15-440 Distributed Systems CDN & Peer-to-Peer.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
1 Server Selection & Content Distribution Networks (slides by Srini Seshan, CS CMU)
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Distributed Hash Tables CPE 401 / 601 Computer Network Systems Modified from Ashwin Bharambe and Robert Morris.
CompSci 356: Computer Network Architectures Lecture 21: Content Distribution Chapter 9.4 Xiaowei Yang
Peer-to-Peer
Peer-to-Peer Jeff Pang Spring Spring 2004, Jeff Pang2 Intro Quickly grown in popularity –Dozens or hundreds of file sharing applications.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Distributed Lookup Systems
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Wide-area cooperative storage with CFS
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Peer-to-Peer Scaling Problem Millions of clients  server and network meltdown.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Peer-to-Peer Outline p2p file sharing techniques –Downloading: Whole-file vs. chunks –Searching Centralized index (Napster, etc.) Flooding (Gnutella,
CS 640: Introduction to Computer Networks Yu-Chi Lai Lecture 18 - Peer-to-Peer.
Distributed Systems Lecture 21 – CDN & Peer-to-Peer.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
DHTs and Peer-to-Peer Systems Supplemental Slides Aditya Akella 03/21/2007.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Introduction of P2P systems
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
1 Slides from Richard Yang with minor modification Peer-to-Peer Systems: DHT and Swarming.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
15-744: Computer Networking L-22: P2P. Lecture 22: Peer-to-Peer Networks Typically each member stores/provides access to content Has quickly.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 24 - Peer-to-Peer.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
EE324 DISTRIBUTED SYSTEMS L17 P2P. Scaling Problem 2  Millions of clients  server and network meltdown.
Hui Zhang, Fall Computer Networking CDN and P2P.
Distributed Systems Lecture 21 – CDN & Peer-to-Peer.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
15-829A/18-849B/95-811A/19-729A Internet-Scale Sensor Systems: Design and Policy Review.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Distributed Hash Tables. DHTs ● Like it sounds – a distributed hash table ● Put(Key, Value) ● Get(Key) -> Value.
Peer-to-Peer Information Systems Week 12: Naming
(some slides from D. Anderson, K. Harras and others)
Lecture XV: Real P2P Systems
BitTorrent Vs Gnutella.
CS 268: Lecture 22 (Peer-to-Peer Networks)
CSE 486/586 Distributed Systems Distributed Hash Tables
Distributed Hash Tables
Peer-to-Peer Data Management
(slides by Nick Feamster)
مظفر بگ محمدی دانشگاه ایلام
EE 122: Peer-to-Peer (P2P) Networks
CS 268: Peer-to-Peer Networks and Distributed Hash Tables
DHT Routing Geometries and Chord
Prof. Leonardo Mostarda University of Camerino
CS 162: P2P Networks Computer Science Division
P2P Systems and Distributed Hash Tables
Distributed Hash Tables
Consistent Hashing and Distributed Hash Table
CSE 486/586 Distributed Systems Distributed Hash Tables
A Scalable Peer-to-peer Lookup Service for Internet Applications
Peer-to-Peer Information Systems Week 12: Naming
#02 Peer to Peer Networking
Presentation transcript:

15-440 Distributed Systems CDN & Peer-to-Peer

Announcements Midterm regrades available tomorrow in OH

Server Selection Which server? Lowest load  to balance load on servers Best performance  to improve client performance Based on Geography? RTT? Throughput? Load? Any alive node  to provide fault tolerance How to direct clients to a particular server? As part of routing  anycast, cluster load balancing Not covered  As part of application  HTTP redirect As part of naming  DNS 3

How Akamai Works Clients delegate domain to akamai ibm.com. 172800 IN NS usw2.akam.net. CNAME records eventually lead to Something like e2874.x.akamaiedge.net For IBM Or a1686.q.akamai.net for IKEA…. Client is forced to resolve eXYZ.x.akamaiedge.net hostname 4

How Akamai Works End-user cnn.com (content provider) DNS root server Akamai server Get foo.jpg 10 9 3 1 Akamai high-level DNS server 4 2 5 Akamai low-level DNS server 6 Nearby matching Akamai server 7 8 End-user Get /cnn.com/foo.jpg 5

Akamai – Subsequent Requests cnn.com (content provider) DNS root server Akamai server Assuming no timeout on NS record Akamai high-level DNS server 7 Akamai low-level DNS server 8 Nearby matching Akamai server 9 10 End-user Get /cnn.com/foo.jpg 6

