Self-organized fault-tolerant routing in P2P overlays Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo Euro-Labs,

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Castor: Scalable Secure Routing for Ad Hoc Networks
Breaking the Single-Path Barrier Brad Smith Jack Baskin SoE Research Review Day 10/20/2011.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Computer Networks Layering and Routing Dina Katabi
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Leveraging Social Networks for Increased BitTorrent Robustness Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo.
Designing a DHT for low latency and high throughput Robert Vollmann P2P Information Systems.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Packet-Switching Networks Routing in Packet Networks.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
CSE 461 University of Washington1 Topic How do we connect nodes with a switch instead of multiple access – Uses multiple links/wires – Basis of modern.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
William Stallings Data and Computer Communications
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Network Layer.
Ad-hoc Transport Layer Protocol (ATCP)
CS 457 – Lecture 12 Routing Spring 2012.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing in Packet Networks Shortest Path Routing
COS 561: Advanced Computer Networks
Distributed Systems CS
Distributed Systems CS
Presentation transcript:

Self-organized fault-tolerant routing in P2P overlays Wojciech Galuba, Karl Aberer EPFL, Switzerland Zoran Despotovic, Wolfgang Kellerer Docomo Euro-Labs, Munich, Germany

2 © 2009 EPFL, Docomo Euro-Labs What are the P2P overlays? Underlying blue network (e.g. TCP/IP) Red peers come and go Peers form an overlay network (red links)

3 Routing in P2P overlays Overlays (usually) have their own address space Goal: provide point-to-point connectivity  or rather point-to-service connectivity... © 2009 EPFL, Docomo Euro-Labs source destination

4 © 2009 EPFL, Docomo Euro-Labs What is the problem? Failures in large-scale systems are the norm, not the exception Permanent failures  well understood  Overlay maintenance algorithms Intermittent failures  Transient network connectivity problems  Peer overload, resource exhaustion  Cannot be addressed in the same way as permanent failures

5 Existing solutions - multipath Multiple paths Goal: at least one path reaches destination © 2009 EPFL, Docomo Euro-Labs source destination - lossy peer

6 Existing solutions – iterative routing Source controls the routing process Successively ask nodes for their neighbors High redundancy  if one node fails, use others © 2009 EPFL, Docomo Euro-Labs source destination - lossy peer j

7 Exisisting solutions - problems Heavily rely on message redundancy  High bandwidth cost Do not learn from failures  Likely to repeat the same routing mistakes © 2009 EPFL, Docomo Euro-Labs

8 Forward feedback protocol (FFP) Requestor determines the quality of the provided service decision binary: good or bad Feedback follows the same path as the request Feedback is obligatory, no feedback = bad feedback

9 A peer on the path Knows only its overlay neighbors Based on feedback, learns which neighbors are reliable Associates a success estimator with each (j, dz) pair:  j – neighbor address  dz – destination zone A success estimator is an exponentially averaged success rate, [0..1]  Initially 0.5  Increased on positive feedback  Decreased on negative feedback or feedback timeout © 2009 EPFL, Docomo Euro-Labs phpeer nh

10 Next hop selection Based on the state of the success estimators Pick a neighbor j for which the current value of a success estimator is the highest  i.e. maximize the probability of success based on performance history © 2009 EPFL, Docomo Euro-Labs

11 The FFP protocol in action ph peer nh2 nh1 nh1 has history of success but starts failing peer switches to nh © 2009 EPFL, Docomo Euro-Labs

12 Cumulative effect  The root cause of the failure receives the most negative feedback  The links to the faulty peer are avoided by its neighbors - lossy peer © 2009 EPFL, Docomo Euro-Labs

13 Scalability through dest zoning O(log N) zones and O(log N) neighbors Total state at each node: O(log 2 N) © 2009 EPFL, Docomo Euro-Labs Increasing overlay distance to destination Increasing destination zone number Exponentially decreasing zone size

14 Evaluation PlanetLab – a planetary-scale testbed 350 peers Conditions:  Median system load: 5.3  Unpredictable delays and loss „natural” on PlanetLab Challege:  introduce loss and delays in a Chord-like DHT  place a tight 3s timeout on service requests  see if protocols can route around faulty peers Workload: multi-source, multi-destination © 2009 EPFL, Docomo Euro-Labs

15 The line-up BASE – baseline, no fault-tolerance mechanisms MULTI4 – 4-way multipath routing ITER4 – Kademlia-based iterative routing, 4 parallel RPCs FFP © 2009 EPFL, Docomo Euro-Labs

16 Every 5 mins:  a new 10% of peers become droppers Droppers drop all requests © 2009 EPFL, Docomo Euro-Labs

17 © 2009 EPFL, Docomo Euro-Labs

18 © 2009 EPFL, Docomo Euro-Labs Every 5 mins:  a new 10% of peers become delayers Delayers delay all messages by ms

19 25% of droppers arrive at 300s Convergence time depends on the traffic pattern © 2009 EPFL, Docomo Euro-Labs

20 Topology-oblivious routing Starts with all success estimators = 0.5  Empty routing tables Learn by trial and error  Which neighbors are good forwarders for which destinations Routing tables are entirely emergent Initially random walks  converge to reliable routes © 2009 EPFL, Docomo Euro-Labs

21 © 2009 EPFL, Docomo Euro-Labs Warmup: initially use the original Chord routing tables After some time switch to FFP routing tables

22 Summary FFP uses 2-5 times less bandwidth than MULTI and ITER Same or higher fault-tolerance More suitable for workloads:  that are high-rate  with fewer src-dest pairs © 2009 EPFL, Docomo Euro-Labs

23 Benefits of the self-org approach Decentralized  scalability Topology-oblivious  Applicable to many networks Agnostic to the causes of failures  Robust to many failure scenarios Even those it was not designed for © 2009 EPFL, Docomo Euro-Labs

24 FFP used for secure routing in MANETs Additional crypto to prevent feedback forgery No PKI ! Tech report: © 2009 EPFL, Docomo Euro-Labs

25 FFP: a signaling meta-protocol Feedback is binary FFP can be used to signal any Boolean property of the routing path  Service provisioning success (currently)  Congestion on the path (ECN bit in IP) Congestion control  Delay exceeding thresholds Latency-minimizing routing? What about non-Boolean? © 2009 EPFL, Docomo Euro-Labs

26 At 800s, 40% peers become droppers FFP’s performance is not affected by churn © 2009 EPFL, Docomo Euro-Labs

27 Loop-freedom Requests stuck in a loop  negative feedback If requests exit a loop they have already accumulated a large delay  potentially negative feedback All in all, the © 2007 EPFL, DoCoMo Euro-Labs

28 Compared to ant algorithms FFP designed with focus on scalability FFP designed for highly dynamic systems:  P2P overlays  MANETs Not exactly an ant algorithm:  we found the „evaporation” to degrade performance © 2009 EPFL, Docomo Euro-Labs