US20060271638A1 - Method and apparatus for improving data transfers in peer-to-peer networks - Google Patents

Method and apparatus for improving data transfers in peer-to-peer networks Download PDF

Info

Publication number
US20060271638A1
US20060271638A1 US11/140,122 US14012205A US2006271638A1 US 20060271638 A1 US20060271638 A1 US 20060271638A1 US 14012205 A US14012205 A US 14012205A US 2006271638 A1 US2006271638 A1 US 2006271638A1
Authority
US
United States
Prior art keywords
node
message
requested data
search request
referral
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/140,122
Inventor
Mandis Beigi
Raymond Jennings
Jason LaVoie
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/140,122 priority Critical patent/US20060271638A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BEIGI, MANDIS S., JENNINGS, RAYMOND B., III, LAVOIE, JASON D.
Priority to PCT/EP2006/061881 priority patent/WO2006125710A1/en
Priority to TW095117483A priority patent/TW200703025A/en
Publication of US20060271638A1 publication Critical patent/US20060271638A1/en
Priority to US12/163,490 priority patent/US7958195B2/en
Priority to US13/099,919 priority patent/US8280970B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1038Load balancing arrangements to avoid a single path through a load balancer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1834Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1012Server selection for load balancing based on compliance of requirements or conditions with available server resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
    • H04L67/1068Discovery involving direct consultation or announcement among potential requesting and potential source peers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services

