Bruce Hammer, Steve Wallis, Raymond Ho

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

2/66 GET /index.html HTTP/1.0 HTTP/ OK... Clients Server.
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Exercises for Chapter 10: Peer-to-Peer Systems
Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, © Addison-Wesley.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Peer-to-Peer Computing
Distributed Lookup Systems
Peer-To-Peer Systems Chapter 10 B. Ramamurthy. 6/25/2015B.RamamurthyPage 2 Introduction Monolithic application Simple client-server Multi-tier client-server.
1 Client-Server versus P2P  Client-server Computing  Purpose, definition, characteristics  Relationship to the GRID  Research issues  P2P Computing.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Storage management and caching in PAST PRESENTED BY BASKAR RETHINASABAPATHI 1.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
Introduction Widespread unstructured P2P network
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
JuxMem: An Adaptive Supportive Platform for Data Sharing on the Grid Gabriel Antoniu, Luc Bougé, Mathieu Jan IRISA / INRIA & ENS Cachan, France Workshop.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Bruce Hammer, Steve Wallis, Raymond Ho
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 10: Peer-to-Peer.
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Exercises for Chapter 10: Peer-to-Peer Systems Peer-to-Peer Systems
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Peer-to-peer systems Chapter Outline Introduction Napster and its legacy Peer-to-peer middleware Routing overlay Pastry 2.
Peer-to-peer systems Chapter Outline Introduction Napster and its legacy Peer-to-peer middleware Routing overlay Pastry 2.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Slides for Chapter 10: Peer-to-Peer Systems
1. 2 Tuesday, January 27, 2009 “In the confrontation between the stream and the rock, the stream always wins, not through strength but by perseverance.”
Peer to Peer Network Design Discovery and Routing algorithms
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
1 Tuesday, February 03, 2009 “Work expands to fill the time available for its completion.” - Parkinson’s 1st Law.
Peer-to-peer systems ”Sharing is caring”. Why P2P? Client-server systems limited by management and bandwidth P2P uses network resources at the edges.
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Web Systems Peer-to-Peer Systems Lecturer Department University.
Peer-to-Peer Information Systems Week 12: Naming
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
Peer-to-Peer Storage Systems
Peer-To-Peer Systems Chapter 10 B. Ramamurthy.
Peer-To-Peer Systems Chapter 10 B. Ramamurthy.
Peer-To-Peer Systems Chapter 10 B. Ramamurthy.
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Bruce Hammer, Steve Wallis, Raymond Ho Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.1: Introduction Peer-to-Peer Systems Where data and computational resources are contributed by many hosts Objective to balance network traffic and reduce the load on the primary host Management requires knowledge of all hosts, their accessibility, (distance in number of hops), availability and performance. They exploit existing naming, routing, data replication and security techniques in new ways Client-Server relationships are more transaction-based than defined as permanent roles. Peer-to-Peer elevates clients to servers – on an asynchronous basis Subordinate hosts need to be aware that they are participating in the peer-to-peer system Objective – to build a reliable resource sharing layer over an unreliable and untrusted collection of computers and networks Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.1: Introduction Goal of Peer-to-Peer Systems Sharing data and resources on a very large scale ‘Applications that exploit resources available at the edges of the Internet – storage, cycles, content, human presence’ (Shirky 2000) Uses data and computing resources available in the personal computers and workstations Eliminating any requirement for separately-managed servers and their associated infrastructure – Can use peer-to-peer within one company, but this relies on each subordinate host to maintain its own infrastructure The professor has mentioned the SETI@home project, Search for Extra-Terrestrial Intelligence, which partitions a stream of digitzed radio telescope data into 107-second work units, and parcels them out to personal computers on the network. This is controlled by one single server. SETI does not involve any communication or coordination between computers while they are processing the work units. Single message to central server. Design aims to deliver a service that is fully decentralized and self-organizing, dynamically balancing the storage and processing loades between all the participaating computers as computers join and leave the service Increasingly attractive as the performance difference narrows between host servers and personal computers Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.1: Introduction Characteristics of Peer-to-Peer Systems Each computer contributes resources All the nodes have the same functional capabilities and responsibilities No centrally-administered system Offers a limited degree of anonymity Algorithm for placing and accessing the data Balance workload, ensure availability Without adding undue overhead Napster legal problems need to add anonymity Not needed in corporate peer-to-peer systems Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.1: Introduction Evolution of Peer-to-Peer Systems Napster – download music, return address Freenet, Gnutella, Kazaa and BitTorrent More sophisticated – greater scalability, anonymity and fault tolerance Pastry, Tapestry, CAN, Chord, Kademlia Peer-to-peer middleware Steve will demonstrate BitTorrent Napster and Peer-to-Peer middleware are the next two presentations Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.1: Introduction Evolution (Continued) Immutable Files, (music, video) GUIDs (Globally Unique Identifiers) Middleware to provide better routing algorithms, react to outages Evolve to mutable files Application within one company’s intranet Globally Unique Identifiers, usually derived as a secure hash – from some or all of the resource’s state. (metioned in Chapter 7) The use of a secure hash makes a resource ‘self certifying’ The use of p2p that demand a high level of availability for the objects stored requires careful application design to avoid situations in all of the replicas are unavailable. The use of randomly-distributed GUIDs assists by distributing the object replicas to randomly-located nodes in the underlying network. Spans many organizations across the globe minimizes the risk. Bruce Hammer, Steve Wallis, Raymond Ho

