SlideShare a Scribd company logo
1 of 4
Download to read offline
G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and
                    Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 3, Issue 2, March -April 2013, pp.356-359
     Load Balancing in P2P networks using DHT based systems and
                  Ant based systems: A Comparison
                                  G. T. Chavan, M. A. Mahajan
                               Asst. Prof. Sinhgad College of Engineering, Pune
                              M.E. Student Sinhgad College of Engineering, Pune


Abstract
         The heterogeneity in peer to peer (P2P)          searched.
networks can be its advantage as well as                           Distributed hash tables (DHTs) are
disadvantage. The heterogeneity may be about              example
amount of storage, computing power,                       of decentralized distributed systems. DHTs
connectivity etc. But P2P systems make it                 provide a lookup for the data items similar to a
possible to harness resources such as the
                                                          hashing where (key, value) pairs are stored in the
storage, bandwidth and computing power of
large populations of networked computers in a             DHT, and any node can efficiently get the value
cost effective manner. There are many                     associated with a given key. Responsibility of the
approaches to balance these systems in a cost-            mapping for keys to values is divided among the
effective way. Here we are giving focus on two            nodes, in such a way that a change in mapping
main approaches; the Distributed Hash Table               causes a minimal amount of disruption. Figure 1
(DHT) based systems and Ant based systems.                shows the structure of the DHT where the data
Both approaches are having its own advantages             items are combined with the hash function and the
and shortcomings.                                         result generated will be stored in the node as a (key,
                                                          Value) pair.
                                                          DHTs form an infrastructure that can be used to
Keywords—load balancing, p2p networks,
                                                          build P2P networks
DHT, Ant based Systems
                                                          II.   DHT WORKING
I.   INTRODUCTION                                         In the DHT based systems each data item which is
Peer to Peer network:-                                    to be stored on the computers is having its unique
          Peer to peer network is way of                  id. The identifier space is partitioned among the
implementing the networking between the                   nodes on
computers where all are equivalent in nature i.e. all
share equivalent responsibilities of processing data.           FOX           HF
                                                                                          DF
A peer to peer network can also be created in ad-
hoc connection; where a couple of computers                                               CD
connected via a Universal Serial Bus to transfer              FOX             HF          345
files, or it can also be a permanent network like a          RUNS                         52E
                                                                                            4
network setup in a small organization.
Peer to peer systems doesn’t have any centralised                                         D87
control or any hierarchy in operation, so peer to                                          9E
peer systems are distributed systems where the              FOX               HF
                                                           WALKS
                                                                                          45O
software running at each node is equivalent in
functionality.                                                                            428                    P
                                                                                           41
                                                          Fig.1. The structure of Distributed Hash Table.        e
Load Balancing:
          Load balancing is sharing the work                                                                     e
                                                                   the system, called as zone. Every node on
between two or more computers, CPUs, network              the system is responsible for storing all the items r
links etc. The load balancing is done to maximize         that are mapped to an identifier in its portion of the s
throughput- by getting the work done from all the         space. The data items can be accessed and stored
resources available in the system. As many                on the zone by using a set of functions i.e. put(ID,
resources are working simultaneously the resource         item): stores the item associated with ID, and
utilization will be higher and the response time will     get(ID): retrieves the item corresponding to ID. The
gradually minimize. Load balancing can also be            load balancing is done using the virtual servers.
useful      when      dealing     with     redundant      The virtual server is part of the node. A single node
communications links. To achieve balancing first          can be partitioned into multiple virtual servers. A
the nodes should be available for processing and          virtual server is also responsible for the identifier
the different routes between them should also be