Definitions

  • the present invention relates generally to computing networks and relates more particularly to the expansion of peer-to-peer data transfer networks.
  • FIG. 1 is a schematic diagram of a network 100 of nodes (e.g., computing devices) interacting in a peer-to-peer (P2P) manner.
  • a requesting node 101 sends a search message 105 (e.g., containing keywords relating to data that the requesting node 101 wishes to locate) to at least one intermediate node 111 in communication with the requesting node 101 via a peer connection.
  • the intermediate node 111 receives the search message 105 and forwards the search message 105 to at least one additional node 111 .
  • the search message 105 reaches at least one responding node 103 having the requested data (in some cases, the first intermediate node 111 to which the search message 105 is forwarded will also be a responding node 103 ). At least one responding node 103 then sends a response message 107 back to the requesting node 101 , e.g., via the intermediate nodes 111 .
  • the requesting node 101 requests the relevant data from a responding node 103 by connecting directly to the responding node 103 , e.g., via direct connection 109 .
  • messages including the search message 105 have a limited time to live or hop count. That is, a message will expire once it has been forwarded to a predefined maximum number of nodes 101 , 103 or 111 .
  • the requesting node 101 generates a search message having a time to live of four, and a node at which the requested data resides (e.g., node 113 ) is more than four “hops” away from the requesting node 101 , the search message will expire before the requested data is obtained.
  • Typical methods for increasing the possibility of the search message reaching a node having the requested data thus include increasing the search message's time to live or increasing the number of peer connections per node; however, either method will cause an increase in network traffic.
  • Similar methods that may decrease download time include allowing selective downloads (by which a requesting node downloads the same data from multiple responding nodes at different offsets, thereby shortening download time), or to allow a requesting node to partner with one or more other peer nodes currently downloading the requested data.
  • these methods do not increase the “view” of a node in the P2P network (e.g., by enabling search requests from the node to reach nodes further into the P2P network), nor do these methods enable the building of P2P communities of users having similar interests, which can increase the likelihood of searches finding desired content in the P2P network.
  • One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data.
  • a responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers.
  • the responding node may also indicate that the responding node has the requested data.
  • this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.
  • nodes e.g., referred nodes
  • FIG. 1 is a schematic diagram of a network of nodes interacting in a peer-to-peer manner
  • FIG. 2 is a flow diagram illustrating one embodiment of a method for referring out-of-range nodes in a P2P network, such as the network illustrated in FIG. 1 ;
  • FIG. 3 is a flow diagram illustrating one embodiment of a method for building communities in a P2P network, such as the network illustrated in FIG. 1 ;
  • FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device.
  • the present invention is a method and apparatus for improving data transfers in P2P networks.
  • Embodiments of the present invention make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes.
  • This capability further facilitates the building of “communities” within the P2P network, where a “community” in the context of the present invention is a subset of nodes in a P2P network that share common interests and/or data, e.g., over direct peer connections.
  • node refers to a computing device such as a personal computing device (e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.), a server, a router or the like that is connected to a P2P network.
  • a personal computing device e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.
  • server e.g., a server, a router or the like that is connected to a P2P network.
  • FIG. 2 is a flow diagram illustrating one embodiment of a method 200 for referring out-of-range nodes in a P2P network, such as the network 100 illustrated in FIG. 1 .
  • the method 200 may be implemented at, for example, any node (e.g., 101 , 103 , 111 or 113 ) on the P2P network 100 .
  • the method 200 is initialized at step 202 and proceeds to step 204 , where the method 200 receives a search request message, e.g., from a peer (connected) node.
  • the method 200 then proceeds to step 206 , where the method 200 examines the search request message and determines whether the receiver (e.g., the node at which the search request message was received in step 204 ) has the requested data. If the receiver has the requested data, the method 200 proceeds to step 208 and sends a response message over the network 100 back to the requesting node, e.g., in accordance with conventional P2P protocols. The response message indicates that the receiver has the requested data.
  • the receiver e.g., the node at which the search request message was received in step 204 .
  • the response message sent in step 208 further includes a referral message comprising at least one referred node, where a “referred node” is another node in the P2P network that has previously retrieved the requested data.
  • the referral message is included in the response message.
  • the referral message is a separate message sent to the requesting node.
  • the referral message is piggybacked on the response message.
  • the referred nodes are nodes that have retrieved the requested data directly from the receiver.
  • the referral message may include, for example, at least one of the hostnames, IP addresses, virtual names and other identifiers of the referred nodes.
  • the referral message may be time-sensitive such that it includes only nodes that have retrieved the requested content within a predefined maximum timeframe (e.g., within the last 24 hours, etc.).
  • This predefined maximum timeframe may be specified in the search request message (e.g., “refer only nodes that have requested the data within the past 24 hours”), or the predefined maximum timeframe may be specified at the receiver.
  • the assumption is that if a referred node has recently (e.g., within the predefined maximum timeframe) retrieved the requested data, the referred node will likely still have the requested data available to share.
  • the referral message may be sorted or ranked based on at least one of: uptime for the referred nodes, bandwidth of the referred nodes and latency of the referred nodes.
  • the method 200 sends a referral message based on a threshold distance that the search request message has traveled in the network. For example, in one embodiment, the method 200 only sends a referral message if the search request message's time to live has expired (e.g., the receiver is an edge node in the requesting node's view of the P2P network). In another embodiment, the method 200 only sends a referral message if the search request message's time to live is at least half expired. This threshold distance may be specified by the requesting node, the receiver, or both.
