SlideShare a Scribd company logo
CSM13CSM13
Software AgentsSoftware Agents
Seminar 5: Agents and P2P NetworksSeminar 5: Agents and P2P Networks
j.salter@surrey.ac.uk
http://www.computing.surrey.ac.uk/personal/st/N.Antonopoulos
Acknowledgements
Some of the slides in this presentation are taken or adapted from:
Sebastien Baehni. “Introduction to P2P and the JXTA framework”
http://www.ece.rutgers.edu/~parashar/Classes/03-04/ece451-566/slides/p2p.pdf
Frans Kaashoek et al. “Peer-to-Peer computing research: a fad?”
http://project-iris.net/talks/dht-toronto-03.ppt
Vinod Muthusamy. “An Introduction to Peer-to-Peer Networks”
http://www.eecg.toronto.edu/~jacobsen/mie456/slides/p2p-mie.pdf
Network Architectures
Client/Server Pure Peer-to-Peer
• Clients send requests to/via a
central server
• Small #messages
• Single point of failure
• Problem: Extreme scalability
• No central server
• Clients connected to
one or more peers
• Resilient
• Large #messages
Hybrid Peer-to-Peer Networks
• Some nodes act as group managers/routers
• More robust than client/server
• Potentially lower #messages than pure P2P
Characteristics of a P2P Network
• Nodes can act as clients and servers
• No centralised server/authority
– In Pure P2P Networks
• Network is highly dynamic
– Nodes join and leave regularly
• Large-scale
– Potentially millions of nodes
• Nodes are autonomous
– But co-operate to share/retrieve resources
Benefits of P2P Networks
• Efficient use of resources
• Scalability
• Reliability
• Ease of administration
but
• Increased message costs
• More complicated than client/server interaction
The Agent Relationship
• How does this relate to agents?
– P2P network platform for mobile agents
– Access agents over P2P network
– Agents administer P2P network
• P2P Networks are useless if agents, users and
applications cannot find resources they require
– Queries can be represented as agents
Research Question
How can we efficiently and accurately discover resources and
services in a P2P network?
Solution 1: Introduce some centralisation
Solution 2: Introduce some structure
“centralisation” and “structure” define two dimensions for classifying P2P networks
Napster
• Lists of files are uploaded
to Napster server
• Queries contain various
keywords of required file
• Server returns IP address
of user machines having
the file
• Client chooses user
machine and sets up
connection to it
• File transfer is direct
Napster
Centralised model
Napster server ensures correct results
Only used for finding the location of the files
Scalability bottleneck
Single point of failure
Denial of Service attacks possible
Lawsuits
Gnutella
• Decentralised search – no
central server
• Queries are sent to the
neighbour nodes
• Neighbours ask their own
neighbours, etc.
• Time To Live (TTL) field to
prevent loops
• File transfer is direct
Gnutella
Decentralised model
No single point of failure
Less susceptible to denial of service
SCALABILITY (flooding)
Cannot ensure correct results: “query
horizon”
KaZaA
• Hybrid of Napster and Gnutella
• Super-peers act as local search hubs
– Each super-peer is like a constrained Napster server
– Automatically chosen based on capacity and availability
• Lists of files are uploaded to a super-peer
• Super-peers periodically exchange file lists
• Queries are sent to super-peers
Freenet
• Ensures anonymity
• Decentralised search
• Queries are sent to the
neighbour nodes
• Neighbours ask their
own neighbours, etc.
• The query process is
sequential
• Learning ability
• Files propagate back
along query route
• Second generation P2P (overlay) networks
• Self-organizing
• Load balanced
• Fault-tolerant
• Guarantees on numbers of hops to answer a query
• Based on a distributed hash table interface
Structured P2P
• Distributed version of a hash table data structure
• Stores (key, value) pairs
• Goal: Efficiently insert/lookup/delete (key, value) pairs
• Each peer stores a subset of (key, value) pairs in the system
• Core operation: Find node responsible for a key
• Map key to node
• Efficiently route insert/lookup/delete request to this node
Distributed Hash Tables (DHT)
• Node id: m-bit identifier (similar to an IP address)
• Key: sequence of bytes
• Value: sequence of bytes
put(key, value)
 Store (key,value) at the node responsible for the key
value = get(key)
 Retrieve value associated with key (from the appropriate node)
DHT Generic Interface
• File sharing
• Databases
• Service discovery
• Chat service
• Publish/subscribe networks
DHT Applications
• Keys mapped evenly to all nodes in the network
• Each node maintains information about only a few
other nodes
• Efficient routing of messages to nodes
• Node insertion/deletion only affects a few nodes
DHT Desirable Properties
Node id: m-bit identifier (similar to an IP address)
Key: m-bit identifier (hash of a sequence of bytes)
Value: sequence of bytes
API
• insert(key, value)
• lookup(key)
• update(key, newval)
• join(n)
• leave()
Chord API
Chord Operation
• Nodes form a circle
based on node
identifiers
• Each node is
responsible in storing a
portion of the keys
• Hash function ensures
even distribution of
keys and nodes in the
circle
Chord Operation
Chord Operation
• Lookup the furthest
node that precedes the
key
• Query reaches target
node in O(logN) hops
Chord Properties
In a system with N nodes and K keys:
Each node manages at most K/N keys
Bounded routing information stored in every
node
Lookups resolved with O(logN) hops
Poor network locality
Network Locality
Nodes close on ring can be far in the network
Issues in P2P/Agents
• P2P applications cannot (usually)
communicate with each other
• Agent collaboration over P2P networks
• Enhancements to existing P2P protocols using
agents
• Enhance agent co-ordination schemes using
P2P co-ordination mechanisms
• Self organisation of P2P networks
Summary
• P2P can be used for sharing resources
• Removes need for central management
• Large scale, dynamic networks
• Efficient information organisation and retrieval
• P2P can enhance agent systems
• Agents can enhance P2P
• Focus gradually moves towards the coordinated
use of versatile, distributed computing resources