                                                                                                356 | P a g e
G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and
                    Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 3, Issue 2, March -April 2013, pp.356-359
space. As the node is a combination of multiple          conditions and selecting the destination for the load
virtual servers it is responsible for multiple           transfer. In semi-centralized the multiple central
identifier spaces. The basic advantage of using          nodes are responsible for the storing the load
virtual servers is that when the node gets               conditions and selecting the destination for the load
overloaded at that time a virtual server can be          transfer for the local systems. Although the
transferred to any other node making the source          centralized system provides good load balancing
node lighter. This mechanism is supported by DHT         but these system are immune to single point
by making two calls leave source node and join           failures which leads to unbalanced system very
destination node. This gives advantage over the          easily.
scheme of having only one virtual server per node        The decentralized systems will not affect form the
where a node can transfer his load to its neighbours     the single point failure problem but they suffer
only.                                                    from load information collection overhead. Due to
                                                         the decentralized nature it needs more time for
There are multiple ways to do load balancing in the      convergence.
DHT based systems, some of which are explained
below.                                                   III. ANT COLONY OPTIMIZATION
          The first method is having one to one                    An Ant is a simple creature of nature. Ants
mapping. In this scheme the light node will select       always work in a group, usually called as colony.
any ID randomly and will start searching for the         Ants discover the shortest path to the food source
node who is responsible of that ID. When the target      from its nest. For this ants use indirect
node is identified, its load is checked. If the target   communication method called as stigmergy. Ants
node is heavy then the light node will initiate the      achieve stigmergic communication by using a
transfer operation and will accept the load of the       chemical substance called as pheromone. While
heavy node till its threshold value. The advantage       searching for the path to the food source ants lay
of the scheme is that it is simple to implement; the     down the pheromone on the path which is sensed
light node is doing probing not the heavy node so        by the other ants. Ants will make the decision
the heavy node is free from the Burdon of probing.       depending upon the concentration of the
The second method is having the mapping of one to        pheromone on the path; the more the concentration
many. In this scheme one directory maintains the         high is the probability to select the path. Computer
list of light nodes. The heavy node sends                scientist transformed this model of collective
information of its target load and the load of every     intelligence into the computer algorithms. This
virtual server it has to the node which maintains the    emerging field is called as Ant Colony
directory.                                               Optimization (ACO). In ACO analogous to the
          Then the directory node will search for the    biological ants there is society of mobile agents.
best possible light nodes that will accommodate the      These mobile agents communicate depending upon
virtual servers of the heavy nodes and then will do      the pheromone value which is nothing but the
the transfer accordingly. This procedure is repeated     entries in the routing table made by the artificial
till all the heavy nodes will become light nodes.        ants. The ACO can be applied to various
The third scheme is many to many. In this scheme         combinatorial problems like asymmetric travelling
there is pool of virtual servers, where every node       salesman problem, graph coloring problem, vehicle
will submit the list of virtual servers to it. Then      routing problem etc. To simulate the behaviour of
from the pool the heaviest virtual server is selected    an ant ACO uses different data structures like to
and transferred to the light node by making sure         simulate laying and sensing of pheromone simple
that the destination node will not become heavy. If      procedures are used. For example while doing
there is no node available to transfer the virtual       migration from one node to another node, an
server then from the available list of light nodes, a    artificial ant emulates laying of pheromone by
virtual server is selected and transferred to the pool   updating the routing table entries in a node.
and the heaviest virtual server is transferred to the
node.

Disadvantages of the systems based on DHT are:
         The disadvantage of the systems based on
the DHT is that in these systems the processing
required for the load collection and the load
transferred are not considered. Some systems are
centralised and some of the systems are
decentralized. The centralised systems can further
be classified as full centralized and semi-
centralized. In the full centralized systems one                    Fig. 2. Ant Colony Optimization.
central node is responsible for storing the load



