Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.

Slides:



Advertisements
Similar presentations
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Advertisements

Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Scalable Content-Addressable Network Lintao Liu
Pastiche: Making Backup Cheap and Easy. Introduction Backup is cumbersome and expensive Backup is cumbersome and expensive ~$4/GB/Month (now $0.02/GB)
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
SplitStream: High- Bandwidth Multicast in Cooperative Environments Monica Tudora.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Bowstron & Peter Druschel Presented by: Long Zhang.
Presented by Elisavet Kozyri. A distributed application architecture that partitions tasks or work loads between peers Main actions: Find the owner of.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Pastry Partially borrowed for Gabi Kliot. Pastry Scalable, decentralized object location and routing for large-scale peer-to-peer systems  Antony Rowstron.
1 Pastry and Past Based on slides by Peter Druschel and Gabi Kliot (CS Department, Technion) Alex Shraer.
SkipNet Christian Schmidt-Madsen, Peter Tiedemann,
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Pastry And Squirrel Presented by Eirik T. Laberg Håvard Semundseth Orri G. Pálsson.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Application Layer Multicast for Earthquake Early Warning Systems Valentina Bonsi - April 22, 2008.
An Evaluation of Scalable Application-level Multicast Using Peer-to-peer Overlays Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony Rowstron,
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Security Considerations for Structured p2p Peng Wang 6/04/2003.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Slides for Chapter 10: Peer-to-Peer.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
P2p file storage and distribution Team: Brian Smith, Daniel Suskin, Dylan Nunley, Forrest Vines Mentor: Brendan Burns.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Chord Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber Google,
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Squirrel: A decentralized peer-to- peer web cache Paper by Sitaram Iyer, Antony Rowstron and Peter Druschel (© 2002) Presentation* by Alexander Prohaska.
Peer to Peer Network Design Discovery and Routing algorithms
STATE KEY LABORATORY OF NETWORKING & SWITCHING BEIJING UNIVERSITY OF POSTS AND TELECOMMUNICATAIONS A Semantic Peer-to- Peer Overlay for Web Services.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony I.T.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Tuesday, February 03, 2009 “Work expands to fill the time available for its completion.” - Parkinson’s 1st Law.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Chapter 29 Peer-to-Peer Paradigm Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Chord P2P Network Some slides taken from the original presentation by the authors.
Pastry Scalable, decentralized object locations and routing for large p2p systems.
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
PASTRY.
Applications (2) Outline Overlay Networks Peer-to-Peer Networks.
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes

Introduction General substrate for P2P applications General substrate for P2P applications Provides object location and routing Provides object location and routing Characteristics Characteristics Completely decentralized Completely decentralized Fault-resilient Fault-resilient Scalable Scalable Reliability Reliability

Design Circular Node Space Circular Node Space Nodes randomly assigned unique 128 bit identifiers Nodes randomly assigned unique 128 bit identifiers Uniform distribution of identifiers Uniform distribution of identifiers Identifiers indicate position in space Identifiers indicate position in space Messages and Keys Messages and Keys Messages assigned N-bit keys Messages assigned N-bit keys Each message routed to the node whose identifier is numerically closest to its assigned key Each message routed to the node whose identifier is numerically closest to its assigned key Key generation is application specific Key generation is application specific

Node State Leaf Set Leaf Set L closest nodes in the node space L closest nodes in the node space Routing Table Routing Table Identifies 2 b -1 hosts whose identifiers match the current node identifier in n bits Identifies 2 b -1 hosts whose identifiers match the current node identifier in n bits Neighborhood Set Neighborhood Set M closest nodes according to a proximity metric M closest nodes according to a proximity metric

Network Organization Node Arrival Node Arrival New node acquires the identifier X and routes a join message with key X through node A New node acquires the identifier X and routes a join message with key X through node A New nodes initialize their state based upon state shared by nodes that route its join message New nodes initialize their state based upon state shared by nodes that route its join message Node Departure Node Departure If a member of a node’s leaf set is lost, the leaf set is expanded outward to find a new node If a member of a node’s leaf set is lost, the leaf set is expanded outward to find a new node If a routing table entry is lost a node in the same row is consulted for a replacement If a routing table entry is lost a node in the same row is consulted for a replacement

Maintaining Locality Proximity based on a scalar metric Proximity based on a scalar metric E.g. IP routing hops, geographic distance E.g. IP routing hops, geographic distance Metric determined by application Metric determined by application Assumed that the triangulation inequality holds for the metric Assumed that the triangulation inequality holds for the metric Connections to nodes with greater proximity are desired Connections to nodes with greater proximity are desired Facilitated by the neighborhood set Facilitated by the neighborhood set

Message Routing Check the leaf set Check the leaf set If destination present route to it directly If destination present route to it directly Consult the routing table Consult the routing table Forward to a node whose identifier matches the message key in at least one more bit Forward to a node whose identifier matches the message key in at least one more bit Forward to a node whose identifier is numerically closer to the message key Forward to a node whose identifier is numerically closer to the message key

Evaluation Number of routing hops scales with the network size (log 2 b N) – Figure 4. Number of routing hops scales with the network size (log 2 b N) – Figure 4. Routes are only 30% to 40% longer despite minimal routing tables – Figure 6. Routes are only 30% to 40% longer despite minimal routing tables – Figure 6. Able to locate one of the top two nodes 92% of the time Able to locate one of the top two nodes 92% of the time Minimally impacted by node failure – Figure 10. Minimally impacted by node failure – Figure 10.