10.2: Napster and its Legacy Bruce Hammer, Steve Wallis, Raymond Ho

10.2: Napster and Its Legacy Bruce Hammer, Steve Wallis, Raymond Ho

10.3: Peer-to-Peer Middleware Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.4: Routing Overlays Routing Overlays Sub-systems, APIs, within the peer-to-peer middleware Responsible for locating nodes and objects Implements a routing mechanism in the application layer Separate from any other routing mechanisms such as IP routing Ensures that any node can access any object by routing each request thru a sequence of nodes Exploits knowledge at each node to locate the destination Routing Overlay is a distributed algorithm Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.4: Routing Overlays GUIDs ‘pure’ names or opaque identifiers Reveal nothing about the locations of the objects Building blocks for routing overlays Computed from all or part of the state of the object using a function that deliver a value that is very likely to be unique. Uniqueness is then checked against all other GUIDs Not human readable From Section 9.1.1. pure names are simply uninterpreted bit patterns. Non-pure names contain information about the object that the name, e.g., the location. Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.4: Routing Overlays Tasks of a routing overlay Client submits a request including the object GUID, routing overlay routes the request to a node at which a replica of the object resides A node introduces a new object by computing its GUID and announces it to the routing overlay Clients can remove an object Nodes may join and leave the service Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.4: Routing Overlays Types of Routing Overlays DHT – Distributed Hash Tables DOLR – Distributed Object Location and Routing DOLR is a layer over the DHT that maps GUIDs and address of nodes DHT – GUIDs are stored based on the hash value DOLR – GUIDs host address is notified using the Publish() operation Bruce Hammer, Steve Wallis, Raymond Ho

10.5: Overlay Case Studies: Pastry, Tapestry Bruce Hammer, Steve Wallis, Raymond Ho

10.6: Application Case Studies: Squirrel, OceanStore, Ivy Squirrel Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.7: Summary Napster – immutable data, unsophisticated routing Current – mutable data, routing overlays, sophisticated algorithms Internet or company intranet support Distributed Computing (SETI) For the professor, Peer-to-Peer systems seem to be an evolving technology. Have there been significant changes since the book was published? Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.7: Summary Benefits of Peer-to-Peer Systems Ability to exploit unused resources (storage, processing) in the host computers Scalability to support large numbers of clients and hosts with load balancing of network links and host computer resources Self-organizing properties of the middleware platforms reduces costs Bruce Hammer, Steve Wallis, Raymond Ho

Bruce Hammer, Steve Wallis, Raymond Ho 10.7: Summary Weaknesses of Peer-to-Peer Systems Costly for the storage of mutable data compared to trusted, centralized service Can not yet guarantee anonymity to hosts Bruce Hammer, Steve Wallis, Raymond Ho

10: Peer-to-Peer Systems Questions???? Comments?? For the professor, This fields seems to be evolving rapidly, do you have interesting updates for us? Bruce Hammer, Steve Wallis, Raymond Ho