SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 3, Issue 3 (October 2013) PP: 15-18

A Comparison between Flooding and Bloom Filter Based
Multikeyword Search in Peer-To-Peer Network
Amulia P.M1, Jisha G2
1

Department of Information Technology, RSET, Kakkanad,
Department of Information Technology, RSET, Kakkanad

2

ABSTRACT: P2P networks are popular in multikeyword searching systems. There are centralized and
decentralized P2P networks. P2P systems can also be structured or unstructured. The common technique like
flooding used in unstructured network for keyword search incurs large amount of unnecessary traffic. The
bloom filter technique used in keyword search reduces unnecessary traffic in the network. With user demand
becoming complex and broad, multikeyword search is becoming popular. This paper gives a comparison
between flooding and bloom filter based multikeyword search techniques.

Keywords: P2P,flooding, TTL, query, bloom filter
I.
INTRODUCTION
Peer-to-peer (P2P) network is a popular information sharing tool where data is located mostly in
geographically separate locations. Peer-to-peer network could be structured or unstructured. Search process
includes query forwarding, identifying the set of nodes that should be contacted for the result, local processing
of the query, local indices that are stored in each peer and its updating. The search efficiency depends greatly
on the time taken to provide the result. The search techniques [1] used in unstructured networks is blind or
informed search. The common blind search technique [2] is flooding. Flooding uses the basic technique to flood
the network with query. Unnecessary nodes are contacted in flooding based search technique. The single
keyword search requires the result of the query to be received with minimum delay and lesser bandwidth
wastage. The bloom filters are probabilistic data structures that specify the membership of an element in a set. It
is a bit vector that specifies “is an element present in the set”. Using encoded filters the amount of data
transmitted through the network is reduced. With user query becoming broad and complex multikeyword search
is becoming popular.
In a query that includes “cloud computing” the query is separated into individual keywords “cloud” and
“computing”. The traditional method includes that each keyword be separately searched and the results to be
merged at the selected peer node. The keywords “cloud” and “computing” are separately searched. If this multi
keyword search requires flooding technique the amount of traffic and the number of unnecessary peer nodes
contacted would be numerous. Consider a Google web search that includes contacting each and every node in
the network. This could cause wastage of resources. The search will be time consuming leading to user
frustration. The benefit of flooding technique is guaranteed search result. There are different ways to improve
flooding technique [3]. The informed search technique, bloom filter discussed in the paper reduces the
unnecessary overhead data in the network.
The rest of this paper is organized as follows. Section 2 provides an idea of multikeyword search using
intersection and union operations. Section 3 gives a comparison of flooding and bloom filter based multikeyword
search and a conclusion is given in section 4
II.

MULTIKEYWORD SEARCH USING INTERSECTION AND UNION OPERATION

In multikeyword search the search query is separated into individual keywords and each keyword is
separately searched. The result is obtained after the distributed intersection of each keyword results if the
required operation is AND. Given an example for a two-keyword (keyword1, keyword2) search, the keyword1
is searched and the result identifiers x_id are obtained. The keyword2 is also propagated in the similar manner
and the result identifiers y_id are obtained. The identifiers x_id contains the set of result identifiers that contains
keyword1 and identifiers y_id contains the set of result identifiers that contains keyword2. The resultant
intersection [9, 10] operation is found using x_id ∩y_id. The result is sent to the client node that requested the
search result for the query.
In some queries the user requires the results containing any of the keywords, OR operation. The
technique used is union of results. The multikeyword query containing keywords (keyword1, keyword2) are
separated into individual keywords and searched separately. The search results x_id contains the result
identifiers for all the documents containing keyword1 and y_id contains the result identifiers for all the
www.ijeijournal.com

Page | 15
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network
documents containing keyword2. Finally the result (x_id, y_id) are merged [9, 10], x_id U y_id and the result
sent to the client. Depending on the popularity of the query the result can be cached for a time period at the
query node.

COMPARISON OF FLOODING AND BLOOM FILTER BASED MULTIKEYWORD SEARCH

III.

