|
Register | FAQ | The Twelve Commandments | Members List | Calendar | Arcade | Find the Best VPN | Today's Posts | Search |
General Gnutella Development Discussion For general discussion about Gnutella development. |
Welcome To Gnutella Forums You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, fun aspects such as the image caption contest and play in the arcade, and access many other special features after your registration and email confirmation. Registration is fast, simple and absolutely free so please, join our community today! (click here) (Note: we use Yandex mail server so make sure yandex is not on your email filter or blocklist.) Confirmation emails might be found in your Junk folder, especially for Yahoo or GMail. If you have any problems with the Gnutella Forum registration process or your Gnutella Forum account login, please contact us (this is not for program use questions.) Your email address must be legitimate and verified before becoming a full member of the forums. Please be sure to disable any spam filters you may have for our website, so that email messages can reach you. Note: Any other issue with registration, etc., send a Personal Message (PM) to one of the active Administrators: Lord of the Rings or Birdy. Once registered but before posting, members MUST READ the FORUM RULES (click here) and members should include System details - help us to help you (click on blue link) in their posts if their problem relates to using the program. Whilst forum helpers are happy to help where they can, without these system details your post might be ignored. And wise to read How to create a New Thread Thank you If you are a Spammer click here. This is not a business advertising forum, all member profiles with business advertising will be banned, all their posts removed. Spamming is illegal in many countries of the world. Guests and search engines cannot view member profiles. Deutsch? Español? Français? Nederlands? Hilfe in Deutsch, Ayuda en español, Aide en français et LimeWire en français, Hulp in het Nederlands Forum Rules Support Forums Before you post to one of the specific Client Help and Support Conferences in Gnutella Client Forums please look through other threads and Stickies that may answer your questions. Most problems are not new. The Search function is most useful. Also the red Stickies have answers to the most commonly asked questions. (over 90 percent). If your problem is not resolved by a search of the forums, please take the next step and post in the appropriate forum. There are many members who will be glad to help. If you are new to the world of file sharing please do not be shy! Everyone was ‘new’ when they first started. When posting, please include details for: Your Operating System ....... Your version of your Gnutella Client (* this is important for helping solve problems) ....... Your Internet connection (56K, Cable, DSL) ....... The exact error message, if one pops up Any other relevant information that you think may help ....... Try to make your post descriptive, specific, and clear so members can quickly and efficiently help you. To aid helpers in solving download/upload problems, LimeWire and Frostwire users must specify whether they are downloading a torrent file or a file from the Gnutella network. Members need to supply these details >>> System details - help us to help you (click on blue link) Moderators There are senior members on the forums who serve as Moderators. These volunteers keep the board organized and moving. Moderators are authorized to: (in order of increasing severity) Move posts to the correct forums. Many times, members post in the wrong forum. These off-topic posts may impede the normal operation of the forum. Edit posts. Moderators will edit posts that are offensive or break any of the House Rules. Delete posts. Posts that cannot be edited to comply with the House Rules will be deleted. Restrict members. This is one of the last punishments before a member is banned. Restrictions may include placing all new posts in a moderation queue or temporarily banning the offender. Ban members. The most severe punishment. Three or more moderators or administrators must agree to the ban for this action to occur. Banning is reserved for very severe offenses and members who, after many warnings, fail to comply with the House Rules. Banning is permanent. Bans cannot be removed by the moderators and probably won't be removed by the administration. The Rules 1. Warez, copyright violation, or any other illegal activity may NOT be linked or expressed in any form. Topics discussing techniques for violating these laws and messages containing locations of web sites or other servers hosting illegal content will be silently removed. Multiple offenses will result in consequences. File names are not required to discuss your issues. If filenames are copyright then do not belong on these forums & will be edited out or post removed. Picture sample attachments in posts must not include copyright infringement. 