  • step 210 inquires whether the receiver knows of another node that is likely to have the requested data (e.g., because the node has previously downloaded the requested data from another source as discussed above). If the receiver does know of another node that is likely to have the requested data, the method 200 proceeds to step 208 as described above but sends only a referral message, and not a response message. Thus, even if the receiver does not have the requested data, the receiver may still be able to refer the requesting node to one or more other nodes that are likely to have the requested data.
  • the method 200 proceeds to step 212 and either forwards the search request message to the next node (e.g., in accordance with conventional P2P protocols) or discards the search request message (e.g., if the search message's time to live or hop count has expired).
  • the method 200 terminates in step 214 .
  • the receiver may be contacted by the requesting node for at least a portion of the requested data (if the method 200 has indicated that the receiver has the data).
  • the method 200 as described above enables the view of a node in a P2P network to be expanded while only minimally increasing network traffic.
  • the view of the requesting node can be expanded despite the requesting node's inherently limited range. The farther away a receiver/responding node is in hops from the requesting node, the smaller the intersection is between the requesting node and the receiver/responding node, and the larger the expanded view of the P2P is likely to therefore be.
  • the method 200 actually conserves traffic while at the same time “expanding” the network.
  • response latency is typically reduced as a requesting node can select faster nodes which can provide more data than nodes on slower links.
  • a node may periodically update its referral message, for example based on one or more test searches. For example, a node may send a test search message to one or more nodes identified in its referral message, in order to determine that the nodes identified in the referral message still have the indicated data. If a node identified in the referral message no longer has the indicated data, it can be removed from the referral message. Test searches may be performed periodically, e.g., based on an expiration of a predefined period of time.
  • a node may remove a referred node from the referral message if the node receives a message from a requesting node (to which the referred node has been referred) indicating that the referred node no longer has the indicated data.
  • the method 200 facilitates the building of “communities” within the P2P by identifying out-of-range nodes with potentially similar interests (e.g., as inferred by the request for the same data).
  • the existence of communities allows nodes with similar interests to directly communicate and exchange data, thereby reducing overall network traffic (as search request messages sent through the community tend not to propagate as far into the P2P network as is typical with a normal search as described in connection with FIG. 1 ).
  • FIG. 3 is a flow diagram illustrating one embodiment of a method 300 for building communities in a P2P network, such as the network 100 illustrated in FIG. 1 .
  • the method 300 may be implemented at, for example, any node (e.g., 101 , 103 , 111 or 113 ) on the P2P network 100 .
  • the method 300 is initialized at step 302 and proceeds to step 304 , where the method 300 sends a search request message, e.g., to one or more peer nodes.
  • the method 300 receives at least one response message responsive to the search request message sent in step 304 .
  • the response message includes at least one referred node, e.g., as described with reference to the method 200 .
  • the response message may also include an indication that the responding node has the requested data, e.g., in accordance with traditional P2P protocols.
  • the method 300 may collate multiple response messages received from multiple responding nodes to create an aggregate list of potential sources for the requested data.
  • the method 300 proceeds to step 308 and retrieves at least a portion of the requested data from at least one of the responding node and/or at least one referred node listed in the referral message.
  • the method 300 may choose which portions of the requested data to retrieve from which responding and/or referred nodes, based on a collated list of potential sources for the requested data.
  • the requesting node may identify one or more preferred nodes for searching, based on the information received in step 306 .
  • step 310 the method 300 creates a direct peer connection to at least one of the referred nodes, e.g., to admit the referred node into or to create a “community” or subset of nodes in the P2P network that share common interests and/or data.
  • the referred node is a mutually preferred node (e.g., preferred for searching).
  • step 310 further includes terminating an existing peer connection for every new peer connection that is created (e.g., to conserve network resources where each node in the P2P network is allowed a maximum number of peer connections).
  • the method 300 may create a direct peer connection between the requesting node 101 and the normally out-of-range node 113 , which has the requested data, and may terminate the peer connection between the requesting node 101 and the intermediate node 111 illustrated to the left of the requesting node 101 .
  • the method 300 is terminated in step 312 .
  • FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device 400 .
  • a general purpose computing device 400 comprises a processor 402 , a memory 404 , a data transfer module 405 and various input/output (I/O) devices 406 such as a display, a keyboard, a mouse, a modem, and the like.
  • I/O devices 406 such as a display, a keyboard, a mouse, a modem, and the like.
  • at least one I/O device is a storage device (e.g., a disk drive, an optical disk drive, a floppy disk drive).
  • the data transfer module 405 can be implemented as a physical device or subsystem that is coupled to a processor through a communication channel.
  • the data transfer module 405 can be represented by one or more software applications (or even a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC)), where the software is loaded from a storage medium (e.g., I/O devices 406 ) and operated by the processor 402 in the memory 404 of the general purpose computing device 400 .
  • a storage medium e.g., I/O devices 406
  • a computer readable medium or carrier e.g., RAM, magnetic or optical drive or diskette, and the like.
  • the present invention represents a significant advancement in the field of data transfer networks.
  • a method and apparatus are provided that make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes.
  • This capability further facilitates the building of “communities” within the P2P network, enabling faster, more efficient data transfers and reducing network traffic.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.

