P-Grid Presentation by Thierry Lopez P-Grid: A Self-organizing Structured P2P System Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic,

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Scalable Content-Addressable Network Lintao Liu
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Xiaoli Zhang P-Grid: A self-organizing access structure for P2P information systems Karl Aberer Department of Communication Systems Swiss Federal Institute.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
© 2007, Roman Schmidt Distributed Information Systems Laboratory Evergrow workshop, Jerusalem, IsraelFebruary 19, 2007 Efficient implementation of BP in.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
Distributed Lookup Systems
1 ISWC GridVine: Building Internet-Scale Semantic Overlay Networks Karl Aberer, Philippe Cudré-Mauroux, Manfred Hauswirth School of Computer.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
1 A Scalable Content- Addressable Network S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Proceedings of ACM SIGCOMM ’01 Sections: 3.5 & 3.7.
Searching in Unstructured Networks Joining Theory with P-P2P.
Wide-area cooperative storage with CFS
EPFL-I&C-LSIR [P-Grid.org] Workshop on Distributed Data and Structures ’04 NCCR-MICS [IP5] presented by Anwitaman Datta Joint work with Karl Aberer and.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Ecole Polytechnique Fédérale de Lausanne, Switzerland Efficient processing of XPath queries with structured overlay networks Gleb Skobeltsyn, Manfred Hauswirth,
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Peer-to-Peer Databases David Andersen Advanced Databases.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Indexing data-oriented overlay networks September 1 st, 2005 Indexing data-oriented overlay networks Presented by: Anwitaman Datta Joint work with Karl.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
The EigenTrust Algorithm for Reputation Management in P2P Networks
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
© 2002, Magdalena Punceva, EPFL-IC, Laboratoire de systèmes d'informations répartis Self-Organized Construction of Distributed Access Structures: A Comparative.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Chord Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber Google,
Trust Management in P2P systems Presenter: Lintao Liu April 21th, 2003.
Chord Advanced issues. Analysis Search takes O(log(N)) time –Proof 1 (intuition): At each step, distance between query and peer hosting the object reduces.
1. Efficient Peer-to-Peer Lookup Based on a Distributed Trie 2. Complex Queries in DHT-based Peer-to-Peer Networks Lintao Liu 5/21/2002.
Peer to Peer Network Design Discovery and Routing algorithms
BATON A Balanced Tree Structure for Peer-to-Peer Networks H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
EGEE is a project funded by the European Union under contract IST Distributed Superscheduling Matteo Mordacchini INFN – Padova Università Ca’
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Peer-to-Peer Data Management
Mobile P2P Data Retrieval and Caching
Updates in Highly Unreliable, Replicated Peer-to-Peer Systems
Chord and CFS Philip Skov Knudsen
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
Consistent Hashing and Distributed Hash Table
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

P-Grid Presentation by Thierry Lopez P-Grid: A Self-organizing Structured P2P System Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic, Manfred Hauswirth, Magdalena Punceva, Roman Schmidt, SIGMOND Record, 32(2), September Updates in Highly Unreliable, Replicated Peer-to-Peer Systems Updates in Highly Unreliable, Replicated Peer-to-Peer Systems Anwitaman Datta, Manfred Hauswirth, Karl Aberer, Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), May 19-22, 2003, Providence, Rhode Island, USA.23rd International Conference on Distributed Computing Systems (ICDCS 2003) Scalable Data Access in P2P Systems Using Unbalanced Search Trees Scalable Data Access in P2P Systems Using Unbalanced Search Trees Karl Aberer, Workshop on Distributed Data and Structures (WDAS-2002), Paris, France, Managing Trust in a Peer-2-Peer Information System Managing Trust in a Peer-2-Peer Information System Karl Aberer, Zoran Despotovic, 10th International Conference on Information and Knowledge Management, (2001 ACM CIKM), ACM Press, New York, Advanced Peer-to-Peer Networking: The P-Grid System and its Applications Advanced Peer-to-Peer Networking: The P-Grid System and its Applications Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic, Manfred Hauswirth, Magdalena Punceva, Roman Schmidt, Jie Wu, PIK 26(3), 2003.

Presentation Overview ● What is P-Grid? ● Grid Structure ● Search Tree ● Load Balancing ● Updating ● Security ● Trust

What is P-Grid ● Self-organizing structured P2P system ● Multi-use. One use file distribution ● Heavy use of probabilities and redundancy ● Each peer has a unique ID ● Look up table based on virtual distributed search tree. ● Each peer is responsible for a section of the tree. ● Goal to have each node with equal load

Example of the Network ● Each peer has a prefix of the network ● Files hashed to a key. Low probability of conflicts. ● Redundancy

Example Tree

Routing Algorithm ● Each peer has a routing table. – Show how routing works ● Each peer knows about its duplicates ● Each peer knows a few other peers. Less know are held. – Small world Model – Different than Chord in who is known. ● Should be O(Log(n)) routing

Adding a new node ● Gets a global ID from bootstrapping node – Computer holds onto this ID even offline ● Sharing of files and routing table. – Shares to many files, split index again ● Similar to CAN ● “show example” ● Updating files/routing talked about later – Method of pushing and pulling. ● Storage of routing table, O(log(n))

The Unbalanced Search Tree ● Goal is to be load balanced. Think CAN. – Importance is on number of messages for a search and not the depth of the tree ● A message is routed to a closer reference. ● When the correct node is found, reply sent straight back to source.

Load Balance ● 1024 peers, with average path length of 5.

Updating ● Does not need to be strongly consistent. ● Use of local knowledge. ● Uses rumor spreading by a push and pull method. ● Push when new files added or updates. – Controlled flooding. Select x random prefix peers, send the update, those peers might re- flood. ● Pulling: When logging back on: – Query a few prefix peers for routing tables and file handles. Ask multiple peers for protection.

Updating Cont. ● Basic Idea: Each prefix group is a mini P2P group with no internal structure. ● Each member knows a “minimal fraction of the complete set of replicas.” ● P-Grid to have a higher replication factor than normally assumed. – Replicate between 100 and 1000 times. – Based on staticitics of real information, on average replicas exist. ● This is scalable since if to many peers join a prefix it breaks to be smaller.

Trust ● The use of a binary reputation system. – Meaning, good node or bad node. ● Complaints are only stored. – Stored via the distrusted method of P-Grid. ● Interactions between peers p & q. – Example of q cheating and giving bad reviews. – Look at all the reviews/witnesses and judge yourself.

Example of a Trust Tree

Details on Trust ● What if complaints stored on malicious host? – Replication of that data == voting system. ● Lying witnesses: Randomly check the trust of the witnesses or check if results are mixed. ● Stopping requests. – Use a different route by the routing table.