2. Spamming and excessive advertising will not be tolerated. Commercial advertising is not allowed in any form, including using in signatures. 3. There will be no excessive use of profanity in any forum. 4. There will be no racial, ethnic, or gender based insults, or any other personal attacks. 5. Pictures may be attached to posts and signatures if they are not sexually explicit or offensive. Picture sample attachments in posts must not include copyright infringement. 6. Remember to post in the correct forum. Take your time to look at other threads and see where your post will go. If your post is placed in the wrong forum it will be moved by a moderator. There are specific Gnutella Client sections for LimeWire, Phex, FrostWire, BearShare, Gnucleus, Morpheus, and many more. Please choose the correct section for your problem. 7. If you see a post in the wrong forum or in violation of the House Rules, please contact a moderator via Private Message or the "Report this post to a moderator" link at the bottom of every post. Please do not respond directly to the member - a moderator will do what is required. 8. Any impersonation of a forum member in any mode of communication is strictly prohibited and will result in banning. 9. Multiple copies of the same post will not be tolerated. Post your question, comment, or complaint only once. There is no need to express yourself more than once. Duplicate posts will be deleted with little or no warning. Keep in mind a forum censor may temporarily automatically hold up your post, if you do not see your post, do not post again, it will be dealt with by a moderator within a reasonable time. Authors of multiple copies of same post may be dealt with by moderators within their discrete judgment at the time which may result in warning or infraction points, depending on severity as adjudged by the moderators online. 10. Posts should have descriptive topics. Vague titles such as "Help!", "Why?", and the like may not get enough attention to the contents. 11. Do not divulge anyone's personal information in the forum, not even your own. This includes e-mail addresses, IP addresses, age, house address, and any other distinguishing information. Don´t use eMail addresses in your nick. Reiterating, do not post your email address in posts. This is for your own protection. 12. Signatures may be used as long as they are not offensive or sexually explicit or used for commercial advertising. Commercial weblinks cannot be used under any circumstances and will result in an immediate ban. 13. Dual accounts are not allowed. Cannot explain this more simply. Attempts to set up dual accounts will most likely result in a banning of all forum accounts. 14. Video links may only be posted after you have a tally of two forum posts. Video link posting with less than a 2 post tally are considered as spam. Video link posting with less than a 2 post tally are considered as spam. 15. Failure to show that you have read the forum rules may result in forum rules breach infraction points or warnings awarded against you which may later total up to an automatic temporary or permanent ban. Supplying system details is a prerequisite in most cases, particularly with connection or installation issues. Violation of any of these rules will bring consequences, determined on a case-by-case basis. Thank You! Thanks for taking the time to read these forum guidelines. We hope your visit is helpful and mutually beneficial to the entire community. |
| LinkBack | Thread Tools | Display Modes |
| |||
More efficient searches? I've written up an idea that might be of use in gnutella like networks - I apologize in advance for any and all ignorance on my part of the state of the art. Also, I'm not a regular here so you may want to email me at russjj@mail.com Pretty Darn Good Peer to Peer Search Prediction russjj@mail.com, posted March 7, 2002 The idea here is to prevent most peer to peer search-related traffic in applications like gnutella by providing a pretty good means of predicting whether sending a particular search on down the network might be successful. Traffic can be prevented if, most of the time, a small reference table can tell that what you seek isn't available at a given other machine or the whole network attached to it. The table doesn't tell you where a file is - it tells you, nearly all the time, where the file isn't, preventing the vast majority of search-related traffic. This is derived from a program (later abandoned when I fell ill) that I created to form deltas/diffs on any kind of file effeciently, particularly for creating patches automatically to .exes, and which I hoped might aid what is now called bioinformatics. Unfortunately no-one was interested in that subject area then. The reference table is built up from checksum-like "signatures" one of which is created for each word in every.description of every file. The reference table starts as all zeros. A one is placed at each location in the table corresponding to each signature/checksum. Lets say each signature of each word is 16 bits, and the table 65,536 bits (it could certainly be