KIT – University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association Institute of Telematics, Department of Computer.

Slides:



Advertisements
Similar presentations
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
Advertisements

Brocade: Landmark Routing on Peer to Peer Networks Ben Y. Zhao Yitao Duan, Ling Huang, Anthony Joseph, John Kubiatowicz IPTPS, March 2002.
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Examining The Tradeoffs Of Structured Overlays In A Dynamic Non-transitive Network Steve Gerding Jeremy Stribling {sgerding,
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
A Presentation by: Noman Shahreyar
Exploiting Route Redundancy via Structured Peer to Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
June 3, A New Multipath Routing Protocol for Ad Hoc Wireless Networks Amit Gupta and Amit Vyas.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
IPSN/SPOTS 2007 Beacon Location Service A Location Service for Point-to-Point Routing in Wireless Sensor Networks EECS Department University of California,
1 Canon in G Major: Designing DHTs with Hierarchical Structure Prasanna Ganesan (Stanford University) Krishna Gummadi (U. of Washington) Hector Garcia-Molina.
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Positive Feedback Loops in DHTs or Be Careful How You Simulate January 13, 2004 Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz From “Handling.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
1 Canon in G Major: Designing DHTs with Hierarchical Structure Prasanna Ganesan (Stanford University) Krishna Gummadi (U. of Washington) Hector Garcia-Molina.
Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker UC Berkeley (and now MIT) December.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Routing.
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
Data Consistency in the Structured Peer-to-Peer Network Cheng-Ying Ou, Polly Huang Network and Systems Lab 台灣大學電機資訊學院電機所.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Designing a DHT for low latency and high throughput Robert Vollmann P2P Information Systems.
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi, R. Gummadi..,S.Gribble, S. Ratnasamy, S. Shenker, I. Stoica.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Kaleidoscope – Adding Colors to Kademlia Gil Einziger, Roy Friedman, Eyal Kibbar Computer Science, Technion 1.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Peer to Peer Network Design Discovery and Routing algorithms
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Kris, Karthik, Ansley, Sean, Jeremy Dick, David K, Frans, Hari
Routing.
PASTRY.
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Routing.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Presentation transcript:

KIT – University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association Institute of Telematics, Department of Computer Sciences R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010

Institute of Telematics Department of Computer Sciences 211/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Motivation Structured P2P overlays like Kademlia [1] offer key-based routing (KBR) service Messages are sent to keys instead of IPs No central server needed O(log N) routing hops per message Kademlia used by popular applications in the Internet (eMule, BitTorrent, …) Could be basis for various other services Kademlia is scalable and robust, but… Applications suffer from high routing latencies and problems with NAT/PAT gateways KBR UDP / TCP IPv4 / IPv6 C B D A DHT / ALM / …

Institute of Telematics Department of Computer Sciences 311/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Agenda Motivation The original Kademlia protocol Analysis Key-based routing under churn NAT / PAT R/Kademlia Signaling modes Topology adaptation Related work Implementation, simulation setup and evaluation Summary and outlook

Institute of Telematics Department of Computer Sciences 411/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Kademlia k-buckets as local routing table Binary tree, k-buckets as leafs All nodes in one bucket share a common nodeId prefix with the local node Routing metric d XOR Iterative lookups to find close nodes to a destination key y Lookup initiator sends v parallel FIND_NODE requests to close nodes to y from the local k-buckets Responses with closer nodes merged into result vector V y Lookup terminates if no A i V y knows closer nodes to y New peers are met during lookups (FIND_NODE responses) X Local routing table / k-buckets A1A1 A2A2 A3A3 10 ID: A4A4 A5A5 A6A6 ID: 1… ID: 00… ID: 011…

