1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam.

Slides:



Advertisements
Similar presentations
Topology-Aware Overlay Construction and Server Selection Sylvia Ratnasamy Mark Handley Richard Karp Scott Shenker Infocom 2002.
Advertisements

CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Scalable Content-Addressable Network Lintao Liu
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handly, Richard Karp and Scott Shenker Presented by Shreeram Sahasrabudhe.
Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 22: Overlay Networks Xiaowei Yang
Peer-to-Peer Structured Overlay Networks
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
A Scalable Content Addressable Network (CAN)
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network (CAN) ACIRI U.C.Berkeley Tahoe Networks.
A Scalable Content Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker Presented by: Ilya Mirsky, Alex.
Fault-tolerant Routing in Peer-to-Peer Systems James Aspnes Zoë Diamadi Gauri Shah Yale University PODC 2002.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Distributed Lookup Systems
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
A Scalable Content- Addressable Network Sections: 3.1 and 3.2 Καραγιάννης Αναστάσιος Α.Μ. 74.
1 A Scalable Content- Addressable Network S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Proceedings of ACM SIGCOMM ’01 Sections: 3.5 & 3.7.
Content Addressable Networks. CAN Associate with each node and item a unique id in a d-dimensional space Goals –Scales to hundreds of thousands of nodes.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Wide-area cooperative storage with CFS
P2P Course, Structured systems 1 Introduction (26/10/05)
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network ACIRI U.C.Berkeley Tahoe Networks 1.
A Scalable Content-Addressable Network
ICDE A Peer-to-peer Framework for Caching Range Queries Ozgur D. Sahin Abhishek Gupta Divyakant Agrawal Amr El Abbadi Department of Computer Science.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network ACIRI U.C.Berkeley Tahoe Networks 1.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Other Structured P2P Systems CAN, BATON Lecture 4 1.
1 Plaxton Routing. 2 Introduction Plaxton routing is a scalable mechanism for accessing nearby copies of objects. Plaxton mesh is a data structure that.
CONTENT ADDRESSABLE NETWORK Sylvia Ratsanamy, Mark Handley Paul Francis, Richard Karp Scott Shenker.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Applied Research Laboratory David E. Taylor A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker.
Sylvia Ratnasamy (UC Berkley Dissertation 2002) Paul Francis Mark Handley Richard Karp Scott Shenker A Scalable, Content Addressable Network Slides by.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Peer-to-Peer Systems. 2 Introduction What is peer One that of equal standing with another Peer-to-peer A way of structure distributed applications Each.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Content Addressable Networks CAN is a distributed infrastructure, that provides hash table-like functionality on Internet-like scales. Keys hashed into.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer to Peer Network Design Discovery and Routing algorithms
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Peer-to-Peer Networks 03 CAN (Content Addressable Network) Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
1 Distributed Hash Tables and Structured P2P Systems Ningfang Mi September 27, 2004.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
CSCI 599: Beyond Web Browsers Professor Shahram Ghandeharizadeh Computer Science Department Los Angeles, CA
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
A Scalable content-addressable network
CONTENT ADDRESSABLE NETWORK
A Scalable, Content-Addressable Network
Reading Report 11 Yin Chen 1 Apr 2004
A Scalable Content Addressable Network
A Scalable, Content-Addressable Network
Presentation transcript:

1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam

2 Overview Introduction Design Design Improvements Design Review Related works Discussion

3 Introduction Hash Table Functionality:  Maps ‘key’ to a ‘value’. Content Addressable Network (CAN) :- Is a concept that provides distributed infrastructure which has Hash Table like functionality on Internet like Scale. Characteristics:  scalable, fault-tolerant and completely self-organizing.

4 Introduction (cont..) Napster  Locating a file is centralized. Gnutella  Floods the request for a file, not scalable CAN provides a solution:  Scalable - Nodes maintain small amount of control state  Distributed - Hash table is stored in all Peers, so it is.

5 Design Each node stores a chunk of hash table entry and details of adjacent zones. Requests are forwarded towards the CAN node that contains the key. Indexing uses virtual d-dimensional Cartesian coordinates.  Coordinates are purely logical

6 Coordinate Space A D B C 0,0 1,0 0,1 Each node randomly picks a coordinate. Coordinate space is dynamically partitioned Each node owns its individual zone

7 Design (cont..) Inserting a pair ( key K 1, value V 1 )  Use Hash function to map K 1 to a point P 1 in space  Then this pair is stored in the Node that owns the zone Retrieving a value :  Need to know the key and use the key to identify the node  Node learns and maintains the table of details of adjacent nodes.

8 Routing Information's needed for routing  CAN node hold routing table that contains IP address and its virtual coordinate space.  Neighbor is determined if one of the d-dimension is same and another dimension abuts.  For a d-dimensional coordinate individual node maintains 2d neighbors

9 In figure nodes 5&1 are neighbors, as 5 has same Y coordinates as 1 and X coordinate abut 1’s.

10 Routing (Cont..) CAN message has destination address By simple greedy forwarding to the neighbor closest to the destination it proceeds it routing. average path length = (d/4)n 1/d hops. ( n - # of zones) As many path is available, network sustains even if some node fails.

11 Construction 1. First the new node must find a node already in the CAN. 2. Next, using the CAN routing mechanisms, it must find a node whose zone will be split. 3. Finally, the neighbors of the split zone must be notified so that routing can include the new node.

12 Bootstrap From DNS domain name, one or more bootstrap nodes is determined. A bootstrap node maintains a partial list of CAN nodes it believes are currently in the system. TO join a CAN, a new node looks up the CAN domain name in DNS to retrieve a bootstrap nodes IP address. This bootstrap node then supplies the IP address of several randomly chosen nodes currently in system.

13 Finding a zone New node randomly chooses a point (p) in space. Sends JOIN request destined for P. This is sent into CAN via existing CAN node. Current occupant node then splits its zone in half and assigns one half to the new node. Splitting is done by assuming certain order.  Eg, in 2 d, X coordinate splits first and then Y coordinate.

14 Maintenance Departure of a Node Single Node Failure Multiple Failure

15 Departure of a Node The node that departs hands over the details to the one of its neighbor. If the zone of one of the neighbors can be merged with the departing node’s zone to produce a valid single zone, then this is done. If not, then the zone is handed to the neighbor whose current zone is smallest, and that node will then temporarily handle both zones.

16 Departure of a Node A D B C 1,0 0,1 0,0 D E F. When node F fails, E will be merged with F

17 Failures Prolonged absence of update message will indicate the failure of a node.  Neighbor node starts a takeover timer running.  When the timer expires, a node sends a TAKEOVER message conveying its own zone volume to all of the failed node’s neighbors.  It accepts the TAKEOVER only if the zone volume in the message is smaller than its own zone volume.  Otherwise it sends its TAKEOVER message.

18 Multiple Failure First does a ring search to get the unreachable nodes. Then rebuilds neighbor state table to do safe takeover.

19 Design Improvements Multi-dimensioned coordinate spaces  Increasing the dimensions of the CAN coordinate space reduces the routing path length, and hence the path latency.  Increase in Dimension => increase in neighbor => increase in routing => increases routing fault tolerance

20

21 Design Improvements Realities: multiple coordinate spaces  Each node maintain multiple, independent coordinate spaces with each node in the system. Each such coordinate space is a “reality”.  Given a coordinate, it is searched in all realities.  This reduces the average path length. Multiple dimensions vs. multiple realities  Multiple Reality has increased fault tolerance and data availability than multiple dimensions.

22 Design Improvements Overloading coordinate zones  allow multiple nodes to share the same zone. Nodes that share the same zone are termed peers.  MAXPEERS, which is the maximum number of allowable peers per zone.  reduced path length (number of hops), and hence reduced path latency  improved fault tolerance Multiple hash functions  Almost equal to multi realities.

23 Design Improvements Topologically-sensitive construction of the CAN overlay network  CAN nodes are ordered with their round-trip-time to each of landmarks.  With m landmarks, m! such orderings are possible.  Every portion is assigned a landmark ordering.  a new node joins the CAN at a random point in that portion of the coordinate space associated with its landmark ordering.

24 Design Improvements More Uniform Partitioning  Zone are split after comparing volume of its zone with those of its immediate neighbors in the coordinate space.  Zone with the largest volume is split.  we can see that without the uniform partitioning feature a little over 40% of the nodes are assigned to zones with volume V as compared to almost 90% with this feature and the largest zone volume drops from 8V to 2V.  Not surprisingly, the partitioning of the space further improves with increasing dimensions. Caching and Replication techniques

25

26 Design Review Following metrics were used to evaluate system performance:  Path length : the number of (application-level) hops required to route between two points in the coordinate space.  Neighbor-state: the number of CAN nodes for which an individual node must retain state.  Latency : we consider both the end-to-end latency of the total routing path between two points in the coordinate space and the per-hop latency, i.e., latency of individual application level hops obtained by dividing the end-to-end latency by the path length.  Volume : the volume of the zone to which a node is assigned that is indicative of the request and storage load a node must handle.  Routing fault tolerance : the availability of multiple paths between two points in the CAN.  Hash table availability : adequate replication of a (key,value) entry to withstand the loss of one or more replicas.

27 Design Review The key design parameters affecting system performance are:  dimensionality of the virtual coordinate space: d  number of realities: r  number of peer nodes per zone: p  number of hash functions (i.e. number of points per reality at which a (key, value) pair is stored): k  use of the RTT-weighted routing metric  use of the uniform partitioning Test system specification:  A system size of n=218 nodes,Transit-Stub topology with delay of 100ms on intra- transit links, 10ms on stub-transit links and 1ms on intra-stub links (i.e. 100ms on links that connect two transit nodes, 10ms on links that connect a transit node to a stub node and so forth). Transit-stub models explicitly group vertices into domains, and reflect that grouping in the connectivity between vertices.

node transit-stub topology

29 Bare bones: CAN that does not utilize most of our additional design features Knobs-on-full: CAN making full use of our added features (without the landmark ordering feature )

30 Related Work Related Algorithms  Distance vector and Link State algorithms These need widespread topological information. CAN in other hand stores only less data.  Plaxton algorithm Each node has n bit label divided into l levels. Each level has width w = n/ l. Each node forwards a packet to a neighbor whose label matches the destination label in more digits.

31 Related Work Algorithms with geographic routing.  ‘space’ in this algorithm refers to physical space.  No neighbor search problem.  Correctly mimic the space is a trivial problem  It is not extensible to multi dimension

32 Related System Domain Name System  It stores (domain name, IP address). Ocean Store  To provide continuous access to persistent information  Uses Plaxtons algorithm Peer-to-Peer file sharing systems  Freenet Stores Keys ( analogous URL ), address of other nodes, data corresponding to key.

33 Discussion Addresses two key problems in the design of Content-Addressable Networks: scalable routing and indexing. Simulation results validate the scalability of our overall design – for a CAN with over 260,000 nodes, we can route with a latency that is less than twice the IP path latency. Future works  Secure CAN  Key word searching