                                                                                              357 | P a g e
G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and
                    Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 3, Issue 2, March -April 2013, pp.356-359
Figure 2 is showing the typical working of ant           node (the heavy node) and will destroy itself. The
colony optimization. In this network sis nodes are       source node now has the information of the light
present out of which one node acts as nest and one       node and the shortest path to reach to the node; and
node acts as food source. Between the nest and           will transfer part of the load to the light node. In
food source there are 4 more nodes present. There        this way the load balancing is achieved. This has
are 4 named as A1, A2, A3, A4 ants initially             advantages over the DHT based systems
foraging for food-seeking. There are multiple paths      1.        The ACO is free from the single point
present between nest and food source; out of which           failure due to which the centralized DHT
two paths namely R1, R2 are shown in the figure.             systems fails.
A1, A2 randomly select the path R1 and A3, A4            2.        ACO has the advantage over the
selected randomly R2. While travelling through the           decentralized    systems     also;    that    the
path ants will deposit pheromone on the path.                decentralized systems suffer from the load
When A3 and A4 will reach the food source before             information collection overhead. While
A1 and A2 since R2 is having shorter length than             applying ACO there is no need of load
R1. For their return way two paths are present R1            information collection.
and R2, A3 and A4 will select R2 since the
pheromone concentration on R2 is more than R1(           IV.   FUTURE SCOPE
A1 and A2 are still not reached food source). The             The ACO still is a part of the research. There
further ants will sence the pheromone                    are many areas where ant based solutions could
concentration on the two paths and will select the       work. The ACO also has some shortcomings like if
oath having more concentration. In this case it will     a path is selected by all the ants then the path
be R2 since it has more probability over R1.             becomes stagnant, and the performance reduces
What are the advantages to use ACO?                      gradually. So there was need to refine the ACO.
     1) Routing Information                              The Multiple Ant Colony Optimization (MACO) is
when the Ant Colony Optimization technique is            used to overcome the shortcomings of the ACO.
used the overhead of keeping the routing                 The MACO is same like ACO with little
information is reduced. Unlike in other networks to      advancement. In MACO there are more one
maintain the routing table the needs the information     colonies of ACO are working simultaneously. Each
from its neighbours to get the information of their      of the ACO will find its own optimal path and at
neighbours. This overhead is not present in the          the source node the comparison between the set of
ACO. In ACO each path is parallely identified and        optimal paths will take place. Among the optimal
the routing table are also built randomly.               paths the one which will give the shortest path will
     2) Routing Overhead                                 be selected. If the selected path becomes stagnant
In the networks when the routing table gets updated      athen the other path from the pool of optimal paths
by flooding of link state update messages. For this      is selected and the performance will not be
every node has to do the flooding after regular          affected.
interval. This overhead is removed in ACO where
only pheromone tables are updated parallel.              REFERENCES
     3) Adaptively and Stagnation                          [1]    Ananth R., Karthik L., et.al. “Load
the network gets stagnant due to the flooded                      Balancing in Structured P2P Systems,”
packets sent by all the nodes. In ACO only ant                    Proc. Second Int’l Workshop Peer-to-Peer
packets are sent to other nodes which are very                    Systems (IPTPS ’03), Feb. 2003
small in size.                                             [2]    Brighten G., Karthik L., et.al., “Load
                                                                  Balancing in Dynamic Structured P2P
How ACO will do the load-balancing?                               Systems,” Proc. IEEE INFOCOM, 2004.
The basic idea behind the load balancing is to             [3]    K. M. Sim, W. H. Sun., “Ant Colony
transfer the load of the heavy nodes and shift it the             Optimization for Routing and Load-
light nodes. In the DHT based system as explained                 Balancing: Survey and New Directions,”
in the section II above; the nodes are searched by                IEEE Trans. On Systems, Man, and
different techniques. In ACO the searching of the                 Cybernetics—Part A: Systems and
light nodes will be done by ants. As the ants forage              Humans, Vol. 33, no. 5, Sept. 2003.
for food; to do the load balancing they will search        [4]    Chyouhwa C. and Kun-Cheng T. “The
the light nodes. While travelling the ant will reach              server reassignment problem for load
to node they will check its load status and will                  balancing in     structured P2P systems,”
simultaneously update the pheromone table which                   IEEE Trans. Parallel and Distributed
contains the load value of a node. When the ant                   Systems, Vol. 19, Issue no. 2,       Feb.
will find the sufficient light node it will generate a            2008
backward ant and destroy itself. The backward ant          [5]    Ion S., Robert M., et.al, “Chord: A
will follow the path depending upon the pheromone                 Scalable Peer-to-Peer Lookup Service for
concentration on it and will reach to the source                  Internet     Applications,” Proc. ACM


                                                                                              358 | P a g e
G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 3, Issue 2, March -April 2013, pp.356-359
      SIGCOMM ’01, pp. 149-160, 2001.
[6]   Jonathan L. and Margo S., “Distributed,
      Secure Load Balancing with Skew,
      Heterogeneity, and Churn,” Proc. IEEE
      INFOCOM, 2005.
[7]   P.Brighten G., and Ion S., “Heterogeneity
      and Load Balance in Distributed Hash
      Tables,” Proc. IEEE INFOCOM, 2005.
[8]   Ziyong X. and Laxmi B., “Effective load
      balancing in P2P systems,” Proc. Sixth
      IEEE symposium Cluster computing and
      grid, Feb. 2006




                                                                               359 | P a g e

More Related Content

What's hot

Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...IJMER
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Cv31424430
Cv31424430Cv31424430
Cv31424430IJMER
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
F233842
F233842F233842
F233842irjes
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black holeijasa
 

What's hot (18)

Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Be31390392
Be31390392Be31390392
Be31390392
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
F233842
F233842F233842
F233842
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
3
33
3
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 

Viewers also liked (9)

Reglamento elecciones 2011
Reglamento elecciones 2011Reglamento elecciones 2011
Reglamento elecciones 2011
 
Peixes
PeixesPeixes
Peixes
 
Carimbo suspeito
Carimbo suspeitoCarimbo suspeito
Carimbo suspeito
 
Planificacion
PlanificacionPlanificacion
Planificacion
 
Sepsis neonatal 2012
Sepsis neonatal 2012Sepsis neonatal 2012
Sepsis neonatal 2012
 
Administradores e suas gambiarras
Administradores e suas gambiarrasAdministradores e suas gambiarras
Administradores e suas gambiarras
 
Sistema respiratorio
Sistema respiratorioSistema respiratorio
Sistema respiratorio
 
Cadeia alimentar
Cadeia alimentarCadeia alimentar
Cadeia alimentar
 
Anna e Giovnna
Anna e GiovnnaAnna e Giovnna
Anna e Giovnna
 

Similar to Bc32356359

Simple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In CloudSimple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In CloudIOSR Journals
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple Sncct
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...ijp2p
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based onijp2p
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual contentUvaraj Shan
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSijp2p
 
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...IJCNCJournal
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The CloudMonica Carter
 

Similar to Bc32356359 (20)

Simple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In CloudSimple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In Cloud
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Java Abs Peer To Peer Design & Implementation Of A Tuple S
Java Abs   Peer To Peer Design & Implementation Of A Tuple SJava Abs   Peer To Peer Design & Implementation Of A Tuple S
Java Abs Peer To Peer Design & Implementation Of A Tuple S
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
A LOAD BALANCING ALGORITHM BASED ON REPLICATION AND MOVEMENT OF DATA ITEMS FO...
 
A load balancing algorithm based on
A load balancing algorithm based onA load balancing algorithm based on
A load balancing algorithm based on
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Flexible bloom for searching textual content
Flexible bloom for searching textual contentFlexible bloom for searching textual content
Flexible bloom for searching textual content
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The Cloud
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

Bc32356359

  • 1. G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.356-359 Load Balancing in P2P networks using DHT based systems and Ant based systems: A Comparison G. T. Chavan, M. A. Mahajan Asst. Prof. Sinhgad College of Engineering, Pune M.E. Student Sinhgad College of Engineering, Pune Abstract The heterogeneity in peer to peer (P2P) searched. networks can be its advantage as well as Distributed hash tables (DHTs) are disadvantage. The heterogeneity may be about example amount of storage, computing power, of decentralized distributed systems. DHTs connectivity etc. But P2P systems make it provide a lookup for the data items similar to a possible to harness resources such as the hashing where (key, value) pairs are stored in the storage, bandwidth and computing power of large populations of networked computers in a DHT, and any node can efficiently get the value cost effective manner. There are many associated with a given key. Responsibility of the approaches to balance these systems in a cost- mapping for keys to values is divided among the effective way. Here we are giving focus on two nodes, in such a way that a change in mapping main approaches; the Distributed Hash Table causes a minimal amount of disruption. Figure 1 (DHT) based systems and Ant based systems. shows the structure of the DHT where the data Both approaches are having its own advantages items are combined with the hash function and the and shortcomings. result generated will be stored in the node as a (key, Value) pair. DHTs form an infrastructure that can be used to Keywords—load balancing, p2p networks, build P2P networks DHT, Ant based Systems II. DHT WORKING I. INTRODUCTION In the DHT based systems each data item which is Peer to Peer network:- to be stored on the computers is having its unique Peer to peer network is way of id. The identifier space is partitioned among the implementing the networking between the nodes on computers where all are equivalent in nature i.e. all share equivalent responsibilities of processing data. FOX HF DF A peer to peer network can also be created in ad- hoc connection; where a couple of computers CD connected via a Universal Serial Bus to transfer FOX HF 345 files, or it can also be a permanent network like a RUNS 52E 4 network setup in a small organization. Peer to peer systems doesn’t have any centralised D87 control or any hierarchy in operation, so peer to 9E peer systems are distributed systems where the FOX HF WALKS 45O software running at each node is equivalent in functionality. 428 P 41 Fig.1. The structure of Distributed Hash Table. e Load Balancing: Load balancing is sharing the work e the system, called as zone. Every node on between two or more computers, CPUs, network the system is responsible for storing all the items r links etc. The load balancing is done to maximize that are mapped to an identifier in its portion of the s throughput- by getting the work done from all the space. The data items can be accessed and stored resources available in the system. As many on the zone by using a set of functions i.e. put(ID, resources are working simultaneously the resource item): stores the item associated with ID, and utilization will be higher and the response time will get(ID): retrieves the item corresponding to ID. The gradually minimize. Load balancing can also be load balancing is done using the virtual servers. useful when dealing with redundant The virtual server is part of the node. A single node communications links. To achieve balancing first can be partitioned into multiple virtual servers. A the nodes should be available for processing and virtual server is also responsible for the identifier the different routes between them should also be 356 | P a g e
  • 2. G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.356-359 space. As the node is a combination of multiple conditions and selecting the destination for the load virtual servers it is responsible for multiple transfer. In semi-centralized the multiple central identifier spaces. The basic advantage of using nodes are responsible for the storing the load virtual servers is that when the node gets conditions and selecting the destination for the load overloaded at that time a virtual server can be transfer for the local systems. Although the transferred to any other node making the source centralized system provides good load balancing node lighter. This mechanism is supported by DHT but these system are immune to single point by making two calls leave source node and join failures which leads to unbalanced system very destination node. This gives advantage over the easily. scheme of having only one virtual server per node The decentralized systems will not affect form the where a node can transfer his load to its neighbours the single point failure problem but they suffer only. from load information collection overhead. Due to the decentralized nature it needs more time for There are multiple ways to do load balancing in the convergence. DHT based systems, some of which are explained below. III. ANT COLONY OPTIMIZATION The first method is having one to one An Ant is a simple creature of nature. Ants mapping. In this scheme the light node will select always work in a group, usually called as colony. any ID randomly and will start searching for the Ants discover the shortest path to the food source node who is responsible of that ID. When the target from its nest. For this ants use indirect node is identified, its load is checked. If the target communication method called as stigmergy. Ants node is heavy then the light node will initiate the achieve stigmergic communication by using a transfer operation and will accept the load of the chemical substance called as pheromone. While heavy node till its threshold value. The advantage searching for the path to the food source ants lay of the scheme is that it is simple to implement; the down the pheromone on the path which is sensed light node is doing probing not the heavy node so by the other ants. Ants will make the decision the heavy node is free from the Burdon of probing. depending upon the concentration of the The second method is having the mapping of one to pheromone on the path; the more the concentration many. In this scheme one directory maintains the high is the probability to select the path. Computer list of light nodes. The heavy node sends scientist transformed this model of collective information of its target load and the load of every intelligence into the computer algorithms. This virtual server it has to the node which maintains the emerging field is called as Ant Colony directory. Optimization (ACO). In ACO analogous to the Then the directory node will search for the biological ants there is society of mobile agents. best possible light nodes that will accommodate the These mobile agents communicate depending upon virtual servers of the heavy nodes and then will do the pheromone value which is nothing but the the transfer accordingly. This procedure is repeated entries in the routing table made by the artificial till all the heavy nodes will become