A Comparative Study of the DNS Design with DHT-Based Alternatives 95/08/31 Chen Chih-Ming.

Slides:



Advertisements
Similar presentations
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
Advertisements

CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Scalable Content-Addressable Network Lintao Liu
P2P Systems and Distributed Hash Tables Section COS 461: Computer Networks Spring 2011 Mike Freedman
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Small-world Overlay P2P Network
1 Canon in G Major: Designing DHTs with Hierarchical Structure Prasanna Ganesan (Stanford University) Krishna Gummadi (U. of Washington) Hector Garcia-Molina.
Impact of Configuration Errors on DNS Robustness CSCI 780, Fall 2005.
The Impact of DHT Routing Geometry on Resilience and Proximity New DHTs constantly proposed –CAN, Chord, Pastry, Tapestry, Plaxton, Viceroy, Kademlia,
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Looking Up Data in P2P Systems Hari Balakrishnan M.Frans Kaashoek David Karger Robert Morris Ion Stoica.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
SkipNet: A Scalable Overlay Network with Practical Locality Properties Nick Harvey, Mike Jones, Stefan Saroiu, Marvin Theimer, Alec Wolman Microsoft Research.
Distributed Lookup Systems
The Impact of DHT Routing Geometry on Resilience and Proximity Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion.
Impact of Configuration Errors on DNS Robustness V. Pappas * Z. Xu *, S. Lu *, D. Massey **, A. Terzis ***, L. Zhang * * UCLA, ** Colorado State, *** John.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Impact of Configuration Errors on DNS Robustness Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang SIGCOMM 2004 Presented.
1 Canon in G Major: Designing DHTs with Hierarchical Structure Prasanna Ganesan (Stanford University) Krishna Gummadi (U. of Washington) Hector Garcia-Molina.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
SkipNet: A Scaleable Overlay Network With Practical Locality Properties Presented by Rachel Rubin CS294-4: Peer-to-Peer Systems By Nicholas Harvey, Michael.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
ICDE A Peer-to-peer Framework for Caching Range Queries Ozgur D. Sahin Abhishek Gupta Divyakant Agrawal Amr El Abbadi Department of Computer Science.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
DHTs and Peer-to-Peer Systems Supplemental Slides Aditya Akella 03/21/2007.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi, R. Gummadi..,S.Gribble, S. Ratnasamy, S. Shenker, I. Stoica.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Canon in G Major: Designing DHTs with Hierarchical Structure Prasanna Ganesan, Krishna Gummadi, Hector Garcia-Molina ICDCS2004 報告者 : 陳奕鈞.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
ECO-DNS: Expected Consistency Optimization for DNS Chen Stephanos Matsumoto Adrian Perrig © 2013 Stephanos Matsumoto1.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Peer to Peer Network Design Discovery and Routing algorithms
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
CSCI 599: Beyond Web Browsers Professor Shahram Ghandeharizadeh Computer Science Department Los Angeles, CA
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
Networking Applications
P2P Systems and Distributed Hash Tables
A Scalable Content Addressable Network
P2P: Distributed Hash Tables
Presentation transcript:

A Comparative Study of the DNS Design with DHT-Based Alternatives 95/08/31 Chen Chih-Ming

2 Outline Problem Background Methodology Analytical model Evaluation Discussion Related work Conclusion

3 Problem description Current DNS operational issues DHT-Based System Does DHT-Based system have comparative performance

4 Background – DNS Tree RR NS Authoritative server Caching resolver Stub resolver

5 Background – DNS Tree. jpcntw org nctunthuntu educom

6 Background – Chord Ring Base b One dimensional cyclic identifier space [0, …,b m ], N=b m +1 Distance is calculated as the clockwise numeric distance Each node maintain (b-1)log b N neighbors i th neighbor of X is the node closest to X+2 i on the circle Map DNS by hash to 0~b m, then assigning the RR to the node v with the next larger ID Node = AS & Caching resolver

7 Background – Chord Ring X X+4 X+2 X+8 X+16

8 Background – Impact in Redundancy DNS Multiple servers serve a zone Chose any of them to answer query P = ΠR i Utilizing all the existing redundancy Always the same logical path Chord A set of neighbors A subset of one ’ s neighbors leads towards each destination P = (b-1)(log b N)!, it has been shown DHTs don ’ t fully explore the underlying redundancy May have vary path from different server

9 Background – Impact in Caching DNS Caching query Caching NS RR Improving data availability Improving path availability DHT Caching query for each intermediate nodes Improving data availability Don ’ t shorten the query path Different behavior when a cache miss occur.

10 Methodology Metrics Data failure rate Path failure rate Path lengths DNS trace Trace-driven simulation DNS Reconstruct DNS tree and each zone Cache enable/disable DHT Different size & base Deploy RR to appropriate node Replicate to neighboring nodes Cache enable/disable Place additional clients Failure Physical failure Malicious attack

11 Discussion Recovery mechanisms For static resilient Simply compare two system Node failure model Not capture configuration errors Available again after a short period Only want to measure relative advantages Client record popularity

12

13 Analytical model Availability analysis Path Failure rate Average path failure rate

14

15 Cache performance analysis Table II DNS (Experiment result) Type I – reply a record Type II – reply non-existing Type III – reply referral to a child zone Query distribution generated by a caching server & exact subpart of the DNS tree structure

16 Cache performance analysis DHT (Simulate result) record only in one node Li is probability mass function of path length I Ci is the number of client of a specific record that are I or more hops away from the record Pi is the probability of two clients having a common node at distance I on the path to the record Si is two independent paths merge at distance I from the destination record Hi is the number of cache hits at distance I form the destination record Size of network N, base b, total number of client C

17

18

19 Evaluation Availability DNS: servers DHT: 8192 nodes Data replication & Path Redundancy Availability & Caching Availability & Malicious attacks Summary of Results Cache performance Caching in DNS Caching in DHTs Summary of Results

20

21 圖不了

22

23 圖不了

24 Cache in DNS

25

26

27

28

29 圖不了

30 Cache in DHT

31

32

33

34 Discussion Engineering flexibility Selective engineering worthwhile Deliberated attack System complexity DNS & DHTs Performance v.s. complexity Generality of our conclusions DNS is more resilient to random failure DNS have higher performance on passive caching

35 Related work Long path lengths of DHT network[3] Proactive caching Hybrid system[18][14][4],[2][6]

36 Conclusion DNS have better performance on random node failure & cache performance DHT can provide withstanding orchestrated attacks & normal performance with high degree Improving the resilience of current system against malicious attack is a more appealing solution.