Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert MorrisDavid, Liben-Nowell, David R. Karger, M. Frans Kaashoek,
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications Prepared by Ali Yildiz (with minor modifications by Dennis Shasha)
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Chord: A Scalable Peer-to- Peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
1 Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
Looking Up Data in P2P Systems Hari Balakrishnan M.Frans Kaashoek David Karger Robert Morris Ion Stoica.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Peer-to-Peer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Structure Overlay Networks and Chord Presentation by Todd Gardner Figures from: Ion Stoica, Robert Morris, David Liben- Nowell, David R. Karger, M. Frans.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
Distributed Hash Table Systems Hui Zhang University of Southern California.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
Security Considerations for Structured p2p Peng Wang 6/04/2003.
DHTs and Peer-to-Peer Systems Supplemental Slides Aditya Akella 03/21/2007.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi, R. Gummadi..,S.Gribble, S. Ratnasamy, S. Shenker, I. Stoica.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Presented by: Tianyu Li
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
1 Distributed Hash Tables and Structured P2P Systems Ningfang Mi September 27, 2004.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Md Tareq Adnan Centralized Approach : Server & Clients Slow content must traverse multiple backbones and long distances Unreliable.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M
A Scalable Peer-to-peer Lookup Service for Internet Applications
A Scalable content-addressable network
Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service
Reading Report 11 Yin Chen 1 Apr 2004
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
Consistent Hashing and Distributed Hash Table
P2P: Distributed Hash Tables
Presentation transcript:

Presented by Elisavet Kozyri

A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of the file (indexing) Get the file from the owner

indexingget file Napster (1999 – 2001) Gnutella (2000 – now)

Scalable indexing mechanism

Each node (peer) should be responsible for certain files System remain robust during and after the arrival and departure of nodes

At the new system: – Given an identifier of data it should find the owner. – If a node joins or leaves it should rearrange the data. Is it similar to hash table? – node  bucket – identifier  key – data  value Distributed hash table

Abstraction: – Simple interface – Similar to hash table – Pairs (key, value) are spread across the nodes Implementation: – Name space partitioning – Each node responsible for a fraction – Each node has ID from the same name space – Nodes communicate over an overlay network to route lookup requests Jan Sep May Febabcd Aprbcde Novebcd Junbcd Julcde

Ion Stoica Associate Professor of CS at Berkeley Robert Morris Professor in the EECS department at MIT David Karger Professor in the EECS department at MIT M. Frans Kaashoek Professor in the EECS department at MIT Hari Balakrishnan Professor in the EECS department at MIT

Load balance – Keys are spread evenly over the nodes Decentralization – No node is more important than any other Scalability – The cost of lookups grows as the log of the number of nodes Availability – The node responsible for the key can always be found Flexible naming – No constraints on the structure of the keys

Hashing – Determines the name space and the way it is partitioned among nodes. Routing – Determines the way lookup requests will be routed among nodes to reach their destination. Joining – Determines the way the system adopts itself at the arrival of a node

Consistent hash function Each node and key has an m-bit identifier Identifiers ordered in an identifier circle Key k belongs to the node which identifier is the first clockwise from k

Complexity: O(N)

Complexity: O(logN)

N8 + 1N14 N8 + 2N14 N8 + 4N14 N8 + 8N21 N8 +16N32 N8 +32N42 N42 + 1N48 N42 + 2N48 N42 + 4N48 N42 + 8N51 N42 +16N1 N42 +32N14

Stabilization Ensure node’s successor pointer is up to date Ex: N26.join(N42) -> N26.stabilize -> N26.notify(N32) -> N21.stabilize -> N26.notify(N26)

Load BalancePath Length Lookups During Stabilization Experimental Results

Basic principle of routing algorithm: Longest Shooting Network locality? Stabilization: “we separate our correctness and performance goals” Lookups eventually succeed Is Chord globally consistent ? Anonymity? General comments

Pastry CAN Tapestry PRR Viceroy Kademlia

Circular namespace Each node is randomly assigned a 128-bit identifier (nodeID) Each object is assigned an identifier at least 128 bits long (objID) An object belongs to a node if nodeID is numerically closest to the 128 most significant bits of the objID An object is stored on k nodes

nodeID Routing table For each level l, the routing table contains the IP address of 2 b-1 nodes that have the same nodeID prefix as the local node up to level l-1, but differ at level l. From all possible nodes, the closest are selected Level 0Level 1Level 2Level 3 A message whose destID matches the local node’s nodeID up to level l is forwarded to a node whose nodeID matches the destID up to least l+1.

Content-Addressable Network

d-torus Each node owns a zone within the overall space A key is mapped onto a point in the space If the point P belongs to the zone of node n, then the corresponding (key, value) is stored at n.

Routing table: IP address and virtual coordinate zone of each immediate neighbors A node forwards the message to the neighbor with coordinates closest to destination

“The Impact of DHT Routing Geometry of Resilience and Proximity” K. Gummadi: Head of Networked Systems Research Group at Max Planck Institute for Software Systems R. Gummadi: Assistant Professor, ECE, UMass Amherst S. Gribble: Associate Professor, CSE, University of Washington S. Ratnasamy: Researcher at Intel Research Berkeley S. Shenker: Professor, EECS, UC Berkeley I. Stoica: Associate Professor, CS, US Berkeley

Resilience – The ability of the DHT implementation to route during and after arrivals/departures of nodes. Proximity – The ability of the DHT implementation to adapt to the underlying Internet topology. Flexibility – Neighbor Selection – Route Selection

PRR, Tapestry Generous flexibility in choosing neighbors No flexibility in route selection

CAN Flexibility in route selection No flexibility in choosing neighbors

Chord Changes – i th neighbor of a belongs to [(a + 2 i ),(a+ 2 i+1 )] – multiple paths Flexibility in route selection Flexibility in choosing neighbors

Pastry (ring + tree) Flexibility in route selection Flexibility in choosing neighbors

Static resilience  Routing flexibility

Proximity Neighbor Selection (PNS) Proximity Route Selection (PRS) What is the best?

Are ring geometries the best? What is the importance of sequential neighbors? How does neighbors flexibility influence resilience/proximity? Chord, CAN, Pastry: Are they used today? Which is the best? General comments

Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems, Antony Rowston, Peter Druschel A Scalable Content-Addressable Network, Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard karp, Scott Shenker Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, David Liben-Nowell, David Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan Geometry shapes from Krishna’s SIGCOMM talk