US20060271638A1 - Method and apparatus for improving data transfers in peer-to-peer networks - Google Patents
Method and apparatus for improving data transfers in peer-to-peer networks Download PDFInfo
- Publication number
- US20060271638A1 US20060271638A1 US11/140,122 US14012205A US2006271638A1 US 20060271638 A1 US20060271638 A1 US 20060271638A1 US 14012205 A US14012205 A US 14012205A US 2006271638 A1 US2006271638 A1 US 2006271638A1
- Authority
- US
- United States
- Prior art keywords
- node
- message
- requested data
- search request
- referral
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1038—Load balancing arrangements to avoid a single path through a load balancer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/14—Details of searching files based on file metadata
- G06F16/148—File search processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
- G06F16/1834—Distributed file systems implemented based on peer-to-peer networks, e.g. gnutella
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1012—Server selection for load balancing based on compliance of requirements or conditions with available server resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1068—Discovery involving direct consultation or announcement among potential requesting and potential source peers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
Definitions
- the present invention relates generally to computing networks and relates more particularly to the expansion of peer-to-peer data transfer networks.
- FIG. 1 is a schematic diagram of a network 100 of nodes (e.g., computing devices) interacting in a peer-to-peer (P2P) manner.
- a requesting node 101 sends a search message 105 (e.g., containing keywords relating to data that the requesting node 101 wishes to locate) to at least one intermediate node 111 in communication with the requesting node 101 via a peer connection.
- the intermediate node 111 receives the search message 105 and forwards the search message 105 to at least one additional node 111 .
- the search message 105 reaches at least one responding node 103 having the requested data (in some cases, the first intermediate node 111 to which the search message 105 is forwarded will also be a responding node 103 ). At least one responding node 103 then sends a response message 107 back to the requesting node 101 , e.g., via the intermediate nodes 111 .
- the requesting node 101 requests the relevant data from a responding node 103 by connecting directly to the responding node 103 , e.g., via direct connection 109 .
- messages including the search message 105 have a limited time to live or hop count. That is, a message will expire once it has been forwarded to a predefined maximum number of nodes 101 , 103 or 111 .
- the requesting node 101 generates a search message having a time to live of four, and a node at which the requested data resides (e.g., node 113 ) is more than four “hops” away from the requesting node 101 , the search message will expire before the requested data is obtained.
- Typical methods for increasing the possibility of the search message reaching a node having the requested data thus include increasing the search message's time to live or increasing the number of peer connections per node; however, either method will cause an increase in network traffic.
- Similar methods that may decrease download time include allowing selective downloads (by which a requesting node downloads the same data from multiple responding nodes at different offsets, thereby shortening download time), or to allow a requesting node to partner with one or more other peer nodes currently downloading the requested data.
- these methods do not increase the “view” of a node in the P2P network (e.g., by enabling search requests from the node to reach nodes further into the P2P network), nor do these methods enable the building of P2P communities of users having similar interests, which can increase the likelihood of searches finding desired content in the P2P network.
- One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data.
- a responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers.
- the responding node may also indicate that the responding node has the requested data.
- this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.
- nodes e.g., referred nodes
- FIG. 1 is a schematic diagram of a network of nodes interacting in a peer-to-peer manner
- FIG. 2 is a flow diagram illustrating one embodiment of a method for referring out-of-range nodes in a P2P network, such as the network illustrated in FIG. 1 ;
- FIG. 3 is a flow diagram illustrating one embodiment of a method for building communities in a P2P network, such as the network illustrated in FIG. 1 ;
- FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device.
- the present invention is a method and apparatus for improving data transfers in P2P networks.
- Embodiments of the present invention make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes.
- This capability further facilitates the building of “communities” within the P2P network, where a “community” in the context of the present invention is a subset of nodes in a P2P network that share common interests and/or data, e.g., over direct peer connections.
- node refers to a computing device such as a personal computing device (e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.), a server, a router or the like that is connected to a P2P network.
- a personal computing device e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.
- server e.g., a server, a router or the like that is connected to a P2P network.
- FIG. 2 is a flow diagram illustrating one embodiment of a method 200 for referring out-of-range nodes in a P2P network, such as the network 100 illustrated in FIG. 1 .
- the method 200 may be implemented at, for example, any node (e.g., 101 , 103 , 111 or 113 ) on the P2P network 100 .
- the method 200 is initialized at step 202 and proceeds to step 204 , where the method 200 receives a search request message, e.g., from a peer (connected) node.
