Download presentation

Presentation is loading. Please wait.

Published byKrystal Quiett Modified over 2 years ago

1
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula th.dariotaki@di.uoa.gr

2
2 Peer-to-peer system: A distributed system without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality The goal: Locate the node that stores a particular data item General Idea of Chord: A distributed lookup protocol that, given a key, it maps the key onto a node Benefits: Adapts as nodes join or leave the system Scalable with communication cost scaling logarithmically with the number of nodes

3
3 Chord features Load balance:Using a distributed hash function it spreads keys evenly over the nodes Decentralization:Fully distributed. No node is more important than any other Scalability:Cost of lookup grows with O(logN) Availability:Adjusts its internal tables to reflect joins and failure of nodes Flexible Naming:No constraints on the structure of the keys it looks up

4
4 Examples of Chord applications Cooperative Mirroring: S/W developers who publish demonstrations and the demand vary dramatically. =>balance load =>replication and caching =>ensure authenticity (storing the data under o Chord key derived from a cryptographic hash of the data) Time-Shared Storage: Store data in others’ machine to ensure that they will always be available. The data’s name can serve as a key to identify the node responsible for the data at any time Distributed Index: Support for Gnutella, Napster keyword search. Key can be derived from desired keywords and values can be lists of machines offering documents with these keywords.

5
5 The base Chord Protocol Consistent Hashing Assigns each node and key an m-bit identifier. It is chosen by hashing the node’s IP address or the key Identifier length m must be large enough to make the probability of two nodes or keys hashing to the same identifier negligible Assignment: Identifiers are ordered modulo 2 m Key k is assigned to the first node whose identifier is equal to or follows the identifier of key k (successor node) When node n joins the network, certain keys previously assigned to n’s successor now become assigned to n When node n leaves the network, all of its assigned keys are reassigned to n’s successor m=3

6
6 Theorem 1 For any set of N nodes and K keys, with high probability 1.Each node is responsible for at most (1+ε)K/N keys (ε=O(logN)) 2.When an (N+1) st node joins or leaves the network, responsibility for O(K/N) keys changes hands (and only to or from the joining node) Scalable Key Location To implement consistent hashing, each node need only be aware of its successor node on the circle. May be inefficient e.g. traverse all nodes to find the appropriate Each node maintains a routing table with m entries(finger table) i th finger of n: i th entry in finger table of n, the identity of the first node s that succeeds n by at least 2 i-1 on the identifier circle

7
7 Two important characteristics Each node stores information about a small number of nodes and knows more about nodes closely following it A node’s finger table generally does not contain enough information to determine the successor of an arbitrary key. What happens if a node does not know the successor of a key? It asks a node with ID closer to the key whose successor is requested than its own ID Theorem 2 With high probability the number of nodes that must be contacted to find successor in an N-node network is O(logN)

8
8 Joining the network Requires: 1.Each node’s successor is correctly maintained 2.For every key k, node successor(k) is responsible for k (For fast lookups, finger tables must be correct) Theorem 3 With high probability any node joining or leaving an N-node Chord network will use O(log 2 N) messages to re-establish the Chord routing invariants and finger tables For simplicity each node maintains a predecessor pointer Step 1:Initialize the predecessor and fingers of node n - Ask an existing node n’ to lookup them up - Need for O(mlogN) lookups for m entries - m entries can be reduced checked to O(logN) (with additional check for empty intervals) As a result the overall time for lookups is O(log 2 N)

9
9 Step 2:Update the fingers and predecessors of existing nodes to reflect the addition of n Node n will become the i th finger of a node p iff 1.p precedes n by at least 2 i-1 and 2.the i th finger of node p succeeds n (see e.g.) Finding and updating these nodes takes O(log 2 N) but can be reduced to O(logN) Step 3:Notify the higher layer s/w so that it can transfer state associated with keys (e.g. values) that node n is now responsible for It depends on the higher level s/w using Chord. Node n can become the successor only for keys that the immediately following node was previously responsible for

