N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST DHT Based P2P (Peer-to-Peer) for Exploiting Network Proximity ChanMo Park

Slides:



Advertisements
Similar presentations
Topology-Aware Overlay Construction and Server Selection Sylvia Ratnasamy Mark Handley Richard Karp Scott Shenker Infocom 2002.
Advertisements

Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handly, Richard Karp and Scott Shenker Presented by Shreeram Sahasrabudhe.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Bowstron & Peter Druschel Presented by: Long Zhang.
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network (CAN) ACIRI U.C.Berkeley Tahoe Networks.
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Efficient, Proximity-Aware Load Balancing for DHT-Based P2P Systems Yingwu Zhu, Yiming Hu Appeared on IEEE Trans. on Parallel and Distributed Systems,
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Predicting Communication Latency in the Internet Dragan Milic Universität Bern.
T. S. Eugene Ng Mellon University1 Global Network Positioning: A New Approach to Network Distance Prediction Tze Sing Eugene.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
An Evaluation of Scalable Application-level Multicast Using Peer-to-peer Overlays Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony Rowstron,
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Topology-Aware Overlay Networks By Huseyin Ozgur TAN.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Brocade Landmark Routing on P2P Networks Gisik Kwon April 9, 2002.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST Scalable Overlay Network for Peer-to-Peer File Sharing Park, Chanmo Networked Media Lab. Kwang-Ju.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
Lecture 12 Distributed Hash Tables CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Location aware CHORD Ashwin, Vivek, Manu CS-7460 Project Presentation.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Network Coordinates : Internet Distance Estimation Jieming ZHU
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
1 Distributed Hash Tables and Structured P2P Systems Ningfang Mi September 27, 2004.
CSCI 599: Beyond Web Browsers Professor Shahram Ghandeharizadeh Computer Science Department Los Angeles, CA
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
15-829A/18-849B/95-811A/19-729A Internet-Scale Sensor Systems: Design and Policy Review.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Vivaldi: A Decentralized Network Coordinate System
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Analysis of Network Distance Prediction with Global Network Positioning Mathieu Rodrigue Department of Computer Science University of Hartford 17/09/2018.
Plethora: Infrastructure and System Design
Zhichen Xu, Mallik Mahalingam, Magnus Karlsson
Turning Heterogeneity into an Advantage in Overlay Routing
PASTRY.
A Scalable content-addressable network
Presentation transcript:

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST DHT Based P2P (Peer-to-Peer) for Exploiting Network Proximity ChanMo Park Jan. 9, 2004

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 2/20 Contents  Problems  Estimating Internet Distance  Exploiting Topology Information  Approaches towards exploiting network proximity  Discussion

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 3/20 Problems  P2P File Sharing  DHT (Distributed Hash Table) Based Approaches oCAN ( ’01 - ACIRI) oChord (’01 - MIT ) oTapestry (’01 - Berkeley) oPastry (’01 - Microsoft)  What can help P2P File Sharing? oPerformance of DHT based P2P  Routing (Lookup and Insert)  Nearest node as Next hop  Exploiting Network Proximity

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 4/20 Estimating Internet Distance  Triangulated Heuristic ’00 USC  IDMaps ’01 University of Michigan  GNP (Global Networking Positioning) ’02 CMU  Vivaldi ’03 MIT (Chord)

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 5/20 Triangulated Heuristic ’00 USC  Select N nodes in the network to be base nodes  A node H is assigned coordinates (N-tuples) which are the distances between H and the N base nodes  Then the distance between H1 and H2 is bounded below by bounded above by  U, L, or (U+L)/2 can be distance estimation Base nodes A B

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 6/20 IDMaps ’01 Univ. of Michigan  Special HOPS servers maintain a virtual topology map of the Internet consisting of end hosts and Tracers  Distance of host A and B is estimated as D=a+b+c A B Tracer 1 Tracer 2 a b c

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 7/20 GNP (Global Network Positioning)’02 - CMU

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 8/20 Vialdi’03 - MIT  Distributed algorithm assigning synthetic coordinates in D- dimensional space to Internet hosts  Predicting latency between two hosts by Euclidean distance between their coordinates  Coordinate of each node oSimulating node’s position in a network of physical network  Sampling the network latency between each node and a few other nodes, adjusting the node’s coordinates to minimize the error between the predicted and sampled latencies.  No fixed infrastructure oCollecting latency information from only a few other hosts oPiggy-backing latency information on application traffic

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 9/20 Exploiting Topology Information  Proximity Routing  Proximity Neighbor Selection  Geographic layout

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 10/20 Proximity Routing  Proximity routing is when the routing choice is based not just which neighboring node makes the most progress towards the key, but is also based on which neighboring node is closest in the sense of latency.  compromise between progress in the ID space and proximity in ro uting  Adv. oLight weight, easy to implement oWorkable for all algorithms  Limitation oImprovement depend on number of neighbor.

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 11/20 Proximity Neighbor Selection  Proximity criterion is applied when choosing neighbors, not just when choosing the next hop  Topology  constructing Routing Table  Adv. oImprove performance for prefix routing  Limitation oCan Not apply to CAN, Chord, etc.

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 12/20 Geographic layout  Geographical layout is to choose node identifiers in a geographically informed manner.  Choose nodeID according to physical network  Adv. oSuccessfully apply to CAN  Limitation oNot apply to one dimensional ID space overlay (Chord, Tapestry, P astry, etc) oNeed landmark oDestroy uniform ID population  Load balance

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 13/20 Approaches towards exploiting network proximity 1.Efficient Topology-Aware Overlay Network ’02 2.Efficient Topology-Aware Overlay Network ’02 3.Exploiting network proximity in peer-to-peer overlay networks ’02 4.Topology-aware routing in structured peer-to-peer overlay networks ’02 5.Topologically-Aware Overlay Construction and Server Selection ’02 6.Building Topology-Aware Overlays using Global Soft-State ’03

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 14/20 Efficient Topology-Aware Overlay Network ’02(#1)  Mithos  Proximity Neighbor Selection  Efficient routing o Cartesian coordinate system o Irregular hypercube mesh  Locality-preserving o Chose neighbors wisely  Routing and forwarding o Quadrant-based o Only neighbors known o Efficient forwarding  Assuming 2-D oConnect to each quadrant oForward according to destination vector oRouting becomes trivial

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 15/20 Efficient Topology-Aware Overlay Network ’02 (#2)  Node ID cannot be known a priori  Find out during join phase  Descend towards global minimum  Stabilize using "spring forces"  Result: Node ID

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 16/20 Exploiting network proximity in peer-to-peer overlay networks ’02 Topology-aware routing in structured peer-to-peer overlay networks ’02  Pastry (Tapestry)  Proximity Neighbor Selection  Using mechanism to build routing tables taking network proximity into account  Proximity Invariant oEach entry in a node X’s routing table refers to a node that is near X, according to the proximity metric, among all the live Pastry nodes with the appropriate nodeID prefix

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 17/20 Topologically-Aware Overlay Construction and Server Selection ’02  Based on CAN  Distributed Binning oRequire a set of landmark node spread across the Internet oSelect a particular bin by Measuring its distance to a set of landmarks oUsing Landmark ordering oPartition the coordinate space into m! equal sized portions

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 18/20 Building Topology-Aware Overlays using Global Soft-State ’03  eCAN  Landmark clustering + RTT oComputers with similar landmark vectors are likely to be close omeasures RTT to top candidates to find the nearest neighbor oUse landmark vector as the DHT key U Landmark vector U=(u1,u2,u3,u4) L1L2L3L4 Landmark nodes u1u2u3u4 V Landmark vector V=(v1,v2,v3,v4) v1v2v3v4 U’ Landmark space Landmark vector B A

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 19/20 Discussion

N ETWORKed M EDIA L AB. D EPT. OF I NFO. & C OMM., K-JIST 20/20 References 1.Zhichen Xu, Chunqiang Tang, and Zheng Zhang: "Building Topology-Aware Overlays using Global Soft-State". The 23rd International Conference on Distributed Computing Systems. May 19-22, 2003 Providence, Rhode Island USA (CAN Proximity Neighbor Selection (Landmark + RTT))Building Topology-Aware Overlays using Global Soft-State" 2.S. Ratnasamy, M. Handley and R. Karp, “Topologically-Aware Overlay Construction and Server Selection”, Proceedings of Infocom, 2002(CAN Geographic Layout)Topologically-Aware Overlay Construction and Server Selection 3.Miguel Castro, Peter Druschel, Y. Charlie Hu, and Antony Rowstron. “Topology-aware routing in structured peer-to-peer overlay networks“, In FuDiCo 2002: International Workshop on Future Directions in Distributed Computing. University of Bologna Residential Center Bertinoro (Forli), Italy, June (Pastry Proximity Neighbor) SelectionTopology-aware routing in structured peer-to-peer overlay networks 4.Exploiting network proximity in peer-to-peer overlay networks. Miguel Castro, Peter Druschel, Y. Charlie Hu, and Antony Rowstron. Technical report MSR-TR , 2002 (Pastry Proximity Neighbor Selection)Exploiting network proximity in peer-to-peer overlay networks. 5.Marcel Waldvogel and Roberto Rinaldi, “Efficient Topology-Aware Overlay Network”, Hot Topics in Networks I (HotNets-I), October 2002.The HotNets-I proceedings will also appear in Computer Communication Review, Volume 33, Number 1, January 2003, triangulationMarcel WaldvogelEfficient Topology-Aware Overlay Network Hot Topics in Networks I (HotNets-I)Computer Communication Review triangulation