Plethora: Infrastructure and System Design

Slides:



Advertisements
Similar presentations
Peer-to-Peer Infrastructure and Applications Andrew Herbert Microsoft Research, Cambridge
Advertisements

Brocade: Landmark Routing on Peer to Peer Networks Ben Y. Zhao Yitao Duan, Ling Huang, Anthony Joseph, John Kubiatowicz IPTPS, March 2002.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Distributed Lookup Systems
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
SkipNet: A Scaleable Overlay Network With Practical Locality Properties Presented by Rachel Rubin CS294-4: Peer-to-Peer Systems By Nicholas Harvey, Michael.
Squirrel: A decentralized peer- to-peer web cache Paul Burstein 10/27/2003.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
EPFL-I&C-LSIR [P-Grid.org] Workshop on Distributed Data and Structures ’04 NCCR-MICS [IP5] presented by Anwitaman Datta Joint work with Karl Aberer and.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
Storage management and caching in PAST PRESENTED BY BASKAR RETHINASABAPATHI 1.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
Wide-Area Cooperative Storage with CFS Robert Morris Frank Dabek, M. Frans Kaashoek, David Karger, Ion Stoica MIT and Berkeley.
On P2P Collaboration Infrastructures Manfred Hauswirth, Ivana Podnar, Stefan Decker Infrastructure for Collaborative Enterprise, th IEEE International.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
DMAP : Global Name Resolution Services Through Direct Mapping Tam Vu, Akash Baid WINLAB, Rutgers University (Joint.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Fast Searching in Peer-to-Peer Networks Self-Organizing Parallel Search Clusters Rocky Dunlap.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Plethora: A Wide-Area Read-Write Storage Repository Design Goals, Objectives, and Applications Suresh Jagannathan, Christoph Hoffmann, Ananth Grama Computer.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
DISTRIBUTED FILE SYSTEM- ENHANCEMENT AND FURTHER DEVELOPMENT BY:- PALLAWI(10BIT0033)
Peer-to-Peer Information Systems Week 12: Naming
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
Virtual Direction Routing
Data Management on Opportunistic Grids
Peer to peer Internet telephony challenges, status and trend
Zueyong Zhu† and J. William Atwood‡
Improved Algorithms for Network Topology Discovery
Pastry Scalable, decentralized object locations and routing for large p2p systems.
CSE 486/586 Distributed Systems Distributed Hash Tables
(slides by Nick Feamster)
COS 461: Computer Networks
CHAPTER 3 Architectures for Distributed Systems
Introduction to Wireless Sensor Networks
Accessing nearby copies of replicated objects
Zhichen Xu, Mallik Mahalingam, Magnus Karlsson
Turning Heterogeneity into an Advantage in Overlay Routing
Early Measurements of a Cluster-based Architecture for P2P Systems
PASTRY.
SCOPE: Scalable Consistency in Structured P2P Systems
DHT Routing Geometries and Chord
High-Performance Reliable Distributed Storage Systems
A Scalable content-addressable network
Distributed P2P File System
Mobile P2P Data Retrieval and Caching
Distributed Hash Tables
Dynamic Replica Placement for Scalable Content Delivery
COS 461: Computer Networks
A Scalable Content Addressable Network
Consistent Hashing and Distributed Hash Table
CSE 486/586 Distributed Systems Distributed Hash Tables
Peer-to-Peer Information Systems Week 12: Naming
Brocade: Landmark Routing on Peer to Peer Networks
Presentation transcript:

Plethora: Infrastructure and System Design

Introduction Key features: Peer-to-Peer (P2P) networks: Key problems: Self-organizing distributed systems Nodes receive and provide services cooperatively No predetermined client/server roles Key features: Scalable Adaptive and reconfigurable Leverage technology trends (network/processor/memory) Key problems: Locating and routing objects efficiently Consistency management Fault-Tolerance

Location and Routing - DHT Apply structure to the network: Inputs hashed to a key Each node responsible for a subset of keys Nodes maintain small routing tables Queries routed to neighboring nodes that ensure progress towards the ultimate destination.

Location and Routing - DHT 0XXX 1XXX 2XXX 3XXX 0112 2321 START 0112 routes a message to key 2000. 2032 First hop fixes first digit (2) 2001 Second hop fixes second digit (20) END 2001 closest live node to 2000.

Motivation Virtualization destroys locality. Query responses do not contain locality information. Recent studies show that queries for multiple keys in P2P networks follow a Zipf-like distribution. Exploit geographic locality. Build highly-distributed collaborative environments and applications: information lifecycle distributed file systems software distribution archival storage and disaster recover

IP Addresses as Virtual IDs Incorporate locality into overlay networks: Explore addressing scheme of the underlying network. In most cases, nodes with IP addresses that are numerically close are also physically close. Organization of the Internet in ASs. By correcting a few bits in each hop, the last hops would be inside an AS. Issues: IP space is not uniformly populated by peers. Load imbalance at the peers. The upper bound of O(log n) can no longer be guaranteed.

IP Addresses as Virtual IDs

IP Addresses as Virtual IDs

IP Addresses as Virtual IDs 2,420 nodes. 20 keys per node.

Plethora Two-level overlay One global overlay Several local overlays Global overlay is the main repository of data. Global overlay helps nodes organize themselves into local overlays. Local overlays exploit the organization of the Internet in ASs. Size of the local overlay is controlled by an overlay leader. Uses efficient distributed algorithms for merging and splitting local overlays.

Cache Organization

Simulation Setup Internet topology generated using GT-ITM topology generator. 10,000 overlay nodes selected randomly from the hosts. NLANR web proxy trace with 500,254 objects. Zipf distribution parameters: {0.75, 0.80, 0.85, 0.90, 0.95} Local cache size: 5MB (LRU replacement policy).

IP Addresses as Virtual IDs

Simulation Results Zipf-parameter Cache Hit Ratio Gain 0.75 76% 31.0% 0.80 79% 33.5% 0.85 81% 36.0% 0.90 83% 38.7% 0.95 86% 41.3%

Summary IP addresses as virtual IDs: Plethora Routing Core: Overlays with good locality properties. Non-uniform realworld distribution: severe load imbalance no bounded latency Plethora Routing Core: Two-level overlay architecture. Local overlays are created to cluster nodes that are close in the underlying network. Significant performance gains Low maintenance overhead

Latency Hiding For large-scale collaborative and distributed applications: latency effects are still an issue. need resliency in the presence of network failures. Record updates using a transactional versioning system: Aggregate updates Distributed conflict resolution

Versioning and Transaction Model Local Home Global home T2 T3 commit Tk Tk+1 Tk+2

Open Issues Implementation of versioning trees Efficient update and commit protocols Dealing with failures (node, network) Object structure of the repository to exploit versioning semantics What guarantees can the system provide on object access and consistency of updates?