Description

    BACKGROUND
  • The present invention relates generally to computing networks and relates more particularly to the expansion of peer-to-peer data transfer networks.
  • FIG. 1 is a schematic diagram of a network 100 of nodes (e.g., computing devices) interacting in a peer-to-peer (P2P) manner. Generally, a requesting node 101 sends a search message 105 (e.g., containing keywords relating to data that the requesting node 101 wishes to locate) to at least one intermediate node 111 in communication with the requesting node 101 via a peer connection. The intermediate node 111 receives the search message 105 and forwards the search message 105 to at least one additional node 111. Eventually, the search message 105 reaches at least one responding node 103 having the requested data (in some cases, the first intermediate node 111 to which the search message 105 is forwarded will also be a responding node 103). At least one responding node 103 then sends a response message 107 back to the requesting node 101, e.g., via the intermediate nodes 111. The requesting node 101 then requests the relevant data from a responding node 103 by connecting directly to the responding node 103, e.g., via direct connection 109.
  • In conventional P2P systems, messages including the search message 105 have a limited time to live or hop count. That is, a message will expire once it has been forwarded to a predefined maximum number of nodes 101, 103 or 111. Thus, if the requesting node 101 generates a search message having a time to live of four, and a node at which the requested data resides (e.g., node 113) is more than four “hops” away from the requesting node 101, the search message will expire before the requested data is obtained. Typical methods for increasing the possibility of the search message reaching a node having the requested data thus include increasing the search message's time to live or increasing the number of peer connections per node; however, either method will cause an increase in network traffic.
  • Similar methods that may decrease download time include allowing selective downloads (by which a requesting node downloads the same data from multiple responding nodes at different offsets, thereby shortening download time), or to allow a requesting node to partner with one or more other peer nodes currently downloading the requested data. However, these methods do not increase the “view” of a node in the P2P network (e.g., by enabling search requests from the node to reach nodes further into the P2P network), nor do these methods enable the building of P2P communities of users having similar interests, which can increase the likelihood of searches finding desired content in the P2P network.
  • Thus, there is a need in the art for a method and apparatus for improving data transfers in P2P networks.
  • SUMMARY OF THE INVENTION
  • One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • So that the manner in which the above recited embodiments of the invention are attained and can be understood in detail, a more particular description of the invention, briefly summarized above, may be obtained by reference to the embodiments thereof which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
  • FIG. 1 is a schematic diagram of a network of nodes interacting in a peer-to-peer manner;
  • FIG. 2 is a flow diagram illustrating one embodiment of a method for referring out-of-range nodes in a P2P network, such as the network illustrated in FIG. 1;
  • FIG. 3 is a flow diagram illustrating one embodiment of a method for building communities in a P2P network, such as the network illustrated in FIG. 1; and
  • FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device.
  • To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
  • DETAILED DESCRIPTION
  • In one embodiment, the present invention is a method and apparatus for improving data transfers in P2P networks. Embodiments of the present invention make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes. This capability further facilitates the building of “communities” within the P2P network, where a “community” in the context of the present invention is a subset of nodes in a P2P network that share common interests and/or data, e.g., over direct peer connections.
  • For the purposes of the present invention, the term “node” refers to a computing device such as a personal computing device (e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.), a server, a router or the like that is connected to a P2P network.
  • FIG. 2 is a flow diagram illustrating one embodiment of a method 200 for referring out-of-range nodes in a P2P network, such as the network 100 illustrated in FIG. 1. The method 200 may be implemented at, for example, any node (e.g., 101, 103, 111 or 113) on the P2P network 100. The method 200 is initialized at step 202 and proceeds to step 204, where the method 200 receives a search request message, e.g., from a peer (connected) node.
  • The method 200 then proceeds to step 206, where the method 200 examines the search request message and determines whether the receiver (e.g., the node at which the search request message was received in step 204) has the requested data. If the receiver has the requested data, the method 200 proceeds to step 208 and sends a response message over the network 100 back to the requesting node, e.g., in accordance with conventional P2P protocols. The response message indicates that the receiver has the requested data.
  • In one embodiment, the response message sent in step 208 further includes a referral message comprising at least one referred node, where a “referred node” is another node in the P2P network that has previously retrieved the requested data. In one embodiment, the referral message is included in the response message. In another embodiment, the referral message is a separate message sent to the requesting node. In yet another embodiment, the referral message is piggybacked on the response message. In one embodiment, the referred nodes are nodes that have retrieved the requested data directly from the receiver. The referral message may include, for example, at least one of the hostnames, IP addresses, virtual names and other identifiers of the referred nodes.
  • In one embodiment, the referral message may be time-sensitive such that it includes only nodes that have retrieved the requested content within a predefined maximum timeframe (e.g., within the last 24 hours, etc.). This predefined maximum timeframe may be specified in the search request message (e.g., “refer only nodes that have requested the data within the past 24 hours”), or the predefined maximum timeframe may be specified at the receiver. The assumption is that if a referred node has recently (e.g., within the predefined maximum timeframe) retrieved the requested data, the referred node will likely still have the requested data available to share.
  • In yet another embodiment, the referral message may be sorted or ranked based on at least one of: uptime for the referred nodes, bandwidth of the referred nodes and latency of the referred nodes.
  • In one embodiment, the method 200 sends a referral message based on a threshold distance that the search request message has traveled in the network. For example, in one embodiment, the method 200 only sends a referral message if the search request message's time to live has expired (e.g., the receiver is an edge node in the requesting node's view of the P2P network). In another embodiment, the method 200 only sends a referral message if the search request message's time to live is at least half expired. This threshold distance may be specified by the requesting node, the receiver, or both.