The common search technique used in an unstructured basic Gnutella [4, 5] network is flooding.
Gnutella is the first decentralized peer-to-peer network of its kind. The flooding technique uses simple
broadcasting method where each node contacts all its neighbors. Time to live (TTL) or hop count can be used to
reduce the number of nodes contacted. Flooding comes under the category of blind search. In blind search there
is no information about the route to follow to get to the result. The queries are broad casted or flooded in the
same manner with the results of the query directed back to the unique node. The unnecessary overload on the
network can be reduced with time to live (TTL) value. Choosing the appropriate TTL is not easy. If the TTL is
too low the required search result will not be obtained. As the value of TTL increases, the overhead of flooding
increases. Ultra peer is a concept that was introduced in Gnutella 0.6. These super peers have high capacity,
processing power, memory etc. This architecture saves the client nodes from the burden of extensive message
routing but limits scalability of the network. In multikeyword search in P2P network [7] the query is split into
individual keywords. The result of the individual keyword is either intersected or merged based on the
operation. There are AND or OR operations in a multikeyword search. Flooding technique used in
multikeyword search involves broadcasting of each individual keyword throughout the network. Although the
required search result is provided, this technique overloads the network with unnecessary data. The scalability of
the network is thoroughly affected. Another problem with flooding technique is user frustration since large
amount of time is needed to get the required search result.

Fig 1 P2P network with documents distributed among peer nodes
In Fig 1 if flooding technique is used for the multikeyword search, the keyword is searched in the
document list present in every peer node in the P2P network. For a large network this would be time consuming
causing user frustration. The flooding technique greatly affects the efficiency and scalability of a network.
In informed search intelligent choices are made for the query forwarding based on certain criteria. This
provides optimistic query forwarding so as to get to the result faster. Informed search techniques [6] include
directed breadth first search (DBFS), intelligent search, preferential walk, local indices, routing indices [8] etc. In
multikeyword search the bloom filters provide a faster mechanism to specify if the document for the keyword is
present in the particular peer node. Bloom filter based search technique gives a structured approach to the search
mechanism. The bloom filter [9] technique is also an efficient and improved keyword search mechanism. This
includes transmitting documents in encoded form rather than raw data. This reduces traffic in the network. The
bloom filters are probabilistic data structures that specify the membership of an element in a set. It is a bit vector
that specifies “is an element present in the set”.
{x , y, z}

1

0

0

1

0

1

1

0

1

1

1

0

1

0

0

1

Fig. 2: bloom filter representation of elements {x,y,z}
Fig. 2 shows a bloom filter representation of elements {x,y,z}. The bloom filters shows the bit vector turned on
for each element, specifying their membership in the set.
www.ijeijournal.com

Page | 16
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network
With multikeyword search becoming popular in peer-to-peer network, there should be techniques to guarantee
required search results with minimum overhead and delay. This will reduce the communication cost and
wastage of resources. Bloom Filters are bit vectors that specify if the result document for the particular keyword
is present in the peer node in a P2P network. The problem with using bloom filters is false positive results.
Keywords

Documents

Peer_node1

Peer_node2

Peer_node3

Keyword1

Doc1

1

0

1

Keyword2

Doc2

0

1

0

Keyword3

Doc3

1

0

0

Keyword4

Doc4

0

1

1

Fig 3: Representation of keyword-document-peer_node mapping used in multikeyword search used for bloom
filter creation
Fig 3 shows the keyword-document-peer-node mapping in a multikeyword search used to create bloom filter
vectors set. The multikeyword query is split into individual keywords. The bit vector for the peer_nodes in the
network that contain the document for that particular keyword is turned on (set to 1). If the document for that
keyword is not present in the peer_node the bit vector is set to 0. From the bloom filter set the multikeyword
search is made faster as a mapping is obtained about the location of the result document.
TABLE1 COMPARISON OF FLOODING AND BLOOM FILTER SEARCH
Search Techniques
Advantages
Disadvantages
Guaranteed Search Result
Large network traffic.
Can be used with Unstructured Contacting unnecessary peer nodes.
Flooding Technique
Networks
No information is required about Wastage of resources.
the search.
Can be used with Structured Generation of bloom filters require
networks.
location information of the search
result.
Structured
search
approach. Storage and maintenance of bloom
Bloom Filter Technique
Generated
using
document- filters required.
location mapping information.
Contact only the necessary peernode for the required document
result.
Reduce unnecessary load on the Bloom filter data could include
network.
stale information.
Minimize wastage of resources and False positive results are a very
network bandwidth.
important drawback of bloom
filters.
Reduce communication cost.
IV.
CONCLUSION
There are number of search techniques used with different network topologies. Flooding technique is
commonly used in an unstructured network. This method is reliable but affects the scalability of the P2P network.
Search techniques are selected based on the requirement. The requirement could be, faster search result or
reduced search cost. To reduce communication cost the bandwidth utilization has to be minimized. This requires
more organized search like bloom filter based multikeyword search. Although bloom filters have advantages over
flooding the most important drawback of bloom filters are false positive results. Structured or unstructured
networks, the focus should be to optimize search and provide improved and fast search results.

www.ijeijournal.com

Page | 17
A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network

REFERENCES
[1]

[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

Efficient Search Techniques in Peer to Peer Networks, Tarunpreet Bhatia, Dr Deepak Garg, Computer Science
Department, Thapar University, Patiala . International Journal of Computer Applications(0975- 8887) Volume 36–
No.1, December 2011.
Dynamic Search Algorithm used in Unstructured, B.Srikanth, M.Tech Student, K.Venkateswara Rao, Assoc. Prof in
CSE, QIS College of Engineering & Technology, Ongole, Prakasam Dist, AP, India. International Journal of
Engineering Trends and Technology- Volume2 Issue3- 2011.
Search and Replication in Unstructured Peer-to-Peer Networks, Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott
Shenker. 2002. Search
and replication in unstructured peer-to-peer networks. In Proceedings of the
16th international conference on Supercomputing (ICS '02). ACM, New York, NY, USA, 84-95.
DOI=10.1145/514191.514206. http://doi.acm.org/10.1145/514191.514206.
Survey of search and replication schemes in unstructured P2P networks Sabu M.Thampi, Dept. of Computer Science
and Engineering, Rajagiri School of Engineering and Tecnology ,Kerala , Chandra Sekaran K. Department of
Computer Engineering, NIT, Karnataka
Peer-to-Peer Architecture Case Study : Gnutella Network, Peer-to-Peer Computing, FirstInternationalConferenceon
Aug 2001 Matei, Ripeanu, Department of Computer Science, Chicago University, IL, USA Pages 99-100 Print ISBN
: 0-7695-1503-7 INSPEC Accession Number: 7247201 DOI : 10.1109/P2P.2001.990433, matei@cs uchicago.edu K.
Elissa, “Title of paper if known,” unpublished.
A Comparison of Peer-to-Peer Search Methods; Dimitrios Tsoumakos, Computer Science Department, University of
Maryland, dtsouma@cs.umd.edu, Nick Roussopoulos, Computer Science Department, University of Maryland,
nick@cs.umd.edu. International Workshop on Web and Databases, Proceedings of the Sixth WebDB Workshop San
Diego, California, June , 2003.
Peer-to -Peer Computing : Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, Kiran Nagaraja, Jim Pruyne, Bruno
Richard, Sami Rollins,
Zhichen Xu [dejan, vana, lukose, pruyne, zhichen]@exch.hpl.hp.com,
bruno_richard@hp.com, knagaraj@cs.rutgers.edu, srollins@cs.ucsb.edu, HP Laboratories Palo Alto HPL- 2002- 57
(R.1) July 3rd, 2003.
Routing Indices for Peer-to-Peer Systems ; Distributed Computing Systems, 2002. Proceedings of 22 nd International
Conference on 2002, Arturo Crespo, Hector Garcia-Molina Computer Science Department Stanford University
Stanford, CA 94305-2140, USA {crespo,hector}r@db.Stanford.edu.ISSN: 1063-6927 Print ISBN: 0-7695-1585-1
INSPEC Accession Number : 7404204 DOI : 10.1109/ICDCS.2002.1022239
Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Hanhua Chen,Member, IEEE, Hai Jin,
Senior Member, IEEE, Lei Chen, Member, IEEE Yunhao Liu,Senior Member, IEEE, and Lionel M. Ni, Fellow,
IEEE, IEEE Transactions on Knowledge and Data Engineering, VOL. 24, NO. 4, APRIL 2012.
Efficient Multi-keyword Search over P2P Web; Hanhua Chen, Hai Jin , School of Computer Science and Technology
Huazhong University of Science and Technology Wuhan, 430073, China {chenhanhua,hjin}@hust.edu.cn Jiliang
Wang,Lei Chen,Yunhao Liu,Lionel Ni Department of Computer Science and Engineering Hong Kong University of
Science and Technology Clear Water Bay, Kowloon, Hong Kong {aliang,leichen,liu,ni}@cse.ust.hk. Proceedings of
the 17th international conference on World Wide Web,2008, ISBN: 978-1-60558-085-2 DOI:
10.1145/1367497.136763

www.ijeijournal.com

Page | 18

Contenu connexe

Tendances

A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE ijp2p
 
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...IJORCS
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemeEditor IJMTER
 