Institute of Telematics Department of Computer Sciences 511/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Analysis: Key-based Routing / Churn Routing latency depending on P(node is active), min. 5 routing steps P(node is active) depending on stabilization interval Routing latency depending on stabilization interval Analysis of routing modes under churn [2] Detected lifetime model in public KAD networks (Weibull distribution, λ = 5.000, k = 0.5) [3][4] KAD churn: Up to a stabilization interval of t s 2,500 s, recursive mode is superior to iterative mode Idea: Kademlia using recursive routing and decreasing t s by exploiting application triggered routing traffic Results combined

Institute of Telematics Department of Computer Sciences 611/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Analysis: NAT / PAT During iterative lookups Unknown nodes have to be contacted Nodes might be inaccessible due to NAT/PAT gateways During recursive routing procedures Only nodes from the local routing tables are contacted Accessibility can be checked before X A1A1 A2A2 Y NAT X A1A1 A2A2 Y NAT

Institute of Telematics Department of Computer Sciences 711/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Demands Simple recursive routing and maintenance Avoidance of connection problems in NAT/PAT scenarios Meeting new peers by application-triggered lookups No periodic tasks needed Resilience against node failures Hop-by-hop acknowledgements Redundancy in routing tables Legacy support: Iterative lookups should still be supported Effective deployment of topology adaptation [5] Proximity Neighbor Selection (PNS) and Proximity Routing (PR) Low Key-based routing (KBR) latencies

Institute of Telematics Department of Computer Sciences 811/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Basic Operations Greedy recursive routing: Nodes on the routing path… … forward a message to the closest node to the destination key y from the local k-buckets according to d XOR … use hop-by-hop acknowledgements Failed nodes are removed from k-buckets Messages are resent Meeting new peers by application-triggered routing procedures (like the original protocol) Need for additional messages 2 different signaling modes: Direct and Source-routing

Institute of Telematics Department of Computer Sciences 911/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Signaling: Direct Mode All nodes on routing path send back n nodes that are close to y back to the originator Originator gets all information he would get in iterative mode routed message to destination key yclosest nodes to y for originator X X A1A1 A2A2 A3A3 Y

Institute of Telematics Department of Computer Sciences 1011/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Signaling: Source-Routing Mode All nodes on routing path send back n nodes that are close to y back to last hop on routing path Other nodes on routing path meet new peers and additionally merge their peers into signaling message Originator gets all information he would get in iterative mode Only mutually known peers communicate X A1A1 A2A2 A3A3 Y routed message to destination key yclosest nodes to y for X / A i

Institute of Telematics Department of Computer Sciences 1111/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing PNS and PR for R/Kademlia Proximity Routing (PR) Routing metric d XOR replaced by d KadPR = d prefix + d prox d prox is calculated from measured or estimated RTT Next hop A i+1 is the physically closest to the current node A i of those nodes that share the longest common nodeId prefix with y Proximity Neighbor Selection (PNS) LRU-strategy used for buckets replaced now filling up k-buckets with k physically closest nodes that are met Nodes must be probed to detect their proximity

Institute of Telematics Department of Computer Sciences 1211/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Related Work Rhea et al.: Bamboo [6] Designed for high routing performance in dynamic networks Recursive routing with PNS New peers are only met by periodic tasks Uses two different metrics / routing tables Limited redundancy in the routing tables Only one node per routing table entry is effected by PNS Kaune et al.: Proximity in Kademlia [7] Noticeable decrease of routing latencies due to PNS Only iterative lookups

Institute of Telematics Department of Computer Sciences 1311/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Implementation & Simulation Setup R/Kademlia integrated into overlay framework OverSim [8] Extension of available Kademlia implementation: recursive routing, PR, PNS Simulation: Varied Parameters Routing mode PR, PNS, active probing Signaling mode (rec.) Number of parallel RPCs (in iterative mode) 5000 nodes, 20 random seeds, 2h measurement time Churn: weibull-distributed lifetime model [7][8] Mean lifetime varied between 1,000 – 30,000 s Test application: Every 60s RPCs to random nodeIds Evaluation with Performance vs. Cost framework (PVC) [9]

Institute of Telematics Department of Computer Sciences 1411/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Evaluation: Comparison PVC: Convex hulls of the original protocol, simple iterative mode and R/Kademlia (under KAD churn) Original Kademlia cannot compete due to high bandwidth demands and high routing latencies In all configurations, R/Kademlia achieves best performance/cost trade-off

Institute of Telematics Department of Computer Sciences 1511/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Evaluation: Latency / Bandwidth R/Kademlia and R/Kademlia/PR achieve smallest bandwidth consumption R/Kademlia/PNS achieves lowest routing latencies under all churn rates Iterative mode shows average results Low latencies, but high traffic with PNS enabled The original protocol has very high latencies (2-5 s) and average bandwidth consumption KBR routing latencies (RPCs to random destination keys)Bandwidth consumption

Institute of Telematics Department of Computer Sciences 1611/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Evaluation: Signaling Modes Comparison of both signaling modes under different churn rates (PVC convex hulls) Direct mode has less bandwidth needs under moderate churn Source-routing mode achieves lower routing latencies in high churn scenarios Lifetime mean = 10,000 sLifetime mean = 1,000 s

Institute of Telematics Department of Computer Sciences 1711/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Conclusion & Future Work Summary R/Kademlia achieves better routing performance than the original PR and PNS can be effectively applied Different signaling modes for NAT/PAT compatibility Iterative mode is still supported Source code available at Future Work Comparison to other protocols like Bamboo Evaluation in real networks and testbeds like PlanetLab and G-Lab Usage of Topology-based NodeId Assignment

Institute of Telematics Department of Computer Sciences 1811/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing References [1]Maymounkov and Mazières, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, in Peer-to-Peer Systems: First International Workshop (IPTPS 2002), 2002 [2]Wu et al., Analytical Study on Improving DHT Lookup Performance under Churn, in P2P 06: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing, 2006 [3]Stutzbach et al., Understanding churn in peer-to-peer networks, in IMC06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurements, 2006 [4]Steiner et al., Long Term Study of Peer Behavior in the KAD DHT, in IEEE/ACM Transaction on Networking, 2009 [5]Castro et al., Exploiting network proximity in distributed hash tables, in International Workshop on Future Directions in Distributed Computing (FuDiCo), 2002 [6]Rhea et al., Handling Churn in a DHT, in ATEC 04: Proceedings of the annual conference on USENIX Annual Technical Conference, 2004 [7]Kaune et al., Embracing the Peer Next Door: Proximity in Kademlia, in Proceedings of the Eighth International Conference on Peer-to-Peer Computing (P2P08), 2008 [8] Baumgart, Heep, and Krause, OverSim: A flexible overlay network simulation framework, in Proceedings of 10th IEEE Global Internet Symposium (GI07) in conj. with IEEE INFOCOM, 2007 [9]Li et al., A performance vs. cost framework for evaluating DHT design tradeoffs under churn, in INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Institute of Telematics Department of Computer Sciences 1911/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing … the end! Thank you! Any Questions?

Institute of Telematics Department of Computer Sciences 2011/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing Topology Adaptation Proximity Routing (PR) Optimized routing decisions: Trade-off between progress in ID-space and contacting close overlay nodes Exchange of routing metric Proximity Neighbor Selection (PNS) Proximity-aware choice of nodes in the local routing tables Filling up local routing tables with physically close nodes Topology-based NodeId Assignment (TbNA) Overlay identifiers mapped on underlaying topology Problems with non-uniform distributed nodeIds not considered here

Institute of Telematics Department of Computer Sciences 2111/02/2010Bernhard Heep: R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Basic Operations … using hop-by-hop acknowledgements Failed nodes are removed from k-buckets Messages are resent X A1A1 A2A2 A3A3 Y ACK [1]ACK [2]ACK [3]ACK [4]