1 Locating Application Data Across Service Discovery Domains MobiCom’01.

Slides:



Advertisements
Similar presentations
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Advertisements

Tapestry: Decentralized Routing and Location SPAM Summer 2001 Ben Y. Zhao CS Division, U. C. Berkeley.
A Survey of Key Management for Secure Group Communications Celia Li.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Scalable Content-Addressable Network Lintao Liu
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handly, Richard Karp and Scott Shenker Presented by Shreeram Sahasrabudhe.
Distributed Systems Brief Overview CNT Mobile & Pervasive Computing Dr. Sumi Helal University of Florida.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Overlay Networks + Internet routing has exhibited scalability - Internet routing is inefficient -Difficult to add intelligence to Internet Solution: Overlay.
15-441: Computer Networking Lecture 26: Networking Future.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
An Architecture for a Secure Service Discovery Service Steven Czerwinski, Todd Hodes, Ben Zhao, Anthony Joseph, Randy Katz UC Berkeley Internet Scale Research.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
Hermes: A Distributed Event- Based Middleware Architecture Peter Pietzuch and Jean Bacon 1st DEBS Workshop, Vienna,
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Peer-to-Peer Overlay Networks. Outline Overview of P2P overlay networks Applications of overlay networks Classification of overlay networks – Structured.
4/11/06Tuesday Seminar1 The State of Service Discovery Jeff Pang.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Network Computing Laboratory Scalable File Sharing System Using Distributed Hash Table Idea Proposal April 14, 2005 Presentation by Jaesun Han.
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Overcast: Reliable Multicasting with an Overlay Network Paper authors: Jannotti, Gifford, Johnson, Kaashoek, O’Toole Jr. Slides by Chris Johnstone.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Peer to Peer Network Design Discovery and Routing algorithms
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
CS5248 Student Presentation1 Scalable Resilient Media Streaming Suman Banerjee, Seungjoon Lee, Ryan Braud, Bobby Bhattacharjee, Aravind Srinivasan NOSSDAV.
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Tapestry : An Infrastructure for Fault-tolerant Wide-area Location and Routing Presenter : Lee Youn Do Oct 5, 2005 Ben Y.Zhao, John Kubiatowicz, and Anthony.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
November 2005IETF 641 Interconnect SIP networks using P2P SIP Marc Bailly
Design and implementation of an intentional naming system William Adjie-WinotoElliot Schwartz Hari BalakrishnanJeremy Lilley MIT Laboratory for Computer.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
NCLAB 1 Supporting complex queries in a distributed manner without using DHT NodeWiz: Peer-to-Peer Resource Discovery for Grids Sujoy Basu, Sujata Banerjee,
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Malugo – a scalable peer-to-peer storage system..
CMSC 691B Multi-Agent System A Scalable Architecture for Peer to Peer Agent by Naveen Srinivasan.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
MIT – Laboratory for Computer Science
CSE 4340/5349 Mobile Systems Engineering
Pervasive Data Access (PDA) Research Group
An Architecture for Secure Wide-Area Service Discovery
Presentation transcript:

1 Locating Application Data Across Service Discovery Domains MobiCom’01 Byoungjip Kim SSLab, EECS, KAIST April 22, 2003

2 CONTENTS Introduction VIA Overview VIA Protocol Details Related Work Conclusions Critique

3 ITRODUCTION Mobile Computing Pervasive Computing Thin Clients –PDAs, cellular telephones, sensors, etc. Service Discovery Architecture –To manage pervasive devices –Ex. SLP, Jini, Salutation, UPnP –service discovery protocol –but, local (cell topology) –service discovery domain

4 INTRODUCTION (contd.) Problem – how to share data across service discovery domains Approach –1. Self-logging Client participation model Not sharable –2. Centralized index Infrastructure approach Not scalable Not reliable –3. Distributed indexes WASRV (1998, IETF) SDS (Mobicom’99, Berkeley) INS (OSR’99, MIT)

5 VIA OVERVIEW Gateways Main Channel Metadata Tags –F1: (sslab) –F2: (sslab,ppigy) –F3: (sslab,bjkim) –F4: (sslab,piggy,p3.jpg) VIA –Verified Information Access –“way” in Latin Well Known Multicast Group (sslab, piggy, p1.jpg) (sslab, bjkim, b2.jpg) (sslab, piggy, p2.jpg) (sslab, bjkim, b3.jpg) (sslab, yjsong, y1.jpg) (sslab, piggy, p3.jpg) G1 G2 G3 G4 PDA G5 (sslab, piggy, p4.jpg)

6 VIA OVERVIEW (contd.) Goal –To reduce irrelevant queries to the gateways Features –Hierarchical Scheme –Self-organizing of Gateways based on the types of queries depend on partial knowledge –Semantic Filtering get behind to avoid irrelevant queries –Data Centric Heuristic Criteria for Aggregation/Split –Hit ration: H = Q res /Q Aggregation is triggered when H < T1. –Filtering coefficient: F = Q c /Q root Split is triggered when H>T1, F>T2 –Heuristic mechanisms

7 VIA PROTOCOL Spanning Tree Operations –Growth, Non-root failure, Root failure, and merging. Some basic notions –cluster table, edge set, rootside link –Messages : JOIN, LINK, QUERY, FAIL, ACCEPT, REFRESH Some useful technique – bit randomly generated ID –2. proving (ping, RTT) –3. REFRESH message : heartbeat good scheme for the autonomy. –4. “token count” To avoid the congestion like “DOS” attack.

8 VIA PROTOCOL (Contd.) Basic –Failure recovery algorithms are based on the growth algorithm. Heartbeat (REFRESH message) –Is is useful to detect connection failure.

9 RELATED WORK Overlay Network –“test bed” “application-level infrastructure” –Adaptive Network : Odyssey (Michigan, ’99), CANS (NYU, ’01), etc. –Service Composition : Ninja (UCB, ’00), etc. VIAApplication-level multicast P2P file sharing EnvironmentMobile, Pervasivemaybe Mobile, not Pervasive maybe Mobile, not Pervasive GoalData Recovery, Sharing Content Distribution, Delivery Data Sharing Data Structure TreeMesh, TreeDHT ExampleWASRV (IETF, ’ 98) SDS (UCB, ’ 99) Yoid (ACIRI, ’ 99) Scattercast (UCB, ’ 99) Narada (CMU, ’ 00) NICE (UMD, ’ 02) Chord (MIT, ’ 01) Pastry (Rice, ’ 01) PAST (Rice, ’ 01)

10 CONCLUSIONS Problem –To locate application specific data across service discovery domains. Solution –Multicast + VIA Goal of VIA –To reduce irrelevant queries to a gateway. VIA features –Hierarchy Scheme –Semantic Filtering –Self-organizing Mechanism –Data Centric Heuristic

11 CRITIQUE Strong Points –Simple means against the complex distribution algorithm Proposal of Simple Self-organizing Mechanism Using Semantic Data Model (proper heuristic) Weak Points –VIA clusters rely on global multicast to bootstrap the cluster creation process. –As in any hierarchical scheme, top-level nodes act as “martyrs”. It must need a load balancing scheme for scalability. –Experiments are vulnerable to be doubted. There is no well-synthesized workload. New Idea –Collaboration based on “Reputation” of a node as another heuristic.

12 CRITIQUE (contd.) New Idea

13 Appendix 1 Metadata Tag Schema Query Example

14 Appendix 2 Message Workload vs. Query Distribution

15 Appendix 3 Workload distribution for 24 gateways, 6 cluster system