Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.

Slides:



Advertisements
Similar presentations
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
The Impact of DHT Routing Geometry on Resilience and Proximity New DHTs constantly proposed –CAN, Chord, Pastry, Tapestry, Plaxton, Viceroy, Kademlia,
Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group.
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Distributed Computing Group Keno Albrecht Ruedi Arnold Michael Gähwiler Roger.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
P2P Course, Structured systems 1 Introduction (26/10/05)
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Topology-Aware Overlay Networks By Huseyin Ozgur TAN.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Delivery, Forwarding and
Towards Efficient Load Balancing in Structured P2P Systems Yingwu Zhu, Yiming Hu University of Cincinnati.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Network Aware Resource Allocation in Distributed Clouds.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi, R. Gummadi..,S.Gribble, S. Ratnasamy, S. Shenker, I. Stoica.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Peer to Peer Network Design Discovery and Routing algorithms
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Information Systems Week 12: Naming
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Advanced Computer Networks
Introduction to Dynamic Routing Protocol
Link-Level Internet Structures
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Ch 13 WAN Technologies and Routing
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Distributed Hash Tables
S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord
CHAPTER 3 Architectures for Distributed Systems
Plethora: Infrastructure and System Design
Early Measurements of a Cluster-based Architecture for P2P Systems
PASTRY.
DHT Routing Geometries and Chord
Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service
Wide Area Networks (WANs), Routing, and Shortest Paths
Wide Area Networks (WANs), Routing, and Shortest Paths
Chapter 10 RWA 2019/5/9.
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
P2P: Distributed Hash Tables
Peer-to-Peer Information Systems Week 12: Naming
A. D. Sotiriou, P. Kalliaras, N. Mitrou
Presentation transcript:

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy

Overlay networks An overlay network is a logical network on top of one or more networks. E.g. Internet Main purpose of these networks is to provide effective means by which a huge amount of computing links are linked and accessed. Various distributed services can be built on top of these networks. Structured and Unstructured overlay networks.

Overlay networks Contd.. Unstructured overlay network – a peer joins the network by connecting itself to any node in the network. Structured overlay network – a peer joins the network by connecting itself to some other well-defined peers using a logical identifier.

Authors Byung-Gon Chun, U.C.Berkley Ben Y.Zhao, U.C.Santa Barbara John D.Kubiatowicz, U.C.Berkley

Impact of neighbor selection on performance and Resilience Introduction Related work Details of neighbor selection Impact of cost functions on Performance and Resilience Conclusion

Introduction Structured overlay networks provide routing to endpoints or nodes inside the network requiring logarithmic steps at each node. Nodes choose the neighbors based on optimization metrics. A recent study by Gummadi has shown that neighbor selection based on network proximity significantly increase overall performance. Problem – network imbalance.

Introduction Contd.. To better model neighbor selection across the networks, a generalized cost model is presented. Most current protocols only consider network proximity in neighbor selection This paper uses different models based on network proximity and network capacity. Study the impact they have on lookup latency and static resilience in tree and ring geometries.

Related Work Closest work was done by Gummadi. The authors quantified the impact of routing geometry on performance and resilience. Albert shows a correlation between scale-free nature of networks and resilience to attacks and failures. Several researchers propose optimizing the overlay construction of structured overlays using network proximity, but generally ignore CPU load, storage and bandwidth capacity.

Structured Overlay Construction Each node chooses neighbors that meet logical identifier constraints (e.g., prefix matching or identifier range) and builds direct links. These constraints are flexible such that a no. of nodes are possible for each routing table entry. The neighbor selection problem is reduced to cost minimization problem.

Cost Model Optimizing neighbor selection for node i means minimizing the sum of the cost from i to all nodes. Cost from i to j consists of two factors: node cost and edge cost. Node cost is the cost incurred by intermediate node- Edge cost is the cost incurred by the network links -

Cost Model Contd.. N = network size t (i, j) = traffic from i, to j. Cp (i,j) =cost of the path from i to j V(I,J) = intermediate nodes

Cost Model Contd.. This model captures the heterogeneity node capacity – a function of bandwidth, computation power, disk access time and so on. For structured networks such as Cord, Pastry and Tapestry cost function is defined as follows

Cost function in structured networks b = neighbor index nb = neighbor indexed by b Nb = no. of neighbors Rb = set of destination through nb cn(i) = node cost, ce(e) = edge cost Ce(k,l) = edge cost between k and l.

Neighbor selections Four neighbor selection models Random - choose neighbors randomly Dist – neighbors physically closest in the network Cap – neighbors with smallest processing delay DistCap – neighbors with smallest combined delay (sum of node processing delay and overlay link delay)

Cost functions studied Cn(i) - processing delay in node i Ce(i, nb) -direct overlay link delay between node I and node nb.

Simulation - set up Simulate Tapestry and Chord protocols as representatives of tree and ring structures. Simulations use 5100 node network topologies. Each node in Chord forwards messages to the live neighbor closest to the destination. Look up fails if all neighbors before the destination in the namespace fail. For tapestry each node forwards messages to the first live neighbor matching one more prefix digit. If all primary and backup links in the routing entry fail, the lookup fails.

Simulation results - Performance Two different distributions of node processing delay. Uniform and Bimodal distributions In Uniform we assign the processing delay uniformly from a/10, 2a/10. … a where a is the max processing delay. In Bimodal, nodes are either fast or slow. Fast nodes can process 100 messages/sec and slow nodes process 1 message/sec.

Simulation Results - Uniform

Simulation Results - Bimodal

Simulation Results – Static Resilience Measure resilience as the proportion of all pairs of live nodes that can still route to each other after an external event, either randomized node failures or targeted attacks. Assumptions - attacks focus on removing nodes with the highest in-degree in order to maximize damage to overall network reachability. Assume nodes have an uniform processing delay distribution with a=0.5s

Satic Resilience For Tapestry, examine resilience of the base protocol, base protocol plus additional backup routes (all chosen using the neighbor selection algorithms), base protocol plus backup routes chosen at random. For chord we examine the base protocol, base protocol plus sequential neighbors.

Random node failures - Tapestry

Random Node failure - Chord

Targeted node attacks - Tapestry

Targeted node attacks - Chord

Simulation Results Attacking nodes with high in-degree affects network connectivity severely. Random shows the best attack tolerance among neighbor selections CapDist has the worst attack tolerance than Dist, although it has better performance. This result demonstrates tradeoff between performance and attack resilience in structured P2P overlay construction.

Conclusion and Future Work Took a quantitative approach to examine the benefits and costs of considering network or physical characteristics in overlay construction The choice of neighbor selection algorithm drives a tradeoff between performance and resilience. If high degree nodes are attacked the impact on network connectivity is severe. As future work investigate the resilience of different geometries under different neighbor selection algorithms.