Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Storage management and caching in PAST Antony Rowstron and Peter Druschel Presented to cs294-4 by Owen Cooper.
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
Storage management and caching in PAST, a large-scale, persistent peer- to-peer storage utility Antony Rowstron, Peter Druschel.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
SCRIBE A large-scale and decentralized application-level multicast infrastructure.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Bowstron & Peter Druschel Presented by: Long Zhang.
Small-world Overlay P2P Network
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Pastry Partially borrowed for Gabi Kliot. Pastry Scalable, decentralized object location and routing for large-scale peer-to-peer systems  Antony Rowstron.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
SkipNet: A Scaleable Overlay Network With Practical Locality Properties Presented by Rachel Rubin CS294-4: Peer-to-Peer Systems By Nicholas Harvey, Michael.
Pastry And Squirrel Presented by Eirik T. Laberg Håvard Semundseth Orri G. Pálsson.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications 吳俊興 國立高雄大學 資訊工程學系 Spring 2006 EEF582 – Internet Applications and Services 網路應用與服務.
P2P Course, Structured systems 1 Skip Net (9/11/05)
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Tapestry An off-the-wall routing protocol? Presented by Peter, Erik, and Morten.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 10: Peer-to-Peer.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Squirrel: A decentralized peer-to- peer web cache Paper by Sitaram Iyer, Antony Rowstron and Peter Druschel (© 2002) Presentation* by Alexander Prohaska.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Networks 03 CAN (Content Addressable Network) Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Middleware issues: From P2P systems to Ad Hoc Networks
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony I.T.
Peer-to-Peer Networks 11 Past Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Peer-to-Peer Networks 11 Past Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Peer-to-Peer Networks 04: Chord Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Peer-to-Peer Networks 07 Degree Optimal Networks
Accessing nearby copies of replicated objects
PASTRY.
Presentation transcript:

Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Pastry  Peter Druschel -Rice University, Houston, Texas -now head of Max-Planck-Institute for Computer Science, Saarbrücken/Kaiserslautern  Antony Rowstron -Microsoft Research, Cambridge, GB  Developed in Cambridge (Microsoft Research)  Pastry -Scalable, decentralized object location and routing for large scale peer-to- peer-network  PAST -A large-scale, persistent peer-to-peer storage utility  Two names one P2P network -PAST is an application for Pastry enabling the full P2P data storage functionality -We concentrate on Pastry 2

Pastry Overview  Each peer has a 128-bit ID: nodeID -unique and uniformly distributed -e.g. use cryptographic function applied to IP-address  Routing -Keys are matched to {0,1} 128 -According to a metric messages are distributed to the neighbor next to the target  Routing table has O(2 b (log n)/b) + l entries -n: number of peers -l : configuration parameter -b: word length typical: b= 4 (base 16), l = 16 message delivery is guaranteed as long as less than l /2 neighbored peers fail  Inserting a peer and finding a key needs O((log n)/b) messages 7

Routing Table  NodeId presented in base 2 b -e.g. NodeID: 65A0BA13  For each prefix p and letter x ∈ {0,..,2 b - 1} add an peer of form px* to the routing table of NodeID, e.g. -b=4, 2 b = entries for 0*,1*,.. F* -15 entries for 60*, 61*,... 6F* if no peer of the form exists, then the entry remains empty  Choose next neighbor according to a distance metric -metric results from the RTT (round trip time)  In addition choose l neighbors -l /2 with next higher ID -l /2 with next lower ID 8

Routing Table  Example b=2  Routing Table -For each prefix p and letter x ∈ {0,..,2 b -1} add an peer of form px* to the routing table of NodeID  In addition choose l neighors -l /2 with next higher ID -l /2 with next lower ID  Observation -The leaf-set alone can be used to find a target  Theorem -With high probability there are at most O(2 b (log n)/b) entries in each routing table 10

Routing Table  Theorem -With high probability there are at most O(2 b (log n)/b) entries in each routing table  Proof -The probability that a peer gets the same m-digit prefix is -The probability that a m-digit prefix is unused is -For m=c (log n)/b we get -With (extremely) high probability there is no peer with the same prefix of length (1+ε)(log n)/b -Hence we have (1+ε)(log n)/b rows with 2 b -1 entries each 11

A Peer Enters  New node x sends message to the node z with the longest common prefix p  x receives -routing table of z -leaf set of z  z updates leaf-set  x informs informiert l -leaf set  x informs peers in routing table -with same prefix p (if l /2 < 2 b )  Numbor of messages for adding a peer -l messages to the leaf-set -expected (2 b - l /2) messages to nodes with common prefix -one message to z with answer 13

When the Entry-Operation Errs  Inheriting the next neighbor routing table does not allows work perfectly  Example -If no peer with 1* exists then all other peers have to point to the new node -Inserting knows from its routing table 22,33 00,01, knows from the leaf-set 01,02,20,21  11 cannot add all necessary links to the routing tables 16 new peer entries in leaf set necessary entries in leaf set missing entries

missing link request to known neighbors links of neighbors Missing Entries in the Routing Table  Assume the entry R i j is missing at peer D -j-th row and i-th column of the routing table  This is noticed if message of a peer with such a prefix is received  This may also happen if a peer leaves the network  Contact peers in the same row -if they know a peer this address is copied  If this fails then perform routing to the missing link 17

Lookup  Compute the target ID using the hash function  If the address is within the l -leaf set -the message is sent directly -or it discovers that the target is missing  Else use the address in the routing table to forward the mesage  If this fails take best fit from all addresses 18

Lookup in Detail  L: l -leafset  R:routing table  M: nodes in the vicinity of D (according to RTT)  D: key  A:nodeID of current peer  R i l : j-th row and i-th column of the routing table  L i : numbering of the leaf set  D i : i-th digit of key D  shl(A): length of the larges common prefix of A and D (shared header length) 19

Routing — Discussion  If the Routing-Table is correct -routing needs O((log n)/b) messages  As long as the leaf-set is correct -routing needs O(n/l) messages -unrealistic worst case since even damaged routing tables allow dramatic speedup  Routing does not use the real distances -M is used only if errors in the routing table occur -using locality improvements are possible  Thus, Pastry uses heuristics for improving the lookup time -these are applied to the last, most expensive, hops 23

Localization of the k Nearest Peers  Leaf-set peers are not near, e.g. -New Zealand, California, India,...  TCP protocol measures latency -latencies (RTT) can define a metric -this forms the foundation for finding the nearest peers  All methods of Pastry are based on heuristics -i.e. no rigorous (mathematical) proof of efficiency  Assumption: metric is Euclidean 24

Locality in the Routing Table  Assumption -When a peer is inserted the peers contacts a near peer -All peers have optimized routing tables  But: -The first contact is not necessary near according to the node-ID  1st step -Copy entries of the first row of the routing table of P good approximation because of the triangle inequality (metric)  2nd step -Contact fitting peer p‘ of p with the same first letter -Again the entries are relatively close  Repeat these steps until all entries are updated 27

Locality in the Routing Table  In the best case -each entry in the routing table is optimal w.r.t. distance metric -this does not lead to the shortest path  There is hope for short lookup times -with the length of the common prefix the latency metric grows exponentially -the last hops are the most expensive ones -here the leaf-set entries help 28

Localization of Near Nodes  Node-ID metric and latency metric are not compatible  If data is replicated on k peers then peers with similar Node-ID might be missed  Here, a heuristic is used  Experiments validate this approach 29

Experimental Results — Scalability  Parameter b=4, l=16, M=32  In this experiment the hop distance grows logarithmically with the number of nodes  The analysis predicts O(log n)  Fits well 30

Experimental Results Distribution of Hops 31  Parameter b=4, l=16, M=32, n = 100,000  Result -deviation from the expected hop distance is extremely small  Analysis predicts difference with extremely small probability -fits well

Experimental Results — Latency  Parameter b=4, l=16, M=3  Compared to the shortest path astonishingly small -seems to be constant 32

Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg