Peer-to-Peer Networks 07 Degree Optimal Networks

Slides:



Advertisements
Similar presentations
Peer to Peer and Distributed Hash Tables
Advertisements

Applied Algorithmics - week7
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Viceroy: Scalable Emulation of Butterfly Networks For Distributed Hash Tables By: Dahlia Malkhi, Moni Naor & David Ratajzcak Nov. 11, 2003 Presented by.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Shuffle Exchange Network and de Bruijn’s Graph Shuffle Exchange graph Merge exchange into a single node De Bruijn.
Interconnection Network Topologies
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Examples Broadcasting and Gossiping. Broadcast on ring (Safe and Forward)
03/01/2005Tucker, Sec Applied Combinatorics, 4th Ed. Alan Tucker Section 3.1 Properties of Trees Prepared by Joshua Schoenly and Kathleen McNamara.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Interval Routing Presented by: Marc Segal. Motivation(1) In a computer network a routing method is required so that nodes can communicate with each other.
1 Koorde: A Simple Degree Optimal DHT Frans Kaashoek, David Karger MIT Brought to you by the IRIS project.
Proof of Kleinberg’s small-world theorems
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Optimisation des DHT à partir des propriétés physiques, logiques et sociologiques des clients Pierre Fraigniaud CNRS LRI, Univ. Paris-Sud
Searching via Your Neighbor’s Neighbor: The Power of Lookahead in P2P Networks Moni Naor Udi Wieder The Weizmann Institute of Science Gurmeet Manku Stanford.
Hot Topics in Peer-to-Peer Computing (HOT-P2P 2004) Volendam 08 October 2004 Non-uniform deterministic routing on F-Chord(  ) Gennaro Cordasco, Luisa.
 Rooted tree and binary tree  Theorem 5.19: A full binary tree with t leaves contains i=t-1 internal vertices.
Dynamic Networks for Peer-to-Peer Systems Pierre Fraigniaud CNRS LRI, Univ. Paris Sud Joint work with Philippe Gauron.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Dynamic Networks for Peer-to-Peer Systems Pierre Fraigniaud CNRS Lab. de Recherche en Informatique (LRI) Univ. Paris-Sud, Orsay Joint work with Philippe.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Peer-to-Peer Networks 03 CAN (Content Addressable Network) Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Sketching complexity of graph cuts Alexandr Andoni joint work with: Robi Krauthgamer, David Woodruff.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
1 dBBlue:Low Diameter and Self-routing Bluetooth Scatternet Wen-Zhan Song, Xiang-Yang Li, Yu Wang and Weizhao Wang Department of Computer Science Illinois.
5.6 Prefix codes and optimal tree Definition 31: Codes with this property which the bit string for a letter never occurs as the first part of the bit string.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Peer-to-Peer Networks 04: Chord Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Small-world phenomenon: An Algorithmic Perspective Jon Kleinberg.
Trees.
Peer-to-Peer Networks 09 Random Graphs for Peer-to-Peer-Networks Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University.
Peer-to-Peer Networks 07 Degree Optimal Networks
New Characterizations in Turnstile Streams with Applications
Peer-to-Peer Networks 09 Random Graphs for Peer-to-Peer-Networks
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Computability and Complexity
MST in Log-Star Rounds of Congested Clique
Chord Advanced issues.
Koorde: A simple degree optimal DHT
Chord Advanced issues.
Introduction Wireless Ad-Hoc Network
High Performance Computing & Bioinformatics Part 2 Dr. Imad Mahgoub
Chord Advanced issues.
Koorde: A Simple Degree Optimal DHT
Peer-to-Peer Networks 08 Kelips and Epidemic Algorithms
Proof of Kleinberg’s small-world theorems
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
at University of Texas at Dallas
Locality In Distributed Graph Algorithms
Presentation transcript:

Peer-to-Peer Networks 07 Degree Optimal Networks Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Degree Optimal Networks Koorde M. Frans Kaashoek and David R. Karger 2003

Shuffle, Exchange, Shuffle-Exchange Consider binary string s of length m shuffle operation: shuffle(s1, s2, s3,..., sm) = (s2,s3,..., sm,s1) exchange: exchange(s1, s2, s3,..., sm) = (s1, s2, s3,..., ¬sm) shuffle exchange: SE(S) = exchange(shuffle(S)) = (s2,s3,..., sm, ¬ s1 ) Observation: Every string a can be transformed into a string b by at most m shuffle and shuffle exchange operations Exchange Shuffle-Exchange

Magic Trick SE SE SE S SE S S Observation Every string a can be transformed into a string b by at most m shuffle and shuffle exchange operations Beispiel: From 0 1 1 1 0 1 1 to 1 0 0 1 1 1 1 via SE SE SE S SE S S operations SE SE S SE S S

The De Bruijn Graph A De Bruijn graph consists of n=2m nodes, each representing an m digit binary strings Every node has two outgoing edges (u,shuffle(u)) (u, SE(u)) Lemma The De Bruijn graph has degree 2 and diameter log n Koorde = Ring + DeBruijn- Graph

Koorde = Ring + DeBruijn-Graph Consider ring with 2m nodes and De Bruijn edges

Koorde = Ring + DeBruijn-Graph Note shuffle(s1, s2,..., sm) = (s2,..., sm,s1) shuffle (x) = (x div 2m-1)+(2x) mod 2m SE(S) = (s2,s3,..., sm, ¬ s1 ) SE(x) = 1-(x div 2m-1)+(2x) mod 2m Hence: Then neighbors of x are 2x mod 2m and 2x+1 mod 2m

Virtual DeBruijn Nodes To avoid collisions we choose m > (2+c) log (n) Then the probability of two peers colliding is at most n-c But then we have much mor nodes in the graph than peers in the network Solution Every peer manages all DeBruijn nodes between his position and his successor on the ring only for incoming edges outgoing edges are considered only from the peer‘s poisition on the ring

Properties of Koorde Theorem But: Every node has four pointers Every node has at most O(log n) incoming pointers w.h.p. The diameter is O(log n) w.h.p. Lookup can be performed in time O(log n) w.h.p. But: Connectivity of the network is very low.

Properties of Koorde Theorem 1. Every node has four pointers 2. Every node has at most O(log n) incoming pointers w.h.p. Proof: 1. follows from the definition of the De Bruijn graph and the observation that only non-virtual nodes have outgoing edges 2. The distance between two peers is at most c (log n)/n 2m with high probability The number of nodes pointing to this distance is therefore at most c (log n) with high probability

Properties of Koorde Theorem Proof sketch: The diameter is O(log n) w.h.p. Lookup can be performed in time O(log n) w.h.p. Proof sketch: The minimal distance of two peers is at least n-c 2m w.h.p. Therefore use only the c log n most significant bits in the routing since the prefix guarantees that one end in the responsibility area of a peer Follow the routing algorithm on the De Bruijn-graph until one ends in the responsibility area of a peer

Degree k-DeBruijn-Graph Consider alphabet using k letters, e.g. k = 3 Now, every k-De Bruijn- node has successors (kx mod km) (kx +1 mod km) (kx+2 mod km) ... (kx+k-1 mod km) Diameter is reduced to (log m)/(log k) Graph connectivity is increased to k

k-Koorde Straight-forward generalization of Koorde by using k-De Bruijn graphs Improves lookup time and messages to O((log n)/(log k)) steps

Peer-to-Peer Networks 07 Degree Optimal Networks Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg