Probabilistic file indexing and searching in unstructured peer-to-peer networks

被引:15
|
作者
Cheng, AH [1 ]
Joung, YJ [1 ]
机构
[1] Natl Taiwan Univ, Dept Informat Management, Taipei 106, Taiwan
关键词
unstructured peer-to-peer network; bloom filter; file search; keyword search; P2P file sharing; probabilistic file indexing; Gnutella;
D O I
10.1016/j.comnet.2005.04.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Thanks to the advance of network and computing technology, Peer-to-Peer (P2P) has become a popular way for file sharing. A huge amount of files can now be directly accessed and downloaded by a simple mouse click. Among the types of P2P networks, unstructured architecture has been proven quite successful, mainly due to its simplicity and robustness. However, searching for distant and rare files is still a challenging problem in unstructured P2P networks. Existing approaches either have poor response time, or generate too much network traffic. In this paper we propose a simple, practical, yet powerful index scheme to enhance search in unstructured P2P networks. The index scheme uses a data structure "Bloom filters" to index files shared at each node, and then lets nodes gossip to one another to exchange their Bloom filters. In effect, each node indexes a random set of files in the network, thereby allowing every query to have a constant probability to be successfully resolved within a fixed search space. The experimental results show that our approach can improve the search in Gnutella by an order of magnitude. For example, in a typical Gnutella network consisting of about 89,000 nodes, by replicating a node's Bloom filter to less than 0.45% of the nodes in the network, 70% of the queries can be resolved within a search space of 200 nodes. In contrast, within the same search space size, only 1.6% of the queries can be resolved without the index scheme; or, alternatively, more than 48,000 nodes need to be searched in Gnutella in order to reach the same success rate as our index scheme. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:106 / 127
页数:22
相关论文
共 50 条
  • [21] Probabilistic replication based on access frequencies in unstructured peer-to-peer networks
    Hara, Takahiro
    Kido, Yuki
    Nishio, Shojiro
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 791 - 800
  • [22] Improving Network Coding Based File Sharing for Unstructured Peer-to-Peer Networks
    Leu, Jenq-Shiou
    Yu, Min-Chieh
    Yueh, Hsiao-Chuan
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (04) : 803 - 829
  • [23] Improving Network Coding Based File Sharing for Unstructured Peer-to-Peer Networks
    Jenq-Shiou Leu
    Min-Chieh Yu
    Hsiao-Chuan Yueh
    [J]. Journal of Network and Systems Management, 2015, 23 : 803 - 829
  • [24] Search in unstructured peer-to-peer networks
    Jia, ZQ
    Tang, XH
    You, JY
    Li, ML
    [J]. WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 694 - 705
  • [25] Structuring unstructured peer-to-peer networks
    Schmid, Stefan
    Wattenhofer, Roger
    [J]. HIGH PERFORMANCE COMPUTING - HIPC 2007, PROCEEDINGS, 2007, 4873 : 432 - 442
  • [26] Searching Flocks in Peer-to-Peer Networks
    Pommier, Hugo
    Romito, Benoit
    Bourdon, Francois
    [J]. ADVANCES ON PRACTICAL APPLICATIONS OF AGENTS AND MULTI-AGENT SYSTEMS, 2011, 88 : 103 - 108
  • [27] Replication strategies in unstructured peer-to-peer networks
    Cohen, E
    Shenker, S
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (04) : 177 - 190
  • [28] ON COVERAGE BOUNDS OF UNSTRUCTURED PEER-TO-PEER NETWORKS
    Chandra, Joydeep
    Ganguly, Niloy
    [J]. ADVANCES IN COMPLEX SYSTEMS, 2011, 14 (04): : 611 - 633
  • [29] Efficient search in unstructured peer-to-peer networks
    Cholvi, V
    Felber, P
    Biersack, E
    [J]. EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2004, 15 (06): : 535 - 548
  • [30] On Unbiased Sampling for Unstructured Peer-to-Peer Networks
    Stutzbach, Daniel
    Rejaie, Reza
    Duffield, Nick
    Sen, Subhabrata
    Willinger, Walter
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (02) : 377 - 390