- the method 200 then proceeds to step 206 , where the method 200 examines the search request message and determines whether the receiver (e.g., the node at which the search request message was received in step 204 ) has the requested data. If the receiver has the requested data, the method 200 proceeds to step 208 and sends a response message over the network 100 back to the requesting node, e.g., in accordance with conventional P2P protocols. The response message indicates that the receiver has the requested data.
- the receiver e.g., the node at which the search request message was received in step 204 .
- the response message sent in step 208 further includes a referral message comprising at least one referred node, where a “referred node” is another node in the P2P network that has previously retrieved the requested data.
- the referral message is included in the response message.
- the referral message is a separate message sent to the requesting node.
- the referral message is piggybacked on the response message.
- the referred nodes are nodes that have retrieved the requested data directly from the receiver.
- the referral message may include, for example, at least one of the hostnames, IP addresses, virtual names and other identifiers of the referred nodes.
- the referral message may be time-sensitive such that it includes only nodes that have retrieved the requested content within a predefined maximum timeframe (e.g., within the last 24 hours, etc.).
- This predefined maximum timeframe may be specified in the search request message (e.g., “refer only nodes that have requested the data within the past 24 hours”), or the predefined maximum timeframe may be specified at the receiver.
- the assumption is that if a referred node has recently (e.g., within the predefined maximum timeframe) retrieved the requested data, the referred node will likely still have the requested data available to share.
- the referral message may be sorted or ranked based on at least one of: uptime for the referred nodes, bandwidth of the referred nodes and latency of the referred nodes.
- the method 200 sends a referral message based on a threshold distance that the search request message has traveled in the network. For example, in one embodiment, the method 200 only sends a referral message if the search request message's time to live has expired (e.g., the receiver is an edge node in the requesting node's view of the P2P network). In another embodiment, the method 200 only sends a referral message if the search request message's time to live is at least half expired. This threshold distance may be specified by the requesting node, the receiver, or both.
- step 210 inquires whether the receiver knows of another node that is likely to have the requested data (e.g., because the node has previously downloaded the requested data from another source as discussed above). If the receiver does know of another node that is likely to have the requested data, the method 200 proceeds to step 208 as described above but sends only a referral message, and not a response message. Thus, even if the receiver does not have the requested data, the receiver may still be able to refer the requesting node to one or more other nodes that are likely to have the requested data.
- the method 200 proceeds to step 212 and either forwards the search request message to the next node (e.g., in accordance with conventional P2P protocols) or discards the search request message (e.g., if the search message's time to live or hop count has expired).
- the method 200 terminates in step 214 .
- the receiver may be contacted by the requesting node for at least a portion of the requested data (if the method 200 has indicated that the receiver has the data).
- the method 200 as described above enables the view of a node in a P2P network to be expanded while only minimally increasing network traffic.
- the view of the requesting node can be expanded despite the requesting node's inherently limited range. The farther away a receiver/responding node is in hops from the requesting node, the smaller the intersection is between the requesting node and the receiver/responding node, and the larger the expanded view of the P2P is likely to therefore be.
- the method 200 actually conserves traffic while at the same time “expanding” the network.
- response latency is typically reduced as a requesting node can select faster nodes which can provide more data than nodes on slower links.
- a node may periodically update its referral message, for example based on one or more test searches. For example, a node may send a test search message to one or more nodes identified in its referral message, in order to determine that the nodes identified in the referral message still have the indicated data. If a node identified in the referral message no longer has the indicated data, it can be removed from the referral message. Test searches may be performed periodically, e.g., based on an expiration of a predefined period of time.
- a node may remove a referred node from the referral message if the node receives a message from a requesting node (to which the referred node has been referred) indicating that the referred node no longer has the indicated data.
- the method 200 facilitates the building of “communities” within the P2P by identifying out-of-range nodes with potentially similar interests (e.g., as inferred by the request for the same data).
- the existence of communities allows nodes with similar interests to directly communicate and exchange data, thereby reducing overall network traffic (as search request messages sent through the community tend not to propagate as far into the P2P network as is typical with a normal search as described in connection with FIG. 1 ).
- FIG. 3 is a flow diagram illustrating one embodiment of a method 300 for building communities in a P2P network, such as the network 100 illustrated in FIG. 1 .
- the method 300 may be implemented at, for example, any node (e.g., 101 , 103 , 111 or 113 ) on the P2P network 100 .
- the method 300 is initialized at step 302 and proceeds to step 304 , where the method 300 sends a search request message, e.g., to one or more peer nodes.
- the method 300 receives at least one response message responsive to the search request message sent in step 304 .
- the response message includes at least one referred node, e.g., as described with reference to the method 200 .
- the response message may also include an indication that the responding node has the requested data, e.g., in accordance with traditional P2P protocols.