More Related Content

Similar to Agents and P2P Networks

Lecture: Software Agents and P2P
Lecture: Software Agents and P2PLecture: Software Agents and P2P
Lecture: Software Agents and P2P
James Salter
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...
P. Taylor Goetz
 
From Device to Data Center to Insights
From Device to Data Center to InsightsFrom Device to Data Center to Insights
From Device to Data Center to Insights
DataWorks Summit/Hadoop Summit
 
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
Tristan Penman
 
P2P Lecture.ppt
P2P Lecture.pptP2P Lecture.ppt
P2P Lecture.ppt
JohnRebenRequinto1
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
Chandan Balachandra
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
Clement Robert Habimana
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
James Salter
 
Peer to peer Paradigms
Peer to peer ParadigmsPeer to peer Paradigms
Peer to peer Paradigms
hassan ahmed
 
P2 p
P2 pP2 p
CS8603 DS UNIT 5.pptx
CS8603 DS UNIT 5.pptxCS8603 DS UNIT 5.pptx
CS8603 DS UNIT 5.pptx
BShanmugasundariAssi
 
Distributed "Web Scale" Systems
Distributed "Web Scale" SystemsDistributed "Web Scale" Systems
Distributed "Web Scale" Systems
Ricardo Vice Santos
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
rAVe [PUBS]
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
Olivier Bonaventure
 
Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
Olivier Bonaventure
 
Kademlia introduction
Kademlia introductionKademlia introduction
Kademlia introduction
Priyab Satoshi
 
Msit computer networks 1
Msit computer networks 1Msit computer networks 1
Msit computer networks 1
Sridhar Baithi
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
Joff Thyer
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
home107
 

Similar to Agents and P2P Networks (20)

Lecture: Software Agents and P2P
Lecture: Software Agents and P2PLecture: Software Agents and P2P
Lecture: Software Agents and P2P
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...
 
From Device to Data Center to Insights
From Device to Data Center to InsightsFrom Device to Data Center to Insights
From Device to Data Center to Insights
 
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
PWL Seattle #16 - Chord: A Scalable Peer-to-peer Lookup Protocol for Internet...
 
