• Keine Ergebnisse gefunden

Indexing Dynamic Networks

N/A
N/A
Protected

Academic year: 2022

Aktie "Indexing Dynamic Networks"

Copied!
5
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Indexing Dynamic Networks

Sven Herschel

herschel@informatik.hu-berlin.de

Humboldt-Universit¨at zu Berlin, Databases and Information Systems Abstract: While Peer-To-Peer (P2P) networks have evolved largely outside the acad- emic community, they became increasingly popular with computer science researchers lately due to their compelling properties like robustness, scalability and resistance to failure. Due to lack of centralized control a major problem in any P2P system is the location of suitable information sources, a problem especially challenging in dy- namic scenarios, where nodes join and leave the network regularly. In order to meet these challenges we developed an architecture for query processing which we call “The Query Web”, based on a hybrid P2P index combining a distributed hash table approach with an unstructured P2P network. By assigning the high-level indexing task to the re- liable nodes in the P2P network, we expect the index to be reasonably insensitive to both changes of the network structure as well as updates of the data instances.

1 Introduction

1.1 Thematic Classification, or: My Graduate School

The “Berlin-Brandenburg Graduate School on Distributed Information Systems” (GKVI) was founded in late 1996 by funding of the German Research Society (DFG) and was one of the first German research centers in this area. The school is an interdisciplinary institution, bringing together faculty from computer science and business administration.

There is a strong practical orientation, due to numerous contacts between participating faculty, local industry, and various government agencies.

The graduate school is currently in its ninth year and has during this time successfully graduated 22 Ph.D. students, many of which continued their career in academics, some being researchers at scientific institutions, some heading their own research groups as university professors.

Research in the school is mainly concerned with (1) the development of suitable query lan- guages and more sophisticated search engines, (2) the network-based integration of legacy information systems using suitable middleware, (3) the adaptation of database techniques for transaction management and fault tolerance to the loosely coupled information system architectures that are typical for this domain; and (4) the development of efficient market and payment mechanisms.

Following the spirit of this research direction, the headline of my work is “Indexing dy- namic networks” which fits nicely into the overall theme of the GKVI. My work is con- cerned with providing efficient access strategies in highly dynamic Peer-To-Peer (P2P) networks.

(2)

1.2 Motivation

Peer-To-Peer networks have become popular with computer science researchers because of their compelling properties like robustness, scalability and failure resilience. Due to the lack of centralized control, however, several challenges arise within these networks: (1) fast indexing of data structures to allow efficient query processing, (2) creation, abstraction and dissemination of suitable metadata, (3) dynamic assignment of roles to peers according to their capabilities and (4) maintenance of global values in P2P networks.

We develop a novel architecture for query processing which we term “The Query Web”

to address these challenges within a dynamic scenario where nodes regularly join and leave the network. By combining a distributed hash table approach with unstructured P2P networks, we expect our architecture to be reasonably insensitive to both changes of the network structure as well as updates of the data instances.

This is a major improvement over other systems which usually trade efficient reliable lookups against the ability to cope with change.

2 Querying P2P networks

2.1 Unstructured vs. structured approaches

Unstructured P2P networks like Gnutella or KaZaA heralded the advent of P2P research within the academic community. In unstructured networks queries are usually routed to all available nodes within the network. In order to reduce network strain, cycles are avoided by means of an assigned queryID. Additionally, a time-to-live (TTL) parameter is assigned to each query which limits query propagation to a certain horizon.

The advantage of unstructured networks are obvious: they incur almost no maintenance traffic. Node leaves are treated optimistically (“resend query if node is unreachable”) and node joins are very cheap since it is sufficient to know only one other node of the system in order to participate within the network. The first drawback of the unstructured approaches is their TTL parameter which prevents reliable object lookup: objects behind the horizon cannot be retrieved. The second drawback is the flooding approach which is responsible for a query traveling all over the network, even though there may only be a handful of peers with suitable answers to the query. Improvements like random walker approaches [LCC+02] or history based query routing [TSW04] exist; all of these approaches, however, need flooding as their last resort due to the basic principles of unstructured P2P systems.

Research then developed structured approaches within P2P networks, usually based on distributed hash tables (DHTs), examples of which are CAN [RFH+01], Chord [SMK+01]

and Pastry [RD01]. In these structured networks, a key is assigned to each participating peer for which this peer is henceforth responsible. “Queries” within these structured net- works may only consist of a key, but in turn the DHT structure limits the number of mes- sages required to look up the node responsible for this key to an average ofO(log(n))

(3)

with n being the number of nodes within the system. In order to accomplish this, each node must hold additional status information, called “finger tables” to other nodes of the network. Here as well, the size of the status tables isO(log(n)).

The advantage of these networks is their ability to efficiently and reliably lookup objects in the network (IF the object exists, it WILL be found). Their two disadvantages are (1) only simple lookup queries are supported and (2) maintenance of the network, i.e., nodes joining and leaving the network, is much more expensive than in unstructured networks.

2.2 Consequences

Summarizing the introduction of the two main ap-

Highly dynamic network

structure

Reliable object

retriev al Low network

strain

Figure 1: Tradeoff in P2P networks proaches of P2P networks, there exists a tradeoff

between the reliable object retrieval of the struc- tured networks and the possibility of a highly dy- namic network structure in unstructured networks.

This tradeoff exists at the cost of a low network strain: In today’s P2P network architectures you can only improve two at the cost of the third (see figure 1).

The solution we propose to solve this dilemma would be to construct a hybrid architec- ture where peers that have proven their reliability are clustered together in a structured network while peers frequently joining and leaving the network are simply registered with the reliable peers and therefore do not incur much maintenance traffic. While the former would be assigned the task of indexing the network content, the latter would function as information providers. This architecture will be introduced in the following.

3 The Query Web

3.1 Architecture

The QueryWeb is our approach to querying a large amount of information sources within a highly dynamic P2P network. It is based on the assumption that not all peers are cre- ated equal and may therefore be assigned roles according to their capabilities. While the internal status of a QueryWeb node contains quite a few parameters (see figure 2), we cur- rently focus on “reliability”. Reliability is determined by the time a node has already spent on the network. Reliable nodes are called consultants and assigned the task of indexing the network. For efficient and reliable lookup they are arranged in a DHT. One of the drawbacks of DTHs, difficulties with a high churn rate, is circumvented by only allowing reliable nodes into the DHT. For an overview of the architecture see figure 3.

Less reliable nodes with at least some reputation is assigned the role of experts, which

(4)

are responsible for semantically local query processing. Experts function like superpeers in their semantic clusters and are the primary contact for retrieving information from the cluster.

The unreliable nodes function as “ordinary” information sources. Every peer new to the network starts out as an information source and attaches itself to the experts responsible for its semantic cluster. The suitable expert is determined by contacting the consultant DHT with the key of the cluster. The consultant will then return a list of experts responsible for the cluster and the node may decide to which expert it attaches to.

Query Processing works similar: One or more keys into semantic clusters are extracted from a query and routed through the DHT. The list(s) of experts returned is then contacted for query processing. The experts in turn forward the query to their attached information sources for best results.

Parameter uptime

max. processing power avg. processing power max. network bandwidth avg. network bandwidth available storage Figure 2: Internal Status of a peer

Consultant - DHT Indexing

Query Processing

Information Storage Consultant 1

Consultant 3 Consultant 2

Expert 1 Expert 2 Expert 3 Expert 4

CS CS

CS CS

IS

IS IS

IS IS IS

IS

IS IS

IS IS

IS

Figure 3: Architecture of the Query Web

3.2 Challenges, or: Research Questions

The most obvious challenge is to find a suitable key for mapping content and queries into semantic clusters and therefore allowing to circumvent the second drawback of DHTs, that is, only key lookup queries are supported. In the first scenario we considered, the Seman- tic Web, one possible mapping was rather obvious: we used the URIs of the ontologies supported by peers and the URIs of the ontologies occurring in the queries as keys.

In our current scenario, P2P information retrieval, determining such a mapping proves to be much more difficult and is the focus of our current research.

Further problems we consider are (1) additional role assignments in P2P networks besides the approach introduced in this short paper, (2) maintaining global values in P2P networks, which we expect to be most useful in the IR scenario (maintenance of an IDF value over the entire network) and (3) creation, abstraction and dissemination of suitable metadata, especially with an eye on disseminating metadata in differing granularities depending on the (semantic) proximity to the respective node.

(5)

3.3 Expected Benefits

While an implementation of the architecture is currently underway, we speculate on the following areas of improvement in P2P query processing:

Less Messages Exchanged Compared to unstructured networks, queries are routed di- rectly to their semantic cluster and not flooded through the network. Therefore the expected network traffic will decrease significantly. Compared to structured net- works, the maintenance traffic of the DHT will be negligible due to the procedure of choosing peers for the structured part of the network.

Higher Result Quality Results are retrieved reliably and efficiently due to the architec- ture of the system. While unstructured networks are limited by their horizon and structured networks are rather limited in their query capabilities, our hybrid archi- tecture makes of use of the respective advantages of both types of network. Semantic clustering and therefore semantically local query processing also results in higher result quality.

We believe that our research represents a big step towards the ultimate goal of efficient, reliable processing of complex queries within P2P networks. I expect to finish my thesis by fall 2006.

A dedicated “related work” section in this short paper was omitted due to space limita- tions.

References

[LCC+02] Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Shenker. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th international conference on Supercomputing, pages 84–95, New York, NY, USA, 2002. ACM Press.

[RD01] Antony Rowstron and Peter Druschel. Pastry: Scalable, Decentralized Object Loca- tion, and Routing for Large-Scale Peer-to-Peer Systems. In Rachid Guerraoui, editor, Proceedings of the IFIP/ACM International Conference on Distributed Systems Plat- forms, volume 2218 of Lecture Notes in Computer Science, pages 329–350. Springer, November 2001.

[RFH+01] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Schenker. A scalable content-addressable network. In SIGCOMM2001 [SIG01], pages 161–172.

[SIG01] Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Archi- tectures, and Protocols for Computer Communication. ACM Press, August 2001.

[SMK+01] Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrish- nan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIG- COMM2001 [SIG01], pages 149–160.

[TSW04] Christoph Tempich, Steffen Staab, and Adrian Wranik. Remindin’: semantic query routing in peer-to-peer networks based on social metaphors. In WWW ’04: Proceedings of the 13th international conference on World Wide Web, pages 640–649, New York, NY, USA, 2004. ACM Press.

Referenzen

ÄHNLICHE DOKUMENTE

An ELVIZ-based visualization tool is created in four steps: 1) Specifying the input format using meta-models, or re-using an existing meta-model. Input data is assumed to be exis-

Given a predicate, the Pack Index Access Path retrieves matching pack numbers from the Pack Index, translates the pack numbers to memory addresses and scans the corresponding packs

By applying ancestor reconstruction to such an index scan, we can compute the node streams that are required as input to the holistic twig join operator without document access. This

In summary, SWS2QL represents a unified query language for SWS, which is not bound to specific service description formalisms, registry standards, or matchmakers like other

There are two ways of executing queries. The first is to reactively send queries into the network and to pull relevant results out of the network. Another possibility is to

The method called pseudo relevance feedback works in three stages: First documents are ranked according to their similarity to the original query.. Then highly ranked documents

We define skyline and k-rank answers to CQs under preferences and provide complexity (in- cluding data tractability) results for deciding con- sistency and CQ skyline membership

•  Need to “normalize” terms in indexed text as well as query terms into the same form..   We want to match