  • Alternatively, if the method 200 determines in step 206 that the receiver does not have the requested data, the method 200 proceeds to step 210 and inquires whether the receiver knows of another node that is likely to have the requested data (e.g., because the node has previously downloaded the requested data from another source as discussed above). If the receiver does know of another node that is likely to have the requested data, the method 200 proceeds to step 208 as described above but sends only a referral message, and not a response message. Thus, even if the receiver does not have the requested data, the receiver may still be able to refer the requesting node to one or more other nodes that are likely to have the requested data.
  • However, if the receiver does not have the requested data and does not know of another node that is likely to have the requested data, the method 200 proceeds to step 212 and either forwards the search request message to the next node (e.g., in accordance with conventional P2P protocols) or discards the search request message (e.g., if the search message's time to live or hop count has expired).
  • The method 200 terminates in step 214. Based on the requesting node's evaluation of the response message, including the referral message, the receiver may be contacted by the requesting node for at least a portion of the requested data (if the method 200 has indicated that the receiver has the data).
  • The method 200 as described above enables the view of a node in a P2P network to be expanded while only minimally increasing network traffic. By enabling one or more nodes in a P2P network to “refer” out-of-range nodes to a requesting node, the view of the requesting node can be expanded despite the requesting node's inherently limited range. The farther away a receiver/responding node is in hops from the requesting node, the smaller the intersection is between the requesting node and the receiver/responding node, and the larger the expanded view of the P2P is likely to therefore be. Thus, unlike conventional P2P expansion methods that tend to result in a sometimes exponential increase in network traffic (e.g., by increasing either a search request message's time to live or a node's number of peer connections), the method 200 actually conserves traffic while at the same time “expanding” the network. In addition, response latency is typically reduced as a requesting node can select faster nodes which can provide more data than nodes on slower links.
  • Those skilled in the art will appreciate that a node may periodically update its referral message, for example based on one or more test searches. For example, a node may send a test search message to one or more nodes identified in its referral message, in order to determine that the nodes identified in the referral message still have the indicated data. If a node identified in the referral message no longer has the indicated data, it can be removed from the referral message. Test searches may be performed periodically, e.g., based on an expiration of a predefined period of time. In yet another embodiment, a node may remove a referred node from the referral message if the node receives a message from a requesting node (to which the referred node has been referred) indicating that the referred node no longer has the indicated data.
  • Moreover, by referring nodes that have or are likely to have the requested data, the method 200 facilitates the building of “communities” within the P2P by identifying out-of-range nodes with potentially similar interests (e.g., as inferred by the request for the same data). The existence of communities allows nodes with similar interests to directly communicate and exchange data, thereby reducing overall network traffic (as search request messages sent through the community tend not to propagate as far into the P2P network as is typical with a normal search as described in connection with FIG. 1).
  • FIG. 3 is a flow diagram illustrating one embodiment of a method 300 for building communities in a P2P network, such as the network 100 illustrated in FIG. 1. The method 300 may be implemented at, for example, any node (e.g., 101, 103, 111 or 113) on the P2P network 100. The method 300 is initialized at step 302 and proceeds to step 304, where the method 300 sends a search request message, e.g., to one or more peer nodes.
  • In step 306, the method 300 receives at least one response message responsive to the search request message sent in step 304. The response message includes at least one referred node, e.g., as described with reference to the method 200. In one embodiment, the response message may also include an indication that the responding node has the requested data, e.g., in accordance with traditional P2P protocols. The method 300 may collate multiple response messages received from multiple responding nodes to create an aggregate list of potential sources for the requested data.
  • Once the method 300 has received the response message, the method 300 proceeds to step 308 and retrieves at least a portion of the requested data from at least one of the responding node and/or at least one referred node listed in the referral message. In one embodiment, the method 300 may choose which portions of the requested data to retrieve from which responding and/or referred nodes, based on a collated list of potential sources for the requested data. In another embodiment, the requesting node may identify one or more preferred nodes for searching, based on the information received in step 306.
  • In step 310, the method 300 creates a direct peer connection to at least one of the referred nodes, e.g., to admit the referred node into or to create a “community” or subset of nodes in the P2P network that share common interests and/or data. In one embodiment, the referred node is a mutually preferred node (e.g., preferred for searching). In one embodiment, step 310 further includes terminating an existing peer connection for every new peer connection that is created (e.g., to conserve network resources where each node in the P2P network is allowed a maximum number of peer connections). Thus, for example, referring back to FIG. 1, the method 300 may create a direct peer connection between the requesting node 101 and the normally out-of-range node 113, which has the requested data, and may terminate the peer connection between the requesting node 101 and the intermediate node 111 illustrated to the left of the requesting node 101.
  • The method 300 is terminated in step 312.
  • FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device 400. In one embodiment, a general purpose computing device 400 comprises a processor 402, a memory 404, a data transfer module 405 and various input/output (I/O) devices 406 such as a display, a keyboard, a mouse, a modem, and the like. In one embodiment, at least one I/O device is a storage device (e.g., a disk drive, an optical disk drive, a floppy disk drive). It should be understood that the data transfer module 405 can be implemented as a physical device or subsystem that is coupled to a processor through a communication channel.
  • Alternatively, the data transfer module 405 can be represented by one or more software applications (or even a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC)), where the software is loaded from a storage medium (e.g., I/O devices 406) and operated by the processor 402 in the memory 404 of the general purpose computing device 400. Thus, in one embodiment, the data transfer module 405 for expanding a P2P network and building P2P communities described herein with reference to the preceding Figures can be stored on a computer readable medium or carrier (e.g., RAM, magnetic or optical drive or diskette, and the like).
  • Thus, the present invention represents a significant advancement in the field of data transfer networks. A method and apparatus are provided that make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes. This capability further facilitates the building of “communities” within the P2P network, enabling faster, more efficient data transfers and reducing network traffic.
  • While foregoing is directed to the preferred embodiment of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.

