Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Scalable Content-Addressable Network Lintao Liu
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Node Lookup in Peer-to-Peer Network P2P: Large connection of computers, without central control where typically each node has some information of interest.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Content Addressable Networks. CAN Associate with each node and item a unique id in a d-dimensional space Goals –Scales to hundreds of thousands of nodes.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Wide-area cooperative storage with CFS
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Memory Coherence in Shared Virtual Memory System ACM Transactions on Computer Science(TOCS), 1989 KAI LI Princeton University PAUL HUDAK Yale University.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Middleware issues: From P2P systems to Ad Hoc Networks
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Distributed systems. distributed systems and protocols distributed systems: use components located at networked computers use message-passing to coordinate.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Chapter 5 Naming (I) Speaker : Jyun-Yao Huang 1 Application and Practice of Distributed Systems.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Author:Zarei.M.;Faez.K. ;Nya.J.M.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
EE 122: Peer-to-Peer (P2P) Networks
Dewan Tanvir Ahmed and Shervin Shirmohammadi
Chord Advanced issues.
Chord Advanced issues.
Mobile P2P Data Retrieval and Caching
Presentation transcript:

Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual Environments Research Laboratory School of Information Technology and Engineering University of Ottawa, Ottawa, Ontario, Canada {dahmed, Pervasive Computing and Communications Workshops(PerComW'07) 報告 : 羅世豪

Outline 一. Introduction  Multi-level hashing in wireless ad hoc peer-to-peer systems 三. Wireless ad hoc p2p system – node join  Wireless ad hoc p2p system – content publishing  Wireless ad hoc p2p system – content discovery  Simulation 七. Conclusion

Introduction (1/2)  Mobile peer-to-peer (MP2P) system faces more constraints as compared to wired peer-to-peer system. Some problems in this network are  Scarcity of bandwidth  Short lifetime of the nodes due to power constraint  Dynamic topology caused by the mobility of nodes.  These constraints give hard challenges to the researchers in the various aspects of the peer-to-peer system in ad hoc environments such as  Routing  Content discovering  Data retrieval  Caching

Introduction (2/2)  Smart content discovery is the heart of peer-to- peer system. In ad hoc network, routing is expensive so it requires more effective content discovery process.  We apply chord directly on top of wireless ad hoc peer-to-peer system.  We use two-level distributed hashing scheme.  First level hash maps a content request to a region that greatly reduces routing overhead.  Second level hash discovers content location after redirecting the request to that region.

Multi-level hashing in wireless ad hoc peer-to-peer systems (1/2)  The entire system consists of a set of home regions where peers in close proximity form home region.  Each home region has a representative that plays a supporting role to make the system operational.

Multi-level hashing in wireless ad hoc peer-to-peer systems (2/2)  These representatives may change over the time considering the ad hoc issues of the system.  Home region is identified by the Home-Region- ID.  The representative functions as a rendezvous point for incoming requests and also provides useful information to its local peers.

Wireless ad hoc p2p system – node join (1/3)  We use a pair,, to identify a node.  Hash function generates Node-ID;  Node-ID = H l (Node-Address)  Home-Region-ID depends on its location that may change over time.

Wireless ad hoc p2p system – node join (2/3)  Two ways to learn about home region representative.  The home region representative periodically broadcasts its own identity (address) and Home- Region-ID.  Joining node explicitly floods Home-Region-Search- Request.  Home-Region-Search-Request is a controlled flood – not flooded to the entire system.  An intermediate node does not forward the request when it already has the answer of the request.

Wireless ad hoc p2p system – node join (3/3)  The requester may get multiple responses based on its location.  It marks minimum hops away response.  The joining node confirms the representative for its inclusion to the system.  It gets the identity of its successor and predecessor from this representative.  The joining node determines its Node-ID using the hash function H l.

Wireless ad hoc p2p system – content publishing (1/5)  key r = H r (Content-Name )  Map the content name to a home region.  key s =H l (Content-Name)  Determine the successor in a particular region, i.e. the actual node where content information has to be stored.

Wireless ad hoc p2p system – content publishing (2/5)  key r, is used to determine the home region where content has to be published.  The content publisher first builds a tuple consisting of and then asks local representative to store the tuple.

Wireless ad hoc p2p system – content publishing (3/5)  Local representative transport the tuple to the foreign region. But it may happen that content has to be stored in the local region based on the key r.

Wireless ad hoc p2p system – content publishing (4/5)  successor(key s )  the node identifier of the first actual node following keys around the circle clockwise.  At a particular region, the successor of the content is determined using key s and the representative initiates tuple storing process.

Wireless ad hoc p2p system – content publishing (5/5)  The index is distributed over the nodes at random. One of the shortcomings in this environment is node’s ad hoc nature.  To recover from such unwanted events protocol deploys multiple hash functions to store tuple in multiple nodes.

Wireless ad hoc p2p system – content discovery (1/8)  Hashes to get key r using H r (Content-Name).  This key represents the home region where the content information is stored.  If the content is not in local region, the request is delegated to the foreign representative.  Node gets the address of foreign representative with the help of local representative.  The protocol allows local representative to broadcast home regions’ addresses in its periodic keep-alive messages.

Wireless ad hoc p2p system – content discovery (2/8)  We applied chord like content searching process with modified finger table in local region.  Lookup can proceed as follows.  Based on key r, either the initiating node or the foreign representative sends a packet to its successor containing requester’s physical address and the key, key s.  The packet is circulated around the logical circle until it locates the successor or it fails.

Wireless ad hoc p2p system – content discovery (3/8)  Chord uses finger table to speed up searching process. If the hash address space is too large as compared to the number of peers in the system  The most of the entries in finger table point to the same node, and search continues in linear way.  Let hash key is 128-bit long. Most entries of the finger table point to the same successor.  We propose two approaches to construct finger table for wireless ad hoc environments.

Wireless ad hoc p2p system – content discovery – first approach (4/8)  In the first design, the finger table is slightly different from chord.  The finger table has m entries, indexed by 0 through m-1. It is divided into two halves:  0 to m/2  m/2 to (m-1).

Wireless ad hoc p2p system – content discovery – first approach (5/8)  The values of the fields for entry i at node k for the first half of the table are:  First half table covers k to k + 2 m / 2−1 address space. startthe physical address of successor(start) k + 2 i mod 2 m, where 0 ≤ i < m/2Physical address of successor(start[i])

Wireless ad hoc p2p system – content discovery – first approach (6/8)  step-size  a big number to jump more rapidly.  The entries of the second half of the table are incremented by the step size starting from k + 2 m / 2−1.  Similarly we have corresponding physical addresses of the successors.

Wireless ad hoc p2p system – content discovery – first approach (7/8)

Wireless ad hoc p2p system – content discovery – second approach (8/8)  The values of the fields for entry i at table of node k are:  a is a constant  One possible choice for the value of ‘a’ is the index of finger table.  i.e. it increase at a rate of i i [1 1, 2 2, 3 3 …].  n is n-bit hash value.  These approaches perform well when the number of peers is too small as compared to the address space; otherwise we prefer the usual one. Startthe physical address of successor(start) (k + a i ) mod 2 n,where m/2 ≤ i < mPhysical address of successor(start[i])

Simulation (1/8)  8000 – peers are randomly deployed in the environment  Each peer has 0.2 movement probability.  Nodes are allowed to move at any direction.  16 fixed adjacent regions.  Not all nodes are involved in peer-to-peer system.  If we have 8000 peers, system has more than 8000 nodes.  Peers are considered alive during the simulations but helping nodes (intermediate ad hoc nodes that provide routing service) are not all time.  The request may not end with a success.

Simulation (2/8)

Simulation (3/8)  Applied chord directly on top of wireless ad hoc network (Setup 1).  Estimated search cost and routing cost of chord for peer- to-peer system in wireless ad hoc network.  Search cost  How many peers are involved in a particular content discovering process  Routing cost  All ad hoc nodes that are involved in content discovering process including the forwarding nodes.

Simulation (4/8)  Chord in wireless ad hoc network is not suitable as a peer-to-peer system because of its high routing cost.  If the number of peers is too small as compared to the hash address space, finger table has little contribution in content discovering process.

Simulation (5/8)  Two-level hashing presented in this paper is tested and compared with chord for wireless ad hoc p2p system.  Simulation environment : (Setup 2)  For the sake of fair experiment, we ignored finger table in both approaches. This is because we can deploy any variant of finger table in both approaches.

Simulation (6/8)  On an average, chord requires 10 to 12 times more searching cost than our two-level hashing approach.  Content searching cost is reduced as we divide the entire topology into multiple small regions and first level hash makes it possible to explore the content into that small region.

Simulation (7/8)  Chord requires 50 times more routing cost than two level hashing scheme on an average.  Chord is a logical topology. It has no knowledge of the physical structure.  Request is redirected to a node that is logically close but physically far away.

Simulation (8/8)  It is also true in two-level hashing approach when it enters in a local region.  But its logical ring is composed of close proximity nodes as compared to one level hashing in chord.  Reduces routing cost to a large extent.  Proves the requirement of multi-level hashing.

Conclusion(1/1)  We present a two-level hashing scheme for wireless ad hoc peer-to-peer system.  It shows that the performance of the system will be increased once we have multi-level hashing in terms of searching cost and routing overhead.  Modified finger tables works well when the number of peers is too small as compared to the hash address space.