Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks

Slides:



Advertisements
Similar presentations
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
P2P Systems and Distributed Hash Tables Section COS 461: Computer Networks Spring 2011 Mike Freedman
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Chord A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion StoicaRobert Morris David Liben-NowellDavid R. Karger M. Frans KaashoekFrank.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
University of Cincinnati1 Towards A Content-Based Aggregation Network By Shagun Kakkar May 29, 2002.
Peer-to-Peer Networks João Guerreiro Truong Cong Thanh Department of Information Technology Uppsala University.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
CSc 461/561 CSc 461/561 Peer-to-Peer Streaming. CSc 461/561 Summary (1) Service Models (2) P2P challenges (3) Service Discovery (4) P2P Streaming (5)
Distributed Lookup Systems
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Peer-to-Peer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Introduction Widespread unstructured P2P network
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
 A P2P IRC Network Built on Top of the Kademlia Distributed Hash Table.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Peer to Peer Network Design Discovery and Routing algorithms
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems Distributed Hash Tables Steve Ko Computer Sciences and Engineering University at Buffalo.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
CSE 486/586 Distributed Systems Distributed Hash Tables
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Peer-to-peer Systems All slides © IG.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Vehicular Communications Paradigms ORT Braude College of Engineering Software Engineering Department April 2012 Students: Evgeny Yudashkin & Tal Bahalool.
The Chord P2P Network Some slides taken from the original presentation by the authors.
Peer-to-Peer Information Systems Week 12: Naming
CSE 486/586 Distributed Systems Distributed Hash Tables
The Chord P2P Network Some slides have been borrowed from the original presentation by the authors.
(slides by Nick Feamster)
EE 122: Peer-to-Peer (P2P) Networks
DHT Routing Geometries and Chord
Building Peer-to-Peer Systems with Chord, a Distributed Lookup Service
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
CSE 486/586 Distributed Systems Distributed Hash Tables
Peer-to-Peer Information Systems Week 12: Naming
#02 Peer to Peer Networking
Presentation transcript:

Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks Mohammed Nadeem Ahmed Department of Computer Science and Engineering Professor: Dr. Gautam Das T.A : Mr. Ashish Chawla

Outline What is Peer-to-Peer? Types of Peer-to-Peer Networks Chord Unstructured P2P Networks Napster, Gnutella & KaZaA Structured P2P Networks Chord Overview & Implementation Distributed Hash Tables Routing in Chord Chord Features Chord Performance Comparison in performances in Unstructured and Structured P2P networks

What is Peer-to-Peer Sharing of Free MP3 Files !! : ) Peer-to-Peer unlike Traditional Client-Server models Scalable Flexible Fault-Tolerant Easily Deployable

Types of Peer-to-Peer Networks Unstructured P2P Networks No global protocol Maintained by a Central Server or Peer Leader Easy to Deploy & Maintain Poor Search Efficiency Not Scalable

Types of Peer-to-Peer Systems Structured P2P Networks Global protocol ( Hash Functions) High Search Efficiency Natural Load Balancing Highly Scalable

Examples of Unstructured P2P Systems Napster Peers update central server about Content Peers get files by querying Central Server File transfer directly between peers

Examples of Unstructured P2P Systems Gnutella Peers form a logical overlay network Queries are broadcasted to neighbors Neighbors broadcast to their neighbors (Flooding) Query radius is limited (Not Scalable)

Examples of Unstructured P2P Systems KaZaA Hybrid approach Concept of Peer-leaders (just like C.S in Napster) Peer-Leaders broadcast queries to other Peer-Leaders. (just like in Gnutella)

Problems with Unstructured P2P What we have? Centralized : Napster Table size – O (n) Number of Hops – O (1) Flooding of Queries : Gnutella Table Size – O (1) Number of Hops – O (n)

What we want from P2P Efficiency Scalability Robustness: O (log (N)) messages per look up (where N is the total number of nodes in the network) Scalability O (log (N)) states per node Robustness: Ability to handle a lot of instabilities

Chord Overview Provides just one operation: Lookup (key) -> Node (IP Address) Chord is a lookup service, not a search engine. It’s a building block for P2P applications

Distributed Hash Tables The resource file (e.g. monalisa.jpg) is translated into a 160 bit identifier through the hash function SHA - 1 160 bit resource ID Similarly the node (IP address) is also translated into a 160 bit identifier through the same function. 160 bit node ID Node with the NodeID closest to that resource name ID is responsible for that resource.

Scalable Routing in Chord Chord can scale millions of nodes Uses Finger Tables Each node is responsible for a bunch of nodes In finger table row I at node n = successor (n + 2^i-1) Finger intervals increase with distance from node n If close, short hops If far, long hops Thus in a N-node network, needs to contact only O (log (N) nodes to find any node.

Chord Features Load Balancing Decentralization Scalability Uses distributed Hash Function Decentralization No node is as important as any other Scalability Only uses O (log (N)) to reach N nodes Availability Node responsible for a key can always be found Robustness Minimal join/leave disruption

Average messages per look up Chord Performance Average messages per look up Number of nodes

Summary: Unstructured vs Structured P2P No global protocol used Maintained by a C.S or Peer-Leader All nodes need to know every other node (O (n) Look-ups) Structured Global protocol involved (Hash Function) Completely Distributed Nodes need to know only a handful of others ( O log (N) Look-ups)

Unstructured Vs Structured P2P Contd: Unstable when nodes frequently join or leave. Scalability Problems Phrase-match queries Structured Stable in all conditions Highly Scalable Exact-Key match queries

Thank You