Claims (30)

1. A method for transferring data between nodes in a network, said method comprising:
receiving, by a first node, a search request message from a second node, said search request message requesting data; and
sending, by said first node, a response message to said second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
2. The method of claim 1, wherein said response message further indicates that said first node has said requested data.
3. The method of claim 1, wherein said at least one third node is a node that has retrieved said requested data from said first node.
4. The method of claim 1, wherein said referral message includes at least one of: said at least one third node's hostname, said at least one third node's IP address and said at least one third node's virtual name.
5. The method of claim 1, wherein said at least one third node has retrieved said requested data within a predefined maximum timeframe.
6. The method of claim 5, where said predefined maximum timeframe is defined by at least one of: said first node and said second node.
7. The method of claim 1, wherein said referral message is sent if said search request message has traveled at least a threshold distance into said network.
8. The method of claim 7, wherein said threshold distance is defined by at least one of: said first node and said second node.
9. The method of claim 1, further comprising:
updating said referral message to remove at least one third node if said at least one third node no longer has said requested data.
10. The method of claim 9, wherein said updating further comprises:
sending, by said first node, a test search message to said at least one third node, to determine whether said third node still has said requested data.
11. The method of claim 9, wherein said updating further comprises:
receiving, from said second node, a message indicating that said at least one third node no longer has said requested data.
12. The method of claim 1, wherein said referral message is ranked based on at least one of: uptime of said at least one third node, bandwidth of said at least one third node and latency of said at least one third node.
13. A computer readable medium containing an executable program for transferring data between nodes in a network, where the program performs the steps of:
receiving, by a first node, a search request message from a second node, said search request message requesting data; and
sending, by said first node, a response message to said second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
14. The computer readable medium of claim 13, wherein said response message further indicates that said first node has said requested data.
15. The computer readable medium of claim 13, wherein said at least one third node is a node that has retrieved said requested data from said first node.
16. The computer readable medium of claim 13, wherein said referral message includes at least one of: said at least one third node's hostname, said at least one third node's IP address and said at least one third node's virtual name.
17. The computer readable medium of claim 13, wherein said at least one third node has retrieved said requested data within a predefined maximum timeframe.
18. The computer readable medium of claim 17, where said predefined maximum timeframe is defined by at least one of: said first node and said second node.
19. The computer readable medium of claim 13, wherein said referral message is sent if said search request message has traveled at least a threshold distance into said network.
20. The computer readable medium of claim 19, wherein said threshold distance is defined by at least one of: said first node and said second node.
21. The computer readable medium of claim 13, further comprising:
updating said referral message to remove at least one third node if said at least one third node no longer has said requested data.
22. The computer readable medium of claim 21, wherein said updating further comprises:
sending, by said first node, a test search message to said at least one third node, to determine whether said third node still has said requested data.
23. The computer readable medium of claim 21, wherein said updating further comprises:
receiving, from said second node, a message indicating that said at least one third node no longer has said requested data.
24. The computer readable medium of claim 13, wherein said referral message is ranked based on at least one of: uptime of said at least one third node, bandwidth of said at least one third node and latency of said at least one third node.
25. Apparatus comprising:
means for receiving, by a first node, a search request message from a second node, said search request message requesting data; and
means for sending, by said first node, a response message to said second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
26. A method for building a community of nodes having common interests in a network, said method comprising the steps of:
sending, by a first node, a search request message, said search request message requesting data; and
receiving a response message from a second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
27. The method of claim 26, further comprising:
admitting at least one of said at least one third node into said community.
28. The method of claim 26, wherein said admitting comprises:
creating a new direct peer connection from a node in said community to said at least one of said at least one third node.
29. A computer readable medium containing an executable program for building a community of nodes having common interests in a network, where the program performs the steps of:
sending, by a first node, a search request message, said search request message requesting data; and
receiving a response message from a second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
30. Apparatus comprising:
means for sending, by a first node, a search request message, said search request message requesting data; and
means for receiving a response message from a second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
US11/140,122 2005-05-27 2005-05-27 Method and apparatus for improving data transfers in peer-to-peer networks Abandoned US20060271638A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US11/140,122 US20060271638A1 (en) 2005-05-27 2005-05-27 Method and apparatus for improving data transfers in peer-to-peer networks
PCT/EP2006/061881 WO2006125710A1 (en) 2005-05-27 2006-04-27 Method and apparatus for improving data transfers in peer-to-peer networks
TW095117483A TW200703025A (en) 2005-05-27 2006-05-17 Method and apparatus for improving data transfers in peer-to-peer networks
US12/163,490 US7958195B2 (en) 2005-05-27 2008-06-27 Method and apparatus for improving data transfers in peer-to-peer networks
US13/099,919 US8280970B2 (en) 2005-05-27 2011-05-03 Method and apparatus for improving data transfers in peer-to-peer networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/140,122 US20060271638A1 (en) 2005-05-27 2005-05-27 Method and apparatus for improving data transfers in peer-to-peer networks