- the method 300 may collate multiple response messages received from multiple responding nodes to create an aggregate list of potential sources for the requested data.
- the method 300 proceeds to step 308 and retrieves at least a portion of the requested data from at least one of the responding node and/or at least one referred node listed in the referral message.
- the method 300 may choose which portions of the requested data to retrieve from which responding and/or referred nodes, based on a collated list of potential sources for the requested data.
- the requesting node may identify one or more preferred nodes for searching, based on the information received in step 306 .
- step 310 the method 300 creates a direct peer connection to at least one of the referred nodes, e.g., to admit the referred node into or to create a “community” or subset of nodes in the P2P network that share common interests and/or data.
- the referred node is a mutually preferred node (e.g., preferred for searching).
- step 310 further includes terminating an existing peer connection for every new peer connection that is created (e.g., to conserve network resources where each node in the P2P network is allowed a maximum number of peer connections).
- the method 300 may create a direct peer connection between the requesting node 101 and the normally out-of-range node 113 , which has the requested data, and may terminate the peer connection between the requesting node 101 and the intermediate node 111 illustrated to the left of the requesting node 101 .
- the method 300 is terminated in step 312 .
- FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device 400 .
- a general purpose computing device 400 comprises a processor 402 , a memory 404 , a data transfer module 405 and various input/output (I/O) devices 406 such as a display, a keyboard, a mouse, a modem, and the like.
- I/O devices 406 such as a display, a keyboard, a mouse, a modem, and the like.
- at least one I/O device is a storage device (e.g., a disk drive, an optical disk drive, a floppy disk drive).
- the data transfer module 405 can be implemented as a physical device or subsystem that is coupled to a processor through a communication channel.
- the data transfer module 405 can be represented by one or more software applications (or even a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC)), where the software is loaded from a storage medium (e.g., I/O devices 406 ) and operated by the processor 402 in the memory 404 of the general purpose computing device 400 .
- a storage medium e.g., I/O devices 406
- a computer readable medium or carrier e.g., RAM, magnetic or optical drive or diskette, and the like.
- the present invention represents a significant advancement in the field of data transfer networks.
- a method and apparatus are provided that make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes.
- This capability further facilitates the building of “communities” within the P2P network, enabling faster, more efficient data transfers and reducing network traffic.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Library & Information Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.
Description
- The present invention relates generally to computing networks and relates more particularly to the expansion of peer-to-peer data transfer networks.
-
FIG. 1 is a schematic diagram of anetwork 100 of nodes (e.g., computing devices) interacting in a peer-to-peer (P2P) manner. Generally, a requestingnode 101 sends a search message 105 (e.g., containing keywords relating to data that the requestingnode 101 wishes to locate) to at least oneintermediate node 111 in communication with the requestingnode 101 via a peer connection. Theintermediate node 111 receives thesearch message 105 and forwards thesearch message 105 to at least oneadditional node 111. Eventually, thesearch message 105 reaches at least one respondingnode 103 having the requested data (in some cases, the firstintermediate node 111 to which thesearch message 105 is forwarded will also be a responding node 103). At least one respondingnode 103 then sends aresponse message 107 back to the requestingnode 101, e.g., via theintermediate nodes 111. The requestingnode 101 then requests the relevant data from a respondingnode 103 by connecting directly to the respondingnode 103, e.g., viadirect connection 109. - In conventional P2P systems, messages including the
search message 105 have a limited time to live or hop count. That is, a message will expire once it has been forwarded to a predefined maximum number ofnodes node 101 generates a search message having a time to live of four, and a node at which the requested data resides (e.g., node 113) is more than four “hops” away from the requestingnode 101, the search message will expire before the requested data is obtained. Typical methods for increasing the possibility of the search message reaching a node having the requested data thus include increasing the search message's time to live or increasing the number of peer connections per node; however, either method will cause an increase in network traffic. - Similar methods that may decrease download time include allowing selective downloads (by which a requesting node downloads the same data from multiple responding nodes at different offsets, thereby shortening download time), or to allow a requesting node to partner with one or more other peer nodes currently downloading the requested data. However, these methods do not increase the “view” of a node in the P2P network (e.g., by enabling search requests from the node to reach nodes further into the P2P network), nor do these methods enable the building of P2P communities of users having similar interests, which can increase the likelihood of searches finding desired content in the P2P network.
- Thus, there is a need in the art for a method and apparatus for improving data transfers in P2P networks.
- One embodiment of the present method and apparatus for improving data transfers in peer-to-peer networks includes receiving a search request message from a requesting node, where the search request message requests specific data. A responding node then sends a response message to the requesting node including a referral message comprising at least one referred node that is expected to have the requested data, based on knowledge of the referred node's previous incoming and outgoing data transfers. The responding node may also indicate that the responding node has the requested data. In addition to increasing the requesting node's view of the peer-to-peer network, this also enables the identification of nodes (e.g., referred nodes) with which the requesting node may wish to establish direct peer-to-peer connections, e.g., to build peer-to-peer communities of nodes having similar interests.
- So that the manner in which the above recited embodiments of the invention are attained and can be understood in detail, a more particular description of the invention, briefly summarized above, may be obtained by reference to the embodiments thereof which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
-
FIG. 1 is a schematic diagram of a network of nodes interacting in a peer-to-peer manner; -
FIG. 2 is a flow diagram illustrating one embodiment of a method for referring out-of-range nodes in a P2P network, such as the network illustrated inFIG. 1 ; -
FIG. 3 is a flow diagram illustrating one embodiment of a method for building communities in a P2P network, such as the network illustrated inFIG. 1 ; and -
FIG. 4 is a high level block diagram of the network expansion method that is implemented using a general purpose computing device. - To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
- In one embodiment, the present invention is a method and apparatus for improving data transfers in P2P networks. Embodiments of the present invention make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes. This capability further facilitates the building of “communities” within the P2P network, where a “community” in the context of the present invention is a subset of nodes in a P2P network that share common interests and/or data, e.g., over direct peer connections.
- For the purposes of the present invention, the term “node” refers to a computing device such as a personal computing device (e.g., a desk top computer, a laptop computer, a cellular telephone, a personal digital assistant, etc.), a server, a router or the like that is connected to a P2P network.
-
FIG. 2 is a flow diagram illustrating one embodiment of amethod 200 for referring out-of-range nodes in a P2P network, such as thenetwork 100 illustrated inFIG. 1 . Themethod 200 may be implemented at, for example, any node (e.g., 101, 103, 111 or 113) on theP2P network 100. Themethod 200 is initialized atstep 202 and proceeds tostep 204, where themethod 200 receives a search request message, e.g., from a peer (connected) node. - The
method 200 then proceeds tostep 206, where themethod 200 examines the search request message and determines whether the receiver (e.g., the node at which the search request message was received in step 204) has the requested data. If the receiver has the requested data, themethod 200 proceeds to step 208 and sends a response message over thenetwork 100 back to the requesting node, e.g., in accordance with conventional P2P protocols. The response message indicates that the receiver has the requested data. - In one embodiment, the response message sent in
step 208 further includes a referral message comprising at least one referred node, where a “referred node” is another node in the P2P network that has previously retrieved the requested data. In one embodiment, the referral message is included in the response message. In another embodiment, the referral message is a separate message sent to the requesting node. In yet another embodiment, the referral message is piggybacked on the response message. In one embodiment, the referred nodes are nodes that have retrieved the requested data directly from the receiver. The referral message may include, for example, at least one of the hostnames, IP addresses, virtual names and other identifiers of the referred nodes. - In one embodiment, the referral message may be time-sensitive such that it includes only nodes that have retrieved the requested content within a predefined maximum timeframe (e.g., within the last 24 hours, etc.). This predefined maximum timeframe may be specified in the search request message (e.g., “refer only nodes that have requested the data within the past 24 hours”), or the predefined maximum timeframe may be specified at the receiver. The assumption is that if a referred node has recently (e.g., within the predefined maximum timeframe) retrieved the requested data, the referred node will likely still have the requested data available to share.
- In yet another embodiment, the referral message may be sorted or ranked based on at least one of: uptime for the referred nodes, bandwidth of the referred nodes and latency of the referred nodes.
- In one embodiment, the
method 200 sends a referral message based on a threshold distance that the search request message has traveled in the network. For example, in one embodiment, themethod 200 only sends a referral message if the search request message's time to live has expired (e.g., the receiver is an edge node in the requesting node's view of the P2P network). In another embodiment, themethod 200 only sends a referral message if the search request message's time to live is at least half expired. This threshold distance may be specified by the requesting node, the receiver, or both. - Alternatively, if the
method 200 determines instep 206 that the receiver does not have the requested data, themethod 200 proceeds tostep 210 and inquires whether the receiver knows of another node that is likely to have the requested data (e.g., because the node has previously downloaded the requested data from another source as discussed above). If the receiver does know of another node that is likely to have the requested data, themethod 200 proceeds tostep 208 as described above but sends only a referral message, and not a response message. Thus, even if the receiver does not have the requested data, the receiver may still be able to refer the requesting node to one or more other nodes that are likely to have the requested data. - However, if the receiver does not have the requested data and does not know of another node that is likely to have the requested data, the
method 200 proceeds to step 212 and either forwards the search request message to the next node (e.g., in accordance with conventional P2P protocols) or discards the search request message (e.g., if the search message's time to live or hop count has expired). - The
method 200 terminates instep 214. Based on the requesting node's evaluation of the response message, including the referral message, the receiver may be contacted by the requesting node for at least a portion of the requested data (if themethod 200 has indicated that the receiver has the data). - The
method 200 as described above enables the view of a node in a P2P network to be expanded while only minimally increasing network traffic. By enabling one or more nodes in a P2P network to “refer” out-of-range nodes to a requesting node, the view of the requesting node can be expanded despite the requesting node's inherently limited range. The farther away a receiver/responding node is in hops from the requesting node, the smaller the intersection is between the requesting node and the receiver/responding node, and the larger the expanded view of the P2P is likely to therefore be. Thus, unlike conventional P2P expansion methods that tend to result in a sometimes exponential increase in network traffic (e.g., by increasing either a search request message's time to live or a node's number of peer connections), themethod 200 actually conserves traffic while at the same time “expanding” the network. In addition, response latency is typically reduced as a requesting node can select faster nodes which can provide more data than nodes on slower links. - Those skilled in the art will appreciate that a node may periodically update its referral message, for example based on one or more test searches. For example, a node may send a test search message to one or more nodes identified in its referral message, in order to determine that the nodes identified in the referral message still have the indicated data. If a node identified in the referral message no longer has the indicated data, it can be removed from the referral message. Test searches may be performed periodically, e.g., based on an expiration of a predefined period of time. In yet another embodiment, a node may remove a referred node from the referral message if the node receives a message from a requesting node (to which the referred node has been referred) indicating that the referred node no longer has the indicated data.
- Moreover, by referring nodes that have or are likely to have the requested data, the
method 200 facilitates the building of “communities” within the P2P by identifying out-of-range nodes with potentially similar interests (e.g., as inferred by the request for the same data). The existence of communities allows nodes with similar interests to directly communicate and exchange data, thereby reducing overall network traffic (as search request messages sent through the community tend not to propagate as far into the P2P network as is typical with a normal search as described in connection withFIG. 1 ). -
FIG. 3 is a flow diagram illustrating one embodiment of amethod 300 for building communities in a P2P network, such as thenetwork 100 illustrated inFIG. 1 . Themethod 300 may be implemented at, for example, any node (e.g., 101, 103, 111 or 113) on theP2P network 100. Themethod 300 is initialized atstep 302 and proceeds to step 304, where themethod 300 sends a search request message, e.g., to one or more peer nodes. - In
step 306, themethod 300 receives at least one response message responsive to the search request message sent instep 304. The response message includes at least one referred node, e.g., as described with reference to themethod 200. In one embodiment, the response message may also include an indication that the responding node has the requested data, e.g., in accordance with traditional P2P protocols. Themethod 300 may collate multiple response messages received from multiple responding nodes to create an aggregate list of potential sources for the requested data. - Once the
method 300 has received the response message, themethod 300 proceeds to step 308 and retrieves at least a portion of the requested data from at least one of the responding node and/or at least one referred node listed in the referral message. In one embodiment, themethod 300 may choose which portions of the requested data to retrieve from which responding and/or referred nodes, based on a collated list of potential sources for the requested data. In another embodiment, the requesting node may identify one or more preferred nodes for searching, based on the information received instep 306. - In
step 310, themethod 300 creates a direct peer connection to at least one of the referred nodes, e.g., to admit the referred node into or to create a “community” or subset of nodes in the P2P network that share common interests and/or data. In one embodiment, the referred node is a mutually preferred node (e.g., preferred for searching). In one embodiment, step 310 further includes terminating an existing peer connection for every new peer connection that is created (e.g., to conserve network resources where each node in the P2P network is allowed a maximum number of peer connections). Thus, for example, referring back toFIG. 1 , themethod 300 may create a direct peer connection between the requestingnode 101 and the normally out-of-range node 113, which has the requested data, and may terminate the peer connection between the requestingnode 101 and theintermediate node 111 illustrated to the left of the requestingnode 101. - The
method 300 is terminated instep 312. -
FIG. 4 is a high level block diagram of the network expansion method that is implemented using a generalpurpose computing device 400. In one embodiment, a generalpurpose computing device 400 comprises aprocessor 402, amemory 404, adata transfer module 405 and various input/output (I/O)devices 406 such as a display, a keyboard, a mouse, a modem, and the like. In one embodiment, at least one I/O device is a storage device (e.g., a disk drive, an optical disk drive, a floppy disk drive). It should be understood that thedata transfer module 405 can be implemented as a physical device or subsystem that is coupled to a processor through a communication channel. - Alternatively, the
data transfer module 405 can be represented by one or more software applications (or even a combination of software and hardware, e.g., using Application Specific Integrated Circuits (ASIC)), where the software is loaded from a storage medium (e.g., I/O devices 406) and operated by theprocessor 402 in thememory 404 of the generalpurpose computing device 400. Thus, in one embodiment, thedata transfer module 405 for expanding a P2P network and building P2P communities described herein with reference to the preceding Figures can be stored on a computer readable medium or carrier (e.g., RAM, magnetic or optical drive or diskette, and the like). - Thus, the present invention represents a significant advancement in the field of data transfer networks. A method and apparatus are provided that make it possible for a requesting node on a P2P network to receive data from nodes that would normally be outside of the requesting node's “range” by enabling the referral, by intermediate nodes, of the out-of-range nodes. This capability further facilitates the building of “communities” within the P2P network, enabling faster, more efficient data transfers and reducing network traffic.
