SlideShare une entreprise Scribd logo
1  sur  32
Web and Social Computing
Speakers: Chandan ,Robert and Kalthoom
 Objectives
 Peer to Peer Networks
 PeerSim
 Max and Min function Implementation and Results
 Conclusion
 Question & Answers
1. Describe PeerSim functionality
2. Describe the different modes of PeerSim .
3. Design new methods ( Maximum and Minimum ).
4. Explain the out put results .
 A peer-to-peer network, P2P, is considered to be a
type of network architecture composed of
contributors that make their resources available to
other contributors on the same network without the
need for a server to oversee the transfer of
information.
 A peer-to-peer network’s architecture is generally formed dynamically by an ad-
hoc type of addition of nodes, meaning the loss of a certain node does not have a
significant impact on the rest of the network.
 This aspect of peer-to-peer networks gives the system the ability to easily scale to
any size that may be needed for a certain application.
 There are generally two major
types, Structured and
Unstructured. These two types of
networks also contain even more
specific underlying types of
networks.
 To be considered an unstructured
peer-to-peer network, the network
must not use any algorithm for
organization or optimization of
the network.
 For unstructured peer-to-peer
networks there are three different
models which include Pure peer-
to-peer networks, Hybrid peer-to-
peer networks, and Centralized
peer-to-peer networks.
 In a pure peer-to-peer network, or sometimes called a purely decentralized
network, all nodes are of equal ability meaning that there are no nodes that have
any special infrastructure function that could affect the network.
 A great example of a popular purely decentralized peer-to-peer network is the
Gnutella network. The main purpose of the Gnutella network is for that of a file
sharing system.
 Infrastructural nodes are
allowed to exist and are
often a type of central
directory server.
 All clients connected to the
network must connect to
one of these servers.
 Users connection
information and List of files
are saved in the central
server.
 Added Supernodes.
 These Supernodes are nodes
that are dynamically assigned
the task of servicing a small
subpart of the peer network by
indexing and caching files
contained therein.
 A popular example of this
centralized peer-to-peer
network is the file sharing
network Kazaa.
 Structured peer-to-peer networks generally hold the traits of using some type of
algorithm for organization or optimization of the network.
 Structured peer-to-peer networks use some type of global protocol to ensure that
any node in the network can proficiently route a search to some peer that has a
desired file.
 By far the most popular type of structured peer-to-peer network is the distributed
hash table or DHT.
• N nodes in the network
• Consistent hashing is used to assign keys and
values to nodes and resources
- SHA-1 hash of node’s IP address produces
160-bit ID
- SHA-1 hash of file produces 160-bit key, k
• Resource with key K is stored at node with ID=k
- If node with ID=k doesn’t exist then resource
is stored in the node with next highest available ID
• If node n joins the network
- Reassign keys from successor(n)
• If node n leaves the network
- Reassign keys to successor(n)
 Supplier vs Consumer Concept.
 Unlike Client/Server networks peers in P2P don’t rely one single source for
acquiring their necessities. Multiple Participants are involved.
 P2P is relatively cheaper to setup and simpler than client server networks.
 P2P can operate on a basic PC operating system whereas Client/ Server networks
require special OS.
 One of the major advantages to a peer-to-peer network is that each time a new
node is connected to the network the total capacity of the system increases.
 This point differs from the client-server model standpoint since the addition of
new nodes to a network that connects to a set of number of servers could possibly
slow data transfers for all of the connected users.
 Another advantage in regards to a pure peer-to-peer network is that there is no
single point of failure in the network.
 When compared to the client-server model on this point if the server fails the
network is brought down since the server is unable to relay information to the
connected nodes.
 One of the weaknesses of peer-to-peer networks is that of security. Generally
speaking peer-to-peer networks are more susceptible to security problems.
 Another disadvantage of peer-to-peer networks is the high bandwidth usage
required. This high bandwidth usage has lead to Internet Service Providers
starting to throttle, or limit, peer-to-peer traffic
 Simulating Peer-to-Peer (P2P) overlay networks is a common problem for
researchers and developers:
 need to be scalable .
 are highly dynamic .
 PeerSim :is one of the most known among researchers.
 A Peer-to-Peer simulator
 Is to use a modular approach, as the preferred way of coding with it is to re-use
existing modules:
 construct and initialize the underlying network modules.
 handle the different protocols modules.
 control and modify the network modules.
 The engines consist of components which may be 'plugged in' .
 Two different modes:
 Cycle-based :based on a very simple time scheduling algorithm and is very efficient and
scalable.
 Event-based :scheduled through events .
 protocols: used to define the behavior of the different peers.
 nodes: represent the peer themselves in the P2P network.
 controls: control the simulation by perform the global initialization and analysis:
 Initializer
 Dynamic
 Observers
 Linkable :interface used to access and manage node’s properties
 Add neighbor
 Get neighbor
 Node’s degree
 Every simulation is
configured with the help
of a configuration file :a
simple ASCII file
Simulator
• Main() Method
CDSimulator
nextExperment()
• loadInitializers()
• loadControls()
• execute()
Controls
Eg:
AverageObserver
s
Protocol n
IncrementalStats
Max, Min, Nmax,
Nmin, AVG etc
Protocol1 Protocol 2
Config File
• Set of Protocols and ordering
• Set of Controls and Ordering
• Set of Initializers + ordering
AverageFunction
• nextCycle()
Generated in Eclipse by ObjectAid UML Explorer
 How much free space does the network have to offer?
 What is the average lifetime of a node in the network?
 How many documents do nodes share on the average?
 Which node(s) performed the most searches?
 What is the maximum number of downloads that some node supported during a
session
 Etc
MAYANK BAWA, HECTOR GARCIA-MOLINA, ARISTIDES GIONIS, RAJEEV MOTWANI
“Estimating Aggregates on a Peer-to-Peer Network”
Stanford University, CA 94305 USA
 AverageObserver
 IncrementalStats
 Config File  Output: The Min Function Remains Constants and
the Max Values decreases towards the Min
value
 Config File  Results: Max Remains the same and Min increases
towards the Max Value
PeerSim Output
 Data taken in Excel  Graph generated
 Graph Generated Data taken in Excel
 Lessons Learnt (slide)
 Clear understanding of how Peer to Peer Networks work
 PeerSim provides an easy way to simulate P2P Protocols without wasting resources
 Java Programming Revised.
 Limitations
 The PeerSim Source codes are somehow complex to understand
 Some Protocols implemented in PeerSim need some time to understand
Q& A

Contenu connexe

Tendances

Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
905426
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
Bharath Nair
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
John Berkmans
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...
Mumbai Academisc
 

Tendances (20)

Overlay network
Overlay networkOverlay network
Overlay network
 
Citcism on Peer to peer networking
Citcism on Peer to peer networkingCitcism on Peer to peer networking
Citcism on Peer to peer networking
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Commonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & ApplicationsCommonly Used Peer to Peer Methods & Applications
Commonly Used Peer to Peer Methods & Applications
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Camp finall
Camp finallCamp finall
Camp finall
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Peer topeer
Peer topeerPeer topeer
Peer topeer
 
F233842
F233842F233842
F233842
 
Journal Club- MPSS
Journal Club- MPSSJournal Club- MPSS
Journal Club- MPSS
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
Filesharing using bittorrent protocol
Filesharing using bittorrent protocolFilesharing using bittorrent protocol
Filesharing using bittorrent protocol
 
My Dissertation 2016
My Dissertation 2016My Dissertation 2016
My Dissertation 2016
 
High performance and flexible networking
High performance and flexible networkingHigh performance and flexible networking
High performance and flexible networking
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Distributed Database practicals
Distributed Database practicals Distributed Database practicals
Distributed Database practicals
 
Content-Centric Networking (CCN)
Content-Centric Networking (CCN)Content-Centric Networking (CCN)
Content-Centric Networking (CCN)
 
Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...Efficient and secure content processing and distribution by cooperative inter...
Efficient and secure content processing and distribution by cooperative inter...
 