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/163,490 Continuation US7958195B2 (en) 2005-05-27 2008-06-27 Method and apparatus for improving data transfers in peer-to-peer networks

Publications (1)

Publication Number Publication Date
US20060271638A1 true US20060271638A1 (en) 2006-11-30

Family

ID=36636918

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/140,122 Abandoned US20060271638A1 (en) 2005-05-27 2005-05-27 Method and apparatus for improving data transfers in peer-to-peer networks
US12/163,490 Active 2026-06-24 US7958195B2 (en) 2005-05-27 2008-06-27 Method and apparatus for improving data transfers in peer-to-peer networks
US13/099,919 Expired - Fee Related US8280970B2 (en) 2005-05-27 2011-05-03 Method and apparatus for improving data transfers in peer-to-peer networks

Family Applications After (2)

Application Number Title Priority Date Filing Date
US12/163,490 Active 2026-06-24 US7958195B2 (en) 2005-05-27 2008-06-27 Method and apparatus for improving data transfers in peer-to-peer networks
US13/099,919 Expired - Fee Related US8280970B2 (en) 2005-05-27 2011-05-03 Method and apparatus for improving data transfers in peer-to-peer networks

Country Status (3)

Country Link
US (3) US20060271638A1 (en)
TW (1) TW200703025A (en)
WO (1) WO2006125710A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009524293A (en) * 2006-01-13 2009-06-25 インターナショナル・ビジネス・マシーンズ・コーポレーション Method and apparatus for establishing peer-to-peer karma and trust
US20110208823A1 (en) * 2005-05-27 2011-08-25 Beigi Mandis S Method and apparatus for improving data transfers in peer-to-peer networks

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8015204B2 (en) 2001-10-16 2011-09-06 Microsoft Corporation Scoped access control metadata element
EP1303097A3 (en) 2001-10-16 2005-11-30 Microsoft Corporation Virtual distributed security system
US7194553B2 (en) * 2001-10-16 2007-03-20 Microsoft Corporation Resolving virtual network names
US7676540B2 (en) * 2001-10-16 2010-03-09 Microsoft Corporation Scoped referral statements
US7899047B2 (en) 2001-11-27 2011-03-01 Microsoft Corporation Virtual network with adaptive dispatcher
US8014337B2 (en) * 2008-10-27 2011-09-06 Motorola Solutions, Inc. Method and system for wireless multi-hopping communication
US7925736B2 (en) * 2009-06-15 2011-04-12 Microsoft Corporation Message redirection within a messaging infrastructure
EP2413254A1 (en) * 2010-07-27 2012-02-01 Alcatel Lucent System and method for accessing collaborative multimedia content
US8626854B2 (en) * 2011-01-17 2014-01-07 Alcatel Lucent Traffic localization in peer-to-peer networks
KR101980129B1 (en) * 2012-07-10 2019-05-20 한국전자통신연구원 Peer-to-peer network system with manageability

