Exploiting Route Redundancy via Structured Peer to Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz.

Slides:



Advertisements
Similar presentations
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Advertisements

Brocade: Landmark Routing on Peer to Peer Networks Ben Y. Zhao Yitao Duan, Ling Huang, Anthony Joseph, John Kubiatowicz IPTPS, March 2002.
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Exploiting Route Redundancy via Structured Peer to Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz.
Optimizations for Locality-Aware Structured Peer-to-Peer Overlays Jeremy Stribling Collaborators: Kris Hildrum John D. Kubiatowicz The First.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Rapid Mobility via Type Indirection Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John D. Kubiatowicz Computer Science Division, UC Berkeley IPTPS 2004.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Host Mobility Using an Internet Indirection Infrastructure by Shelley Zhuang, Kevin Lai, Ion Stoica, Randy Katz, Scott Shenker presented by Essi Vehmersalo.
Using Overlay Networks for Proximity-based Discovery Steven Czerwinski Anthony Joseph Sahara Winter Retreat January 13, 2004.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
Traffic Engineering With Traditional IP Routing Protocols
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Positive Feedback Loops in DHTs or Be Careful How You Simulate January 13, 2004 Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz From “Handling.
Brocade Landmark Routing on Structured P2P Overlays Ben Zhao, Yitao Duan, Ling Huang Anthony Joseph and John Kubiatowicz (IPTPS 2002) Goals Improve routing.
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
Delayed Internet Routing Convergence Craig Labovitz, Abha Ahuja, Abhijit Bose, Farham Jahanian Presented By Harpal Singh Bassali.
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Weaving a Tapestry Distributed Algorithms for Secure Node Integration, Routing and Fault Handling Ben Y. Zhao (John Kubiatowicz, Anthony Joseph) Fault-tolerant.
CITRIS Poster Supporting Wide-area Applications Complexities of global deployment  Network unreliability.
Locality Optimizations in Tapestry Jeremy Stribling Joint work with: Kris Hildrum Ben Y. Zhao Anthony D. Joseph John D. Kubiatowicz Sahara/OceanStore Winter.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
Or, Providing High Availability and Adaptability in a Decentralized System Tapestry: Fault-resilient Wide-area Location and Routing Issues Facing Wide-area.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Arnold N. Pears, CoRE Group Uppsala University 3 rd Swedish Networking Workshop Marholmen, September Why Tapestry is not Pastry Presenter.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
Brocade Landmark Routing on P2P Networks Gisik Kwon April 9, 2002.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 More on Plaxton routing There are n nodes, and log B n digits in the id, where B = 2 b The neighbor table of each node consists of - primary neighbors.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer to Peer Network Design Discovery and Routing algorithms
Tapestry : An Infrastructure for Fault-tolerant Wide-area Location and Routing Presenter : Lee Youn Do Oct 5, 2005 Ben Y.Zhao, John Kubiatowicz, and Anthony.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
Brocade: Landmark Routing on Overlay Networks
Internet Indirection Infrastructure (i3)
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Kris, Karthik, Ansley, Sean, Jeremy Dick, David K, Frans, Hari
Plethora: Infrastructure and System Design
Zhichen Xu, Mallik Mahalingam, Magnus Karlsson
Ben Y. Zhao University of California at Berkeley
Infrastructure-based Resilient Routing
An Overlay Infrastructure for Decentralized Object Location and Routing Ben Y. Zhao University of California at Santa Barbara.
John D. Kubiatowicz UC Berkeley
COS 561: Advanced Computer Networks
Locality Optimizations in Tapestry Sahara/OceanStore Winter Retreat
Rapid Mobility via Type Indirection
Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Brocade: Landmark Routing on Peer to Peer Networks
Presentation transcript:

Exploiting Route Redundancy via Structured Peer to Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz University of California, Berkeley ICNP 2003

November 7, 2003 Challenges Facing Network Applications Network connectivity is not reliable  Disconnections frequent in the wide-area Internet  IP-level repair is slow Wide-area: BGP  3 mins Local-area: IS-IS  5 seconds Next generation network applications  Mostly wide-area  Streaming media, VoIP, B2B transactions  Low tolerance of delay, jitter and faults  Our work: transparent resilient routing infrastructure that adapts to faults in not seconds, but milliseconds

ICNP 2003 November 7, 2003 Talk Overview Motivation Why structured routing Structured Peer to Peer overlays Mechanisms and policy Evaluation Summary

ICNP 2003 November 7, 2003 Routing in “Mesh-like” Networks Previous work has shown reasons for long convergence [Labovitz00, Labovitz01] MinRouteAdver timer  Necessary to aggregate updates from all neighbors Commonly set to 30 seconds  Contributes to lower bound of BGP convergence time Internet becoming more mesh-like [Kaat99,labovitz99]  Worsens BGP convergence behavior Question  Can convergence be faster in context of structured routing?

ICNP 2003 November 7, 2003 Resilient Overlay Networks (MIT) Fully connected mesh Allows each node full knowledge of network  Fast, independent calculation of routes  Nodes can construct any path, maximum flexibility Cost of flexibility  Protocol needs to choose the “right” route/nodes  Per node O(n) state Monitors n - 1 paths  O(n 2 ) total path monitoring is expensive S D

ICNP 2003 November 7, 2003 Leveraging Structured Peer-to-Peer Overlays Key based routing (IPTPS 03)  Large sparse ID space N (160 bits: 0 – )  Nodes in overlay network have nodeIDs  N  Given some key k  N, overlay deterministically maps k to its root node (live node in the network)  route message to root (k) 0 root(k) k source Distributed Hashtables (DHT) is interface on KBR  Key is leveraging underlying routing mesh

ICNP 2003 November 7, 2003 Proximity Neighbor Selection PNS = network aware overlay construction  Within routing constraints, choose neighbors closest in network distance (latency)  Generally reduces # of IP hops Important for routing  Reduce latency  Reduce susceptibility to faults Less IP links = smaller chance of link/router failure  Reduce overall network bandwidth utilization We use Tapestry to demonstrate our design  P2P protocol with PNS overlay construction  Topology-unaware P2P protocols will likely perform worse

ICNP 2003 November 7, 2003 v v v v vv v v v v v v v O V E R L A Y System Architecture Locate nearby overlay proxy Establish overlay path to destination host Overlay traffic routes traffic resiliently Internet

ICNP 2003 November 7, 2003 B Traffic Tunneling Legacy Node A Legacy Node B Proxy register Structured Peer to Peer Overlay put (hash(B), P’(B)) P’(B) get (hash(B)) P’(B) A, B are IP addresses put (hash(A), P’(A)) P’(A) = A P’(B) = B Store mapping from end host IP to its proxy’s overlay ID Similar to approach in Internet Indirection Infrastructure (I3)

ICNP 2003 November 7, 2003 Tradeoffs of Tunneling via P2P Less neighbor paths to monitor per node: O(log(n))  Large reduction in probing bandwidth: O(n)  O(log(n))  Increase probing frequency  Faster fault detection with low bandwidth consumption Actively maintain path redundancy  Manageable for “small” # of paths  Redirect traffic immediately when a failure is detected  Eliminate on-the-fly calculation of new routes  Restore redundancy when a path fails End result  Fast fault detection + precomputed paths = increased responsiveness to faults Cons  Overlay imposes routing stretch (more IP hops), generally < 2

ICNP 2003 November 7, 2003 Some Details Efficient fault detection  Use soft-state to periodically probe log(n) neighbor paths  “Small” number of routes  reduced bandwidth  Exponentially weighted moving average in link quality estimation Avoid route flapping due to short term loss artifacts Loss rate L n = (1 -  )  L n-1 +    p p = instantaneous loss rate,  = hysteresis factor Maintaining backup paths  Each hop has flexible routing constraint Create and store backup routes at node insertion  Restore redundancy via “intelligent” gossip after failures  Simple policies to choose among redundant paths

ICNP 2003 November 7, 2003 First Reachable Link Selection (FRLS) Use estimated loss results to choose shortest “usable” path Sort next hop paths by latency Use shortest path with minimal quality > T Correlated failures  Reduce with intelligent topology construction  Key is to leverage redundancy available

ICNP 2003 November 7, 2003 Evaluation Metrics for evaluation  How much routing resiliency can we exploit?  How fast can we adapt to faults?  What is the overhead of routing around a failure? Proportional increase in end to end latency Proportional increase in end to end bandwidth used Experimental platforms  Event-based simulations on transit stub topologies Data collected over different 5000-node topologies  PlanetLab measurements Microbenchmarks on responsiveness Bandwidth measurements from 200+ node overlays Multiple virtual nodes run per physical machine

ICNP 2003 November 7, 2003 Exploiting Route Redundancy (Sim) Simulation of Tapestry, 2 backup paths per routing entry Transit-stub topology shown, results from TIER and AS graphs similar

ICNP 2003 November 7, 2003 Responsiveness to Faults (PlanetLab) Response time increases linearly with probe period Minimum link quality threshold T = 70%, 20 runs per data point

ICNP 2003 November 7, 2003 Link Probing Bandwidth (Planetlab) Medium sized routing overlays incur low probing bandwidth Bandwidth increases logarithmically with overlay size

ICNP 2003 November 7, 2003 Related Work Redirection overlays  Detour (IEEE Micro 99)  Resilient Overlay Networks (SOSP 01)  Internet Indirection Infrastructure (SIGCOMM 02)  Secure Overlay Services (SIGCOMM 02) Topology estimation techniques  Adaptive probing (IPTPS 03)  Peer-based shared estimation (Zhuang 03)  Internet tomography (Chen 03)  Routing underlay (SIGCOMM 03) Structured peer-to-peer overlays  Tapestry, Pastry, Chord, CAN, Kademlia, Skipnet, Viceroy, Symphony, Koorde, Bamboo, X-Ring…

ICNP 2003 November 7, 2003 Conclusion Benefits of structure outweigh costs  Structured routing lowers path maintenance costs Allows “caching” of backup paths for quick failover  Can no longer construct arbitrary paths Structured routing with low redundancy gets very close to ideal in connectivity Incur low routing stretch Fast enough for highly interactive applications  300ms beacon period  response time < 700ms  On overlay networks of 300 nodes, b/w cost is 7KB/s Future work  Deploying a public routing and proxy service on PlanetLab  Examine impact of Network aware topology construction Loss sensitive probing techniques

ICNP 2003 November 7, 2003 Questions… Related websites:  Tapestry  Pastry  Chord Acknowledgements  Thanks to Dennis Geels and Sean Rhea for their work on the BMark benchmark suite

ICNP 2003 November 7, 2003 Backup Slides

ICNP 2003 November 7, 2003 Another Perspective on Reachability Portion of all pair- wise paths where no failure-free paths remain Portion of all paths where IP and FRLS both route successfully A path exists, but neither IP nor FRLS can locate the path FRLS finds path, where short-term IP routing fails

ICNP 2003 November 7, 2003 Constrained Multicast Used only when all paths are below quality threshold Send duplicate messages on multiple paths Leverage route convergence  Assign unique message IDs  Mark duplicates  Keep moving window of IDs  Recognize and drop duplicates Limitations  Assumes loss not from congestion  Ideal for local area routing ???

ICNP 2003 November 7, 2003 Latency Overhead of Misrouting

ICNP 2003 November 7, 2003 Bandwidth Cost of Constrained Multicast

ICNP 2003 November 7, 2003 Challenge 2: Tunneling Application Traffic Basic idea  Tunnel “legacy” traffic via overlay proxies  Should be protocol independent Desired properties  Traffic redirection transparent to end hosts  Stable mapping between a proxy and its legacy nodes  Incremental deployment Details  Making a connection to D Determine if D is reachable from overlay If so, retrieve D’s overlay ID from storage in overlay Redirect traffic through overlay to D’s overlay ID  Assign legacy nodes IDs in the overlay Routing to IDs automatically reach respective proxies

ICNP 2003 November 7, 2003 Assigning Overlay Identifiers A proxy close by in network assigns a legacy node a non-random overlay ID Assign closest possible ID to proxy’s ID  such that: root (ID) = proxy  Chord/Tapestry: ID = proxyID – 1 Stable ID mapping  Probability of a new node “hijacking” legacy node very low  1 million nodes, 1000 nodes / proxy, 160 bit names, P h < source node ID proxy destination node ID

ICNP 2003 November 7, 2003 Unused Slides

ICNP 2003 November 7, 2003 Summary Highly adaptive to link failures  Fast adaptation time w/ low monitoring BW cost 300ms beacon period, 7KB/s (300 overlay nodes), response time < 700ms  Low latency and BW overhead for misrouting Limitation: less useful for congested IP links  Constrained multicast can exacerbate congestion  Can utilize more physically-aware overlay construction  Issue: using loss as congestion indicator Can fix with more intelligent protocols such as XCP

ICNP 2003 November 7, 2003 Possible Approaches Modify basic IP protocols  BGP, OSPF, IS-IS  Millions of deployed routers  Significant deployment challenge “Helper” infrastructures to assist protocols  Manipulate input to improve performance without modification Deploy intelligent protocols above IP layer  Overlay approach taken by many  Relies on basic point to point IP routing