Similaire à Peer Sim & P2P

PeerToPeerComputing (1)
PeerToPeerComputing (1)PeerToPeerComputing (1)
PeerToPeerComputing (1)
MurtazaB
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
Mumbai Academisc
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
ambitlick
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
Ankit Sudegora
 

Similaire à Peer Sim & P2P (20)

Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Network archetecture
Network archetectureNetwork archetecture
Network archetecture
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
PeerToPeerComputing (1)
PeerToPeerComputing (1)PeerToPeerComputing (1)
PeerToPeerComputing (1)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
F233842
F233842F233842
F233842
 
Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)Peer peer messaging system (synopsis)
Peer peer messaging system (synopsis)
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Compare peer
Compare peerCompare peer
Compare peer
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
 
App for peer-to-peer file transfer
App for peer-to-peer file transferApp for peer-to-peer file transfer
App for peer-to-peer file transfer
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
 
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
IEEE 2014 DOTNET NETWORKING PROJECTS A proximity aware interest-clustered p2p...
 
L4Network Architecture.pptx
L4Network Architecture.pptxL4Network Architecture.pptx
L4Network Architecture.pptx
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 

Dernier

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Peer Sim & P2P

  • 1. Web and Social Computing Speakers: Chandan ,Robert and Kalthoom
  • 2.  Objectives  Peer to Peer Networks  PeerSim  Max and Min function Implementation and Results  Conclusion  Question & Answers
  • 3. 1. Describe PeerSim functionality 2. Describe the different modes of PeerSim . 3. Design new methods ( Maximum and Minimum ). 4. Explain the out put results .
  • 4.  A peer-to-peer network, P2P, is considered to be a type of network architecture composed of contributors that make their resources available to other contributors on the same network without the need for a server to oversee the transfer of information.
  • 5.  A peer-to-peer network’s architecture is generally formed dynamically by an ad- hoc type of addition of nodes, meaning the loss of a certain node does not have a significant impact on the rest of the network.  This aspect of peer-to-peer networks gives the system the ability to easily scale to any size that may be needed for a certain application.
  • 6.  There are generally two major types, Structured and Unstructured. These two types of networks also contain even more specific underlying types of networks.
  • 7.  To be considered an unstructured peer-to-peer network, the network must not use any algorithm for organization or optimization of the network.  For unstructured peer-to-peer networks there are three different models which include Pure peer- to-peer networks, Hybrid peer-to- peer networks, and Centralized peer-to-peer networks.
  • 8.  In a pure peer-to-peer network, or sometimes called a purely decentralized network, all nodes are of equal ability meaning that there are no nodes that have any special infrastructure function that could affect the network.  A great example of a popular purely decentralized peer-to-peer network is the Gnutella network. The main purpose of the Gnutella network is for that of a file sharing system.
  • 9.  Infrastructural nodes are allowed to exist and are often a type of central directory server.  All clients connected to the network must connect to one of these servers.  Users connection information and List of files are saved in the central server.
  • 10.  Added Supernodes.  These Supernodes are nodes that are dynamically assigned the task of servicing a small subpart of the peer network by indexing and caching files contained therein.  A popular example of this centralized peer-to-peer network is the file sharing network Kazaa.
  • 11.  Structured peer-to-peer networks generally hold the traits of using some type of algorithm for organization or optimization of the network.  Structured peer-to-peer networks use some type of global protocol to ensure that any node in the network can proficiently route a search to some peer that has a desired file.  By far the most popular type of structured peer-to-peer network is the distributed hash table or DHT.