- While foregoing is directed to the preferred embodiment of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
Claims (30)
1. A method for transferring data between nodes in a network, said method comprising:
receiving, by a first node, a search request message from a second node, said search request message requesting data; and
sending, by said first node, a response message to said second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
2. The method of claim 1 , wherein said response message further indicates that said first node has said requested data.
3. The method of claim 1 , wherein said at least one third node is a node that has retrieved said requested data from said first node.
4. The method of claim 1 , wherein said referral message includes at least one of: said at least one third node's hostname, said at least one third node's IP address and said at least one third node's virtual name.
5. The method of claim 1 , wherein said at least one third node has retrieved said requested data within a predefined maximum timeframe.
6. The method of claim 5 , where said predefined maximum timeframe is defined by at least one of: said first node and said second node.
7. The method of claim 1 , wherein said referral message is sent if said search request message has traveled at least a threshold distance into said network.
8. The method of claim 7 , wherein said threshold distance is defined by at least one of: said first node and said second node.
9. The method of claim 1 , further comprising:
updating said referral message to remove at least one third node if said at least one third node no longer has said requested data.
10. The method of claim 9 , wherein said updating further comprises:
sending, by said first node, a test search message to said at least one third node, to determine whether said third node still has said requested data.
11. The method of claim 9 , wherein said updating further comprises:
receiving, from said second node, a message indicating that said at least one third node no longer has said requested data.
12. The method of claim 1 , wherein said referral message is ranked based on at least one of: uptime of said at least one third node, bandwidth of said at least one third node and latency of said at least one third node.
13. A computer readable medium containing an executable program for transferring data between nodes in a network, where the program performs the steps of:
receiving, by a first node, a search request message from a second node, said search request message requesting data; and
sending, by said first node, a response message to said second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
14. The computer readable medium of claim 13 , wherein said response message further indicates that said first node has said requested data.
15. The computer readable medium of claim 13 , wherein said at least one third node is a node that has retrieved said requested data from said first node.
16. The computer readable medium of claim 13 , wherein said referral message includes at least one of: said at least one third node's hostname, said at least one third node's IP address and said at least one third node's virtual name.
17. The computer readable medium of claim 13 , wherein said at least one third node has retrieved said requested data within a predefined maximum timeframe.
18. The computer readable medium of claim 17 , where said predefined maximum timeframe is defined by at least one of: said first node and said second node.
19. The computer readable medium of claim 13 , wherein said referral message is sent if said search request message has traveled at least a threshold distance into said network.
20. The computer readable medium of claim 19 , wherein said threshold distance is defined by at least one of: said first node and said second node.
21. The computer readable medium of claim 13 , further comprising:
updating said referral message to remove at least one third node if said at least one third node no longer has said requested data.
22. The computer readable medium of claim 21 , wherein said updating further comprises:
sending, by said first node, a test search message to said at least one third node, to determine whether said third node still has said requested data.
23. The computer readable medium of claim 21 , wherein said updating further comprises:
receiving, from said second node, a message indicating that said at least one third node no longer has said requested data.
24. The computer readable medium of claim 13 , wherein said referral message is ranked based on at least one of: uptime of said at least one third node, bandwidth of said at least one third node and latency of said at least one third node.
25. Apparatus comprising:
means for receiving, by a first node, a search request message from a second node, said search request message requesting data; and
means for sending, by said first node, a response message to said second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
26. A method for building a community of nodes having common interests in a network, said method comprising the steps of:
sending, by a first node, a search request message, said search request message requesting data; and
receiving a response message from a second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
27. The method of claim 26 , further comprising:
admitting at least one of said at least one third node into said community.
28. The method of claim 26 , wherein said admitting comprises:
creating a new direct peer connection from a node in said community to said at least one of said at least one third node.
29. A computer readable medium containing an executable program for building a community of nodes having common interests in a network, where the program performs the steps of:
sending, by a first node, a search request message, said search request message requesting data; and
receiving a response message from a second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
30. Apparatus comprising:
means for sending, by a first node, a search request message, said search request message requesting data; and
means for receiving a response message from a second node, said response message including a referral message identifying at least one third node that is expected to have said requested data.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/140,122 US20060271638A1 (en) | 2005-05-27 | 2005-05-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
PCT/EP2006/061881 WO2006125710A1 (en) | 2005-05-27 | 2006-04-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
TW095117483A TW200703025A (en) | 2005-05-27 | 2006-05-17 | Method and apparatus for improving data transfers in peer-to-peer networks |
US12/163,490 US7958195B2 (en) | 2005-05-27 | 2008-06-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
US13/099,919 US8280970B2 (en) | 2005-05-27 | 2011-05-03 | Method and apparatus for improving data transfers in peer-to-peer networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/140,122 US20060271638A1 (en) | 2005-05-27 | 2005-05-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/163,490 Continuation US7958195B2 (en) | 2005-05-27 | 2008-06-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060271638A1 true US20060271638A1 (en) | 2006-11-30 |
Family
ID=36636918
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/140,122 Abandoned US20060271638A1 (en) | 2005-05-27 | 2005-05-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
US12/163,490 Active 2026-06-24 US7958195B2 (en) | 2005-05-27 | 2008-06-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
US13/099,919 Expired - Fee Related US8280970B2 (en) | 2005-05-27 | 2011-05-03 | Method and apparatus for improving data transfers in peer-to-peer networks |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/163,490 Active 2026-06-24 US7958195B2 (en) | 2005-05-27 | 2008-06-27 | Method and apparatus for improving data transfers in peer-to-peer networks |
US13/099,919 Expired - Fee Related US8280970B2 (en) | 2005-05-27 | 2011-05-03 | Method and apparatus for improving data transfers in peer-to-peer networks |
Country Status (3)
Country | Link |
---|---|
US (3) | US20060271638A1 (en) |
TW (1) | TW200703025A (en) |
WO (1) | WO2006125710A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009524293A (en) * | 2006-01-13 | 2009-06-25 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method and apparatus for establishing peer-to-peer karma and trust |
US20110208823A1 (en) * | 2005-05-27 | 2011-08-25 | Beigi Mandis S | Method and apparatus for improving data transfers in peer-to-peer networks |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8015204B2 (en) | 2001-10-16 | 2011-09-06 | Microsoft Corporation | Scoped access control metadata element |
EP1303097A3 (en) | 2001-10-16 | 2005-11-30 | Microsoft Corporation | Virtual distributed security system |
US7194553B2 (en) * | 2001-10-16 | 2007-03-20 | Microsoft Corporation | Resolving virtual network names |
US7676540B2 (en) * | 2001-10-16 | 2010-03-09 | Microsoft Corporation | Scoped referral statements |
US7899047B2 (en) | 2001-11-27 | 2011-03-01 | Microsoft Corporation | Virtual network with adaptive dispatcher |
US8014337B2 (en) * | 2008-10-27 | 2011-09-06 | Motorola Solutions, Inc. | Method and system for wireless multi-hopping communication |
US7925736B2 (en) * | 2009-06-15 | 2011-04-12 | Microsoft Corporation | Message redirection within a messaging infrastructure |
EP2413254A1 (en) * | 2010-07-27 | 2012-02-01 | Alcatel Lucent | System and method for accessing collaborative multimedia content |
US8626854B2 (en) * | 2011-01-17 | 2014-01-07 | Alcatel Lucent | Traffic localization in peer-to-peer networks |
KR101980129B1 (en) * | 2012-07-10 | 2019-05-20 | 한국전자통신연구원 | Peer-to-peer network system with manageability |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4807224A (en) * | 1987-08-21 | 1989-02-21 | Naron Steven E | Multicast data distribution system and method |
US20030050966A1 (en) * | 2001-09-13 | 2003-03-13 | International Business Machines Corporation | Method and system for redirecting data requests in peer-to-peer data networks |
US20050174972A1 (en) * | 2004-02-09 | 2005-08-11 | Lee Boynton | Reliable message distribution in an ad hoc mesh network |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10143754A1 (en) * | 2001-09-06 | 2003-04-03 | Siemens Ag | Scalable peer-to-peer network with a directory service |