How Akamai Works How is content replicated? Akamai only replicates static content (*) Modified name contains original file name Akamai server is asked for content First checks local cache If not in cache, requests file from primary server and caches file * (At least, the version we’re talking about today. Akamai actually lets sites write code that can run on Akamai’s servers, but that’s a pretty different beast) 7

How Akamai Works Root server gives NS record for akamai.net Akamai.net name server returns NS record for x.akamaiedge.net Name server chosen to be in region of client’s name server TTL is large x.akamaiedge.net nameserver chooses server in region Should try to chose server that has file in cache - How to choose? Uses eXYZ name and consistent hashing TTL is small  why? 8

Summary DNS Content Delivery Networks move data closer to user, maintain consistency, balance load Consistent hashing maps keys AND buckets into the same space 9

Outline Content Distribution Networks P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups – Chord

Scaling Problem Millions of clients  server and network meltdown

P2P System Leverage the resources of client machines (peers) App end-point vs. Infrastructure vs. waypoints Transition: infrastructure -> remove them Leverage the resources of client machines (peers) Computation, storage, bandwidth

Peer-to-Peer Networks Typically each member stores/provides access to content Basically a replication system for files Always a tradeoff between possible location of files and searching difficulty Peer-to-peer allow files to be anywhere  searching is the challenge Dynamic member list makes it more difficult

The Lookup Problem N2 N1 N3 ? N4 N6 N5 Key=“title” Value=MP3 data… Internet ? Client Publisher Lookup(“title”) 1000s of nodes. Set of nodes may change… N4 N6 N5

Searching Needles vs. Haystacks Search expressiveness Searching for top 40, or an obscure punk track from 1981 that nobody’s heard of? Search expressiveness Whole word? Regular expressions? File names? Attributes? Whole-text search? (e.g., p2p gnutella or p2p google?)

Framework Common Primitives: Join: how to I begin participating? Publish: how do I advertise my file? Search: how to I find a file? Fetch: how to I retrieve a file?

Outline Content Distribution Networks P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups – Chord

Napster: Overiew Centralized Database: Join: on startup, client contacts central server Publish: reports list of files to central server Search: query the server => return someone that stores the requested file Fetch: get the file directly from peer

Napster: Publish insert(X, 123.2.21.23) ... Publish I have X, Y, and Z! 123.2.21.23

Napster: Search 123.2.0.18 Fetch search(A) --> 123.2.0.18 Query Reply Where is file A?

Napster: Discussion Pros: Cons: Simple Search scope is O(1) Controllable (pro or con?) Cons: Server maintains O(N) State Server does all processing Single point of failure

“Old” Gnutella: Overview Query Flooding: Join: on startup, client contacts a few other nodes; these become its “neighbors” Publish: no need Search: ask neighbors, who ask their neighbors, and so on... when/if found, reply to sender. TTL limits propagation Fetch: get the file directly from peer

Gnutella: Search I have file A. Reply Query Where is file A?

Gnutella: Discussion Pros: Cons: Fully de-centralized Search cost distributed Processing @ each node permits powerful search semantics Cons: Search scope is O(N) Search time is O(???) Nodes leave often, network unstable TTL-limited search works well for haystacks. For scalability, does NOT search every node. May have to re-issue query later

BitTorrent: Overview Swarming: Big differences from Napster: Join: contact centralized “tracker” server, get a list of peers. Publish: Run a tracker server. Search: Out-of-band. E.g., use Google to find a tracker for the file you want. Fetch: Download chunks of the file from your peers. Upload chunks you have to them. Big differences from Napster: Chunk based downloading “few large files” focus Anti-freeloading mechanisms

BitTorrent: Publish/Join Tracker

BitTorrent: Fetch

BitTorrent: Sharing Strategy Employ “Tit-for-tat” sharing strategy A is downloading from some other people A will let the fastest N of those download from him Be optimistic: occasionally let freeloaders download Otherwise no one would ever start! Also allows you to discover better peers to download from when they reciprocate Goal: Pareto Efficiency Game Theory: “No change can make anyone better off without making others worse off” Does it work? (not perfectly, but perhaps good enough?)

BitTorrent: Summary Pros: Cons: Works reasonably well in practice Gives peers incentive to share resources; avoids freeloaders Cons: Pareto Efficiency relative weak condition Central tracker server needed to bootstrap swarm Alternate tracker designs exist (e.g. DHT based)

Outline Content Distribution Networks P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups – Chord

DHT: Overview (1) Goal: make sure that an item (file) identified is always found in a reasonable # of steps Abstraction: a distributed hash-table (DHT) data structure insert(id, item); item = query(id); Note: item can be anything: a data object, document, file, pointer to a file… Implementation: nodes in system form a distributed data structure Can be Ring, Tree, Hypercube, Skip List, Butterfly Network, ...

DHT: Overview (2) Structured Overlay Routing: Join: On startup, contact a “bootstrap” node and integrate yourself into the distributed data structure; get a node id Publish: Route publication for file id toward a close node id along the data structure Search: Route a query for file id toward a close node id. Data structure guarantees that query will meet the publication. Fetch: Two options: Publication contains actual file  fetch from where query stops Publication says “I have file X”  query tells you 128.2.1.3 has X, use IP routing to get X from 128.2.1.3

DHT: Consistent Hashing Key 5 K5 Node 105 N105 K20 Circular ID space N32 N90 K80 A key is stored at its successor: node with next higher ID

Routing: Chord Basic Lookup “Where is key 80?” N105 N32 “N90 has K80” K80 N90 N60

Routing: Finger table - Faster Lookups ¼ ½ 1/8 1/16 1/32 1/64 1/128 N80

DHT: Chord Summary Routing table size? Routing time? Log N fingers Each hop expects to 1/2 the distance to the desired id => expect O(log N) hops.

Routing: Chord Summary Assume identifier space is 0…2m Each node maintains Finger table Entry i in the finger table of n is the first node that succeeds or equals n + 2i Predecessor node An item identified by id is stored on the successor node of id

Routing: Chord Example Assume an identifier space 0..7 Node n1:(1) joinsall entries in its finger table are initialized to itself Succ. Table i id+2i succ 0 2 1 1 3 1 2 5 1 1 7 6 2 5 3 4

Routing: Chord Example Node n2:(2) joins Succ. Table i id+2i succ 0 2 2 1 3 1 2 5 1 1 7 6 2 Succ. Table i id+2i succ 0 3 1 1 4 1 2 6 1 5 3 4

Routing: Chord Example Succ. Table i id+2i succ 0 1 1 1 2 2 2 4 6 Nodes n3:(0), n4:(6) join Succ. Table i id+2i succ 0 2 2 1 3 6 2 5 6 1 7 Succ. Table i id+2i succ 0 7 0 1 0 0 2 2 2 6 2 Succ. Table i id+2i succ 0 3 6 1 4 6 2 6 6 5 3 4

Routing: Chord Examples Nodes: n1:(1), n2(3), n3(0), n4(6) Items: f1:(7), f2:(2) Succ. Table Items i id+2i succ 0 1 1 1 2 2 2 4 6 7 Succ. Table Items 1 7 i id+2i succ 0 2 2 1 3 6 2 5 6 1 Succ. Table 6 2 i id+2i succ 0 7 0 1 0 0 2 2 2 Succ. Table i id+2i succ 0 3 6 1 4 6 2 6 6 5 3 4

Routing: Query Upon receiving a query for item id, a node Check whether stores the item locally If not, forwards the query to the largest node in its successor table that does not exceed id Succ. Table Items i id+2i succ 0 1 1 1 2 2 2 4 6 7 Succ. Table Items 1 7 i id+2i succ 0 2 2 1 3 6 2 5 6 1 query(7) Succ. Table 6 2 i id+2i succ 0 7 0 1 0 0 2 2 2 Succ. Table i id+2i succ 0 3 6 1 4 6 2 6 6 5 3 4

DHT: Discussion Pros: Cons: Guaranteed Lookup O(log N) per node state and search scope Cons: Supporting non-exact match search is hard

What can DHTs do for us? Distributed BitTorrent tracket Distributed object lookup Based on object ID De-centralized file systems CFS, PAST, Ivy Application Layer Multicast Scribe, Bayeux, Splitstream Databases PIER

P2P: Summary Many different styles; remember pros and cons of each centralized, flooding, swarming, unstructured and structured routing Lessons learned: Single points of failure are very bad Flooding messages to everyone is bad Not all nodes are equal Need incentives to discourage freeloading Structure can provide theoretical bounds and guarantees Underlying network topology is important Privacy and security are important