Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.

Slides:



Advertisements
Similar presentations
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Scalable Content-Addressable Network Lintao Liu
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
FreeNet: A Distributed Anonymous Information Storage and Retrieval System Ian Clark, Oskar Sandberg, Brandon Wiley and Theodore Hong.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
Wide-area cooperative storage with CFS
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Distributed Hash Table Systems Hui Zhang University of Southern California.
Proof of Kleinberg’s small-world theorems
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
© 2002, Magdalena Punceva, EPFL-IC, Laboratoire de systèmes d'informations répartis Self-Organized Construction of Distributed Access Structures: A Comparative.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Small-world phenomenon: An Algorithmic Perspective Jon Kleinberg.
Peer-to-Peer Information Systems Week 12: Naming
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CS 268: Lecture 22 (Peer-to-Peer Networks)
Peer-to-Peer and Social Networks
EE 122: Peer-to-Peer (P2P) Networks
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Peer-to-Peer Video Services
Freenet.
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC

INFOCOM Peer-to-peer systems IP overlay networks without any central control or hierarchical organization Each node in the network is equivalent in functionality A special class: content-addressed networks a document is accessed using a descriptive title of the content rather than the location where the document is stored. A data object is represented by a point in a key space. At the core lies the distributed algorithm for content lookup and dissemination

INFOCOM Structured vs. Unstructured Structured system there is global consensus on which network node a document is stored. Algorithmic mapping between document key and node identifier. Example CAN, CHORD, Tapestry, Pastry. Unstructured system no such consensus exists Document key and node identifier are irrelevant. Example Gnutella, Freenet

INFOCOM Structured vs. Unstructured (cont’d) Structured system Advantage Efficient query Guarantee retrieval of existing documents Disadvantage Hard to provide anonymity Problem caused by DoS and selective attacks Unstructured system Advantage Simplicity in network maintenance Resistant to attacks Disadvantage Retrieval cost not bounded Search may fail even if the requested data exists

INFOCOM Freenet [Clark et al 2001] A Distributed Anonymous Information Storage and Retrieval System An adaptive Peer-to-Peer network application No broadcast search or centralized location index is employed in Freenet

INFOCOM Freenet routing protocol [Clark et al 2001] Files are identified by binary file keys obtained by applying a hash function. Each node maintains a datastore and a routing table of values LRU (Least Recently Used) route-cache Replacement Scheme Steepest-ascent hill-climbing search with backtracking.

INFOCOM Our contributions A new cache replacement scheme for Freenet A small change to local user behavior leads to a significant global improvement on system performance. Discovery: A carefully configured unstructured system gives comparable performance as structured systems in terms of the size of the routing table and the average number of hops per request.

INFOCOM An example search in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM A searching example in Freenet network

INFOCOM Main premise behind Freenet The routing in Freenet is expected to run efficiently nodes should come to specialize in locating sets of similar keys nodes should become similarly specialized in storing clusters of files having similar keys.

INFOCOM For the original Freenet protocol, there is a steep reduction in the hit ratio with increasing load. Fig. 1: Hit Ratio vs. Key Size Simulation Results (I) Fig.2: Simulation with a larger datastore and routing table. Ring Topology (300 nodes, cache size=200) # of keys generated per node Request Hit Ratio LRU

INFOCOM Why can’t Freenet search efficiently under heavy work load? Hypothesis: Frequent local caching actions could break up clusters caused by the Freenet routing mechanism Our simulation results showed that Freenet does not achieve clustering with light randomness in its route cache when lots of data items were inserted into the network

INFOCOM Snapshots of Freenet node’s datastore Fig.3: average number of keys generated per node =2 Fig.4: average number of keys generated per node =20

INFOCOM Problem Definition How can we improve the routing performance of the Freenet protocol efficiently without affecting its design goals? Two obvious solutions which do not work Increasing the cache-size the cache-size is locally administered since it depends on individual system resources. Increasing the HopsToLive value could increase the hit ratio, at the expense of significantly increased access latency.

INFOCOM Small-world model [Watts et al 1998] A network between order and randomness short-distance clustering (like regular graph) + long-distance shortcuts (result in short global path length like random graph) Local contact Shortcut An one-dimensional small-world network example

INFOCOM Kleinberg’s theorem [Kleinberg 1999] The network model consists of a one- dimensional linear network plus one long- distance shortcut for each node. The expected steps to delivery a message in the network model is O(log 2 n) when the shortcut for each node is chosen with the probability inversely proportional to the distance.

INFOCOM Clustering with randomness To improve routing performance, we want the routing table at node x to conform to the small- world model. Crucial Observation: Such clustering can be achieved by just changing the route-cache replacement policy S(x) Clustered keys Random key (shortcut) Key Space

INFOCOM Enhanced-clustering cache replacement scheme Each node chooses a seed randomly when joining the network When a new key (file) u is to be cached, the node chooses in the current datastore the key v farthest from the seed Distance (v, seed) = Max Distance (x, seed) If Distance ( u, seed) < Distance ( v, seed), cache u and evict v (clustering) If Distance ( u, seed) > Distance (v, seed), cache u and evict v with probability P (randomness) Can make P dependent on the two distances

INFOCOM Simulation Results (II) Fig. 3: Hit Ratio vs. Key Size Fig. 4: Avg. Hops per Successful Request vs. Key Size Enhanced-clustering with random shortcuts achieves both the highest hit ratio and the lowest avg. hops per successful request.

INFOCOM Network model: transit keys link nodes to nodes

INFOCOM An idealized model of Freenet from the node level

INFOCOM Theorem 1 In the idealized network model if each node x chooses its random shortcut so that the random shortcut has an endpoint y with probability proportional to 1/d where d = |s x - s y | E [Number of hops per request] = O(log 2 n) using Freenet’s search algorithm.

INFOCOM “misleading” links: two cases

INFOCOM Theorem 2 In the idealized network model considering the effect of “misleading” links if the routing table size is  (log 2 n) and the shortcuts are chosen in the same way as in Theorem.1 E [Number of hops per request] = using Freenet’s search algorithm. O(log 2 n)O(logn)

INFOCOM Conclusion SystemExpected hops per Request Expected Routing table size CAN [ Ratnaswamy et al 2001 ] O(dn 1/d )O(d) CHORD [Stoica et al 2001] O(logn) Tapestry [Zhao et al 2000] O(logn) Kleingbor’s unique Small-world model O(log 2 n)O(1) Freenet in the idealized model O(logn)O(log 2 n) Performance Comparison of several P2P systems