Supervisor: Ittay Eyal Developers: Hani Ayoub & Daniel Aranki DHT Firefox ExtensionWhat is a DHT? Distributed Hash Table Decentralized distributed system.

Slides:



Advertisements
Similar presentations
Split Databases. What is a split database? Two databases Back-end database –Contains tables (data) only –Resides on server Front-end database –Contains.
Advertisements

The recent technological advances in mobile communication, computing and geo-positioning technologies have made real-time transit vehicle information systems.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Peer to Peer and Distributed Hash Tables
Mark Phillip markphillip.com The Right Tools For The Right Job Building Add-ons for Firefox and Fennec.
Prime’ Senior Project. Presentation Outline What is Our Project? Problem Definition What does our system do? How does the system work? Implementation.
1 Failure Recovery for Priority Progress Multicast Jung-Rung Han Supervisor: Charles Krasic.
January Supervisors & Staff Supervisor: Mr. Ittay Eyal Developers: Hani Ayoub Daniel Aranki.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
Oren Kalinsky Amir Tepper Supervisor: Ittay Eyal.
INTRODUCTION The Group WEB BROWSER FOR RELATION Goals.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
Multiple Tiers in Action
Architecture, Deployment Diagrams, Web Modeling Elizabeth Bigelow CS-15499C October 6, 2000.
12/11/01 Matt Bridges Advisor: Ralph Morelli. What is Web Analytics? In traditional commerce, store owners can observe their customers habits: What time.
Trustworthy User Interface Design: Dynamic Security Skins Rachna Dhamija and J.D. Tygar University of California, Berkeley TIPPI Workshop June 13, 2005.
In-page traffic distribution display ● Original idea – Allow a website administrator to see the flow of users from current page to all available destinations.
P2P Over MANET An Introduction to Mobile Resource Sharing.
By K atherine I E buoh ( M sc ) Information Technology Implementation Of Technical Analysis Stock Trading Application For The Nigerian Stock Exchange.
Technion – Israel Institute of Technology Department of Electrical Engineering Software Lab Grades Server on J2EE Technology Edo Yichie Sagee Rosen Supervisor:
Content Networking - CON Content Overlay Network Vishal Kumar Singh Eilon Yardeni April, 28 th 2005.
Web Application Architecture: multi-tier (2-tier, 3-tier) & mvc
Team Member: Dakuo Wang, Li Zhang, Xuejie Sun, Yang Liu NETWORK INFORMATION BASE (NIB) VISUALIZATION SYSTEM.
Chris Pinski.  History  What is Ajax  Who uses Ajax  Underlying Technologies  SE Aspect  Common Problems  Conclusion.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Network Aware Module Implementation of the paper: “Forecasting Network Performance to Support Dynamic Scheduling Using the Network Weather Service”. Its.
Chapter 17 - Deploying Java Applications on the Web1 Chapter 17 Deploying Java Applications on the Web.
AJAX Making Dynamic Web pages more Dynamic Jim Hendricks April 25th, 2006.
Grid Appliance – On the Design of Self-Organizing, Decentralized Grids David Wolinsky, Arjun Prakash, and Renato Figueiredo ACIS Lab at the University.
Matrix Mapping Tool Sam Gross Internship at Virtual Technology Corporation.
Class 1Intro to Databases Goals of this class Understand the architecture behind web database applications Gain a basic understanding of what relational.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 2 ARCHITECTURES.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
MACIASZEK, L.A. (2001): Requirements Analysis and System Design. Developing Information Systems with UML, Addison Wesley Chapter 6 - Tutorial Guided Tutorial.
Web Interfaces, Forms & Databases Databases Snyder p HTML Basics Snyder p JavaScript Snyder Chapter 18.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
Syllabus Management System. The Problem There is need for a management system for syllabi that: Provides a simple and effective user interface Allows.
Senior Project, 2015, Spring Senior Project Web Site –Version 5 Student: Jacek Kopczynski, Florida International University Mentor: Masoud Sadjadi, Florida.
How to make tables in HTML By Daniel Arze. How do they do this?
GOAL User Interactive Web Interface Update Pages by Club Officers Two Level of Authentication.
CS779 Term Project Steve Shoyer Section 5 December 9, 2006 Week 6.
Browser Wars (Click on the logo to see the performance)
OPTIMISING USER INTERFACES FOR MOBILE COMPUTER ASSISTED INTERVIEWING DEVICES Prepared By Otyek Ronald James Uganda Bureau of Statistics Presented at the.
Class 1Intro to Databases Goals of this class Understand the architecture behind web database applications Gain a basic understanding of what relational.
Senior Project, 2015, Spring Senior Project Website –Version 5 Student: Yamel Peraza, Florida International University Mentor: Masoud Sadjadi, Florida.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Computer Systems Lab TJHSST Senior Research Project Browser Based Distributed Computing Siggi Simonarson.
Internet Searching the World Wide Web. The Internet and the World Wide Web The Internet is a worldwide collection of networks that allows people to communicate.
NGMAST Mobile DHT Energy1 Optimizing Energy Consumption of Mobile Nodes in Heterogeneous Kademlia-based Distributed Hash Tables Imre Kelényi Budapest.
The Scientific Method. The scientific method is the only scientific way accepted to back up a theory or idea. This is the method on which all research.
Step # 5: Conclusion Step # 4: Collect & Analyze Data Step # 3: Experiment Step # 2: Hypothesis Step # 1: Problem Scientific Method.
Maninda Edirisooriya. Introduction Extension for Google Chrome. Privacy protection system for online chat. Encrypts chat text using 128 bit AES. Decrypts.
Mozilla Firefox connector
Introduction Web Environments
CHAPTER 3 Architectures for Distributed Systems
آشنايی با اصول و پايه های يک آزمايش
Lecture 1: Multi-tier Architecture Overview
WEB PAGE AUTHORINHG AND DESIGNING
EXTENSION AND INTEGRATION
Science Chapter 1.
The Scientific Method TAKEN PARTLY FROM THE INTERNET
The Scientific Method.
Chord and CFS Philip Skov Knudsen
Client-Server Model: Requesting a Web Page
Design and Implementation of OverLay Multicast Tree Protocol
The Scientific Method.
Presentation transcript:

Supervisor: Ittay Eyal Developers: Hani Ayoub & Daniel Aranki DHT Firefox ExtensionWhat is a DHT? Distributed Hash Table Decentralized distributed system holds data in its nodes Keep data distributed dynamically Scalable system - Data - Node New node enters the DHT Existing node exits the DHT

Determine whether a DHT can be implemented in Mozilla Firefox web browser or not in sense of duty time Project GoalHow? Implement: Firefox extension That gathers statistics Distribute: The extension Analyze: The results And answer the project question Server Residing in the Technion Softlab Responsible for managing and collecting data MySQL server for data gathering Has interface to add/remove/update data (PHP) A machine uses Mozilla Firefox With the statistics extension installed on it Uses server interface for committing user data (JavaScript to PHP)

Conclusion: Can a DHT be implemented? 1 st Approach: Standard Deviation hard to predict next user’s duty time (high error rate) 2 nd Approach: Static Analysis Using (inverse) accumulative probability What % of the nodes used Firefox for more than X sec

Conclusion: Can a DHT be implemented? 3 rd Approach: Dynamic Analysis predicting duty time given that a user has been in FF for X start time, what is the probability for the user to stay more than X end time? Heaviest Overlay Network … … Lightest Overlay Network Time Line T enterDHT T1T1 T2T2 Several Overlays After T enterDHT the user enters the system After T 2 the user joins 3 rd overlayJoins 1 st overlayAfter T 1 the user joins 2 nd overlay