SlideShare a Scribd company logo
IMPROVING THE SEARCH
MECHANISM FOR UNSTRUCTURED
PEER-TO-PEER NETWORKS USING
STATISTICAL MATRIX FORM
A FINAL YEAR PROJECT BY
ADITYA KUMAR 1 P I 1 2 I S 0 0 4
RAVIKUMARA K G 1 P I 1 3 I S 4 1 7
GUIDE
PARIMALA R
ASSISTANT PROFESSOR
DEPT. OF INFORMATION SCIENCE & ENGINEERING
PESIT, BANGALORE
D E PA R T M E N T O F I N F O R M AT I O N S C I E N C E & E N G I N E E R I N G
PROBLEM STATEMENT
EXSISTING SYSTEM
PROPOSED SYSTEM
METHODOLOGY
DEPT. OF INFORMATION SCIENCE & ENGINEERING
 The Peer-to-Peer network is an emerging communication model where a group of systems are interconnected in such a way that all
systems have similar service capabilities
 There are two main types of Peer-to-Peer networks; Structure Peer-to-Peer networks and Unstructured Peer-to-Peer networks.
 Our project deals with the how searching operations are performed in an Unstructured Peer-to-Peer network.
 The features which are to be analyzed are:
 Processing Ability (PA)
 Effective Sharing (ES)
 Index Power (IP)
 Transmission Efficiency (TE)
DEPT. OF INFORMATION SCIENCE & ENGINEERING
 The objective of our project is to improve the existing search mechanism in an unstructured
Peer-to-Peer network by using a Statistical Matrix Form.
 Keeping a track for the number of shared files.
 The quality of the content that is to be forwarded.
 The query transmission between the source and the neighbors.
 The transmission distance between the neighbors
EXISTING SYSTEM
The basic search mechanism used in an unstructured Peer-to-Peer network is flooding.
Another search approach commonly used is the Random Walk (RW) approach.
The RW search mechanism suffers from two fundamental problems.
Multiple Random Walk (MRW) improves the RW and the k-walker approaches by enabling a query peer to select k
different neighbours arbitrarily in each step.
The above search mechanisms select neighbours without any strategies, so their performance may not be satisfactory.
PROPOSED SYSTEM
We represent the four characteristics in a matrix form called the Statistical Matrix Form (SMF).
We utilize a standard deviation technique to determine an overall ranking of a query peer’s
neighbours.
The performance evaluation demonstrates that the response time and traffic overhead can be reduced significantly,
while the computation overhead is acceptable.
DEPT. OF INFORMATION SCIENCE & ENGINEERING
PSEUDO CODE
 1.1.
DEPT. OF INFORMATION SCIENCE & ENGINEERING
PSEUDO CODE
 1.2.
Scoring Matrix 1.3.
DEPT. OF INFORMATION SCIENCE & ENGINEERING
SYSTEM ARCHITECTURE
FEATURE MATRIX
PEER
SERVER
WEIGHT MATRIX
PA ES IP TE
PEERDEPT. OF INFORMATION SCIENCE & ENGINEERING
FUNCTIONAL REQUIREMENTS
 The peer initiator is responsible for creating the network for the other peers to connect
 Peers connect to the network by running the peer and connecting to the network
 Peers can upload the file which will be divided to the other peers
 Peer provides the query for the requested data based on which Matrix are created.
 Server accepts the request from the peer and performs the task
DEPT. OF INFORMATION SCIENCE & ENGINEERING
USE CASES
DEPT. OF INFORMATION SCIENCE & ENGINEERING
Network Creation
Deploy Peer
Monitoring Peer
Upload File
Connect
Search file
Chunks Creation
FM
WM
SM
Server
Peer
SEQUENCE DIAGRAM
PeerServer Network
Create
Network
Assign Port
Response
Peer
Details
Store
Reply
DEPT. OF INFORMATION SCIENCE & ENGINEERING
SEQUENCE DIAGRAM CONT..,
ServerPeer
Connect
Upload
Download
Information
Assign Port
Selected
Check SM
Reply
Chunks
File Request
Reply
DEPT. OF INFORMATION SCIENCE & ENGINEERING
DFD L-1
Server
Connection
Network
Create
Network
Assign
New Port
Peer
Create
Chunks
Upload
File
Connection
Peer
DEPT. OF INFORMATION SCIENCE & ENGINEERING
DFD L-2
Server
Search File
Assign Port
Creates
Network
Connection
Request
Peer
PA ES IP TE
Weight
Matrix
Score
Matrix
Selected Peer
Forward
File
DEPT. OF INFORMATION SCIENCE & ENGINEERING
OUTCOME
SMF performs more than 80 percent better than the flooding approach in terms of
the traffic overhead.
Compared to the multiple random walk approach, SMF’s response times and
success rate are 40 percent and 20 percent better respectively.
SMF is an effective search mechanism for P2P networks.
DEPT. OF INFORMATION SCIENCE & ENGINEERING
DEPT. OF INFORMATION SCIENCE & ENGINEERING

More Related Content

What's hot

Path Analysis
Path AnalysisPath Analysis
Path Analysis
Khoshnaw Rahmani
 
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Amr E. Mohamed
 
RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...
RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...
RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...
ASWATHYSANAND1
 
Application of Analytic Hierarchy Process for the Selection of Best Tablet Model
Application of Analytic Hierarchy Process for the Selection of Best Tablet ModelApplication of Analytic Hierarchy Process for the Selection of Best Tablet Model
Application of Analytic Hierarchy Process for the Selection of Best Tablet Model
Shankha Goswami
 
Criteria-III-NBA.pdf
Criteria-III-NBA.pdfCriteria-III-NBA.pdf
Criteria-III-NBA.pdf
sulekhasaxena2
 
Markov chain intro
Markov chain introMarkov chain intro
Markov chain intro
2vikasdubey
 
Reduced order observers
Reduced order observersReduced order observers
Reduced order observers
Solo Hermelin
 
Concurrent Engineering
Concurrent EngineeringConcurrent Engineering
Concurrent Engineering
Nitin Chandekar
 
co-ordinate systems
 co-ordinate systems co-ordinate systems
co-ordinate systems
Suganthi Thangaraj
 
A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...
A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...
A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...
Shankha Goswami
 
02trainingmaterialformsa (1) 111030062223-phpapp02
02trainingmaterialformsa (1) 111030062223-phpapp0202trainingmaterialformsa (1) 111030062223-phpapp02
02trainingmaterialformsa (1) 111030062223-phpapp02
Junelly Grace Catalan-Tecson
 
topology.pptx
topology.pptxtopology.pptx
topology.pptx
cesa23
 
Change Point | Statistics
Change Point | StatisticsChange Point | Statistics
Change Point | Statistics
Transweb Global Inc
 
3.funzioni esecutive
3.funzioni esecutive3.funzioni esecutive
3.funzioni esecutiveiva martini
 
NBA preparation for Tier-II Institute according to revised SAR
NBA preparation for Tier-II Institute according to revised SAR NBA preparation for Tier-II Institute according to revised SAR
NBA preparation for Tier-II Institute according to revised SAR
sushantvwaghmare
 
187186134 5-geometric-modeling
187186134 5-geometric-modeling187186134 5-geometric-modeling
187186134 5-geometric-modeling
manojg1990
 
CADM-Unit 1/INTRODUCTION
CADM-Unit 1/INTRODUCTIONCADM-Unit 1/INTRODUCTION
CADM-Unit 1/INTRODUCTION
gopalkrishnan202
 
Topological Data Analysis.pptx
Topological Data Analysis.pptxTopological Data Analysis.pptx
Topological Data Analysis.pptx
Colleen Farrelly
 
Probability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfProbability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdf
Vedant Srivastava
 
Markov chain analysis
Markov chain analysisMarkov chain analysis
Markov chain analysis
Divyandu Pandey
 

What's hot (20)

Path Analysis
Path AnalysisPath Analysis
Path Analysis
 
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
Modern Control - Lec 04 - Analysis and Design of Control Systems using Root L...
 
RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...
RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...
RENEWABLE INTEGRATION IN HYBRID AC/DC SYSTEMS USING A MULTIPORT AUTONOMOUS RE...
 
Application of Analytic Hierarchy Process for the Selection of Best Tablet Model
Application of Analytic Hierarchy Process for the Selection of Best Tablet ModelApplication of Analytic Hierarchy Process for the Selection of Best Tablet Model
Application of Analytic Hierarchy Process for the Selection of Best Tablet Model
 
Criteria-III-NBA.pdf
Criteria-III-NBA.pdfCriteria-III-NBA.pdf
Criteria-III-NBA.pdf
 
Markov chain intro
Markov chain introMarkov chain intro
Markov chain intro
 
Reduced order observers
Reduced order observersReduced order observers
Reduced order observers
 
Concurrent Engineering
Concurrent EngineeringConcurrent Engineering
Concurrent Engineering
 
co-ordinate systems
 co-ordinate systems co-ordinate systems
co-ordinate systems
 
A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...
A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...
A COMPARATIVE STUDY OF DIFFERENT INTEGRATED MULTIPLE CRITERIA DECISION MAKING...
 
02trainingmaterialformsa (1) 111030062223-phpapp02
02trainingmaterialformsa (1) 111030062223-phpapp0202trainingmaterialformsa (1) 111030062223-phpapp02
02trainingmaterialformsa (1) 111030062223-phpapp02
 
topology.pptx
topology.pptxtopology.pptx
topology.pptx
 
Change Point | Statistics
Change Point | StatisticsChange Point | Statistics
Change Point | Statistics
 
3.funzioni esecutive
3.funzioni esecutive3.funzioni esecutive
3.funzioni esecutive
 
NBA preparation for Tier-II Institute according to revised SAR
NBA preparation for Tier-II Institute according to revised SAR NBA preparation for Tier-II Institute according to revised SAR
NBA preparation for Tier-II Institute according to revised SAR
 
187186134 5-geometric-modeling
187186134 5-geometric-modeling187186134 5-geometric-modeling
187186134 5-geometric-modeling
 
CADM-Unit 1/INTRODUCTION
CADM-Unit 1/INTRODUCTIONCADM-Unit 1/INTRODUCTION
CADM-Unit 1/INTRODUCTION
 
Topological Data Analysis.pptx
Topological Data Analysis.pptxTopological Data Analysis.pptx
Topological Data Analysis.pptx
 
Probability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfProbability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdf
 
Markov chain analysis
Markov chain analysisMarkov chain analysis
Markov chain analysis
 

Similar to Improving the search mechanism for unstructured peer to-peer networks using the statistical matrix form

Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
International Journal of Engineering Inventions www.ijeijournal.com
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesA Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic Matrices
IJERA Editor
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
ncct
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET Journal
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET Journal
 
F233842
F233842F233842
F233842
irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
journalBEEI
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
TTA_TNagar
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
TTA_TNagar
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
IJARIIT
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETPerformance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
jannahyusoff1
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
ijp2p
 
Internet data mining 2006
Internet data mining   2006Internet data mining   2006
Internet data mining 2006raj_vij
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
IRJET Journal
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
IOSR Journals
 
Benefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, NcctBenefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, Ncct
ncct
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Editor IJMTER
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
redpel dot com
 

Similar to Improving the search mechanism for unstructured peer to-peer networks using the statistical matrix form (20)

Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P SystemNon Path-Based Mutual Anonymity Protocol for Decentralized P2P System
Non Path-Based Mutual Anonymity Protocol for Decentralized P2P System
 
A Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic MatricesA Multipath Connection Model for Traffic Matrices
A Multipath Connection Model for Traffic Matrices
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET - Detecting and Securing of IP Spoofing Attack by using SDN
IRJET - Detecting and Securing of IP Spoofing Attack by using SDN
 
F233842
F233842F233842
F233842
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETPerformance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
Internet data mining 2006
Internet data mining   2006Internet data mining   2006
Internet data mining 2006
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Benefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, NcctBenefits Of Final Year Projects, Ncct
Benefits Of Final Year Projects, Ncct
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Improving the search mechanism for unstructured peer to-peer networks using the statistical matrix form

