Middleware issues: From P2P systems to Ad Hoc Networks

Slides:



Advertisements
Similar presentations
Peer to Peer and Distributed Hash Tables
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Pastry Partially borrowed for Gabi Kliot. Pastry Scalable, decentralized object location and routing for large-scale peer-to-peer systems  Antony Rowstron.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Peer-to-Peer.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
MobileMAN Internal meetingHelsinki, June 8 th 2004 NETikos activity in MobileMAN project Veronica Vanni NETikos S.p.A.
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Routing & Middleware: Experiments Eleonora Borgia, Franca Delmastro, and Luciana Pelusi Pervasive Computing & Networking Lab. (PerLab) IIT-CNR Pisa.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 A Context Discovery Middleware for Context-Aware Applications with Heterogeneous Sensors Yu-Min Tseng.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
HSLS R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN Project - Helsinki.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peter R Pietzuch and Jean Bacon Peer-to-Peer Overlay Networks in an Event-Based Middleware DEBS’03, San Diego, CA, USA,
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
PeerNet: Pushing Peer-to-Peer Down the Stack Jakob Eriksson, Michalis Faloutsos, Srikanth Krishnamurthy University of California, Riverside.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
ECE453 – Introduction to Computer Networks
Presentation transcript:

Middleware issues: From P2P systems to Ad Hoc Networks Franca Delmastro franca.delmastro@iit.cnr.it Pervasive Computing & Networking Lab (PerLab) IIT-CNR Pisa MobileMAN Project Helsinki, June 7th 2004

Middleware for Ad Hoc networks Ad Hoc networks and P2P systems: The distribution of services and data can fit well with the decentralized nature of Ad Hoc networks In both cases nodes interactions are temporary Resources are distributed among heterogeneous nodes Systems must be reliable in case of node failures and disconnections events

The fundamentals of the structured overlay network CAN, Chord, Pastry et al. represents a family of middleware solutions for large-scale P2P systems They use a Distributed Hash Function (DHT) to map physical addresses to a logical address space Information and workload are uniformely distributed on the network System scalability with the number of nodes is the main objective for ad hoc networks

The Pastry model The overlay network is a circular address space where nodes and data are logically mapped. There is no correspondence between logical and physical distances Subject-based routing reduce the lookup cost to a logarithmic cost There are a lot of applications implemented for this solution, and many others are adaptable to this routing policy

Logical & Physical distances Pastry Ring 2128 - 1

The Pastry Ring L1 X2 L2 X1 (K1 ,V) (K2 ,V) L1 = H(K1) L2 = H(K2 ) X1 = H(N1) N2 X2 = H(N2) L2 L1 2128 - 1 X2 X1

Pastry routing tables 2128 - 1 02212102 10233001 10233102 10233232 2128 - 1 02212102 11301233 10323302

Pastry Multi-hop Routing 23301101 23301201 33301201 2128 - 1 22301203 10233102 02212102 bestMatch(RoutingTable[0], 23302121 ) = 22301203 Route(23302121) 23000101 Compare(10233102, 23302121) = 0

Joining the Ring X has to know a own physical neighbor already present in the ring (node A) A sends a message with key equal to X Pastry Routing table of node X is initialized using routing tables of contacted nodes: LS(X) = LS(Z) NS(X) = NS(A) RT(X) is a join of the routing tables of other nodes, according to the prefix shared metric 2128 - 1 X Route(X) Z Bk B2 X Join(X) A B1

Disconnection from the ring Each node executes a polling procedure to discover “remote” nodes status (referred only to routing table knowledge). A “remote” node is considered disconnected from the Pastry network if it doesn’t answer to a polling message before a timeout expiration After a disconnection event, the sender of the polling message has to update its routing tables contacting other “remote” nodes to fill in entries related to that node.

Pastry Pros & Cons Pros: Cons: DHT allows an uniform distribution of IDs and workload on nodes providing the service The subject-based routing defines a logarithmic lookup cost on the network dimension (O(log N)) A lot of application can adapt their contents to this routing strategy Cons: Routing tables management based on remote connections can be a big overhead for ad hoc networks Forcing the network routing with the subject-based policy can reduce network performances

Using Cross-Layer to CROSS-ROAD CROSS-layer Ring Overlay for AD hoc networks In order to build an overlay network, the middleware can directly use the Network Routing table. Node ID = H(IPaddress) Since each ring is associated to a service, the routing protocol has to provide Service Location Using a proactive LINK- STATE routing protocol, each node knows the entire network NeSt Applications Middleware Transport Network MAC

Hazy Sighted Link-State Optimization of Proactive routing protocols Each node sends periodical LSU packets on the network with frequencies inversary proportional to the routing hops number. “Hazy” knowledge of distant nodes. Their status is not frequently updated as the 1-hop neighbors. (*) C. Santivanez, I. Stavrakakis et al., “Making Link-State Routing Scale for Ad Hoc Networks”, MobiHoc 2001 (*) C. Santivanez, I. Stavrakakis et al., “On the Scalability of Ad Hoc Routing Protocols”, INFOCOM 2002

Nodes providing service S CROSS-ROAD overlay Working hypothesis: The Network level gives a graph representing the network topology to the Nest Each node has to be characterized by at least: (IPaddress, Services, 1hop-neighbors) The middleware level can access to this graph and recover relevant information for itself Middleware level A B A Network level B Nodes providing service S Ad Hoc Network nodes

Interactions with NeSt Network Data Abstraction Middleware Node A Middleware Network NeSt Data Abstraction Node B Local Provided services LSU routing pkt containing services publications and topology updates Application messages Topology update and remote services

CROSS-ROAD Routing Tables Each node defines the ring autonomously CROSS-ROAD routing table contains only nodes provide the service (Leafset and Neighborset disappear) Middleware routing protocol is limited to a peer-to-peer connection Messages forwarding is realized by the network routing protocol CROSS-ROAD Routing Table Destination ID = H(IP address) Cost Network Routing Table Destination IP address Next Hop IP add. Cost Services

Pastry vs CROSS-ROAD CROSS-ROAD: PASTRY: Join operation does not require remote connections: each node can build its ring autonomously PASTRY: Join operation requires many remote connections to recover routing tables contents HIGH COST at middleware level NO COST at middleware level

Pastry vs CROSS-ROAD PASTRY: CROSS-ROAD: The detection of disconnection events requires polling cycles towards remote nodes CROSS-ROAD: Disconnection events are detected by the netwrok routing protocol through LSU packets HIGH COST at middleware level NO COST at middleware level

Pastry vs CROSS-ROAD PASTRY: CROSS-ROAD: Routing table fixed size involves a not complete knowledge of the network CROSS-ROAD: Routing table size depends on the number of nodes taking part to the service HIGH COST for tables management due to remote connections following topology updates NO COST at middleware level: local interactions with NeSt are sufficient to update routing tables

Pastry vs CROSS-ROAD PASTRY: CROSS-ROAD: Subject-based routing involves a multi-hop middleware routing CROSS-ROAD: Subject-based routing involves a peer-to-peer connection O(log(N)) middleware lookup cost O(1) middleware lookup cost, the remaining is a routing task

CROSS-ROAD Software Architecture