CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.

Slides:



Advertisements
Similar presentations
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
Online Social Networks and Media Navigation in a small world.
Rumors and Routes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopRumors and Routes1.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Information Networks Small World Networks Lecture 5.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Thomas ZahnCST1 Seminar: Information Management in the Web Query Processing Over Peer- to-Peer Data Sharing Systems (UC Santa Barbara)
Small-world Overlay P2P Network
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Distributed Lookup Systems
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
Content Addressable Networks. CAN Associate with each node and item a unique id in a d-dimensional space Goals –Scales to hundreds of thousands of nodes.
The Small World Phenomenon: An Algorithmic Perspective by Anton Karatoun.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
P2P Course, Structured systems 1 Skip Net (9/11/05)
P2P Course, Structured systems 1 Introduction (26/10/05)
Peer-to-Peer Networks Slides largely adopted from Ion Stoica’s lecture at UCB.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Other Structured P2P Systems CAN, BATON Lecture 4 1.
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Small-world networks. What is it? Everyone talks about the small world phenomenon, but truly what is it? There are three landmark papers: Stanley Milgram.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Searching via Your Neighbor’s Neighbor: The Power of Lookahead in P2P Networks Moni Naor Udi Wieder The Weizmann Institute of Science Gurmeet Manku Stanford.
Hot Topics in Peer-to-Peer Computing (HOT-P2P 2004) Volendam 08 October 2004 Non-uniform deterministic routing on F-Chord(  ) Gennaro Cordasco, Luisa.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith CohenScott Shenker Some slides are taken from the authors’ original presentation.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
1 Slides from Richard Yang with minor modification Peer-to-Peer Systems: DHT and Swarming.
Gennaro Cordasco - How Much Independent Should Individual Contacts be to Form a Small-World? - 19/12/2006 How Much Independent Should Individual Contacts.
Online Social Networks and Media
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
MobiQuitous 2007 Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering Wei Gao.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Chord Advanced issues. Analysis Search takes O(log(N)) time –Proof 1 (intuition): At each step, distance between query and peer hosting the object reduces.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
BATON A Balanced Tree Structure for Peer-to-Peer Networks H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Peer-to-Peer Networks 03 CAN (Content Addressable Network) Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
A configuration method for structured P2P overlay network considering delay variations Tomoya KITANI (Shizuoka Univ. 、 Japan) Yoshitaka NAKAMURA (NAIST,
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Zone Routing Protocol (ZRP)
CS 268: Lecture 22 (Peer-to-Peer Networks)
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Peer-to-Peer and Social Networks
SKIP GRAPHS James Aspnes Gauri Shah SODA 2003.
CS 268: Peer-to-Peer Networks and Distributed Hash Tables
Compact routing schemes with improved stretch
Presentation transcript:

CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center

P2P Systems Two Classes: –Unstructed P2P Sytems High searching cost:Flooding with blind search may induce huge unuseful messages. Undeterministic search: It is hard to find these rare items. –Structured P2P Systems The right search depends on a valid geometry structure. The maintaining cost of the structure is due to the construction of this geometry. The limitation for current structured P2P systems –Chord/Tapestry/Pastry better routing hops O(logn) with relatively higher maintaing cost O(log 2 n ), where n is the number of the node. –CAN worst routing O(dn 1/d ) with relatively lower maintaining cost O(2d), where d is the dimension of a torus –like structure.

Goal Deterministic search Low search cost Low maintaining cost Better routing hops

Why CAN? CAN is a classic structured P2P system. It has : –A deterministic search –Low search cost –Low maintaining cost want: –Better routing hops with low maintaining cost

CAN Example Space divided between nodes All nodes cover the entire space Each node covers either a square or a rectangular Each node knows its neighbors in the d-space Forward query to the neighbor that is closest to the query id Example: assume n1 queries f n1 n2 n3 n4 n5 f1 f2 f3 f4

Construct Small World Network Kleinberg’s Model Theory (Kleinberg 1999) –node S should choose long range contact T with the probability of L -r, where L=||S-T|| is the Manhattan distance between node S and T, and r is the dimension degree of the underlying topology. The distribution of long contact is called the inverse rth-power distribution by Kleinsberg. It gives an upper- bound path length O(log 2 n) even with one long range contact.

Kleinberg’s Construction(2d-Grid) The key is the probabilistic distribution of the long contact, which should follow up the inverse r th -power distribution.

How to improve CAN? Construct Small World Network for CAN systems Add k long contacted edges for each node The Problem: –How to reduce the additional overheads for the construction of small world network? Cache long contacted edges instead of the real edges. –How to realize the inverse r th -power distribution for these long contacted edges? Probabilistic replacement Mechanism Improved CAN is called CCAN (Cache-based CAN )

CCAN Topology An illustration of CCAN topology and message forwarding in CCAN. There are 12 nodes distributed in the 8*8 lattice and a sketch map of routing table of node n4 is shown in the lattice. For a query message for item f3 originated from n3, it is forwarded with the greed strategy to the node that is closest to the query id. There is a shortcut from n4 to n12 because of the cached long contact in the routing table of n4.

When & How to Cache When: routing process How: replacing with a counting probability Suppose a worm routing with probabilistic replacement algorithm –Node S send a query request for Node T –During the routing process, the passed node P (including the target node) caches the Node S with a counting probability. –For any passed node P, suppose it has a cached long contact K. The counting probability: α = ||P-K|| d / (||P-K|| d + ||P-S|| d ) if random(0.,1.)< α cache S and evict K ; else still keep K The farther the distance is, the less the replacing probability is. It is in accord with the spirit of the small world model.

Cache Replacing Example Node n1 queries item f3, cache replacement happens along with the forwarding routing of the query message.

Theorem Theorem 1: Repeating the probabilistic cache replacing procedure in the system. Considering the node space N,  s  N, s would cache t (t  N∩t≠s) with probability proportional to ||s-t|| -d in CCAN with d dimension degree. * The cache mechanism gradually constructs the distribution of long contacts as same as Kleinberg’s construction. Theorem 2: With the help of the probabilistic cache scheme, CCAN system presents the small world phenomenon with the expected number of hops is O(log 2 n). Here n is the number of nodes in the system, and d is the dimension degree of CCAN. * The routing hops is improved from O(dn 1/d ) to O(log 2 n). See the proof in the paper

More Considerations 1. Dynamic Convergence 2. The Speed of Convergence 3. The Maintenance of Routing Table 4. Multi Cached Long Contacts

Convergence and Reality Reality: –the query is generally the uppermost operation in P2P systems Convergence ( form a small world network) –By means of the effort of the query –The speed is affected by dynamic network few queries Solution: –Active query mechanism

Active query mechanism Goal: to handle the dynamic network or fewer queries so as to accelerate the convergence for a small world network. A peer node would invoke a active query procedure with a time interval. The time interval is due to the dynamic characteristic and the current queries.

Repair Routing Table with Cache Effect Principle: –During routing process, the node’s long contact is replaced with the current visiting “live” node with the probability α. So current cached long contact is invalid, it can be auto- repaired with the probability α. The effect may help to reduce the maintaining cost of cached long contact.

Cost Evaluation I. The cached long contact has the flag: invalid/valid. Only the flag is valid, the routing considers the long contact. The flag is maintained by a backgroud process and it brings additional maintaining overheads. –(1) The routing can keep the correctness though the cached long contact may be invalid and the updated messages sent in a fixed period are few. –(2) Cache Effect reduces the maintaining overheads. II.The active procedure may create additional messages on the network. –(1) for fewer queries, these additional messages do not much affect the system. Fortunately, the most p2p application is query intensive. –(2) for dynamic network, the join & leave of the node can be treated as a active query so that the additional messages is controled.

Experiments 1.Static Convergence 2.Dynamic Convergence 3.Routing Hops

Setup 2-dimensional CCAN equipped with 1024 nodes Two nodes are randomly chosen from the network and one initiates a query for the other The routing hop number and the times of cache replacement are recorded in every query. After 100 queries are made, the average path hops and the average replacing times per node are counted.

Static Convergence Each data point is the average of 100 queries.

Dynamic Convergence Each data point is the average of 100 queries.

Path Hops

Related Work Symphony [USITS 2003 ] –uses a continuous version of Kleinsberg’s construction –bear high adjusting overheads compared with our cache scheme when the node join and leave dynamically. Improved Freenet [Infocom2002] –a probabilistic cache to model small world phenomenon –focuses on data-key cache which is much different from our node cache. Deterministic cache replacing –improve the hit rate [unstructured p2p systems] – reduce the hot problem [structured p2p systems] –Our probabilistic cache replacing is not only to aid routing and also to realize a unique effect with an expected path hops.

Conclusions Using small world model theory, Cache-based CAN has the characteristics: –Deterministic search –Low search cost –Low maintaining cost –Better routing hops The probabilistic cache scheme is successfully introduced into CAN in this paper. However, it is easily to be extended to a class of P2P systems with low-degree routing networks and only needs a few modifications. Especailly, the scheme favors these resource sharing P2P systems, which are very popular in today’s applications.

Thank you!