Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,

Slides:



Advertisements
Similar presentations
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
2/66 GET /index.html HTTP/1.0 HTTP/ OK... Clients Server.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Replica Control for Peer-to- Peer Storage Systems.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
Overlay Networks + Internet routing has exhibited scalability - Internet routing is inefficient -Difficult to add intelligence to Internet Solution: Overlay.
Applications over P2P Structured Overlays Antonino Virgillito.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Stoica et al. Presented by Tam Chantem March 30, 2007.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Wide-area cooperative storage with CFS
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Structured P2P Network Group14: Qiwei Zhang; Shi Yan; Dawei Ouyang; Boyu Sun.
Introduction to Peer-to-Peer Networks. What is a P2P network Uses the vast resource of the machines at the edge of the Internet to build a network that.
Data Consistency in the Structured Peer-to-Peer Network Cheng-Ying Ou, Polly Huang Network and Systems Lab 台灣大學電機資訊學院電機所.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Peer-to-Peer Computing CS587x Lecture Department of Computer Science Iowa State University.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
Distributed Load Balancing for Key-Value Storage Systems Imranul Hoque Michael Spreitzer Malgorzata Steinder.
A Distributed Architecture for Multi-dimensional Indexing and Data Retrieval in Grid Environments Athanasia Asiki, Katerina Doka, Ioannis Konstantinou,
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
High Throughput Computing on P2P Networks Carlos Pérez Miguel
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
1 Distributed Hash Tables (DHTs) Lars Jørgen Lillehovde Jo Grimstad Bang Distributed Hash Tables (DHTs)
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
An Improved Kademlia Protocol In a VoIP System Xiao Wu , Cuiyun Fu and Huiyou Chang Department of Computer Science, Zhongshan University, Guangzhou, China.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer to Peer Network Design Discovery and Routing algorithms
Data Indexing in Peer- to-Peer DHT Networks Garces-Erice, P.A.Felber, E.W.Biersack, G.Urvoy-Keller, K.W.Ross ICDCS 2004.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Peter R Pietzuch and Jean Bacon Peer-to-Peer Overlay Networks in an Event-Based Middleware DEBS’03, San Diego, CA, USA,
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Bruce Hammer, Steve Wallis, Raymond Ho
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Malugo – a scalable peer-to-peer storage system..
Large-Scale Monitoring of DHT Traffic Ghulam Memon – University of Oregon Reza Rejaie – University of Oregon Yang Guo – Corporate Research, Thomson Daniel.
Querying the Internet with PIER CS294-4 Paul Burstein 11/10/2003.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Peer-to-Peer Information Systems Week 12: Naming
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004.
Distributed Hash Tables
Providing Secure Storage on the Internet
Distributed P2P File System
Peer-to-Peer Video Services
Chord and CFS Philip Skov Knudsen
Consistent Hashing and Distributed Hash Table
Peer-to-Peer Information Systems Week 12: Naming
Distributed Systems and Algorithms
Presentation transcript:

Thesis Proposal Data Consistency in DHTs

Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing, file storage, Real time broadcasting, … Advantages of P2P system –Scalable –load balance, –fault-tolerant, –low-cost deployment Why is it so magic?

Core of P2P Each peer is a server and a client DHT –Every peer can find each other and cooperate –A hashed ID maps to a peer or an object –The object would be stored on the closest peer

Usages of DHT Directory service –Very little amount of information, such as URI, metadata, … –Don’t need to modified Storage –Data, such as files, … –Immutable, only for downloading and uploading What is the next?

Mutable DHT Most of DHT are for immutable data Immutable –Data wouldn’t be modified –Operations of DHT ping, search, publish Mutable –Data would be modified –Operations of DHT ping, search, publish, delete, modified

What is the challenge? Churn –Peer join, leave, fail randomly Replica –Fault-tolerant Problem –Object consistency Replicas are consistent on different nodes

What is the challenge? Network dynamic –Partial unreachability Problem –Key consistency Only one node is the root of a key

Related work Consensus system –Primary data maintainer –Clients modify the data on primary one –Do consensus algorithm After data modified After churn happened Quorum system –No primary one –Clients try to lock every replica before modifying

Related work Authorization –Contact the original closest one –Get Authorized token of the closer partition –Be the root of the partition

Questions Is key consistency really a big assumption on realistic environment? For what kind of churn and mutability, do we need a strong consistency mechanism? The importance of key and data consistency mechanisms –If we can guarantee only one of them, than what is the result on different situations?

Experimental Plan Create a realistic network environment for simulation Result of data consistency on different churn and mutability –DHT without any mechanism –DHT with key consistency mechanism –DHT with data consistency mechanism –DHT with key and data consistency mechanisms

Network Environment for Simulation Partial unreachability –Path outage probability of internet –Path outage duration and inter-duration Distribution of Node up and down –Statistics of real p2p network Topology –Hierarchical topology (few depth of AS’) –BRITE

References 1.Non-Transitive Connectivity and DHTs 2.Key consistency in DHTs 3.Toward Fault-tolerant Atomic Data Access in Mutable Distributed Hash Tables 4.Etna: a Fault-tolerant Algorithm for Atomic Mutable DHT Data 5.PaxonDHT: Achieving Consensus in Distributed Hash Tables 6.MUREX: A Mutable Replica Control Scheme for Structured Peer- to-Peer Storage Systems 7.A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems 8.An Experimental Study of the Skype Peer-to-Peer VoIP System 9.Actively Monitoring Peers in KAD 10.An Analysis of Network Reachability Using BGP Data 11.PlanetSeeer: Internet Path Failure Monitoring and Characterization in Wide-Area services 12.Quantifying the Effects of Routing dynamics on End-to-End Internet Path Failures

Next!! Questions –Nothing –Key consistency –Data consistency –Key and data consistency Narrow down –What my application like? –The parameters would be? –Why can’t Others experiment and parameters I use? –Why they are not realistic –Simulate the same other and change parameters to mine –Churn Distributions parameters –Experimental plans!! (all details)