10
10 Example of a node join Node 6 joins the network

11
11 Concurrent joins Use of a stabilization protocol to keep successors up to date. Every node run stabilization periodically What happens if a lookup occurs before stabilization has finished? Three cases: 1.All finger tables are current=>Lookup needs O(logN) steps 2.Successors correct, fingers inaccurate=>Correct lookups but slow 3.Successors inaccurate=>Query failure. Retry after short pause Example of stabilization Existing nodes:n p and n s Joining node: n with ID between n p and n s n acquire n s as successor -> n notifies n s, n s acquire n as predecessor -> when n p runs stabilization it asks n s for its predecessor(=n) -> n p acquire n as successor -> n p notifies n, n acquires n p as predecessor. Correct state

12
12 Theorem 4-5 - Once a node can successfully resolve a given query, it will always be able to do so in the future - At some time after the last join all successor pointers will be correct Joins don’t substantially damage the performance of fingers. O(logN) hops to reach the interval close to the target node and a linear search to find the exact node. Theorem 6 If we take a stable network with N nodes and another set of up to N nodes joins the network with no finger pointers (but with correct successor pointers), then lookups will still take O(logN) time with high probability

13
13 Failures - Each node keeps a successor-list of its r nearest successors - If a node notices that its successor failed it replaces it with the first live entry in its successor-list. - When stabilization runs, finger tables will be updated. Theorem 7-8 If we use a successor list of length r=O(logN) in a network that is initially stable, and then every node fail with probability ½, then with high probability find_successor returns the closest living successor to the query key and the expected time to execute find_successor in the failed network is O(logN) Chord can store replicas of the data associated with a key to the next k nodes succeeding the key => It can inform the higher layer when successors come and go, and when the s/w should propagate new replicas

14
14 Simulation and experimental results Load Balance Num of nodes: 10 4 Total num of keys: 10x10 4 -100x10 4 PDF for 50x10 4 keys There are nodes with no keys max num of nodes=9.1x mean num Notes: The ID do not cover uniformly the identifiers’ space The number of keys per node increase linearly with num of keys

15
15 Adding virtual nodes to improve load balance Num of nodes: 10 4 Total num of keys: 100x10 4 Better distribution of keys as number of virtual nodes increase Notes: -The tradeoff is the routing table usage will increase as each actual node needs r times as much space to store the finger tables for its virtual nodes. In practice it is not a problem -The number of v.n. needed is at most O(logN) so we must know the total # of nodes. Solution: Use an upper bound of nodes

16
16 Path Length :# of nodes traversed during a lookup operation. O(logN) Num of nodes: 2 k Num of keys: 100x2 k PDF 2 12 nodes Notes The mean path length increases logarithmically with the numbers of nodes Path length ~ ½ log 2 N

17
17 Simultaneous node failures Num of nodes: 10 4 Num of keys: 100x10 4 Note The fraction of lookups that fail as a function of nodes that fail is almost the fraction of nodes that fail

18
18 Failed lookups and stabilization Cause: 1.The node responsible for the key has failed 2.Some finger tables and predecessor pointers are inconsistent Note: It may take more than one stabilization to completely clear out a failed node

Similar presentations

OK

Chapter 5 Naming (I) Speaker ： Jyun-Yao Huang 1 Application and Practice of Distributed Systems.

Chapter 5 Naming (I) Speaker ： Jyun-Yao Huang 1 Application and Practice of Distributed Systems.

© 2018 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on weapons of mass destruction in iraq Ppt on immigration to canada Ppt on hunter commission 1882 Ppt on health care industry in india Ppt on materials metals and nonmetals Edit ppt on iphone Web development seminar ppt on 4g Ppt on drama julius caesar by william shakespeare Download ppt on the rime of ancient mariner part 1 Ppt on area of a circle