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4807224A (en) * 1987-08-21 1989-02-21 Naron Steven E Multicast data distribution system and method
US20030050966A1 (en) * 2001-09-13 2003-03-13 International Business Machines Corporation Method and system for redirecting data requests in peer-to-peer data networks
US20050174972A1 (en) * 2004-02-09 2005-08-11 Lee Boynton Reliable message distribution in an ad hoc mesh network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10143754A1 (en) * 2001-09-06 2003-04-03 Siemens Ag Scalable peer-to-peer network with a directory service
US7426534B2 (en) * 2001-12-19 2008-09-16 International Business Machines Corporation Method and system for caching message fragments using an expansion attribute in a fragment link tag
US7613796B2 (en) * 2002-09-11 2009-11-03 Microsoft Corporation System and method for creating improved overlay network with an efficient distributed data structure
US7715396B2 (en) * 2004-08-19 2010-05-11 Microsoft Corporation Network routing
US20060271638A1 (en) * 2005-05-27 2006-11-30 Beigi Mandis S Method and apparatus for improving data transfers in peer-to-peer networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4807224A (en) * 1987-08-21 1989-02-21 Naron Steven E Multicast data distribution system and method
US20030050966A1 (en) * 2001-09-13 2003-03-13 International Business Machines Corporation Method and system for redirecting data requests in peer-to-peer data networks
US20050174972A1 (en) * 2004-02-09 2005-08-11 Lee Boynton Reliable message distribution in an ad hoc mesh network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110208823A1 (en) * 2005-05-27 2011-08-25 Beigi Mandis S Method and apparatus for improving data transfers in peer-to-peer networks
US8280970B2 (en) 2005-05-27 2012-10-02 International Business Machines Corporation Method and apparatus for improving data transfers in peer-to-peer networks
JP2009524293A (en) * 2006-01-13 2009-06-25 インターナショナル・ビジネス・マシーンズ・コーポレーション Method and apparatus for establishing peer-to-peer karma and trust

Also Published As

Publication number Publication date
US8280970B2 (en) 2012-10-02
US20080263166A1 (en) 2008-10-23
US20110208823A1 (en) 2011-08-25
WO2006125710A1 (en) 2006-11-30
US7958195B2 (en) 2011-06-07
TW200703025A (en) 2007-01-16

Similar Documents

Publication Publication Date Title
US7958195B2 (en) Method and apparatus for improving data transfers in peer-to-peer networks
JP4755683B2 (en) Method, apparatus, and program for efficiently extending a peer-to-peer (P2P) network
US7376749B2 (en) Heuristics-based peer to peer message routing
US8798016B2 (en) Method for improving peer to peer network communication
US7725596B2 (en) System and method for resolving network layer anycast addresses to network layer unicast addresses
US20060179137A1 (en) Method and apparatus for reducing spam on a peer-to-peer network
US20100070600A1 (en) Methods and media for exchanging data between nodes of disconnected networks
US7643458B1 (en) Communicating between wireless communities
JP4607764B2 (en) Mobile peer-to-peer network construction
US20090201939A1 (en) Data communication apparatus, method for its network configuration, and computer readable recording medium storing its program
US8650259B2 (en) Method and apparatus for increasing the search space or peer-to-peer networks using time-to-live boosting
RU2483457C2 (en) Message routing platform
US8862095B2 (en) Managing mobile nodes in a lawful intercept architecture
US7551570B2 (en) System and method for data handling a network environment
CA2595438C (en) Method for improving peer to peer network communication
US7266082B2 (en) Expressway routing among peers
JP2009230369A (en) Synchronization method for shared data, program for synchronizing shared data, and network system for synchronizing shared data to be held
Dash et al. Flooding control in named data networking
JP2004258994A (en) Dynamic file retrieval method for p2p network, terminal, program, and recording medium
JP2004127074A (en) File retrieval method in p2p network, terminal, program, and recording medium
Nordström et al. Haggle: Relevance-aware content sharing for mobile devices using search
Perera et al. Broadcast Updates with Local Look-up Search (BULLS) a new peer-to-peer protocol
CN117119054A (en) Method, device, computer equipment and storage medium for accelerating domain name query
WO2001084803A2 (en) System and method for resolving network layer anycast addresses to network layer unicast addresses

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BEIGI, MANDIS S.;JENNINGS, RAYMOND B., III;LAVOIE, JASON D.;REEL/FRAME:016538/0918

Effective date: 20050524

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION