Professional Documents
Culture Documents
Nitin Singha, Ruchir Gupta, Member IEEE, Yatindra Nath Singh, Senior Member, IEEE
I. Introduction
3) The transfer function of the proposed control system has been derived. The results obtained from
it clearly show that classical control theory can
address the problem of the free riding.
4) The overall network performance under varying
degree of loading at the serving nodes has also
been studied and simulation results clearly show
that the proposed control system is able to handle
these changes.
5) The equivalent transfer function and the original
network with the control system were simulated
independently and the results were compared to
validate the accuracy of the derived transfer function. The simulation results clearly verify that the
transfer function closely models the network in
steady state. Acceptable variations were observed
during transient state which can be attributed to
the linearizion [30] and other assumptions taken
during derivation of transfer function. For details
please refer to section V-E.
6) It has been shown through simulation results sharing less than what is instructed by the control
system are unable to utilize their complete download capacity. Therefore they they are at loss and
consequently dont freeride.
7) The resource allocation performance with control
system and then with the existing resource allocation algorithm (R.A.) [22] was compared. In
simulation results it has been observed that the network with control system is able to achieve steady
state faster and control system appreciably reduces
the steady state error (i.e. difference between the
actually shared and the optimal upload capacity).
This happens due to the PI controller present in
control system.
8) Finally, the proposed control system has been
shown to considerably reduce the whitewashing in
the network. First, we propose a method to determine whitewashing level. Afterwards depending
upon the current whitewashing level, the transfer
function updates itself which changes the speed at
which a peer achieves the optimal level of resource
sharing i.e. Utilization = 1.
Rest of the paper is organized as follows. The section II
summarizes and compares the related work, whereas the
system model is described in section III. In section IV,
reputation management system along with the resource
allocation is discussed in detail. In section V, we model
the overall P2P network as control system and derive its
transfer function. The section VI presents performance
evaluation of the proposed control system in achieving
optimality and controlling free riding, simulation results
to verify accuracy of transfer function and finally comparison with the existing (R.A.) [22] allocation algorithm.
Discussion about whitewashing problem and its solution
using control system is provided in section VII. Finally
paper concludes with section VIII.
Node 1
Node 2
Access Link
Backbone
Network
Node 3
Fig. 1.
Node 4
the node i are assumed greater than or equal to maximum download capacity of the node i. This assumption
is taken to model the worst case of maximum overloading in the network. It is further assumed that the total
upload bandwidth available at the node i is sufficient,
such that when it is bartered with other requesting nodes
in the network, the download requirement at the node i
will always be fulfilled.
For the purpose of modeling, time is divided into discrete time slot. Each time slot signifies a period. We have
considered unstructured P2P network for simulation but
the proposed control system is applicable for structured
P2P networks also. However we have not performed any
simulations to substantiate this claim. Every time slot is
termed as a round. The nodes send the requests at the
starting of the round and if they gets selected for the
service allocation then their request are fulfilled by the
serving nodes within the same round. For the next round
the whole process is repeated again.
IV. Reputation model
Any P2P network is meaningful only when nodes
cooperate and fulfill each others requirements. Network
under consideration, contains selfish peers who are rational i.e they are interested in maximizing their own
benefit without caring about the other members. Selfish
nodes never want to contribute back to the network.
Therefore they will always try to become a free rider,
unless their is some incentive attached in sharing of their
resources. This leads to the overloading at the few nodes
which are contributing back to the network also known
as tragedy of commons. In the worst case, the network
will collapse when every node becomes a free rider.
For avoiding the problems of free riding and tragedy of
commons, a reputation management system can be used
in P2P network. Every nodes reputation is evaluated at
the end of the each round based upon its performance
in that round.
A. Reputation Calculation
The trust is measure of the cooperative behaviour of
the node. The trust model used in this paper is similar
to the one proposed by Satsiou and Tassiulas [22]. The
trust calculated by the requesting node j for the serving
node i during the nth period is defined as the ratio of
the bandwidth (rnji ) received by the node j to what it has
actually demanded (Bnji ) from the node i during the nth
period i.e.
rnji
n
(1)
t ji = n .
B ji
For ease of reading, the important notations are listed
in Table I. Reputation of the node i for the (n + 1)st time
slot is calculated using the exponential moving average
[44] of reputation up to the nth period with the average
TABLE I
Notations with their Description
Notation
Rni
tnji
Description
Reputation of node i at the end of nth time slot
Trust of i as measured by j for nth time slot
rnji
Bnji
Bmax
i
lni
gni
f es
Bi j
f es
Bmin
knij
ovd
Ani
Sni
Rmin
Wn
Nn
Rmax
in
Rnin
jSn+1
i
(2)
jSn+1
i
Rn+1
i
Rni +
jSn+1
i
ln+1
i
t ji
(3)
k1
ri )
Rk (Ws
i=1
...., M.
rk = min
k = 1,
(4)
bk ,
;
R
j
j=k
node. Suppose b = [1, 1.5, 2, 5] is the bandwidth demand of the requesting nodes in Mb/s from the source
with upload capacity of 7Mb/s. Let the reputations of
= 0 denotes
The value of kn+1
lies in between [0, R1n ]. kn+1
i jovd
i jovd
i
the worst case of overloading at serving node j, where
the receiving node i will not receive any bandwidth.
When kn+1
= R1n then the bandwidth requirement of node
ij
ovd
1 In
(5)
jAn+1
i
Ci (n)
.
Bmax
i
(7)
Here Ci (n) is the total data rate agreed by all the serving
peers to be given to the requesting node i and Bmax
is the
i
maximum download capacity of the requesting node i
from the nodes in the network .The serving peers will
never give wrong information about the Ci (n) because
their reputation is calculated on the basis of actual data
rate delivered and not the data rate they are willing
to provide i.e. Ci (n). We assume that all the peers are
rational, therefore there are no malicious peer. When a
peer is assumed rational then it will not act maliciously
[43], as rational peers gain nothing by harming other
peers. Therefore a node will not receive incorrect Ci (n).
When the requesting node i increases its upload capacity then its reputation increases consequently making
B. The Controller
The controller [30] stabilizes the system output to a
particular value called set point. It compares the difference between the desired and the actual U in the
proposed control system. Based upon this comparison,
the controller drives the actuator to regulate the output.
Generally PID controller is preferred as a controller in
control system. However when the P2P network reaches
the steady state, nodes generally share in proportion
to their requirement so as to preserve their reputation.
Therefore total shared capacity in network does not
change abruptly and consequently so does U. The differential action is used to counter sudden changes in output
thus it is not required in our system. Therefore the PI
controller with transfer function G(s) = Kp (1 + ksi ) [30] is
used in this paper to model the control system. Kp and
Ki are the proportional and integral gain respectively of
the PI controller.
C. The Actuator
The role of the actuator [30] in the control loop is to
update physical entity based upon the controller output.
In our case, the actuator modifies the upload capacity of
node in response to the controller output y. If y is the
input to the actuator then y is the the upload capacity
shared by the node in the next round. The change in the
upload capacity by the actuator modifies the reputation
of the node, thereby adjusting the download data rate,
max
i
the node receives from the network. = B10
is taken in
accordance with the existing allocation algorithms [22]
[27] for ease of comparison with them.
D. The Monitor
The function of the monitor at the node i is to sense
the current data rate Ci (n) offered to the node i, for
evaluating the Ui (n). The evaluated Ui (n) is compared
with the set point to calculate the error and drive the
controller which in turn decides how much resources
are shared by the node i to the other nodes. Let (y)n+1
ji
corresponds to amount of resources allocated by the
node i to the requesting node j during (n+1)st round. The
trust calculated by the requesting node j for the serving
node i in the (n + 1)st round is given by
tn+1
=
ji
(y)n+1
ji
Bn+1
ji
R(p)
RTT
Ci (n + 2) =
Rni +
P (y)n+1
ji
Bn+1
ji
jSn+1
i
ln+1
i
.
(8)
2
The symbols have been defined along with the equation
(3). The total bandwidth received by the node i during
(n + 2)th time period is calculated using equation (6) as
X
n+2
kn+2
Ci (n + 2) = Rn+1
i
ikovd Bik .
=
kAn+2
i
Ci (n + 2) =
Rni +
(y)n+1
ji
Bn+1
n+1
ji
jS
i
ln+1
i
n+2
kn+2
ikovd Bik .
(9)
kAn+2
i
2bp
3
+ T0 Min(1, 3
.
3bp
8 )p(1 +
32p2 )
Rn+1
i
Rni +
Rni +
(y)n+1
ji
f es
B
n+1
jS
ji
i
ln+1
i
2
P (y)n+1
ji
f es
jSn+1 B ji
i
ln+1
i
max
kn+2
ikovd Bi
kn+2
ikovd .
kAn+2
i
Bmax
i
(10)
kAn+2
i
Here Bmax
is the maximum download capacity of the
i
f es
node i and Bi j is the minimum amount of the bandwidth required to support the feasible data rate, as
derived from the equation (10), on the link between node
i and j. We assume symmetric links in the system model
f es
f es
in the section III. Therefore B ji = Bi j i.e feasible data
rate while transferring data from node i to j is same as
that from j to i.
Using equation (7), the measured variable Ui corresponding to the node i for the (n + 2)th time period is
given by
(y)n+1
ji
f es
jSn+1 B ji
i
ln+1
i
n
Ci (n + 2) Ri +
Ui (n + 2) =
=
Bmax
2
i
kn+2
ikovd . (11)
kAn+2
i
U ref
Error
+
-
Control Logic
(PI Controller)
Upload bandwidth
a node shares
Actuator
(Node)
U ref
Plant
(P2P network)
Ui
Error
+
G(s)
H(s)
Ui
Ui
Monitor
Fig. 3.
Fig. 2.
(y)n+1
P
ji
f es
n+1
B
ji
Rn + jSi
P
ln+1
i
n+2
d
k
2
ik
ovd
kAn+2
i
dUi (n + 2)
h=
=
. (12)
dy
dy
The maximum gain5 hmax occurs when ln+1
= 1 i.e. node
i
i receives only one request during given time slot and
f es
f es
f es
B ji = Bmin . Where Bmin is the minimum value of the
f es
f es
Bmin = min B ji .
i, j
n (y)
Ri + B f es
P
1
min
1
d 2 Rmin
kAn+2
i
.
(13)
hmax =
dy
P
1, represents the cardinality of the set An+2
and
i
kAn+2
i
is equal to gn+2
, the number of the nodes from which
i
resources have been requested by the node i during
(n + 2)th time slot. As peers are rational so to maximize
their chances of getting content from the network they
n (y)
Ri + B f es
1
gmax
esT .
(15)
H(s) =
f es
2Rmin Bmin
ki
)
(16)
s
1) Deriving Model Parameters: When the frequency of
the operation is the natural frequency of oscillation,
then the transfer function6 of the control loop given by
equation (16) becomes
T(s) = H(s)G(s) = hmax .esT Kp (1 +
hmax .e jwn T Kp (1 +
(17)
3 Process
Ki
) = 1.
jwn
and
wn T + tan1 (
Ki
1
)| = ,
jwn
G
Ki
) = .
wn
(18)
(19)
TABLE II
Simulation Parameters along with their Values
Nn
Kp
Ki
G
gmax
Rmax
in
Rnin
Rmin
f es
Bmin
Description
Number of the nodes in
network during nth period
Proportional Gain
Integral Gain
Gain Margin
Maximum number of requests
generated by the node in
a given time period
Exponential moving
average constant
Maximum initial reputation that can
be assigned to newcomers
Initial reputation assigned to
newcomers during nth period, except
during whitewashing scenario ,
where its value is calculated
using equation (21)
Reputation threshold below which
node does not receive any service
from network, except for
whitewashing scenario simulation,
where its value is equal to Rnin
Step Size
The minimum amount of bandwidth
required to support feasible data rate
practically possible on the link
between nodes i and j
Value
100
3.4641 103
1.51149
10
2
1
2
0.01
0.01
0.8
0.6
0.4
Control System Output
Refrence
0.2
0
0
Fig. 4.
20
40
60
80
Sampling Point
100
120
140
0.01
0.5Mbps
2Mbps
tan1 ( ) = .
(20)
wn
6
The parameter G and T are set by the designer and hmax
is calculated using equation (14). Using equation (20) in
(19) we get the value of wn as
5 2.618
=
rad/s.
6T
T
The parameter Ki of controller is calculated by substituting above computed value of wn in equation (20). The
simple algebraic manipulations gives
wn =
1.512
.
T
The above computed values of wn and Ki are used in
equation (18) for obtaining the expression for Kp as
Ki =
Kp =
Utilization
Parameter
0.866
.
hmax G
10
3
Refrence
2.5
Utilization
1.5
0.5
0
0
10
20
30
40
50
1.5
Transfer Function
P2P network
Utilization
0.5
0
0
Fig. 6.
20
40
60
80
Sampling Point
100
120
140
received by a node is directly proportional to the download capacity promised by the serving node. Therefore
increase in the level of loading at the server results in
the receiving node getting promise of lesser bandwidth
and consequently smaller resources for the same level
of the reputation. Simulation results in Fig. 5 clearly
demonstrate that fluctuations in the level of loading at
the serving node is successfully handled by the proposed
control system model.
