Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
1 1 Chord: A scalable Peer-to-peer Lookup Service for Internet Applications Dariotaki Roula
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Peer-to-Peer Content Sharing. P2P File Sharing Benefits Why use a P2P model for a file sharing application?
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Peer-to-Peer.
Object Naming & Content based Object Search 2/3/2003.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Wide-area cooperative storage with CFS
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
Distributed Systems Concepts and Design Chapter 10: Peer-to-Peer Systems Bruce Hammer, Steve Wallis, Raymond Ho.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Introduction of P2P systems
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
PSI Peer Search Infrastructure. Introduction What are P2P Networks? The term "peer-to-peer" refers to a class of systems and applications that employ.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Dr. Yingwu Zhu.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Bruce Hammer, Steve Wallis, Raymond Ho
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Malugo – a scalable peer-to-peer storage system..
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Peer-to-Peer File Sharing Systems Group Meeting Speaker: Dr. Xiaowen Chu April 2, 2004 Centre for E-transformation Research Department of Computer Science.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Peer-to-Peer Information Systems Week 12: Naming
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
Peer-to-Peer Information Systems Week 6: Performance
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
P2P: Distributed Hash Tables
Peer-to-Peer Information Systems Week 12: Naming
Presentation transcript:

Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS

Outline Peer-to-Peer systems Centralized P2P systems (hybrid) Unstructured P2P systems (pure) Structured P2P systems Super-peer networks CoCO Analysis and Conclusion

Peer-To-Peer Systems Decentralized data and resource sharing All computers have equal capabilities The resources can include: Processing power Data Network bandwidth Applications Redundant storage Permanence Selection of nearby servers Anonymity Search Authentication Hierarchical naming

Centralized Server P2P systems - Napster Used in large scale sharing of files Single server maintains a table of data Vs node Features Not self-organized Not scalable Single point of failure/attack Most popular network - mp3 sharing Applications: Napster Central Server Peer 5 Peer 2 Peer 3 Peer 4

Unstructured P2P networks - Gnutella Random overlay networks No central index Start with nodes that know about peer servers and flood along the network Peers find neighbors Features: Scalability – Flooding limited by TTL Keyword search Cannot guarantee search Applications: Gnutella Freenet Peer 1 Peer 6 Peer 7 Peer 4 Peer 3 Peer 5 Peer 2

Structured P2P networks – Chord, Pastry, CAN Based on ‘Distributed Hash Tables’ Self-organized overlay networks Insertion and lookup in a bounded number of hops Features: Load balancing Fault-tolerance Decentralization Scalability Availability Flexible naming Applications: Chord Pastry Tapestry CAN N51 N8 N14 N21 N1 N38 N42 N48 N58 K54 Lookup (K54) N32

Design and Analysis Chord provides fast distributed computation of a hash function, mapping keys to nodes responsible for them Assigns keys to nodes with consistent hashing A chord node needs only a small amount of routing information about other nodes A node resolves the hash function by communicating with other nodes With high probability, the number of nodes that must be contacted to find a successor is an N-node network is O(log N) Only O(log N) fingers need be stored When an Nth node joins or leaves the network, only an O(1/N) fraction of the keys are moved

Super-Peer Networks Hierarchy introduces manageability Super-Peer networks combine features of distributed search and centralized search Super-Peer node acts as server for subset of peers Inherent heterogeneity in the capability of peers on the network Super-Peers are assigned based on processing power, network bandwidth, degree etc. Super-peers communicate by flooding to other super-peers Super-peer to peer communication – centralized server system

Super-peer network Thumb rules for design Increasing cluster size reduces aggregate load Super-peer redundancy makes system resilient Super-peers should have higher out-degree Minimize TTL on floods Drawbacks Flooding does not guarantee search success Super-peers can be burdened Flooding traffic and duplicates

Self-similarities in Mandelbrot Set

Central Server 0 and 640 Super Peer Super Peer Super Peer Super Peer Super Peer Chord-over-Chord Overlay Chord-over-Chord Overlay(CoCO) Chord used in local clusters – Super-peer as manager Super-peer redundancy - by assigning super-peers at the edge Super-peers form a Chord overlay network Super-peers maintain finger tables for cluster as well as the super-peer overlay Central Server consulted only if all Chord searches fail on the overlay

Central Server Super Peer Chord-over-Centralized Server Overlay Chord-over-Centralized server Overlay (CoCO) Super-peers maintain a direct link to the Central Server Central Server consulted in case of failed searches in local clusters Central Server may be single point of failure

CoCO Analysis Number of nodes to be contacted in the local cluster of size N/m - O(log N/m) Cost of searching on Super-peer overlay - O(log m) Only O(log N/m) fingers need to be stored in peers and O(log m) additional fingers on super-peers When an node joins or leaves the network, only an O(m/N) fraction of the keys are moved and when Super peer leaves a network chord flip reassigns O(log N/m) + O(log m) fingers.

Discussion CoCO Uses DHT on all layers – hence resilient to failures, attacks. Increasing hierarchy improves manageability like Internet Efficient and guaranteed search results Joins/Leaves handled efficiently Super-Peer reassignment is integral part of the protocol Super-Peer networks using Gnutella Flooding can reduce efficiency Techniques to reduce flooding directly affect the network efficiency Super-peer failures are not accounted for Flooding on super-peers does not guarantee search results

Conclusion Possible applications of CoCO University wide P2P networks Each department has its own super-peer Company wide P2P networks Geographically distant networks controlled by administrators – super-peer assignment ISP controlled Napster like central server Strategically placed Super-peers – like Akamai caches Better control over the network dynamics and easy to implement Structured network is key to simpler administration

Thank you!