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficiently
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast EfficientlyFull-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficiently
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficientlyijsrd.com
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchredpel dot com
 
Performance evaluation of decision tree classification algorithms using fraud...
Performance evaluation of decision tree classification algorithms using fraud...Performance evaluation of decision tree classification algorithms using fraud...
Performance evaluation of decision tree classification algorithms using fraud...journalBEEI
 
2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects 2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects 1crore projects
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET Journal
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREIJCI JOURNAL
 
Bsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexingBsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexingijp2p
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 

Tendances (15)

A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE P2P DOMAIN CLASSIFICATION USING DECISION TREE
P2P DOMAIN CLASSIFICATION USING DECISION TREE
 
IJCA
IJCAIJCA
IJCA
 
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
Privacy Preserving MFI Based Similarity Measure For Hierarchical Document Clu...
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficiently
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast EfficientlyFull-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficiently
Full-Text Retrieval in Unstructured P2P Networks using Bloom Cast Efficiently
 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
 
Performance evaluation of decision tree classification algorithms using fraud...
Performance evaluation of decision tree classification algorithms using fraud...Performance evaluation of decision tree classification algorithms using fraud...
Performance evaluation of decision tree classification algorithms using fraud...
 
2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects 2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
 
Bsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexingBsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexing
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 

En vedette (9)

Chemistry of Ground Waters Containing High Fluoride in Boudh District, Orissa
Chemistry of Ground Waters Containing High Fluoride in Boudh District, OrissaChemistry of Ground Waters Containing High Fluoride in Boudh District, Orissa
Chemistry of Ground Waters Containing High Fluoride in Boudh District, Orissa
 
Nouns
NounsNouns
Nouns
 
Some Studies on Semirings and Ordered Semirings
Some Studies on Semirings and Ordered SemiringsSome Studies on Semirings and Ordered Semirings
Some Studies on Semirings and Ordered Semirings
 
Ejercicio 12 y 19
Ejercicio 12 y 19Ejercicio 12 y 19
Ejercicio 12 y 19
 
Couverture rp
Couverture rpCouverture rp
Couverture rp
 
Research Analysis and Design of Geometric Transformations using Affine Geometry
Research Analysis and Design of Geometric Transformations using Affine GeometryResearch Analysis and Design of Geometric Transformations using Affine Geometry
Research Analysis and Design of Geometric Transformations using Affine Geometry
 
Ceppe 2013 year end evaluation & 2014 planning pp pres
Ceppe 2013 year end evaluation & 2014 planning pp presCeppe 2013 year end evaluation & 2014 planning pp pres
Ceppe 2013 year end evaluation & 2014 planning pp pres
 
The EU Lightbulb Ban
The EU Lightbulb BanThe EU Lightbulb Ban
The EU Lightbulb Ban
 
Responsibility centers
Responsibility centersResponsibility centers
Responsibility centers
 

Similaire à A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network

IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET-  	  Privacy Preserving Keyword Search over Cloud DataIRJET-  	  Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud DataIRJET Journal
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Optimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage DataOptimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage DataIDES Editor
 
Paper id 37201536
Paper id 37201536Paper id 37201536
Paper id 37201536IJRAT
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET Journal
 
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYNEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYijgca
 
New approaches with chord in efficient p2p grid resource discovery
New approaches with chord in efficient p2p grid resource discoveryNew approaches with chord in efficient p2p grid resource discovery
New approaches with chord in efficient p2p grid resource discoveryijgca
 
Navigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyNavigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyIOSR Journals
 

Similaire à A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network (20)

Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly...
Optimizing of Bloom Filters by Automatic Bloom Filter Updating  and Instantly...Optimizing of Bloom Filters by Automatic Bloom Filter Updating  and Instantly...
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly...
 