  • 1. IMPROVING THE SEARCH MECHANISM FOR UNSTRUCTURED PEER-TO-PEER NETWORKS USING STATISTICAL MATRIX FORM A FINAL YEAR PROJECT BY ADITYA KUMAR 1 P I 1 2 I S 0 0 4 RAVIKUMARA K G 1 P I 1 3 I S 4 1 7 GUIDE PARIMALA R ASSISTANT PROFESSOR DEPT. OF INFORMATION SCIENCE & ENGINEERING PESIT, BANGALORE D E PA R T M E N T O F I N F O R M AT I O N S C I E N C E & E N G I N E E R I N G
  • 2. PROBLEM STATEMENT EXSISTING SYSTEM PROPOSED SYSTEM METHODOLOGY DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 3.  The Peer-to-Peer network is an emerging communication model where a group of systems are interconnected in such a way that all systems have similar service capabilities  There are two main types of Peer-to-Peer networks; Structure Peer-to-Peer networks and Unstructured Peer-to-Peer networks.  Our project deals with the how searching operations are performed in an Unstructured Peer-to-Peer network.  The features which are to be analyzed are:  Processing Ability (PA)  Effective Sharing (ES)  Index Power (IP)  Transmission Efficiency (TE) DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 4.  The objective of our project is to improve the existing search mechanism in an unstructured Peer-to-Peer network by using a Statistical Matrix Form.  Keeping a track for the number of shared files.  The quality of the content that is to be forwarded.  The query transmission between the source and the neighbors.  The transmission distance between the neighbors
  • 5. EXISTING SYSTEM The basic search mechanism used in an unstructured Peer-to-Peer network is flooding. Another search approach commonly used is the Random Walk (RW) approach. The RW search mechanism suffers from two fundamental problems. Multiple Random Walk (MRW) improves the RW and the k-walker approaches by enabling a query peer to select k different neighbours arbitrarily in each step. The above search mechanisms select neighbours without any strategies, so their performance may not be satisfactory.
  • 6. PROPOSED SYSTEM We represent the four characteristics in a matrix form called the Statistical Matrix Form (SMF). We utilize a standard deviation technique to determine an overall ranking of a query peer’s neighbours. The performance evaluation demonstrates that the response time and traffic overhead can be reduced significantly, while the computation overhead is acceptable. DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 7. PSEUDO CODE  1.1. DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 8. PSEUDO CODE  1.2. Scoring Matrix 1.3. DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 9. SYSTEM ARCHITECTURE FEATURE MATRIX PEER SERVER WEIGHT MATRIX PA ES IP TE PEERDEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 10. FUNCTIONAL REQUIREMENTS  The peer initiator is responsible for creating the network for the other peers to connect  Peers connect to the network by running the peer and connecting to the network  Peers can upload the file which will be divided to the other peers  Peer provides the query for the requested data based on which Matrix are created.  Server accepts the request from the peer and performs the task DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 11. USE CASES DEPT. OF INFORMATION SCIENCE & ENGINEERING Network Creation Deploy Peer Monitoring Peer Upload File Connect Search file Chunks Creation FM WM SM Server Peer
  • 12. SEQUENCE DIAGRAM PeerServer Network Create Network Assign Port Response Peer Details Store Reply DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 13. SEQUENCE DIAGRAM CONT.., ServerPeer Connect Upload Download Information Assign Port Selected Check SM Reply Chunks File Request Reply DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 17. Server Search File Assign Port Creates Network Connection Request Peer PA ES IP TE Weight Matrix Score Matrix Selected Peer Forward File DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 18. OUTCOME SMF performs more than 80 percent better than the flooding approach in terms of the traffic overhead. Compared to the multiple random walk approach, SMF’s response times and success rate are 40 percent and 20 percent better respectively. SMF is an effective search mechanism for P2P networks. DEPT. OF INFORMATION SCIENCE & ENGINEERING
  • 19. DEPT. OF INFORMATION SCIENCE & ENGINEERING

Editor's Notes

  1. Peer-to-peer (P2P) networking is a distributed application architecture that partitions tasks or work loads between peers. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. Peers are both suppliers and consumers of resources, in contrast to the traditional client-server model in which the consumption and supply of resources is divided. Unstructured peer-to-peer networks do not impose a particular structure on the overlay network by design, but rather are formed by nodes that randomly form connections to each other. Because there is no structure globally imposed upon them, unstructured networks are easy to build and allow for localized optimizations to different regions of the overlay.  primary limitations of unstructured networks also arise from this lack of structure. In particular, when a peer wants to find a desired piece of data in the network, the search query must be flooded through the network to find as many peers as possible that share the data. Flooding causes a very high amount of signalling traffic in the network, uses more CPU/memory .  there is no correlation between a peer and the content managed by it, there is no guarantee that flooding will find a peer that has the desired data. Popular content is likely to be available at several peers and any peer searching for it is likely to find the same thing. But if a peer is looking for rare data shared by only a few other peers, then it is highly unlikely that search will be successful.
  2. In structured peer-to-peer networks the overlay is organized into a specific topology, and the protocol ensures that any node can efficiently search the network for a file/resource, even if the resource is extremely rare. The most common type of structured P2P networks implement a distributed hash table. his enables peers to search for resources on the network using a hash table: that is, (key, value) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given key.  in DHT-based solutions such as high cost of advertising/discovering resources and static and dynamic load imbalance.
  3. PA: usually free loaders who download files without sharing any of their resources, which impacts the search performance of coadjutant communities. To prevent free loaders, we utilize the PA to differentiate between leeching and enthusiastic peers. The PA score is computed in terms of the peers’ query frequency and response frequency. Query Frequency (QF): In a P2P network, a query peer that generates a lot of queries may be a free loader. Response Frequency (RF): If a peer responds to a large number of queries, we define it as an “eager” peer. The term “response frequency” refers to a peer’s ability to respond to queries.
  4. Effective Sharing :the file-sharing among peers is extremely unbalanced. which is used to determine the number of files shared among peers in a P2P network. Because query answering involves matching keywords with the names of all shared files, as the number of shared files increases, the probability of successful matching should also increase Sharing Count (SC): When choosing influential neighbours to send queries from a query peer, it is necessary to consider the number of files shared by the peers. In a real environment, if a peer shares a large number of files, it should have a higher probability of matching queries than a peer that only shares a few files. Quality of Sharing (QS): It has been shown that some shared files are never used to answer queries .If we only consider the number of files used to answer queries, the number of files shared with query peers has a strong correlation with the responding peers. “quality of sharing", to distinguish useful files from useless files. 2. Index Power: volunteers have different-sized indexes to record historical information. if a peer records a large number of file sharing messages in its index, many of the messages may never be used by the mechanism. The Index Power (IP) feature determines the amount of content in a queried peer’s index and assesses its quality. Index Count (IC): The index count feature records the number of messages in a peer’s index. A peer records a large amount of information in its index, it will have a higher probability of matching queries. Quality of the Index (QI): the quality of an index’s content and the characteristics of the files. Since the probability of index hits may be influenced by the index counts as well as the quality of the index’s content, we count the number of index hits to analyze the quality of the information in the index.
  5. 1.Numerous search mechanisms have been proposed to reduce the large amount of unnecessary traffic generated by flooding based search mechanisms in unstructured P2P networks. The flooding technique sends query messages to all the logical neighbors of a query peer, except the incoming peer, until the Time-To-Live2 (TTL) decreases to zero or the query receives a response. 2. Random Walk (RW): approach reduces the exponentially increasing flood traffic caused by randomly choosing a neighbor to send a query message until sufficient responses are generated .Although the amount of traffic can be reduced, the RW search mechanism suffers from two fundamental problems. First, it is essentially a blind search because, in each step, a query is forwarded to a random peer. Second, if the query arrives at a peer that is already overloaded with traffic, the queried peer may be queued for an excessive amount of time before it can be handled. 3. The random k-walker algorithm improves RW by sending a query to k neighbors, called “kwalkers,” of the source peer. Each walker randomly selects one neighbor and delivers the query to that neighbor. 4. The Multiple Random Walk improves the RW and the k-walker approaches by enabling a query peer to select k different neighbors arbitrarily in each step. 5. the Adaptive Probabilistic Search approach in which a query peer only sends a query to a proper subset of appropriate neighbors rather than all of its neighbors.
  6. N(u) be the neighbors of a query peer u. N(u) are peers that are one hop away from u. NQ(v) be the number of queries sent by v. peer u computes SQ1(u), which is the total number of queries (SQ) sent from the peers that are one hop away from u. SQ1(u) =……….. The Query-Minus-Score (QMS) of a neighbor v of u is……… When NQ(v) increases, the possibility of v being regarded as a free loader also increases and peer v will be assigned a lower score. 2. Each peer u computes SR1(u) (resp. SR2(u)), which is the sum of the response times (SR) of peers that are one (resp. two) hop(s) away from u……. where NR(v) is the number of responses sent by peer v. 3. query peer u computes SF1(u) (resp. SF2(u)) which is the total number of shared files (SF) by peers that are one (resp. two) hop(s) away from u. NF(v) is the number of shared files. 4. NFH(v) be the number of v’s shared files that match queries. Each query peer u computes SFH1(u) (resp. SFH2(u)), which is the effectiveness of the neighbors of a query peer u. 5. Query peer u computes SI1(u) (resp. SI2(u)) which is the number of indices of the peers that are one (resp. two) hop(s) away from u. 6. query peer u computes SIH1(u) (resp. SIH2(u)) which is the total number of index hits of peers that are one (resp. two) hop(s) away from u.
  7. query peer u computes SLD1(u), which is the sum of the link-distances of peers that are one hop away from u. where LD(u; v) is the link-distance between u and v. The Link-Minus-Score (LMS) of a neighbor v of u. when LD(u; v) increases, the distance between peers u and v also increases; thus, peer v will be assigned a lower score. SLMS1(u) (resp. SLMS2(u)), which is the sum of the link-minus-scores of peers that are one (resp. two) hop(s) away from peer u. Weight Matrix: used to normalize the values of the feature matrix
  8. Changes--Db->network