Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
PDPTA03, Las Vegas, June S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1.
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert MorrisDavid, Liben-Nowell, David R. Karger, M. Frans Kaashoek,
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications Prepared by Ali Yildiz (with minor modifications by Dennis Shasha)
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Chord: A Scalable Peer-to- Peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Chord:A scalable peer-to-peer lookup service for internet applications
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up.
Description of CHORD’s Location and routing mechanisms Vincent Matossian October 12 th 2001 ECE 579.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
1 Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
Distributed Lookup Systems
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications 吳俊興 國立高雄大學 資訊工程學系 Spring 2006 EEF582 – Internet Applications and Services 網路應用與服務.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Wide-area cooperative storage with CFS
Concurrent node joins and Stabilization Παρουσίαση: Νίκος Κρεμμυδάς Πάνος Σκυβαλίδας.
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications Lecture 3 1.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Lecture 2 Distributed Hash Table
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Chord Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber Google,
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Chord Advanced issues. Analysis Search takes O(log(N)) time –Proof 1 (intuition): At each step, distance between query and peer hosting the object reduces.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Md Tareq Adnan Centralized Approach : Server & Clients Slow content must traverse multiple backbones and long distances Unreliable.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Chapter 5 Naming (I) Speaker : Jyun-Yao Huang 1 Application and Practice of Distributed Systems.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
1 Distributed Hash tables. 2 Overview r Objective  A distributed lookup service  Data items are distributed among n parties  Anyone in the network.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
The Chord P2P Network Some slides taken from the original presentation by the authors.
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
A Scalable Peer-to-peer Lookup Service for Internet Applications
(slides by Nick Feamster)
Improving and Generalizing Chord
Consistent Hashing and Distributed Hash Table
A Scalable Peer-to-peer Lookup Service for Internet Applications
Presentation transcript:

Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems

2 Overview I. Introduction II. The Chord Protocol and how it works III. Disadvantages and Improvements IV. Applications using Chord V. Summary

3 I. Introduction Problem: Decentralized network with several peers (clients) How to find specific peer that hosts desired data within this network? N5N5 N3N3 N2N2 N1N1 N4N4 Looks for data Network has matching data N9N9 N6N6 N7N7 N8N8

4 I. Introduction Solution: Routing queries along the network via known peers. (Example: quite inefficient!) N5N5 N3N3 N2N2 N1N1 N4N4 Looks for data Network has matching data Is able to respond! N6N6 N7N7 N8N8 N9N9 N

5 Overview I. Introduction II. The Chord Protocol and how it works III. Disadvantages and Improvements IV. Applications using Chord V. Summary

6 II. The Chord Protocol and how it works What is Chord? Efficient Simple Provable Performant Provable Correct Scalable Supporting only one operation: mapping a given key onto a node lookup protocol

7 II. The Chord Protocol and how it works Consistent Hashing: Using SHA1 (secure hash standard) Chord assigns each node and key a m-bit identifier Node (-> hashing IP Address) N2 N10 N20 N40 N50 N60 k7 k11 k16 k25k39 k46 k58 N63 Keys(->hashing key itself) Assign each key to its successor ID Space: 0 to 2 m -1 Here: m = 6 => ID Range 0… 63

8 II. The Chord Protocol and how it works Predecessor: pointer to the previous node on the id circle Successor: pointer to the succeeding node on the id circle ask node n to find the successor of id If id between n and it successor return successor Else forward query to n´s successor and so on A first simple (but slow!) lookup algorithm =>#messages linear in #nodes

9 II. The Chord Protocol and how it works Protocol Improvements Introduce a routing table m: number of bits in the key/node identifiers n: ID of a node i th entry: the closest node that succeeds node N with ID n by at least 2 i-1 mod 2 m  Finger table could contain up to m entries Each node has a successor list of its r successing nodes

10 II. The Chord Protocol and how it works Finger Table for scalable node localisation: not enough information to find node directly but nodes in direct neighbourhood

11 II. The Chord Protocol and how it works //ask node n to find the successor //of id n.find_successor(id) if (id in (n,successor]) return successor else n‘ = closest_preceding_node(id); return n‘.find_successor(id); More efficient algorithm using finger tables //search the local table for the //highest predecessor of id n.closest_preceding_node(id) for i=m downto 1 do if (finger[i] in (n,id)) return finger[i]; return n;

12 II. The Chord Protocol and how it works  #messages = log(#nodes) !! Fig. 2.4

13 II. The Chord Protocol and how it works Node joins and stabilization process Lookups are expected to be correct (though the set of participating nodes can change!)  Important: Any node´s successor pointer is always up to date.  Stabilization protocol running periodically in the background and updating Chord´s finger tables and successor pointers

14 II. The Chord Protocol and how it works Stabilize() if n is not its successor´s predecessor it changes its successor successor… predecessor NyNy NxNx NzNz successorNzNz predecessor… NyNy Am I your predecessor? successorNyNy predecessor… -> No it´s Ny

15 II. The Chord Protocol and how it works Notify() successor… predecessor NIL NxNx NzNz NyNy Might be my predecessor! successor… predecessor NxNx successor… predecessor NyNy Fix_fingers() updates finger tables N z changes predecessor to N y because N y between N x and N z. N z changes predecessor to N x because predecessor = nil

16 II. The Chord Protocol and how it works Illustration (Joining node) a) b)c) a)Initial state b)node 26 enters the system & finds its successor c) Stabilize procedure updates successor of n21 to n26

17 II. The Chord Protocol and how it works Node failures It is provable that even if half of the nodes in the network fail, lookups are executed correctly!

18 Overview I. Introduction II. The Chord Protocol and how it works III. Disadvantages and Improvements IV. Applications using Chord V. Summary

19 III. Disadvantages and Improvements Why is Chord itself no search engine? Protocols are NO applications Upper layers have to coordinate purposes Chord only supports “exact match“, cannot handle queries similar to one or more keys Suitability for use in search engines Chord basically not suitable because specific information about desired data is needed to be able to compute the query key´s hashvalue There exist several proposals for modifications to be able to find what is wanted without prior knowledge (meta data search extension)

20 III. Disadvantages and Improvements Chord´s disadvantages asymmetric lookup => lookup from node n to node p could take a different number of hops than vice versa => In huge Chord Rings lookup to one of near preceding nodes routed clockwise over almost complete ring. Approach for Improvement: S-Chord (->in-place notification of entry changes) Symmetric Structure: - routing entry symmetry – „if p points to n then n points to p“ - routing cost symmetrie – lookup paths between to nodes very likely are equal though they are not the same! (=>no routing symmetry) - finger table symmetry

21 Overview I. Introduction II. The Chord Protocol and how it works III. Disadvantages and Improvements IV. Applications using Chord V. Summary

22 IV. Applications using Chord DNS with Chord Host names hashed to keys, corresponding IP addresses are values Decentralized (no use for servers) Routing information and host changes can be updated dynamically Cooperative mirroring Multiple providers of the same content Load is spread evenly over all hosts by mapping data blocks onto hosts

23 Overview I. Introduction II. The Chord Protocol and how it works III. Disadvantages and Improvements IV. Applications using Chord V. Summary

24 V. Summary Simple, scalable, provable correct and performant Any lookup requires O(log N) messages in a N node network Even in unstable systems lookups are correct Arbitrary implementation provided for developers => extendable in applications

25 Thank you Thank you for your attention!