Loading…

Predicting the behavior of large scale P2P systems by parallel discrete event simulation

P2P systems are becoming the dominator of Internet. Such systems are typically composed of thousands to millions of physical computers, which make it difficult to predict their behaviors without a large scale distributed system simulator. This paper is an attempt to predict the behavior of large sca...

Full description

Saved in:
Bibliographic Details
Published in:Science China. Information sciences 2010-06, Vol.53 (6), p.1109-1121
Main Authors: Zheng, WeiMin, Yu, HongLiang, Shi, GuangYu, Chen, Jian
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:P2P systems are becoming the dominator of Internet. Such systems are typically composed of thousands to millions of physical computers, which make it difficult to predict their behaviors without a large scale distributed system simulator. This paper is an attempt to predict the behavior of large scale P2P systems by building a novel parallel simulator: AegeanSim, which provides parallel discrete event simulation of such systems on high performance server clusters. We abstract the execution of P2P applications with a specific event model, and parallel the simulation of events in a cluster, thus expanding the simulation scale and boosting the simulation process dramatically. A 1-stage synchronization method is proposed to improve the performance. An event callback interface is designed to implement their application logic easily while keeping the simulator application-independent. We use AegeanSim to predict the behavior of a typical P2P system: BitTorrent. By comparing the simulation behavior of BT with that of related BT studies and verifying its efficiency, scalability and accuracy, we make predictions about the behavior of BT system assuming they are assaulted by different man-made system attacks. Some reasonable results are found: (1) Tracker isolation can hardly work because of its short attacking time window. (2) Limiting the bandwidth of BT may be an efficient way to control it,
ISSN:1674-733X
1869-1919
DOI:10.1007/s11432-010-3111-0