Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
1 Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network (CAN) ACIRI U.C.Berkeley Tahoe Networks.
Looking Up Data in P2P Systems Hari Balakrishnan M.Frans Kaashoek David Karger Robert Morris Ion Stoica.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Distributed Lookup Systems
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network ACIRI U.C.Berkeley Tahoe Networks 1.
Tapestry: Decentralized Routing and Location System Seminar S ‘01 Ben Y. Zhao CS Division, U. C. Berkeley.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network ACIRI U.C.Berkeley Tahoe Networks 1.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
CSE 461 University of Washington1 Topic Peer-to-peer content delivery – Runs without dedicated infrastructure – BitTorrent as an example Peer.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam.
Wide-Area Cooperative Storage with CFS Robert Morris Frank Dabek, M. Frans Kaashoek, David Karger, Ion Stoica MIT and Berkeley.
Security Considerations for Structured p2p Peng Wang 6/04/2003.
CONTENT ADDRESSABLE NETWORK Sylvia Ratsanamy, Mark Handley Paul Francis, Richard Karp Scott Shenker.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Applied Research Laboratory David E. Taylor A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker.
Sylvia Ratnasamy (UC Berkley Dissertation 2002) Paul Francis Mark Handley Richard Karp Scott Shenker A Scalable, Content Addressable Network Slides by.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
1 Slides from Richard Yang with minor modification Peer-to-Peer Systems: DHT and Swarming.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Dr. Yingwu Zhu.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
1 Distributed Hash Tables and Structured P2P Systems Ningfang Mi September 27, 2004.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Simple Load Balancing for Distributed Hash tables
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
EE 122: Peer-to-Peer (P2P) Networks
A Scalable, Content-Addressable Network
Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service
Tapestry: Scalable and Fault-tolerant Routing and Location
A Scalable Content Addressable Network
A Scalable, Content-Addressable Network
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
P2P: Distributed Hash Tables
#02 Peer to Peer Networking
Presentation transcript:

Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms

Decentralized Discovery mechanisms Centralized indexes and repositories Flooding broadcast of queries Selective forwarding/routing of queries Decentralized hashing index systems Distributed indexes and repositories

Centralized indexes and repositories

Napster 1 Central Napster server (xyz.mp3, ) From Sylvia Ratnasamy Berkeley

Napster 2 Central Napster server xyz.mp3 ? From Sylvia Ratnasamy Berkeley

Napster 3 Central Napster server xyz.mp3 ? From Sylvia Ratnasamy Berkeley

Drawbacks Advantages Single point of failure Scalability Cost increases with popularity Lawsuits Performance Control of accesses

Decentralized Discovery mechanisms Centralized indexes and repositories Flooding broadcast of queries Selective forwarding/routing of queries Decentralized hashing index systems Distributed indexes and repositories

Flooding broadcast

From Sylvia Ratnasamy Berkeley Gnutella step 1

xyz.mp3 ? From Sylvia Ratnasamy Berkeley Gnutella step 2

Gnutella step 3 From Sylvia Ratnasamy Berkeley

xyz.mp3 Gnutella step 4 From Sylvia Ratnasamy Berkeley

Drawbacks Advantages Message broadcasting becomes a problem as popularity increases due to bandwidth requirements Susceptible to malicious attacks Simple Efficient Flexible query interpretation Reliable in small networks

Decentralized Discovery mechanisms Centralized indexes and repositories Flooding broadcast of queries Selective forwarding/routing of queries Decentralized hashing index systems Distributed indexes and repositories

Clip2 Reflector (Gnutella) CANCELLED

FastTrack (KaZaA Morpheus) Nodes become supernodes automatically if they have sufficient bandwidth and processing power.

Drawbacks Advantages Susceptible to malicious activities Too much importance on Super Nodes Each peer must contain additional information used to route or direct queries received. Performance Scalability Fault-Tolerance

Decentralized Discovery mechanisms Centralized indexes and repositories Flooding broadcast of queries Selective forwarding/routing of queries Decentralized hashing index systems Distributed indexes and repositories

Selective forwarding of queries Chord Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan; MIT Content-Addressable Networks Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker; UC Berkeley Pastry Antony Rowstron (Rice University) and Peter Druschel (Microsoft) Tapestry Ben Y. Zhao, John Kubiatowicz and Anthony D.Joseph UC Berkeley

N4N4 Publisher Client N6N6 N9N9 N7N7 N8N8 N3N3 N2N2 N1N1 Lookup(“title”) Key=“title” Value=MP3 data… Concept From Robert Morris MIT

Chord 1 N32 N90 N105 K80 K20 K5 Circular 7-bit ID space Key 5 Node 105 A key is stored at its successor: node with next higher ID

Chord 2 N32 N90 N105 N60 N10 N120 K80 “Where is key 80?” “N90 has K80”

Content-Addressable Networks - CAN hash(K) = (a,b) (K,V) retrieve (K) insert (K,V) (a,b)

Bootstrap node 1) Discover some node “I” already in CAN new node CAN Node Insertion

I Bootstrap node new node 1) Discover some node “I” already in CAN CAN Node Insertion

2) pick random point in space I (p,q) new node CAN Node Insertion

(p,q) 3) I routes to (p,q), discovers node J I J new node CAN Node Insertion

new J 4) split J’s zone in half… new owns one half CAN Node Insertion

Example: Octal digits, 2 18 namespace,  Neighbor Map For “5712” (Octal) Routing Levels 1234 xxx xxx0 xxx3 xxx4 xxx5 xxx6 xxx7 xx xx22 xx32 xx42 xx52 xx62 xx72 x012 x112 x212 x312 x412 x512 x Plaxton Rajamaran Richa

PASTRY TAPESTRY Based on Plaxton Rajamaran Richa algorithm but have additional support for dynamic node insertion and deletion. Node insertion: Node N requests a new ID and contacts a Gateway G. Neighbor maps tables are updated along each hop. Minor differences in object replications and routing distances calculation.

Comparing Key Metrics Properties –Parameter –Logical Path Length –Neighbor-state –Routing Overhead (RDP) –Messages to insert –Mutability –Load-balancing Tapestry ChordCANPastry Log b N Log 2 N O(d*N 1/d ) O(d) Base b bLog b N O(1)  O(1) O(1) ? App-dep. App-depImmut. ??? Good Log b N Log 2 N NoneDimen dBase b bLog b N+O(b) O(Log 2 2 N)O(d*N 1/d ) Good O(Log b 2 N)O(Log b N) Designed as P2P Indices

Drawbacks Advantages No keyword search Susceptible of malicious activities Scalable Fault Tolerant Common Applications: Storage systems Application-level multicasts Event Notification

Decentralized Discovery mechanisms Centralized indexes and repositories Flooding broadcast of queries Selective forwarding/routing of queries Decentralized hashing index systems Distributed indexes and repositories

Clients Content Broker Content Distribution Networks

Drawbacks Advantages Infrastructure difficult to setup Cost Cache Coherence “Slash-Dot” effect Low latency delivery of content Cuts ISP’s bandwidth costs Load balancing QoS is possible Centrally managed, pre- installed network

Conclusion Not one system fits-all Drawbacks for all systems include malicious activities Business-oriented and Research discovery mechanisms will merge Links: