Locality Aware Network Solutions Dahlia Malkhi The Hebrew University of Jerusalem.

Slides:



Advertisements
Similar presentations
Peer-to-Peer Infrastructure and Applications Andrew Herbert Microsoft Research, Cambridge
Advertisements

Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Sequoia: Virtual-Tree Models for Internet Path Metrics Rama Microsoft Research Also:Ittai Abraham (Hebrew Univ.) Mahesh Balakrishnan (Cornell) Archit Gupta.
Distributed Hash Tables
Distributed Hash Tables: An Overview
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Compact Routing in Theory and Practice Lenore J. Cowen Tufts University.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
PDPTA03, Las Vegas, June S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Application Layer Overlays IS250 Spring 2010 John Chuang.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
Looking Up Data in P2P Systems Hari Balakrishnan M.Frans Kaashoek David Karger Robert Morris Ion Stoica.
Fault-tolerant Routing in Peer-to-Peer Systems James Aspnes Zoë Diamadi Gauri Shah Yale University PODC 2002.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Structure Overlay Networks and Chord Presentation by Todd Gardner Figures from: Ion Stoica, Robert Morris, David Liben- Nowell, David R. Karger, M. Frans.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
LAND: Locality Aware Networks for Distributed Hash Tables Dahlia Malkhi The Hebrew University of Jerusalem Joint work with: Ittai Abraham and Oren Dobzinski.
Object Naming & Content based Object Search 2/3/2003.
Compact Routing and Locality in Peer-to-Peer Systems Ittai Abraham School of Computer Science and Engineering Hebrew University of Jerusalem.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
SkipNet: A Scaleable Overlay Network With Practical Locality Properties Presented by Rachel Rubin CS294-4: Peer-to-Peer Systems By Nicholas Harvey, Michael.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
EPFL-I&C-LSIR [P-Grid.org] Workshop on Distributed Data and Structures ’04 NCCR-MICS [IP5] presented by Anwitaman Datta Joint work with Karl Aberer and.
Scalability of Routing: Compactness and Dynamics Dmitri Krioukov (CAIDA) Kevin Fall (Intel Research) and kc claffy (CAIDA) IETF-67.
Improved Sparse Covers for Graphs Excluding a Fixed Minor Ryan LaFortune (RPI), Costas Busch (LSU), and Srikanta Tirthapura (ISU)
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Optimisation des DHT à partir des propriétés physiques, logiques et sociologiques des clients Pierre Fraigniaud CNRS LRI, Univ. Paris-Sud
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Locality Aware Network Solutions Dahlia Malkhi The Hebrew University of Jerusalem.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Dynamic Networks for Peer-to-Peer Systems Pierre Fraigniaud CNRS LRI, Univ. Paris Sud Joint work with Philippe Gauron.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Dynamic Networks for Peer-to-Peer Systems Pierre Fraigniaud CNRS Lab. de Recherche en Informatique (LRI) Univ. Paris-Sud, Orsay Joint work with Philippe.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Succinct Routing Tables for Planar Graphs Compact Routing for Graphs Excluding a Fixed Minor Ittai Abraham (Hebrew Univ. of Jerusalem) Cyril Gavoille (LaBRI,
Compact Name-Independent Routing with Minimum Stretch
Improving and Generalizing Chord
Plethora: Infrastructure and System Design
Accessing nearby copies of replicated objects
Early Measurements of a Cluster-based Architecture for P2P Systems
Distributed Hash Tables
Routing in Networks with Low Doubling Dimension
Forbidden-set labelling in graphs
Presentation transcript:

Locality Aware Network Solutions Dahlia Malkhi The Hebrew University of Jerusalem

2 A Brief Overview of Distributed Computing The 90 ’ s: –Internet activity: Web browsing –Paradigm: Client-server –Techniques: cluster computing, Paxos, group communication

3 A Brief Overview of Distributed Computing The 90 ’ s: –Internet activity: File sharing –Paradigm: P2P, grid, web-services –Techniques: overlay networks, content distribution networks, resource location

4 Application: IPv6 Routing over IPv4 [van Renesse 02] AF3S:::3FF1:43E4 0001:::3BBB: :::7777: :::2222:2222 EEE0:::EEEE:EEEE 5151:::6161: A:::0202: :::0909:9999 Distribute Hash Tables (DHT)

5 Application: Content Delivery / Finding Nearest Copies of Data ? ? ?

6 Application: Hyperencryption [Maurer 92, Ding & Rabin 02] Random bits Alice Bob Key Adversary bits

7 Application: A Hyperencryption P2P Network [Rabin 03] Distributed Hash Table (DHT)

8 Application: A Distributed Google? ?

9 ever-growing global scale-free networks, their provisioning, repair and unique functions EVERGROW The Vision ultimate RAID ultimate GNUTELLA ultimate GOOGLE ultimate AKAMAI infrastructure and new methods and systems devoted to measurement, mock-up and and analysis of present and future network traffic, topology and logical structure, to bridge the gap in theory, protocols and understanding to what the Internet can be in An EC project. Coordinators: SICS (Sweden) and HUJI (Jerusalem)

10 Scalable Network Solutions Overlay networks provide added functionality at the application level –Search, routing, location services Network theory provides the foundations –Possibilities, impossibilities, lower/upper bounds Practical solutions require flexible deployment

11 Distributed Data Structures (DDS) Peers jointly implement a data structure, e.g., hash table Route queries based on data-name (key)

12 DDS Problem Reduced to Routing ?? Responsible for

13 Why classic routing network designs don’t help Static # of nodes a priori known Node labels designated by network designer

14 DDS Reduced to Routing The problem: Overlay routing network –Variants: labeled routing, name-independent routing, finding nearest copies Dynamic emulation

15 Distributed Hash Tables [Malkhi, Naor, Ratacjzak, PODC 2002] SchemeDegree Route Chord, Tapestry, Pastry [2001] Log n CAN [2001] dd*n (1/d) Viceroy [2002] 5Log n Koorde, D2B, DH, generic [2003] 2Log n [Abraham, Awerbuch, Azar, Bartal, Malkhi, Pavlov, IPDPS 2003 ]

16 Tree View of Dynamic Graphs Leafs of the tree represent current nodes Inner nodes in the tree represent nodes that were split Example: merge of 000, 001 into 00

17 Locality awareness source target

18 Locality awareness source target

19 Locality Awareness in Overlay Networks Model the network as a weighted undirected graph –c(x, y): cost of shortest path from x to y –c() is a metric An overlay network is a sub-graph Let x=x 0, x 1, …, x t =y be a route in the overlay network Stretch: Ratio between overlay route cost and shortest path cost: ( c(x, x 1 ) + c(x 1,x 2 ) + … c(x t-1, y) ) / c(x,y)

20 Overlay Networks in Growth-Bounded Metrics Previous work : –[Plaxton, Rajaraman, Rica 1997], Tapestry (Berkeley), Pastry (MS UK) –Expected (large) constant stretch –Logarithmic node degree LAND [Abraham, Malkhi, Dobzinski, SODA 2004] : –Guaranteed stretch (1+ε) –Expected logarithmic node degree, constant depends on growth-bound –Simple, intuitive construction and proofs

21 Overlay Networks in Geometric Spaces Modeling the Internet as a geometric space is practical –Ubiquitous GPS devices –Successful embeddings in virtual coordinate-space Problem 1: Locate nodes Problem 2: Route to known coordinates

22 Location Services and Routing in Geometric Spaces LLS: First fully-locality aware location service [Abraham Dolev Malkhi 2004] –bounded stretch lookup –bounded stretch update First constant-degree routing scheme (to known coordinates) [Abraham Malkhi, PODC 2004] –constant node degree, logarithmic hops, 1+ε stretch

23 Routing in Arbitrary Graphs: Lower and upper bounds Name-independent routing: node names are independent of routing scheme [Awerbuch, Bar Noy, Linial, Peleg 1989] Lower bounds: [Gavoille Gengler 2001] –Stretch < 3  O(n) routing information –Stretch < 5  √n routing information Upper bound: [Abraham, Gavoille, Malkhi, Nisan, Thorup, SPAA 2004] –stretch-3 routing with O(√n ) routing information –Stretch 3 is indeed attainable! General upper bound: [Abraham Gavoille, Malkhi, DISC 2004] –Stretch-k routing with memory O(k 2 k √n )

24 Network nodes

25 Nodes’ random identifiers

26 Coloring and Vicinities

27 Coloring and Vicinities ? ? ? ?

28 Stretch 3 ? d ≤ d ≤ 2d

29 The Full Routing Scheme ? ? a b c d

30 Locality-Aware, Robust Overlay for Information Lookup and Content Delivery Degree O(√n) Locality awareness: –Formally stretch 3 –For far-apart nodes, lower stretch Mostly two-hop –Whenever full connectivity exists Flexibility –Estimate √n roughly –Cache information on many vicinity nodes –Store information about any known node of same color Fault tolerance: –Multiple route choices –Quick repair –Maintain QoS in face of churn

31