light nodes. ants. The ACO can be applied to various The third scheme is many to many. In this scheme combinatorial problems like asymmetric travelling there is pool of virtual servers, where every node salesman problem, graph coloring problem, vehicle will submit the list of virtual servers to it. Then routing problem etc. To simulate the behaviour of from the pool the heaviest virtual server is selected an ant ACO uses different data structures like to and transferred to the light node by making sure simulate laying and sensing of pheromone simple that the destination node will not become heavy. If procedures are used. For example while doing there is no node available to transfer the virtual migration from one node to another node, an server then from the available list of light nodes, a artificial ant emulates laying of pheromone by virtual server is selected and transferred to the pool updating the routing table entries in a node. and the heaviest virtual server is transferred to the node. Disadvantages of the systems based on DHT are: The disadvantage of the systems based on the DHT is that in these systems the processing required for the load collection and the load transferred are not considered. Some systems are centralised and some of the systems are decentralized. The centralised systems can further be classified as full centralized and semi- centralized. In the full centralized systems one Fig. 2. Ant Colony Optimization. central node is responsible for storing the load 357 | P a g e
  • 3. G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.356-359 Figure 2 is showing the typical working of ant node (the heavy node) and will destroy itself. The colony optimization. In this network sis nodes are source node now has the information of the light present out of which one node acts as nest and one node and the shortest path to reach to the node; and node acts as food source. Between the nest and will transfer part of the load to the light node. In food source there are 4 more nodes present. There this way the load balancing is achieved. This has are 4 named as A1, A2, A3, A4 ants initially advantages over the DHT based systems foraging for food-seeking. There are multiple paths 1. The ACO is free from the single point present between nest and food source; out of which failure due to which the centralized DHT two paths namely R1, R2 are shown in the figure. systems fails. A1, A2 randomly select the path R1 and A3, A4 2. ACO has the advantage over the selected randomly R2. While travelling through the decentralized systems also; that the path ants will deposit pheromone on the path. decentralized systems suffer from the load When A3 and A4 will reach the food source before information collection overhead. While A1 and A2 since R2 is having shorter length than applying ACO there is no need of load R1. For their return way two paths are present R1 information collection. and R2, A3 and A4 will select R2 since the pheromone concentration on R2 is more than R1( IV. FUTURE SCOPE A1 and A2 are still not reached food source). The The ACO still is a part of the research. There further ants will sence the pheromone are many areas where ant based solutions could concentration on the two paths and will select the work. The ACO also has some shortcomings like if oath having more concentration. In this case it will a path is selected by all the ants then the path be R2 since it has more probability over R1. becomes stagnant, and the performance reduces What are the advantages to use ACO? gradually. So there was need to refine the ACO. 1) Routing Information The Multiple Ant Colony Optimization (MACO) is when the Ant Colony Optimization technique is used to overcome the shortcomings of the ACO. used the overhead of keeping the routing The MACO is same like ACO with little information is reduced. Unlike in other networks to advancement. In MACO there are more one maintain the routing table the needs the information colonies of ACO are working simultaneously. Each from its neighbours to get the information of their of the ACO will find its own optimal path and at neighbours. This overhead is not present in the the source node the comparison between the set of ACO. In ACO each path is parallely identified and optimal paths will take place. Among the optimal the routing table are also built randomly. paths the one which will give the shortest path will 2) Routing Overhead be selected. If the selected path becomes stagnant In the networks when the routing table gets updated athen the other path from the pool of optimal paths by flooding of link state update messages. For this is selected and the performance will not be every node has to do the flooding after regular affected. interval. This overhead is removed in ACO where only pheromone tables are updated parallel. REFERENCES 3) Adaptively and Stagnation [1] Ananth R., Karthik L., et.al. “Load the network gets stagnant due to the flooded Balancing in Structured P2P Systems,” packets sent by all the nodes. In ACO only ant Proc. Second Int’l Workshop Peer-to-Peer packets are sent to other nodes which are very Systems (IPTPS ’03), Feb. 2003 small in size. [2] Brighten G., Karthik L., et.al., “Load Balancing in Dynamic Structured P2P How ACO will do the load-balancing? Systems,” Proc. IEEE INFOCOM, 2004. The basic idea behind the load balancing is to [3] K. M. Sim, W. H. Sun., “Ant Colony transfer the load of the heavy nodes and shift it the Optimization for Routing and Load- light nodes. In the DHT based system as explained Balancing: Survey and New Directions,” in the section II above; the nodes are searched by IEEE Trans. On Systems, Man, and different techniques. In ACO the searching of the Cybernetics—Part A: Systems and light nodes will be done by ants. As the ants forage Humans, Vol. 33, no. 5, Sept. 2003. for food; to do the load balancing they will search [4] Chyouhwa C. and Kun-Cheng T. “The the light nodes. While travelling the ant will reach server reassignment problem for load to node they will check its load status and will balancing in structured P2P systems,” simultaneously update the pheromone table which IEEE Trans. Parallel and Distributed contains the load value of a node. When the ant Systems, Vol. 19, Issue no. 2, Feb. will find the sufficient light node it will generate a 2008 backward ant and destroy itself. The backward ant [5] Ion S., Robert M., et.al, “Chord: A will follow the path depending upon the pheromone Scalable Peer-to-Peer Lookup Service for concentration on it and will reach to the source Internet Applications,” Proc. ACM 358 | P a g e
  • 4. G. T. Chavan., M. A. Mahajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.356-359 SIGCOMM ’01, pp. 149-160, 2001. [6] Jonathan L. and Margo S., “Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn,” Proc. IEEE INFOCOM, 2005. [7] P.Brighten G., and Ion S., “Heterogeneity and Load Balance in Distributed Hash Tables,” Proc. IEEE INFOCOM, 2005. [8] Ziyong X. and Laxmi B., “Effective load balancing in P2P systems,” Proc. Sixth IEEE symposium Cluster computing and grid, Feb. 2006 359 | P a g e