Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
PDPTA03, Las Vegas, June S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
YAPPERS: A Peer-to-Peer Lookup Service over Arbitrary Topology Qixiang Sun Prasanna Ganesan Hector Garcia-Molina Stanford University.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Overlay Networks EECS 122: Lecture 18 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Searching in Unstructured Networks Joining Theory with P-P2P.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
P2P Course, Structured systems 1 Skip Net (9/11/05)
Topology-Aware Overlay Networks By Huseyin Ozgur TAN.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Distributed Hash Table Systems Hui Zhang University of Southern California.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Optimisation des DHT à partir des propriétés physiques, logiques et sociologiques des clients Pierre Fraigniaud CNRS LRI, Univ. Paris-Sud
Hot Topics in Peer-to-Peer Computing (HOT-P2P 2004) Volendam 08 October 2004 Non-uniform deterministic routing on F-Chord(  ) Gennaro Cordasco, Luisa.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
The Design of A Distributed Rating Scheme for Peer-to-peer Systems Debojyoti Dutta 1, Ashish Goel 2, Ramesh Govindan 1, Hui Zhang 1 1 University of Southern.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
15 November 2005LCN Collision Detection and Resolution in Hierarchical Peer-to-Peer Systems Verdi March 1, Yong Meng Teo 1,2, Hock Beng Lim 2, Peter.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peter R Pietzuch and Jean Bacon Peer-to-Peer Overlay Networks in an Event-Based Middleware DEBS’03, San Diego, CA, USA,
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Middleware issues: From P2P systems to Ad Hoc Networks
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
The Chord P2P Network Some slides taken from the original presentation by the authors.
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
Improving and Generalizing Chord
Zhichen Xu, Mallik Mahalingam, Magnus Karlsson
Presentation transcript:

Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California 2 Stanford University

6/14/2003Sigmetrics'032 Outline Latency stretch problem in Distributed Hash Table (DHT) systems, with Chord as an example Two “latency stretch” theorems Lookup-Parasitic Random Sampling (LPRS) Simulation & Internet measurement results Conclusion & future work

6/14/2003Sigmetrics'033 DHT systems A new class of peer-to-peer routing infrastructures  CAN, Chord, Pastry, Tapestry, etc. Support a hash table-like functionality on Internet- like scale  a global key space: each data item is a key in the space, and each node is responsible for a portion of the key space.  given a key, map it onto a node. Our research results apply to frugal DHT systems.  The search space for the key decreases by a constant factor after each lookup hop.  Examples: Chord, Pastry, Tapestry.

6/14/2003Sigmetrics'034 Chord – key space A Chord network with 8 nodes and 8-bit key space Network node Data 120

6/14/2003Sigmetrics'035 Chord – routing table setup A Chord network with N(=8) nodes and m(=8)-bit key space Network node [1,2) Range 1 [2,4) Range 2 [4,8) Range 3 [8,16) Range 4 [16,32) Range 5 [32,64) Range 6 [64,128) Range 7 [128,256) Range 8 Data Pointer In node i’s routing table: One entry is created to point to to the first node in its jth ranges [i+2 j-1, i+2 j ), 1  j  m.

6/14/2003Sigmetrics'036 Latency stretch in Chord Network node Data 255 Overlay routing physical link U.S.AChina A Chord network with N(=8) nodes and m(=8)-bit key space

6/14/2003Sigmetrics'037 Latency stretch [Ratnasamy et al. 2001] = latency for each lookup on the overlay topology average latency on the underlying topology In Chord,  (logN) hops per lookup in average   (logN) stretch in original Chord.  Could Chord do better, e.g., O(1) stretch, without much change?

6/14/2003Sigmetrics'038 Our contributions Theory  Latency expansion characteristic of the underlying network topology decides latency optimization in frugal DHT systems.  Exponential latency expansion: bad news.  Power-law latency expansion: good news. System  Lookup-Parasitic Random Sample (LPRS), an incremental latency optimization technique.  Achieve O(1) stretch under power-law latency topologies. Internet measurement.  The Internet router-level topology resembles power-law latency expansion.

6/14/2003Sigmetrics'039 Latency expansion Let N u (x) denote the number of nodes in the network G that are within latency x of node u. - power-law latency expansion: N u (x) grows (i.e. ``expands'‘) proportionally to x d, for all nodes u.  Examples: ring (d=1), mesh (d=2). - exponential latency expansion: N u (x) grows proportionally to  x for some constant  > 1.  Examples: random graphs.

6/14/2003Sigmetrics'0310 “Latency-stretch” theorem - I “Bad news” Theorem If the underlying topology G is drawn from a family of graphs with exponential latency expansion, then the expected latency of Chord is  (LlogN), where L is the expected latency between pairs of nodes in G. Chord node The worse-case scenario: equal-distance Physical link Router

6/14/2003Sigmetrics'0311 “Latency-stretch” theorem - II “Good news” Theorem If (1) the underlying topology G is drawn from a family of graphs with d-power-law latency expansion, and (2) for each node u in the Chord network, it samples (log N) d nodes in each range with uniform randomness and keeps the pointer to the nearest node for future routing, then the expected latency of a request is O(L), where L is the expected latency between pairs of nodes in G.

6/14/2003Sigmetrics'0312 Two remaining questions How does each node efficiently achieve (log N) d samples from each range? Do real networks have power-law latency expansion characteristic?

6/14/2003Sigmetrics'0313 Uniform sampling in terms of ranges For a routing request with  (log N) hops, final node t will be a random node in  (log N) different ranges Node x: the node at hop x Node 0: the request initiator Node t: the request terminator routing path Node 0 node t is in its range-d Node 1 node t is in its range-x (< d) Node 2 node t is in its range-y (< x) Node t

6/14/2003Sigmetrics'0314 Lookup-Parasitic Random Sampling 1.Recursive lookup. 2.Each intermediate hop appends its IP address to the lookup message. 3.When the lookup reaches its target, the target informs each listed hop of its identity. 4.Each intermediate hop then sends one (or a small number) of pings to get a reasonable estimate of the latency to the target, and update its routing table accordingly.

6/14/2003Sigmetrics'0315 LPRS-Chord: convergence time Convergence Time

6/14/2003Sigmetrics'0316 LPRS-Chord: topology with power-law expansion Ring Stretch (at time 2logN)

6/14/2003Sigmetrics'0317 What’s the latency expansion characteristic of Internet? on the end-user level on the router level

6/14/2003Sigmetrics'0318 Internet router-level topology: latency measurement Approximate link latency by geographical latency - assign geo-locations to nodes using Geotrack [Padmanabhan2001]. A large router-level topology dataset - 320,735 nodes, mapped to 603 distinct cities all over the world. - 92,824 node pairs are sampled to tractably compute the latency expansion of this large topology.

6/14/2003Sigmetrics'0319 Internet router-level topology: latency expansion

6/14/2003Sigmetrics'0320 LPRS-Chord on router-level topology Stretch on the router-level subgraphs (at time 2logN)

6/14/2003Sigmetrics'0321 Conclusion LPRS has significant practical applicability as a general latency reduction technique for frugal DHT systems. Future work - Studying the interaction of LPRS scheme with the dynamics of P2P systems.

6/14/2003Sigmetrics'0322 Thank you!

6/14/2003Sigmetrics'0323 Backup slides

6/14/2003Sigmetrics'0324 A simple random sampling solution Network node 0 A Chord network with m-bit key space 2 m -1 Pointer 2 m-1 2 m-2 Distance measurement

6/14/2003Sigmetrics'0325 A simple random sampling solution Network node 0 A Chord network with m-bit key space 2 m -1 Pointer 2 m-1 2 m-2 Distance measurement

6/14/2003Sigmetrics'0326 Term definition (II) Range - for a given node in a Chord overlay with ID j, its i-th range R i (j) is the interval [j+2 i-1, j+2 i ) on the key space, where 1  i  m. Frugal routing 1. after each hop, the search space for the target reduces by a constant factor, and 2. If w is an intermediate node in the route, v is the destination, and v  R i (w), then the node after w in the route depends only on w and i.

6/14/2003Sigmetrics'0327 LPRS-Chord: simulation methodology Phase 1. N nodes join the network one-by-one. Phase 2. each node on average inserts four documents into the network. Phase 3. each node generates, on average 3logN data requests one-by-one. - LPRS actions are enabled only in Phase 3 - Performance measurement begins at Phase 3

6/14/2003Sigmetrics'0328 Comparison of 5 sampling strategies: definitions Consider a lookup that is initiated by node x 0, then forwarded to node x 1, x 2,..., and finally reaches the request terminator, node x n : 1. Node x i samples node x n, 0  i < n 2. Node x n samples nodes x 0, …, x n-1 3. Node x i samples node x i-1, 1  i  n 4. Node x 0 samples nodes x n 5. Node x i samples node x 0, 0 < i  n

6/14/2003Sigmetrics'0329 Comparison of 5 sampling strategies: simulation result

6/14/2003Sigmetrics'0330 Zipf-ian document popularity

6/14/2003Sigmetrics'0331 Impact of skewed request distributions