1 Grid vs. Peer-to-Peer Yin Chen 25 June 2003.

Slides:



Advertisements
Similar presentations
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Advertisements

Scalable Content-Addressable Network Lintao Liu
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Freenet A Distributed Anonymous Information Storage and Retrieval System Ian Clarke Oskar Sandberg Brandon Wiley Theodore W.Hong.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Gnutella, Freenet and Peer to Peer Networks By Norman Eng Steven Hnatko George Papadopoulos.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
SkipNet: A Scaleable Overlay Network With Practical Locality Properties Presented by Rachel Rubin CS294-4: Peer-to-Peer Systems By Nicholas Harvey, Michael.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Efficient Search in Peer to Peer Networks By: Beverly Yang Hector Garcia-Molina Presented By: Anshumaan Rajshiva Date: May 20,2002.
Searching in Unstructured Networks Joining Theory with P-P2P.
Wide-area cooperative storage with CFS
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
“Umbrella”: A novel fixed-size DHT protocol A.D. Sotiriou.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
P2P File Sharing Systems
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
Introduction Widespread unstructured P2P network
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
Searching In Peer-To-Peer Networks Chunlin Yang. What’s P2P - Unofficial Definition All of the computers in the network are equal Each computer functions.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Ian Clarke, Oskar Sandberg, Brandon Wiley,Theodore W. Hong Presented by Zhengxiang.
Freenet File sharing for a political world. Freenet: A Distributed Anonymous Information Storage and Retrieval System I. Clarke, O. Sandberg, B. Wiley,
Routing Indices For P-to-P Systems ICDCS Introduction Search in a P2P system –Mechanisms without an index –Mechanisms with specialized index nodes.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
1 MSc Project Yin Chen Supervised by Dr Stuart Anderson 2003 Grid Services Monitor Long Term Monitoring of Grid Services Using Peer-to-Peer Techniques.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
P2p file storage and distribution Team: Brian Smith, Daniel Suskin, Dylan Nunley, Forrest Vines Mentor: Brendan Burns.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
P2PComputing/Scalab 1 Gnutella and Freenet Ramaswamy N.Vadivelu Scalab.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Peer to Peer Network Design Discovery and Routing algorithms
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Freenet: Anonymous Storage and Retrieval of Information
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
CS 268: Lecture 22 (Peer-to-Peer Networks)
Peer-to-Peer Data Management
CS 268: Peer-to-Peer Networks and Distributed Hash Tables
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric
Presentation transcript:

1 Grid vs. Peer-to-Peer Yin Chen 25 June 2003

2 Content zGrid vs. P2P zWhat’s the request zWhy P2P architecture zIssues of P2P zP2P case study- Freenet zDesign

3 Grid vs. P2P z Grid z Standards- based z Persistent z Addresses security issues z Resources are more powerful,more diverse, better connected z Data intensive z Facing problems of autonomic configuration and management z Not much scalable

4 Grid vs. P2P zP2P z Much scalability z Fault tolerance z Self-configuration z Automatic problem determination z Higher variable behaviour z But lack of infrastructure z Security problems z Less concerned with qualities of service

5 What’s the request zA user requests the car service, and keeps logs recording if the request success or fail zThe user may asks all other users about history request records. By statistic, we can know particular service responding ability. zWhich can also gives prediction of further request.

6 Why P2P zNot run-time information zBetter fault tolerance, zPull model efficient and less network traffic

7 Issues of P2P - Topology

8 Issues of P2P - Response Modes

9 Issues of P2P … It turns to be problem of query from distributed data stores, which is different from central database query …

10 Issues of P2P - Query Processing Recursively Partitionable Query

11 Issues of P2P - Abort Timeout (1) zProblems - User no longer interested in query results - Query will forever roaming the network without stop it - The query should be fade away after sometime - Static timeout remains unchanging across hops zSolution ->Dynamic Abort Timeout - Nodes further away from the originator timeout earlier than nodes closer to the originator. - Decrease the timeout at each hop - Exponential decay with halving

12 Issues of P2P - Abort Timeout (2)

13 Issues of P2P - Query Scope (1) zProblems - No necessary to search the whole net - Broadcast model will flooding the network. zSolutions -> Select a neighbour subset - Search only a specific domain, host, owner - Random select half of the neighbours - In a tree-like topology, select all child and ignore all parent - Only find a single result. - Specify the maximum number of result (maxResults) and bytes (maxResultBytes) to be returned.

14 Issues of P2P - Query Scope (2) zMaintain a statistics about its neighbours. Only select neighbours that meet minimum requirements in term of latency, bandwidth or historic (maxLatency, minBandwidth, minHistoricResult) zNeighbour Selection Query zRadius of a query - is a measure of path length. - Set the maximum number of hops a query is allowed to travel - The radius is decreased by one at each hop. - The roaming query and response fade away when a radius of less than zero.

15 Issues of P2P - Routing zRandom forwarding(random walk) zLearning : nodes record the requests answered by other nodes. A request is forwarded to the peer that answered similar requests previously or randomly. zBest neighbour : records the number of answers received from each peer. A request is forwarded to the peer who answered the largest number of requests. zLearning + best neighbour : identical with the learning, when no relevant experience exists, the request is forwarded to the best neighbour.

16 P2P Case Study - Freenet zFreenet provides a file-storage service zThe network is entirely decentralised zInformation publishers and consumers are anonymous zCommunications are encrypted zFiles in the data store are encrypted

17 Adding New File zA user assigns the file a GUID key, sends an insert message, containing file identifier(GUID) and a time-to- live(TTL)value. zGUID is location - independent globally unique identifier. By hashing the contents of the file. zOn receiving an insert, the node checks if the key already exist. If not, stores it, creates a routing entry for it, looks up the closest key, and forwards the message to the related node. zIf TTL expires, the final node returns an “all clear” message. The user then sends the data alone the path.

18 Requesting File zEvery node maintains a routing table, listing addresses of other nodes and GUID keys. zOn receiving a query, it first checks its own store. If it finds the file, it announces itself as the holder. Otherwise, it forwards the query to the node with the closest key. zIf the file is found, each node passes the file alone the chain, and creates a new entry in its routing table. zEach node might also cache a copy locally. zThe query maintains a TTL, decreased at each hop. zIf a node runs out of candidates, it reports failure and back the its predecessor, which then tries its second choice

19 Adding New Node zNew node sends a announcement to an existing node, with a TTL. zThe receiving node forwards the announcement to another node chosen randomly from its routing table. zThe announcement continues to propagate until its TTL runs out.

20 Training Routes zNodes that reliably answer queries will be added to more routing tables. zWell-known nodes tend to see more requests and become better connected. zSimilar keys tend to cluster in the nodes along the same path, because requests will be for similar files which have similar keys.

21 Managing Storage zGiven finite disk space, sometime need to decide which file to keep. zFreenet decides by the frequency of requests per file, keeps the more popular files. zFrequently requested files have more copies in the network. Tree grows in that direction zUnrequested files are subjected to delete. Tree shrinks in that direction.

22 Design z Tree Topology z Each node maintains a Log File z Each node also maintains a Local Data Store for storing the queries result.

23 Design zAdding New Node - When a new node adds to the network, it connects itself to only one existing node. zAdding Log Record - When a user accesses services, a log record will be created - Log records should provide information about service name, service accessing time, success/fail flag

24 Design - Query zQuery - When a node sets up a query, it first looks up its local data store to see if the same query exists. - If it is a new query, the node multicasts a query message to all connecting nodes. The query message contains Query Conditions, Maximum Data Volume value and a Dynamic Abort Timeout(DAT) value. - Query Condition may contains time period which user concerns, services name etc.

25 Query - On receiving the query message, a node first looks up its own local data store, if there is no same query, it multicasts the query to all connecting nodes. - When DAT expires, the final node begins to return data along the chain. - Response using Routed Response mode

26 Design - Query - To reduce network traffic, calculation will operate at each node. Using Recurisively Query Plan. The calculation result will propagate up along the chain.

27 Design - Query - To avoid data flooding, only necessary volume data will be calculated, that is specified by Maximum Data Volume - Each chain will return zero or one result - Dynamic Abort Time (DAT) using Exponential decay with halving model. DAT will decrease at each hop.

28 Design zCalculation - By particular statistics methodology zShowing Result - Final result will be shown in graph style - The query result will also be saved in the Local Data Store zDeleting log records - To save disk space, early log records should be deleted after period of time

29 Grid vs. P2R Thanks !