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET-  	  Privacy Preserving Keyword Search over Cloud DataIRJET-  	  Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Optimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage DataOptimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage Data
 
Paper id 37201536
Paper id 37201536Paper id 37201536
Paper id 37201536
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud Data
 
IJET-V2I6P33
IJET-V2I6P33IJET-V2I6P33
IJET-V2I6P33
 
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYNEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
 
CloWSer
CloWSerCloWSer
CloWSer
 
New approaches with chord in efficient p2p grid resource discovery
New approaches with chord in efficient p2p grid resource discoveryNew approaches with chord in efficient p2p grid resource discovery
New approaches with chord in efficient p2p grid resource discovery
 
F0433439
F0433439F0433439
F0433439
 
Navigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On OntologyNavigation Cost Modeling Based On Ontology
Navigation Cost Modeling Based On Ontology
 

Plus de International Journal of Engineering Inventions www.ijeijournal.com

Plus de International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 3 (October 2013) PP: 15-18 A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network Amulia P.M1, Jisha G2 1 Department of Information Technology, RSET, Kakkanad, Department of Information Technology, RSET, Kakkanad 2 ABSTRACT: P2P networks are popular in multikeyword searching systems. There are centralized and decentralized P2P networks. P2P systems can also be structured or unstructured. The common technique like flooding used in unstructured network for keyword search incurs large amount of unnecessary traffic. The bloom filter technique used in keyword search reduces unnecessary traffic in the network. With user demand becoming complex and broad, multikeyword search is becoming popular. This paper gives a comparison between flooding and bloom filter based multikeyword search techniques. Keywords: P2P,flooding, TTL, query, bloom filter I. INTRODUCTION Peer-to-peer (P2P) network is a popular information sharing tool where data is located mostly in geographically separate locations. Peer-to-peer network could be structured or unstructured. Search process includes query forwarding, identifying the set of nodes that should be contacted for the result, local processing of the query, local indices that are stored in each peer and its updating. The search efficiency depends greatly on the time taken to provide the result. The search techniques [1] used in unstructured networks is blind or informed search. The common blind search technique [2] is flooding. Flooding uses the basic technique to flood the network with query. Unnecessary nodes are contacted in flooding based search technique. The single keyword search requires the result of the query to be received with minimum delay and lesser bandwidth wastage. The bloom filters are probabilistic data structures that specify the membership of an element in a set. It is a bit vector that specifies “is an element present in the set”. Using encoded filters the amount of data transmitted through the network is reduced. With user query becoming broad and complex multikeyword search is becoming popular. In a query that includes “cloud computing” the query is separated into individual keywords “cloud” and “computing”. The traditional method includes that each keyword be separately searched and the results to be merged at the selected peer node. The keywords “cloud” and “computing” are separately searched. If this multi keyword search requires flooding technique the amount of traffic and the number of unnecessary peer nodes contacted would be numerous. Consider a Google web search that includes contacting each and every node in the network. This could cause wastage of resources. The search will be time consuming leading to user frustration. The benefit of flooding technique is guaranteed search result. There are different ways to improve flooding technique [3]. The informed search technique, bloom filter discussed in the paper reduces the unnecessary overhead data in the network. The rest of this paper is organized as follows. Section 2 provides an idea of multikeyword search using intersection and union operations. Section 3 gives a comparison of flooding and bloom filter based multikeyword search and a conclusion is given in section 4 II. MULTIKEYWORD SEARCH USING INTERSECTION AND UNION OPERATION In multikeyword search the search query is separated into individual keywords and each keyword is separately searched. The result is obtained after the distributed intersection of each keyword results if the required operation is AND. Given an example for a two-keyword (keyword1, keyword2) search, the keyword1 is searched and the result identifiers x_id are obtained. The keyword2 is also propagated in the similar manner and the result identifiers y_id are obtained. The identifiers x_id contains the set of result identifiers that contains keyword1 and identifiers y_id contains the set of result identifiers that contains keyword2. The resultant intersection [9, 10] operation is found using x_id ∩y_id. The result is sent to the client node that requested the search result for the query. In some queries the user requires the results containing any of the keywords, OR operation. The technique used is union of results. The multikeyword query containing keywords (keyword1, keyword2) are separated into individual keywords and searched separately. The search results x_id contains the result identifiers for all the documents containing keyword1 and y_id contains the result identifiers for all the www.ijeijournal.com Page | 15