B. Veracity evaluation of the Transfer Function
To verify and show that the derived transfer function
in section V-E closely models the proposed P2P network,
we simulate the various components of the control system i.e. controller, actuator, plant and monitor. Thereafter
results obtained for both the systems discussed above are
compared and presented in Fig. 6.
While deriving transfer function in section V-E, we
11
The nodes sharing less than what control system recommends are at loss because they are not able to utilize their
total download capacity which discourages the nodes
to freeride. Further, we have used PI controller which
improves the overall allocation process. The proportional
action helps a node in reaching optimal value of resource sharing faster, whereas integral action reduces
the steady state error. These improvements are clearly
visible when compared with the already existing RA [22]
algorithm. Finally, through the simulations, it has been
demonstrated that proposed system can also be used to
control whitewashing.
Utilizatioin
0.8
0.6
0.4
Initial Rputation=.01
Initial Rputation=.001
0.2
Refrence
0
0
Fig. 7.
50
100
150
200
250
Sampling Point
300
350
400
References
[1] eMule, Peer-to-peer file sharing client. [Online]. Available:
http://www.emule-project.net
[2] Kazaa, Peer-to-peer file sharing client. [Online]. Available:
http://www.kazaa.com
[3] BitTorrent, Peer-to-peer file sharing client. [Online]. Available:
http://www.bittorrent.com
[4] R. Matei, A. Iamnitchi, and I. Foster, Mapping the gnutella
network, Internet Computing, IEEE, vol. 6, no. 1, pp. 5057, Jan
2002.
[5] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A
scalable content-addressable network.
[6] A. I. T. Rowstron and P. Druschel, Pastry: Scalable, decentralized
object location, and routing for large-scale peer-to-peer systems,
in Proceedings of the IFIP/ACM International Conference on
Distributed Systems Platforms Heidelberg, ser. Middleware 01.
London, UK, UK: Springer-Verlag, 2001, pp. 329350. [Online].
Available: http://dl.acm.org/citation.cfm?id=646591.697650
[7] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and
H. Balakrishnan, Chord: A scalable peer-to-peer lookup service
for internet applications, SIGCOMM Comput. Commun. Rev.,
vol. 31, no. 4, pp. 149160, Aug. 2001. [Online]. Available:
http://doi.acm.org/10.1145/964723.383071
[8] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, Tapestry:
An infrastructure for fault-tolerant wide-area location and
routing, EECS Department, University of California, Berkeley,
Tech. Rep. UCB/CSD-01-1141, Apr 2001. [Online]. Available:
http://www.eecs.berkeley.edu/Pubs/TechRpts/2001/5213.html
[9] R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and
R. H. Campbell, A survey of peer-to-peer storage
techniques for distributed file systems. in ITCC (2). IEEE
Computer Society, 2005, pp. 205213. [Online]. Available:
http://dblp.uni-trier.de/db/conf/itcc/itcc2005-2.htmlHasanAYBC05
[10] S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M.
Levy, An analysis of internet content delivery systems, SIGOPS
Oper. Syst. Rev., vol. 36, no. SI, pp. 315327, Dec. 2002. [Online].
Available: http://doi.acm.org/10.1145/844128.844158
[11] I. Foster and A. Iamnitchi, On death, taxes, and the convergence
of peer-to-peer and grid computing, in In 2nd International
Workshop on Peer-to-Peer Systems (IPTPS03, 2003, pp. 118128.
[12] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong,
Freenet: A distributed anonymous information storage and
retrieval system, in International Workshop on Designing
Privacy Enhancing Technologies: Design Issues in Anonymity
and Unobservability. New York, NY, USA: Springer-Verlag
New York, Inc., 2001, pp. 4666. [Online]. Available:
http://dl.acm.org/citation.cfm?id=371931.371977
[13] E. Adar and B. A. Huberman, Free riding on gnutella, First
Monday, vol. 5, p. 2000, 2000.
[14] D. Hughes, G. Coulson, and J. Walkerdine, Free riding on
gnutella revisited: The bell tolls, IEEE Distributed Systems
Online, vol. 6, no. 6, pp. 1, Jun. 2005. [Online]. Available:
http://dx.doi.org/10.1109/MDSO.2005.31
[15] G.
Hardin,
The
tragedy
of
the
commons,
Science,
Jan.
1968.
[Online].
Available:
http://www.sciencemag.org/cgi/content/abstract/162/3859/1243
12
Unrm
2
1.8
1.6
1.4
1.2
1
0.8
0.6
0.4
URA
0.2
0
0
UControl
100
200
300
400
500
600
Sampling Point
700
800
900
1000