5.2 FLAT NAMING.

Slides:



Advertisements
Similar presentations
Peer to Peer and Distributed Hash Tables
Advertisements

Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 22: Overlay Networks Xiaowei Yang
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Naming Names in computer systems are used to share resources, to uniquely identify entities, to refer to locations and so on. An important issue with naming.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Wide-area cooperative storage with CFS
“Umbrella”: A novel fixed-size DHT protocol A.D. Sotiriou.
DOMAIN NAME SYSTEM. Introduction  There are several applications that follow client server paradigm.  The client/server programs can be divided into.
Naming Chapter 5. n Most of the lecture notes are based on slides by Prof. Jalal Y. Kawash at Univ. of Calgary n Some slides are from Brennen Reynolds.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 5 Naming.
ICS362 Distributed Systems Dr Ken Cosh Week 5. Review Communication – Fundamentals – Remote Procedure Calls (RPC) – Message Oriented Communication – Stream.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
5.1 Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Naming Chapter 4.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Naming CSCI 4780/6780.
Naming CSCI 4780/6780. Names & Naming System Names have unique importance –Resource sharing –Identifying entities –Location reference Name can be resolved.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Naming CSCI 6900/4900. Mounting Mounting – Merging different namespaces transparently File system example –Directory node of one namespace stores identifier.
Chapter 5 Naming (I) Speaker : Jyun-Yao Huang 1 Application and Practice of Distributed Systems.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
The Chord P2P Network Some slides taken from the original presentation by the authors.
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
School of Computing Clemson University Fall, 2012
Internet Indirection Infrastructure (i3)
IP for Mobile hosts.
Chapter 25 Domain Name System.
CS 268: Lecture 22 (Peer-to-Peer Networks)
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
A Scalable Peer-to-peer Lookup Service for Internet Applications
Distributed Systems CS
CHAPTER 3 Architectures for Distributed Systems
Naming A name in a distributed system is a string of bits or characters used to refer to an entity. To resolve name a naming system is needed.
Net 323 D: Networks Protocols
Distributed Systems CS
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
Prof. Leonardo Mostarda University of Camerino
Distributed Systems CS
Distributed Systems CS
Distributed Systems CS
Other Routing Protocols
Consistent Hashing and Distributed Hash Table
A Scalable Peer-to-peer Lookup Service for Internet Applications
Presentation transcript:

5.2 FLAT NAMING

Introduction Different Mechanisms: Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches

Introduction Flat names: Identifiers are just random bits of strings. Doesn’t have any information on how to locate access point of associated entity. The simplest name space is a flat name space where names are character strings exhibiting no structure. Names defined in a flat name space are called primitive or flat names. Different mechanisms are available to locate an entity given only its identifier. Therefore, flat names are suitable for use either for small name spaces having names for only a few objects or for system-oriented names that need not be meaningful to the users.

Broadcasting Broadcasting: Most common in Local Area Networks Message containing identifier of entity is broadcast to all the machines in the network Machine that has access point for the requested entity responds to the message Advantages: Simple and easy to implement Efficient for small networks Dis: Inefficient when the network grows Network bandwidth wasted by requests Solution: Multicasting

Multicasting Multicasting: Restricted group of hosts receive the request for entity The group is called multicast group and is identified by multicast address Host that has access point for the requested entity responds to the message Advantages: Bandwidth wastage will be less compared to broadcasting Efficient for small groups Dis: Scalability

Forward Pointers Popular approach to locate mobile entities. This is not like looking up an address, instead the client request will be forwarded along a chain to the actual object. Mechanism: When an entity moves from location A to location B, it leaves behind a reference to its new location at B in A. By following the chain of forward pointers, message will be sent from client to the actual object. Ex:

Forward Pointers Advantages: Transparency – The only thing the client sees of an object is a client stub, to which locations the client stub forwards its invocations are hidden from the client. Dis: Chains will be long for highly mobile entities. All intermediate locations in a chain will have to maintain their part of the chain of forward pointers. Vulnerability to broken links. Solution: Home-based approach.

Home based approach Makes use of home location that keeps track of the current location of the entity. Mechanism Each mobile host uses a fixed IP address. All communication to that host will be directed to mobile host’s home agent. When host moves to a new location the new care of address will be updated at the home agent . When a home agent receives a packet for the mobile host, it will be either forwarded or tunneled to the current location depending on the network location.

Home based approach Advantages: Scalability Dis: Communication latency Contacting the entity will become impossible if the home location doesn’t exist Poor geographical stability

Distributed Hash Tables A hash table allows to insert, lookup and delete objects with keys. A distributed hash table allows to do the same in distributed setting (objects=files). Mechanism Each node has an m-bit random identifier. Each entity has a m-bit random key. An entity with key k is located on a node with the smallest identifier that satisfies id >=k. This id is referred to as successor of k denoted as succ(k). The major task is key lookup. Two approaches: linear approach and finger table.

Distributed Hash Tables Linear approach: Each node keeps track of its predecessor and successor. When key k needs to be resolved, request will be forwarded to one of the two neighbors – whichever one is appropriate. Drawback: Poor performance, non scalable. Finger table approach: Each node has a finger table with m entries. The ith entry of node n will contain successor((n+2i-1)mod 2m). At node n, send query for key k to largest successor/finger entry <= k if none exist, send query to successor(n) .

Distributed Hash Tables

Distributed Hash Tables

Distributed Hash tables Advantages: Efficiency of lookups and inserts Load balanced Joining and leaving is simple Dis: Underlying network should be taken into account Ex: Nodes in different places

Hierarchical approaches Network is divided into a collection of domains. Each domain subdivided into smaller subdomains. Lowest level domain is called a leaf domain. Each domain D has an associated directory node dirt(D) that keeps track entities in that domain, leading to a tree of directory nodes. Root directory node knows about all the entities in the network .

Hierarchical approaches Look Up: Performance will be degraded when the search continues until the root node is reached

Research Forward pointers: Research is going on to develop new chain reduction mechanisms. One such mechanism is to update client’s reference when the most recent location is found Distributed Hash Tables: Since the DHT is dependent on underlying network, researchers are working to propose efficient ways to make a DHT aware of its underlying network.

Thank you….