P2P Lecture.ppt
P2P Lecture.pptP2P Lecture.ppt
P2P Lecture.ppt
 
Peer Sim & P2P
Peer Sim & P2PPeer Sim & P2P
Peer Sim & P2P
 
Final peersimp pt
Final peersimp ptFinal peersimp pt
Final peersimp pt
 
Lecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer NetworksLecture - Network Technologies: Peer-to-Peer Networks
Lecture - Network Technologies: Peer-to-Peer Networks
 
Peer to peer Paradigms
Peer to peer ParadigmsPeer to peer Paradigms
Peer to peer Paradigms
 
P2 p
P2 pP2 p
P2 p
 
CS8603 DS UNIT 5.pptx
CS8603 DS UNIT 5.pptxCS8603 DS UNIT 5.pptx
CS8603 DS UNIT 5.pptx
 
Distributed "Web Scale" Systems
Distributed "Web Scale" SystemsDistributed "Web Scale" Systems
Distributed "Web Scale" Systems
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Node.js
Node.jsNode.js
Node.js
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Part1-Intro-Apps.pptx
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptx
 
Kademlia introduction
Kademlia introductionKademlia introduction
Kademlia introduction
 
Msit computer networks 1
Msit computer networks 1Msit computer networks 1
Msit computer networks 1
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 

More from James Salter

Security for The Machine: By Design
Security for The Machine: By DesignSecurity for The Machine: By Design
Security for The Machine: By Design
James Salter
 
The Machine - a vision for the future of computing
The Machine - a vision for the future of computingThe Machine - a vision for the future of computing
The Machine - a vision for the future of computing
James Salter
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
James Salter
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
James Salter
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
James Salter
 
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer NetworksINC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
James Salter
 
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
James Salter
 
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
James Salter
 
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in GridsINC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
James Salter
 

More from James Salter (9)

Security for The Machine: By Design
Security for The Machine: By DesignSecurity for The Machine: By Design
Security for The Machine: By Design
 
The Machine - a vision for the future of computing
The Machine - a vision for the future of computingThe Machine - a vision for the future of computing
The Machine - a vision for the future of computing
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Accumulo: A Quick Introduction
Accumulo: A Quick IntroductionAccumulo: A Quick Introduction
Accumulo: A Quick Introduction
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
 
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer NetworksINC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
INC 2005 - ROME: Optimising DHT-based Peer-to-Peer Networks
 
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
PDPTA 05 Poster: ROME: Optimising Lookup and Load-Balancing in DHT-Based P2P ...
 
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
FCS 05: A Multi-Ring Method for Efficient Multi-Dimensional Data Lookup in P2...
 
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in GridsINC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
INC 2004: An Efficient Mechanism for Adaptive Resource Discovery in Grids
 

Recently uploaded

Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 

Recently uploaded (20)

Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 

Agents and P2P Networks

  • 1. CSM13CSM13 Software AgentsSoftware Agents Seminar 5: Agents and P2P NetworksSeminar 5: Agents and P2P Networks j.salter@surrey.ac.uk http://www.computing.surrey.ac.uk/personal/st/N.Antonopoulos
  • 2. Acknowledgements Some of the slides in this presentation are taken or adapted from: Sebastien Baehni. “Introduction to P2P and the JXTA framework” http://www.ece.rutgers.edu/~parashar/Classes/03-04/ece451-566/slides/p2p.pdf Frans Kaashoek et al. “Peer-to-Peer computing research: a fad?” http://project-iris.net/talks/dht-toronto-03.ppt Vinod Muthusamy. “An Introduction to Peer-to-Peer Networks” http://www.eecg.toronto.edu/~jacobsen/mie456/slides/p2p-mie.pdf
  • 3. Network Architectures Client/Server Pure Peer-to-Peer • Clients send requests to/via a central server • Small #messages • Single point of failure • Problem: Extreme scalability • No central server • Clients connected to one or more peers • Resilient • Large #messages
  • 4. Hybrid Peer-to-Peer Networks • Some nodes act as group managers/routers • More robust than client/server • Potentially lower #messages than pure P2P
  • 5. Characteristics of a P2P Network • Nodes can act as clients and servers • No centralised server/authority – In Pure P2P Networks • Network is highly dynamic – Nodes join and leave regularly • Large-scale – Potentially millions of nodes • Nodes are autonomous – But co-operate to share/retrieve resources
  • 6. Benefits of P2P Networks • Efficient use of resources • Scalability • Reliability • Ease of administration but • Increased message costs • More complicated than client/server interaction
  • 7. The Agent Relationship • How does this relate to agents? – P2P network platform for mobile agents – Access agents over P2P network – Agents administer P2P network • P2P Networks are useless if agents, users and applications cannot find resources they require – Queries can be represented as agents
  • 8. Research Question How can we efficiently and accurately discover resources and services in a P2P network? Solution 1: Introduce some centralisation Solution 2: Introduce some structure “centralisation” and “structure” define two dimensions for classifying P2P networks
  • 9. Napster • Lists of files are uploaded to Napster server • Queries contain various keywords of required file • Server returns IP address of user machines having the file • Client chooses user machine and sets up connection to it • File transfer is direct
  • 10. Napster Centralised model Napster server ensures correct results Only used for finding the location of the files Scalability bottleneck Single point of failure Denial of Service attacks possible Lawsuits
  • 11. Gnutella • Decentralised search – no central server • Queries are sent to the neighbour nodes • Neighbours ask their own neighbours, etc. • Time To Live (TTL) field to prevent loops • File transfer is direct
  • 12. Gnutella Decentralised model No single point of failure Less susceptible to denial of service SCALABILITY (flooding) Cannot ensure correct results: “query horizon”
  • 13. KaZaA • Hybrid of Napster and Gnutella • Super-peers act as local search hubs – Each super-peer is like a constrained Napster server – Automatically chosen based on capacity and availability • Lists of files are uploaded to a super-peer • Super-peers periodically exchange file lists • Queries are sent to super-peers
  • 14. Freenet • Ensures anonymity • Decentralised search • Queries are sent to the neighbour nodes • Neighbours ask their own neighbours, etc. • The query process is sequential • Learning ability • Files propagate back along query route
  • 15. • Second generation P2P (overlay) networks • Self-organizing • Load balanced • Fault-tolerant • Guarantees on numbers of hops to answer a query • Based on a distributed hash table interface Structured P2P
  • 16. • Distributed version of a hash table data structure • Stores (key, value) pairs • Goal: Efficiently insert/lookup/delete (key, value) pairs • Each peer stores a subset of (key, value) pairs in the system • Core operation: Find node responsible for a key • Map key to node • Efficiently route insert/lookup/delete request to this node Distributed Hash Tables (DHT)
  • 17. • Node id: m-bit identifier (similar to an IP address) • Key: sequence of bytes • Value: sequence of bytes put(key, value)  Store (key,value) at the node responsible for the key value = get(key)  Retrieve value associated with key (from the appropriate node) DHT Generic Interface
  • 18. • File sharing • Databases • Service discovery • Chat service • Publish/subscribe networks DHT Applications
  • 19. • Keys mapped evenly to all nodes in the network • Each node maintains information about only a few other nodes • Efficient routing of messages to nodes • Node insertion/deletion only affects a few nodes DHT Desirable Properties
  • 20. Node id: m-bit identifier (similar to an IP address) Key: m-bit identifier (hash of a sequence of bytes) Value: sequence of bytes API • insert(key, value) • lookup(key) • update(key, newval) • join(n) • leave() Chord API
  • 21. Chord Operation • Nodes form a circle based on node identifiers • Each node is responsible in storing a portion of the keys • Hash function ensures even distribution of keys and nodes in the circle
  • 23. Chord Operation • Lookup the furthest node that precedes the key • Query reaches target node in O(logN) hops
  • 24. Chord Properties In a system with N nodes and K keys: Each node manages at most K/N keys Bounded routing information stored in every node Lookups resolved with O(logN) hops Poor network locality
  • 25. Network Locality Nodes close on ring can be far in the network
  • 26. Issues in P2P/Agents • P2P applications cannot (usually) communicate with each other • Agent collaboration over P2P networks • Enhancements to existing P2P protocols using agents • Enhance agent co-ordination schemes using P2P co-ordination mechanisms • Self organisation of P2P networks
  • 27. Summary • P2P can be used for sharing resources • Removes need for central management • Large scale, dynamic networks • Efficient information organisation and retrieval • P2P can enhance agent systems • Agents can enhance P2P • Focus gradually moves towards the coordinated use of versatile, distributed computing resources

Editor's Notes

  1. Notice many of the characteristics are similar to agents
  2. Agents can communicate over P2P - autonomous agents more suited to autonomous environments than client/server.
  3. The key is like a filename The value can be file contents