  • 12. • N nodes in the network • Consistent hashing is used to assign keys and values to nodes and resources - SHA-1 hash of node’s IP address produces 160-bit ID - SHA-1 hash of file produces 160-bit key, k • Resource with key K is stored at node with ID=k - If node with ID=k doesn’t exist then resource is stored in the node with next highest available ID • If node n joins the network - Reassign keys from successor(n) • If node n leaves the network - Reassign keys to successor(n)
  • 13.
  • 14.  Supplier vs Consumer Concept.  Unlike Client/Server networks peers in P2P don’t rely one single source for acquiring their necessities. Multiple Participants are involved.  P2P is relatively cheaper to setup and simpler than client server networks.  P2P can operate on a basic PC operating system whereas Client/ Server networks require special OS.
  • 15.  One of the major advantages to a peer-to-peer network is that each time a new node is connected to the network the total capacity of the system increases.  This point differs from the client-server model standpoint since the addition of new nodes to a network that connects to a set of number of servers could possibly slow data transfers for all of the connected users.  Another advantage in regards to a pure peer-to-peer network is that there is no single point of failure in the network.  When compared to the client-server model on this point if the server fails the network is brought down since the server is unable to relay information to the connected nodes.
  • 16.  One of the weaknesses of peer-to-peer networks is that of security. Generally speaking peer-to-peer networks are more susceptible to security problems.  Another disadvantage of peer-to-peer networks is the high bandwidth usage required. This high bandwidth usage has lead to Internet Service Providers starting to throttle, or limit, peer-to-peer traffic
  • 17.  Simulating Peer-to-Peer (P2P) overlay networks is a common problem for researchers and developers:  need to be scalable .  are highly dynamic .  PeerSim :is one of the most known among researchers.
  • 18.  A Peer-to-Peer simulator  Is to use a modular approach, as the preferred way of coding with it is to re-use existing modules:  construct and initialize the underlying network modules.  handle the different protocols modules.  control and modify the network modules.  The engines consist of components which may be 'plugged in' .
  • 19.  Two different modes:  Cycle-based :based on a very simple time scheduling algorithm and is very efficient and scalable.  Event-based :scheduled through events .
  • 20.  protocols: used to define the behavior of the different peers.  nodes: represent the peer themselves in the P2P network.  controls: control the simulation by perform the global initialization and analysis:  Initializer  Dynamic  Observers  Linkable :interface used to access and manage node’s properties  Add neighbor  Get neighbor  Node’s degree
  • 21.  Every simulation is configured with the help of a configuration file :a simple ASCII file
  • 22. Simulator • Main() Method CDSimulator nextExperment() • loadInitializers() • loadControls() • execute() Controls Eg: AverageObserver s Protocol n IncrementalStats Max, Min, Nmax, Nmin, AVG etc Protocol1 Protocol 2 Config File • Set of Protocols and ordering • Set of Controls and Ordering • Set of Initializers + ordering AverageFunction • nextCycle()
  • 23. Generated in Eclipse by ObjectAid UML Explorer
  • 24.  How much free space does the network have to offer?  What is the average lifetime of a node in the network?  How many documents do nodes share on the average?  Which node(s) performed the most searches?  What is the maximum number of downloads that some node supported during a session  Etc MAYANK BAWA, HECTOR GARCIA-MOLINA, ARISTIDES GIONIS, RAJEEV MOTWANI “Estimating Aggregates on a Peer-to-Peer Network” Stanford University, CA 94305 USA
  • 25.
  • 27.  Config File  Output: The Min Function Remains Constants and the Max Values decreases towards the Min value
  • 28.  Config File  Results: Max Remains the same and Min increases towards the Max Value PeerSim Output
  • 29.  Data taken in Excel  Graph generated
  • 30.  Graph Generated Data taken in Excel
  • 31.  Lessons Learnt (slide)  Clear understanding of how Peer to Peer Networks work  PeerSim provides an easy way to simulate P2P Protocols without wasting resources  Java Programming Revised.  Limitations  The PeerSim Source codes are somehow complex to understand  Some Protocols implemented in PeerSim need some time to understand
  • 32. Q& A