US7426534B2 (en) * | 2001-12-19 | 2008-09-16 | International Business Machines Corporation | Method and system for caching message fragments using an expansion attribute in a fragment link tag |
US7613796B2 (en) * | 2002-09-11 | 2009-11-03 | Microsoft Corporation | System and method for creating improved overlay network with an efficient distributed data structure |
US7715396B2 (en) * | 2004-08-19 | 2010-05-11 | Microsoft Corporation | Network routing |
US20060271638A1 (en) * | 2005-05-27 | 2006-11-30 | Beigi Mandis S | Method and apparatus for improving data transfers in peer-to-peer networks |
-
2005
- 2005-05-27 US US11/140,122 patent/US20060271638A1/en not_active Abandoned
-
2006
- 2006-04-27 WO PCT/EP2006/061881 patent/WO2006125710A1/en active Application Filing
- 2006-05-17 TW TW095117483A patent/TW200703025A/en unknown
-
2008
- 2008-06-27 US US12/163,490 patent/US7958195B2/en active Active
-
2011
- 2011-05-03 US US13/099,919 patent/US8280970B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4807224A (en) * | 1987-08-21 | 1989-02-21 | Naron Steven E | Multicast data distribution system and method |
US20030050966A1 (en) * | 2001-09-13 | 2003-03-13 | International Business Machines Corporation | Method and system for redirecting data requests in peer-to-peer data networks |
US20050174972A1 (en) * | 2004-02-09 | 2005-08-11 | Lee Boynton | Reliable message distribution in an ad hoc mesh network |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110208823A1 (en) * | 2005-05-27 | 2011-08-25 | Beigi Mandis S | Method and apparatus for improving data transfers in peer-to-peer networks |
US8280970B2 (en) | 2005-05-27 | 2012-10-02 | International Business Machines Corporation | Method and apparatus for improving data transfers in peer-to-peer networks |
JP2009524293A (en) * | 2006-01-13 | 2009-06-25 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method and apparatus for establishing peer-to-peer karma and trust |
Also Published As
Publication number | Publication date |
---|---|
US8280970B2 (en) | 2012-10-02 |
US20080263166A1 (en) | 2008-10-23 |
US20110208823A1 (en) | 2011-08-25 |
WO2006125710A1 (en) | 2006-11-30 |
US7958195B2 (en) | 2011-06-07 |
TW200703025A (en) | 2007-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7958195B2 (en) | Method and apparatus for improving data transfers in peer-to-peer networks | |
JP4755683B2 (en) | Method, apparatus, and program for efficiently extending a peer-to-peer (P2P) network | |
US7376749B2 (en) | Heuristics-based peer to peer message routing | |
US8798016B2 (en) | Method for improving peer to peer network communication | |
US7725596B2 (en) | System and method for resolving network layer anycast addresses to network layer unicast addresses | |
US20060179137A1 (en) | Method and apparatus for reducing spam on a peer-to-peer network | |
US20100070600A1 (en) | Methods and media for exchanging data between nodes of disconnected networks | |
US7643458B1 (en) | Communicating between wireless communities | |
JP4607764B2 (en) | Mobile peer-to-peer network construction | |
US20090201939A1 (en) | Data communication apparatus, method for its network configuration, and computer readable recording medium storing its program | |
US8650259B2 (en) | Method and apparatus for increasing the search space or peer-to-peer networks using time-to-live boosting | |
RU2483457C2 (en) | Message routing platform | |
US8862095B2 (en) | Managing mobile nodes in a lawful intercept architecture | |
US7551570B2 (en) | System and method for data handling a network environment | |
CA2595438C (en) | Method for improving peer to peer network communication | |
US7266082B2 (en) | Expressway routing among peers | |
JP2009230369A (en) | Synchronization method for shared data, program for synchronizing shared data, and network system for synchronizing shared data to be held | |
Dash et al. | Flooding control in named data networking | |
JP2004258994A (en) | Dynamic file retrieval method for p2p network, terminal, program, and recording medium | |
JP2004127074A (en) | File retrieval method in p2p network, terminal, program, and recording medium | |
Nordström et al. | Haggle: Relevance-aware content sharing for mobile devices using search | |
Perera et al. | Broadcast Updates with Local Look-up Search (BULLS) a new peer-to-peer protocol | |
CN117119054A (en) | Method, device, computer equipment and storage medium for accelerating domain name query | |
WO2001084803A2 (en) | System and method for resolving network layer anycast addresses to network layer unicast addresses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BEIGI, MANDIS S.;JENNINGS, RAYMOND B., III;LAVOIE, JASON D.;REEL/FRAME:016538/0918 Effective date: 20050524 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |