Small-world Overlay P2P Network

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Data Currency in Replicated DHTs Reza Akbarinia, Esther Pacitti and Patrick Valduriez University of Nantes, France, INIRA ACM SIGMOD 2007 Presenter Jerry.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Technion –Israel Institute of Technology Computer Networks Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Wide-area cooperative storage with CFS
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Efficient Content Sharing Taking Account of Updating Replicas in Hybrid Peer-to-Peer Networks Tatsuru Kato, Shinji Sugawara, Yutaka Ishibashi Nagoya Institute.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Chord Advanced issues. Analysis Search takes O(log(N)) time –Proof 1 (intuition): At each step, distance between query and peer hosting the object reduces.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Click to edit Master title style Multi-Destination Routing and the Design of Peer-to-Peer Overlays Authors John Buford Panasonic Princeton Lab, USA. Alan.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Internet Networking recitation #12
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Early Measurements of a Cluster-based Architecture for P2P Systems
DHT Routing Geometries and Chord
Prof. Leonardo Mostarda University of Camerino
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Effective Replica Allocation
A Scalable Peer-to-peer Lookup Service for Internet Applications
Presentation transcript:

Small-world Overlay P2P Network John C.S. Lui

Outline Describe our motivations on small world overlay P2P network. Introduce the background information of P2P network and small world network. Propose our Small-world Overlay Protocol (SWOP). Explain our Flash Crowd Handling Protocol Illustrate the experimental results

Motivation Fundamental Improvements in P2P network Improve the performance of Object Lookup in P2P Network Solve high traffic loading of a “popular” and “dynamic” object, i.e. under a Flash Crowd Scenario Small world is applied to achieve above criteria

Background --Structured P2P Network-- P2P network contains nodes (computers), which are acting as server as well as client. Structured P2P with two extra characteristics: Decentralized Structured To achieve this, consistent Distributed Hash Table (DHT) has been used. Two implementation issues for maintaining a logical structure: Unique key assignment scheme using DHT Characteristic routing table aims at reducing distance by at least half in each forwarding

Background --Structured P2P Network-- 1. Unique key assignment 1000 10000 217+100 217+10 212-1 6000 12000 216+1 224 x.x.x.b Item 1 x.x.x.a x.x.x.c Objects Item 3 Item 2 x.x.x.d x.x.x.e Nodes

Background --Structured P2P Network-- 2. Characteristic Routing Node 100 sends a message to node 217+100 Routing Table: … >217 : 217+10 …. >21 : 217+100 Item 1 Item 2 6000 1000 10000 12000 224 212-1 Item 3 Objects 216+1 217+100 217+10 Nodes

Background --Small world paradigm-- Small world networks represent two major properties: Two randomly chosen nodes are connected by short avg. distance Nodes are joined together in groups. The effect is called high clustering.

Main Ideas Apply Small world’s small average distance to structure P2P routing in order to improve the performance of object lookup Apply Small world’s high clustering coefficient to provide large traffic resolving solution

Small world Overlay Protocol (SWOP) -- Overview -- Small World Overlay Layer Topology Control Object Lookup Join Cluster (JCP) Leave Cluster (LCP) Object Lookup (OLP) DHT’s network

Small world Overlay Protocol (SWOP) -- Overview -- Terminologies Type of links Short links Long links Types of nodes Head nodes Inner nodes 31 1 30 2 29 3 28 4 27 5 26 6 25 24 7 23 8 22 9 21 10 20 11 19 12 18 17 13 16 14 15

Join Cluster Protocol Compute “distance” between predecessor and successor nodes Retrieve “group size” from nodes Select a group to join Update links information D1 = 3 D2 = 1 G1 = 2 G2 = 2 1 15 8 2 3 7 6 5 4 9 14 13 12 11 10 23 16 17 18 19 20 21 22 24 25 26 27 28 29 30 31

Leave Cluster Protocol Contact short links neighbors for leaving If it is the “Head” node, hand over the short links neighbor and long links neighbors to next “Head”, and generate necessary new long links neighbors P.S. There exists boundary case, like only one node in a cluster. The solution is written in the thesis.

Leave Cluster Protocol Node 9 leaves Node 9 announces a new head 10 to 11 Node 10 gets the long links and short links Link from node 4 to node 9 fade out when this link being used by a lookup request. 31 1 30 2 29 3 28 4 27 5 26 6 25 24 7 23 8 22 9 21 10 20 11 19 12 18 17 13 16 14 15

Object Lookup Protocol Phase 1 Query short link neighbors if there exists one which contains desired object. If result is positive, the object lookup request ends. Otherwise, phase 2 begins. Phase 2 By using the “head” ‘s long link neighbor, forward the object lookup request to another cluster. Phase 1 continues by that node receives the object lookup request.

Object Lookup Example (1) Node 0 requests object 29, managed by node 31 15 8 2 3 7 6 5 4 9 14 13 12 11 10 23 16 17 18 19 20 21 22 24 25 26 27 28 29 30 31

Object Lookup Example (2) Node 0 requests object 16, managed by node 17 15 8 2 3 7 6 5 4 9 14 13 12 11 10 23 16 17 18 19 20 21 22 24 25 26 27 28 29 30 31

Performance analysis mathematical Worst case average link traversals E[X] ≤ (1 + log2(m/2)) (8ln(3m)/k) E[X] represents worst case expected number of link traversals m represents the number of clusters in the SWOP network k represents the number of long links The proof is conducted by randomized algorithm and it leaves in the thesis

Performance analysis simulation result Performance Metrics Probability density function of lookup hop count Simulation Setup We added nodes one by one and reform the topology according the construction protocol. Total about 1k-5k nodes were generated in the system. Each node generated data lookup request randomly certain times.

Performance analysis simulation result

Internet Flash Crowd Unpredictable huge amount of request for a popular object is generated towards the object owner This overwhelms the network and the CPU resources of the owner. e.g. CNN news server during 911

Types for Internet Flash Crowd Static Flash Crowd The popular object involved will remain unchanged after its first appearance, e.g. new movie. Dynamic Flash Crowd The popular object involved will change after its first appearance, e.g. news

Requirements for handling Internet Flash Crowd Loading Distributed Reduce the bottleneck by caching and replication Demand driven Replication scheme has to be demand driven, otherwise, it will be a flooding scheme. Dynamic compatibility Consider how to handle dynamic objects which are changed by original source

Protocols for handling Flash Crowd Algorithm Each node periodically records the access rates of objects stored. If the access rate of an object is greater than certain threshold, the owner of this object contacts the “head” of its cluster. “head” spread this object to all its long link neighbors

Protocols for handling Flash Crowd Each long link neighbor “caches” this object so that each neighbor can be acted as an image source of this object. Each long link neighbor keeps track of the rate of newly added object. Dynamic cases – Refresh Message Aims for reminding neighbor nodes to get the latest updated object.

Static Flash Crowd Example Assume, in node 4, an item’s hitting rate exceeds threshold 1 15 8 2 3 7 6 5 4 9 14 13 12 11 10 23 16 17 18 19 20 21 22 24 25 26 27 28 29 30 31

Dynamic Flash Crowd Example 1 15 8 2 3 7 6 5 4 9 14 13 12 11 10 23 16 17 18 19 20 21 22 24 25 26 27 28 29 30 31 Original ver. New ver. Refresh msg.

Experiment results Study the performance on handling flash crowd scenario Performance metrics: Number of successful request In each interval, the nodes try to lookup the popular object. The metric counts the number of nodes can retrieve in this interval. Number of messages produced (traffic burden) Total number of messages in the system. Settings: Static flash crowd with fixed rate  req/s. Dynamic flash crowd with fixed rate  req/s with simulation time 25, 50 and 75 for object version update Dynamic flash crowd varying  with simulation time 25, 50 and 75 for object version update Static flash crowd with fixed rate  req/s

Experiment results Evaluation procedure We added 2000 nodes in the system using SWOP to form small world. One object was randomly chosen and was acted as the popular object. Each node generated that popular object’s lookup request traffic with rate . Each node has fixed  service rate and a queue for handling the item request.

Experimental results Static flash crowd

Experimental results Dynamic flash crowd

Experiment results Variation of object request rate

Experiment results Operation cost Replicating Region

Summary Build a protocol that applies Small world features on P2P network Improve the Object Lookup performance with the support of mathematical analysis. Propose an algorithm to handle massive traffics produced by “popular” and “dynamic” objects.

Thank you Questions & Answers

Small world Overlay Protocol Stabilize algorithm Method 1: Each node periodically probes their neighbors. Once a timeout event occurs (node failure) for a corresponding probing, the routing information is updated. Method 2: Each node does not perform a probing until an item lookup event occurs. When the lookup event fails, meaning there exists a node failure, the routing information is updated according to the failed node.

Experiment results Variation on number of long link neighbors k

Experiment results Variation of queue size

Mathematical Analysis Apply Markov Model Define each finite state as number of cached clusters Retrieve the transition probabilities Define Troop State Compute the troop state probability Calculate the expected time to troop state