PDPTA03, Las Vegas, June 2003 1 S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
P2P Systems and Distributed Hash Tables Section COS 461: Computer Networks Spring 2011 Mike Freedman
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Chord: A Scalable Peer-to- Peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
Scalable Resource Information Service for Computational Grids Nian-Feng Tzeng Center for Advanced Computer Studies University of Louisiana at Lafayette.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Distributed Lookup Systems
University of Oregon Slides from Gotz and Wehrle + Chord paper
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Wide-area cooperative storage with CFS
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
“Umbrella”: A novel fixed-size DHT protocol A.D. Sotiriou.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Peer-to-Peer Systems. 2 Introduction What is peer One that of equal standing with another Peer-to-peer A way of structure distributed applications Each.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Lecture 2 Distributed Hash Table
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Distributed Hash tables. 2 Overview r Objective  A distributed lookup service  Data items are distributed among n parties  Anyone in the network.
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
A Scalable Peer-to-peer Lookup Service for Internet Applications
(slides by Nick Feamster)
Improving and Generalizing Chord
S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
P2P: Distributed Hash Tables
Presentation transcript:

PDPTA03, Las Vegas, June S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1 Univ. catholique de Louvain, Belgium 2 Centre d’excellence CETIC, Belgium

PDPTA03, Las Vegas, June Contents Context of the problem Chord overview Using symmetry to improve lookup in Chord Conclusion and further work

PDPTA03, Las Vegas, June what is p2p? - a system where the components are “equal” - there is no central point of failure - virtual (overlay) network at the application level -... why p2p? - increase system scalability - avoid single point of failure - achieve better load balancing - enable resource aggregation Context of the problem

PDPTA03, Las Vegas, June Examples of p2p systems hybrid (client/server) - Napster “pure” p2p - Gnutella Distributed Hash Table (DHT) - Chord R = N-1 ( hub ) R = 1 ( others ) H = 1 R = ? ( variable ) H = 1…7 ( but no guarantee ) R = log N H = log N ( with guarantee )

PDPTA03, Las Vegas, June Chord: overview Chord is a p2p system based on binary search the search space is organized as a virtual ring of size N - an entity is assigned an m-bit identifier, - a node has a well determined place within the virtual ring - a node has a predecessor and a successor - a node has log 2 N fingers (= entries in routing table): finger start finger node - a node stores the keys between its predecessor and itself

PDPTA03, Las Vegas, June The fingers at node 1 in a poorly populated Chord system of size 64

PDPTA03, Las Vegas, June Chord: scalable lookup given a system of size N with each node having a routing table of size log 2 N, resolve any key in max log 2 N hops to look for key k at node n - check whether k is found between n and the successor of n - otherwise, forward the request to the closest finger preceding k

PDPTA03, Las Vegas, June Path queries for keys 14 and 58, starting node 1, in a poorly populated Chord system of size 64

PDPTA03, Las Vegas, June Chord: drawbacks weak support for full-duplex protocols/applications - due to the asymmetric routing cost : nr_of_hops( p  n )  nr_of_hops( n  p ) a node can not make in-place notifications (joining/leaving) - due to the asymmetric organization the routing exploiting the underlying network proximity is not straightforward - the choice for the nearest neighborhood is not flexible - each node must connect the right corresponding predecessor and successor

PDPTA03, Las Vegas, June Using symmetry to improve Chord S-Chord: possible solution to some of the drawbacks of Chord - introduce symmetry in the routing organization * routing cost symmetry : nr_of_hops( p  n )  nr_of_hops( n  p ) * routing entry symmetry : if n points to p then p points to n improve lookup efficiency - for the same size of the routing table, resolve a key in 25% less hops for the worst case, and in 10% less hops in average

PDPTA03, Las Vegas, June S-Chord: the finger table S-Chord is based on Chord the search space is organized as a virtual ring of size N - a node has a predecessor and a successor - a node stores the keys between its predecessor and itself - a node has 2*m fingers (where m = ) finger start finger node

PDPTA03, Las Vegas, June The fingers at node 1 in a poorly populated S-Chord system of size 64

PDPTA03, Las Vegas, June S-Chord: the finger responsibility the finger responsibility is used when routing the lookup queries the search space at a node is split among its fingers a finger is situated inside the domain it is responsible for

PDPTA03, Las Vegas, June The fingers and their responsibility at node 1 in a fully populated S-Chord system of size 64 The responsibility of finger i of a node starts from the half way point between it and finger i- 1, and ends at the half way point between it and finger i+ 1

PDPTA03, Las Vegas, June The fingers and their responsibilities at node 1 in a poorly populated S-Chord system of size 64

PDPTA03, Las Vegas, June S-Chord: scalable lookup to look for key k at node n - check whether k is found between the predecessor and successor of n - otherwise, forward the request to the finger whose responsibility includes k resolve any key in max hops (i.e., 25% better than log 2 N in Chord) - at each suite of three steps the distance to the node storing the key is reduced by a factor of 16, while in Chord it’s reduced by 8 - e.g., in S-Chord the distance is reduced by 256 in 6 hops, rather than in 8 hops in Chord

PDPTA03, Las Vegas, June Path queries for keys 14 and 58, starting node 1, in a poorly populated S_Chord system of size 64 R 1 (3)]12  33] R 18 (5)]8  15] R 1 (5)]55  63]

PDPTA03, Las Vegas, June distribution of the path length in Chord and S-Chord for N = 2 16 S-Chord: simulation (I)

PDPTA03, Las Vegas, June worst case and average path length function the network size for Chord and S-Chord (fully populated) S-Chord: simulation (II)

PDPTA03, Las Vegas, June distance variation between pairs of nodes in Chord and S-Chord, measured for two poorly populated (1024 nodes) systems of size 2 12 and 2 20 S-Chord: simulation (III)

PDPTA03, Las Vegas, June Conclusion and further work S-Chord improves lookup efficiency in terms of hops - investigation an optimal method to select fingers - parameterize finger selection in order to choose the tradeoff between routing table size and lookup efficiency S-Chord improves routing table update by enabling in-place notifications -investigation of other benefits of the symmetry bring other functionality than key based routing such as Decentralized Object Location and Routing (DOLR) and group anycast/multicast