larger) or 8 k. Then if "Cohen" yields a checksum/signature of 17,354, the 17,354th bit of the 8k table array becomes a one. If another word in the description of another file also yeilds a signature of 17,354, the bit stays as a one, of course - it means that at least one word descriptive of a file had that signature. Once every word in every file description has been used to form a signature, and all the corresponding bits of our 8k table have been turned on, the table (which is intended to be quite sparse at this point) can be RLEed and sent "up the line" to the next machine as it were. There, the tables that machine receives from the machines connected under it can be combined (logically added), and the table from this machine added in too. That's the beauty of these reference tables in such an application. The resulting table is still very sparse, and will yeild an accurate "don't bother with further enquiries" (zero) to the vast majority of searches. The machines further down the line are never directly queried - we know the search would be unsuccessful. (Remember this system doesn't predict whether a search will be successful necessarily, if sent on, but usually does predict when a search will not be successful. If the table does predict no success, that is accurate. If it says a successful search is possible, that's all it predicts - that the search might or might not be successful.) The tables received from the directly machines under this one are kept as well - so that if a search looks like it might be successful (there was a one at the right spot in the table) these tables can be checked and the search sent on only in the appropriate direction(s). If you imagine a tree structure imposed on the peer-to-peer network simply for search purposes, which is easily formed and repaired dynamically since tables are easy to add, then as you go up to the top of the tree, at each level the tables are added together, becoming less sparse. Searches are sent off only in potentially useful directions and most branches of the tree won't even be asked about most searches because it's known that the search would be unsuccessful. The bulk of traffic that searches would otherwise generated simply doesn't happen, but the results are still just as accurate. For large networks, in order to keep the tables reasonably sparse even after thousands of tables have been summed together, it would be more reasonable to use, say, 24 bit signatures for each word and create 2 Megabyte tables. Because these are very sparse tables at the edges of the network particularly (where they will contain no more ones than 16 bit based tables did, namely one per signature very likley), they can be RLEed to quite small files for transmission purposes. Additional Notes: you're searching for "Bob Cohen" of course, you'll only send the search on if there's a one in the place in the reference table corresponding to the signature number for Bob, and a one in the place in the reference table corresponding to the signature number for Cohen, as well. Etc. Note that this method still allows most of the work to be done at the edges of the network, with the calculations of signatures being created on each individual machine, and most table additions being done towards the edges of the network as well. Since changes in tables have to be passed up the tree (resulting in new logical additions of tables to form result tables) it may be desirable to create one table per session per computer and not update each table as a new file is downloaded from another part of the network. It may be desirable to throw out very common words and punctuation, that is, not to register their signatures in the reference tables. Combined model networks are possible - one could have a peer to peer association of more orderly trees for example. This might be useful, for example, if the tables became quite dense at the "center" (from the perspective of our search trees) of the network. For very sparse tables a two (or more) stage RLE might be useful. This would first RLE which bytes were zero/non-zero, then RLE the string of non-zero bytes to specifiy them fully. A numberwords approach to the RLE might be helpful as well, which would allow one to use numbers as small as nibble-size and as large as needed. No copyright is claimed on this document, it may be freely reproduced so long as the email address is included. |
| |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Make LW more memory efficient | LimeMAN | New Feature Requests | 0 | October 7th, 2006 12:29 PM |
More efficient searches and downloads (3 ideas) | hello there everybody | New Feature Requests | 6 | November 21st, 2004 10:37 PM |
HOW TO BE SMART FOR EFFICIENT DOWNLOADING !!! ...Because i'm feel idiot....:-( | Fredericurly | Download/Upload | 0 | April 10th, 2003 10:57 PM |
Is 2.0 too efficient? | gfox | Download/Upload Problems | 1 | January 14th, 2002 07:48 PM |
Most efficient client (bandwidth usage?) | dredd zeppelin | General Gnutella / Gnutella Network Discussion | 0 | April 29th, 2001 03:46 PM |