  • 2. A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network documents containing keyword2. Finally the result (x_id, y_id) are merged [9, 10], x_id U y_id and the result sent to the client. Depending on the popularity of the query the result can be cached for a time period at the query node. COMPARISON OF FLOODING AND BLOOM FILTER BASED MULTIKEYWORD SEARCH III. The common search technique used in an unstructured basic Gnutella [4, 5] network is flooding. Gnutella is the first decentralized peer-to-peer network of its kind. The flooding technique uses simple broadcasting method where each node contacts all its neighbors. Time to live (TTL) or hop count can be used to reduce the number of nodes contacted. Flooding comes under the category of blind search. In blind search there is no information about the route to follow to get to the result. The queries are broad casted or flooded in the same manner with the results of the query directed back to the unique node. The unnecessary overload on the network can be reduced with time to live (TTL) value. Choosing the appropriate TTL is not easy. If the TTL is too low the required search result will not be obtained. As the value of TTL increases, the overhead of flooding increases. Ultra peer is a concept that was introduced in Gnutella 0.6. These super peers have high capacity, processing power, memory etc. This architecture saves the client nodes from the burden of extensive message routing but limits scalability of the network. In multikeyword search in P2P network [7] the query is split into individual keywords. The result of the individual keyword is either intersected or merged based on the operation. There are AND or OR operations in a multikeyword search. Flooding technique used in multikeyword search involves broadcasting of each individual keyword throughout the network. Although the required search result is provided, this technique overloads the network with unnecessary data. The scalability of the network is thoroughly affected. Another problem with flooding technique is user frustration since large amount of time is needed to get the required search result. Fig 1 P2P network with documents distributed among peer nodes In Fig 1 if flooding technique is used for the multikeyword search, the keyword is searched in the document list present in every peer node in the P2P network. For a large network this would be time consuming causing user frustration. The flooding technique greatly affects the efficiency and scalability of a network. In informed search intelligent choices are made for the query forwarding based on certain criteria. This provides optimistic query forwarding so as to get to the result faster. Informed search techniques [6] include directed breadth first search (DBFS), intelligent search, preferential walk, local indices, routing indices [8] etc. In multikeyword search the bloom filters provide a faster mechanism to specify if the document for the keyword is present in the particular peer node. Bloom filter based search technique gives a structured approach to the search mechanism. The bloom filter [9] technique is also an efficient and improved keyword search mechanism. This includes transmitting documents in encoded form rather than raw data. This reduces traffic in the network. The bloom filters are probabilistic data structures that specify the membership of an element in a set. It is a bit vector that specifies “is an element present in the set”. {x , y, z} 1 0 0 1 0 1 1 0 1 1 1 0 1 0 0 1 Fig. 2: bloom filter representation of elements {x,y,z} Fig. 2 shows a bloom filter representation of elements {x,y,z}. The bloom filters shows the bit vector turned on for each element, specifying their membership in the set. www.ijeijournal.com Page | 16
  • 3. A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network With multikeyword search becoming popular in peer-to-peer network, there should be techniques to guarantee required search results with minimum overhead and delay. This will reduce the communication cost and wastage of resources. Bloom Filters are bit vectors that specify if the result document for the particular keyword is present in the peer node in a P2P network. The problem with using bloom filters is false positive results. Keywords Documents Peer_node1 Peer_node2 Peer_node3 Keyword1 Doc1 1 0 1 Keyword2 Doc2 0 1 0 Keyword3 Doc3 1 0 0 Keyword4 Doc4 0 1 1 Fig 3: Representation of keyword-document-peer_node mapping used in multikeyword search used for bloom filter creation Fig 3 shows the keyword-document-peer-node mapping in a multikeyword search used to create bloom filter vectors set. The multikeyword query is split into individual keywords. The bit vector for the peer_nodes in the network that contain the document for that particular keyword is turned on (set to 1). If the document for that keyword is not present in the peer_node the bit vector is set to 0. From the bloom filter set the multikeyword search is made faster as a mapping is obtained about the location of the result document. TABLE1 COMPARISON OF FLOODING AND BLOOM FILTER SEARCH Search Techniques Advantages Disadvantages Guaranteed Search Result Large network traffic. Can be used with Unstructured Contacting unnecessary peer nodes. Flooding Technique Networks No information is required about Wastage of resources. the search. Can be used with Structured Generation of bloom filters require networks. location information of the search result. Structured search approach. Storage and maintenance of bloom Bloom Filter Technique Generated using document- filters required. location mapping information. Contact only the necessary peernode for the required document result. Reduce unnecessary load on the Bloom filter data could include network. stale information. Minimize wastage of resources and False positive results are a very network bandwidth. important drawback of bloom filters. Reduce communication cost. IV. CONCLUSION There are number of search techniques used with different network topologies. Flooding technique is commonly used in an unstructured network. This method is reliable but affects the scalability of the P2P network. Search techniques are selected based on the requirement. The requirement could be, faster search result or reduced search cost. To reduce communication cost the bandwidth utilization has to be minimized. This requires more organized search like bloom filter based multikeyword search. Although bloom filters have advantages over flooding the most important drawback of bloom filters are false positive results. Structured or unstructured networks, the focus should be to optimize search and provide improved and fast search results. www.ijeijournal.com Page | 17
  • 4. A Comparison between Flooding and Bloom Filter Based Multikeyword Search in Peer-To-Peer Network REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] Efficient Search Techniques in Peer to Peer Networks, Tarunpreet Bhatia, Dr Deepak Garg, Computer Science Department, Thapar University, Patiala . International Journal of Computer Applications(0975- 8887) Volume 36– No.1, December 2011. Dynamic Search Algorithm used in Unstructured, B.Srikanth, M.Tech Student, K.Venkateswara Rao, Assoc. Prof in CSE, QIS College of Engineering & Technology, Ongole, Prakasam Dist, AP, India. International Journal of Engineering Trends and Technology- Volume2 Issue3- 2011. Search and Replication in Unstructured Peer-to-Peer Networks, Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Shenker. 2002. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th international conference on Supercomputing (ICS '02). ACM, New York, NY, USA, 84-95. DOI=10.1145/514191.514206. http://doi.acm.org/10.1145/514191.514206. Survey of search and replication schemes in unstructured P2P networks Sabu M.Thampi, Dept. of Computer Science and Engineering, Rajagiri School of Engineering and Tecnology ,Kerala , Chandra Sekaran K. Department of Computer Engineering, NIT, Karnataka Peer-to-Peer Architecture Case Study : Gnutella Network, Peer-to-Peer Computing, FirstInternationalConferenceon Aug 2001 Matei, Ripeanu, Department of Computer Science, Chicago University, IL, USA Pages 99-100 Print ISBN : 0-7695-1503-7 INSPEC Accession Number: 7247201 DOI : 10.1109/P2P.2001.990433, matei@cs uchicago.edu K. Elissa, “Title of paper if known,” unpublished. A Comparison of Peer-to-Peer Search Methods; Dimitrios Tsoumakos, Computer Science Department, University of Maryland, dtsouma@cs.umd.edu, Nick Roussopoulos, Computer Science Department, University of Maryland, nick@cs.umd.edu. International Workshop on Web and Databases, Proceedings of the Sixth WebDB Workshop San Diego, California, June , 2003. Peer-to -Peer Computing : Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, Kiran Nagaraja, Jim Pruyne, Bruno Richard, Sami Rollins, Zhichen Xu [dejan, vana, lukose, pruyne, zhichen]@exch.hpl.hp.com, bruno_richard@hp.com, knagaraj@cs.rutgers.edu, srollins@cs.ucsb.edu, HP Laboratories Palo Alto HPL- 2002- 57 (R.1) July 3rd, 2003. Routing Indices for Peer-to-Peer Systems ; Distributed Computing Systems, 2002. Proceedings of 22 nd International Conference on 2002, Arturo Crespo, Hector Garcia-Molina Computer Science Department Stanford University Stanford, CA 94305-2140, USA {crespo,hector}r@db.Stanford.edu.ISSN: 1063-6927 Print ISBN: 0-7695-1585-1 INSPEC Accession Number : 7404204 DOI : 10.1109/ICDCS.2002.1022239 Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Hanhua Chen,Member, IEEE, Hai Jin, Senior Member, IEEE, Lei Chen, Member, IEEE Yunhao Liu,Senior Member, IEEE, and Lionel M. Ni, Fellow, IEEE, IEEE Transactions on Knowledge and Data Engineering, VOL. 24, NO. 4, APRIL 2012. Efficient Multi-keyword Search over P2P Web; Hanhua Chen, Hai Jin , School of Computer Science and Technology Huazhong University of Science and Technology Wuhan, 430073, China {chenhanhua,hjin}@hust.edu.cn Jiliang Wang,Lei Chen,Yunhao Liu,Lionel Ni Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong {aliang,leichen,liu,ni}@cse.ust.hk. Proceedings of the 17th international conference on World Wide Web,2008, ISBN: 978-1-60558-085-2 DOI: 10.1145/1367497.136763 www.ijeijournal.com Page | 18