Network Coordinates in the Wild
|
|
- Egbert Thornton
- 5 years ago
- Views:
Transcription
1 Network Coordinates in the Wild Jonathan Ledlie Margo Seltzer Paul Gardner Harvard University Aelitis / Azureus Hourglass Project Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 1
2 Overview Introduction Azureus Very popular BitTorrent client million current users worldwide! Locality essential! Uses network coordinates (NCs) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 2
3 Overview Introduction Azureus Very popular BitTorrent client million current users worldwide! Locality essential! Uses network coordinates (NCs) Problem: inaccurate and unstable :-( Developers found our work on PlanetLab [Ledlie 06] Worked with them to analyze and tame their NC system Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 3
4 BitTorrent Introduction Protocol for file sharing Peers don t download from seed (content source) Instead: discover other peers and download from them Upside Users can provide content without bandwidth hit Downside Consumes huge portion of Internet bandwidth (18-55%) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 4
5 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker tracker Peers? New node Existing swarm Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 5
6 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker 2. Tracker records IP of requester tracker New node Existing swarm Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 6
7 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker 2. Tracker records IP of requester 3. Tracker responds with list of recent peers tracker A A,B,C New node Existing swarm B C Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 7
8 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker 2. Tracker records IP of requester 3. Tracker responds with list of recent peers 4. Contact tracker A New node Expanded swarm B C Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 8
9 BitTorrent: Locality Matters Introduction ISP #1 Unbiased swarms tracker Locally-biased swarms ISP #1 tracker ISP #2 Improved b/w for peers Reduced inter-isp b/w Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 9 ISP #2
10 Contributions Introduction Evidence Use NCs for locality-aware anycast decisions Developed new techniques Minimize overhead Churn Data from Internet-scale system Large latency matrix from end-users Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 10
11 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 11
12 Network Coordinates NC Refresher Embed inter-node latencies into metric space Measure to (small) subset of network Establish coordinate Predict missing measurements Low dimensional space 2-5 dimensions in practice 2d Euclidean embedding Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 12
13 Vivaldi Refinement Process NC Refresher Incremental refinement: minimize global prediction error * Vivaldi [Cox 03,Dabek 04] A B Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 13
14 Measurement NC Refresher Incremental refinement: minimize global prediction error 1. A measures latency to B. (100,80) A Coord? B Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 14
15 Reply NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. (100,80) A RTT=60ms Coord? (70,40) B Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 15
16 Computation NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. (100,80) A RTT=60ms (70,40) B Estimate = (100,80)-(70-40) =50ms Error = (60 - Estimate) = 10ms Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 16
17 Adjustment NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. 4. A moves toward ideal coord, relative to B. B (103,84) A A 60ms Estimate = (100,80)-(70-40) =50ms Error = (60 - Estimate) = 10ms Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 17
18 Repeat NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. C (103,84) A D 4. A moves toward ideal coord, relative to B. 5. Repeat with C, D, E. B E Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 18
19 Predict NC Refresher A has never seen or measured RTT to X 1. A starts measurement to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. C (103,84) A D 4. A moves toward ideal coord, relative to B. 5. Repeat with C, D, E. B X E (130,50) 6. Predict to X Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 19
20 Predict NC Refresher A can predict locality of X and Y. 1. A starts measurement to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. 4. A moves toward ideal coord, relative to B. 5. Repeat with C, D, E. C B A X E D Y 6. Predict to X Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 20
21 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 21
22 Goals: Study and Refine NCs Methodology Twin goals: Study and refine Internet-scale network coordinate system Study Observe and understand causes of inaccurate prediction Refine Test new techniques in simulation / local clients / PL Release Repeat Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 22
23 Two Data Collection Processes Methodology Fine: Instrumented Azureus clients run on PlanetLab Logged every update» real RTT, remote coordinate, remote error, per update error Detailed picture + PL-to-non-PL latency matrix Coarse: Added NC statistics message to Azureus Summarizes their coordinates behavior» instantaneous error, neighbor error, stability» other metrics [Lua 05] Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 23
24 Measurement Challenges Methodology ~1.3 million Azureus clients running at any given moment Impossible to acquire all-to-all latency matrix Complicates simulation and testing Simulated with 249x2902 rectangular matrix Impossible to force clients to run latest version Cannot ensure all clients are running algorithm X, parameter Y 10,000 users regularly (and automatically) update to CVS» >50% within one day; >75% within one month. Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 24
25 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 25
26 Zero Maintenance Limited Horizon Azureus maintains DHT routing table (RT) Heartbeat messages» Frequent: several per minute Tests new nodes for entry into RT» Less frequent: one per 3-5 minutes NC maintenance piggybacks on these messages Good: Zero additional messages! Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 26
27 Problem: Limited Horizon Limited Horizon Bad: Limits view of network to routing table RT (+ neighbor set) biased to nearby nodes Local bias damages accuracy [Dabek 04, Ledlie 05] Creates islands: poor estimation beyond horizon Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 27
28 Strawman Limited Horizon Make tug proportional to distance Boost impact of (occasional) long range contacts Problems What s the right weight? Produces instability Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 28
29 Insight: Expand Horizon over time Limited Horizon Optimize coordinate against (recent) whole network Don t boost all at once; extend period of effect Scale push/pull per neighbor by age Staleness of infomation Decaying tug of neighbor over time: neighbor decay In Effect Limits impact of high frequency (nearby) neighbors Extends impact of low frequency (longer-distance) ones Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 29
30 Original Adjustment Step Limited Horizon A optimizes with respect to B 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. 4. A moves toward ideal coord, relative to B. B (103,84) A A 60ms Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 30
31 Neighbor Decay Adjustment Step Limited Horizon As springs age, they get looser Force F = 0 d for (n : neighbors) { Compute force F n Norm F n by age n 4 minutes old C A A D 2 min F += F n } A += F B E 3min 0min Older information gets less weight Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 31
32 Reading the Neighbor Decay Video Limited Horizon No ND: -300 Red Neighbor Decay Comparison Pct. improvement in accuracy (30-50%) ms Two coords - same node With ND: Green -200 Neighbors: Bluems Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 32 0h 51m Error: 0.472% w/nd no ND Elapsed Time Accuracy ms 3d Euclidean ms x ms x ms
33 Neighbor Decay Video Limited Horizon [First half hour in the life of two coordinates on Azureus with and without neighbor decay] Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 33
34 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 34
35 Improved Accuracy, but End-to-end benefit That s nice that accuracy improves, but Do NCs actually improve app-level performance? Aid in decisions involving node locality? Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 35
36 DHT Traversal: Problem End-to-end benefit Problem: Azureus frequently performs DHT lookups. Need to be as fast as possible! E.g.:» Distributed tracker run within DHT» Want to find these trackers faster Can we use latency prediction to speed up its lookups? Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 36
37 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort routing table by distance to T» distance (a,b) = a b Options for next hop key 0xDD1... 0xD53... Kademlia [Maymounkov 02] Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 37
38 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort RT by distance to T» distance (a,b) = a b 2. Query logically nearest for nodes near T Options for next hop key 0xDD1... 0xD53... Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 38
39 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort RT by distance to T» distance (a,b) = a b 2. Query logically nearest for nodes near T 3. Add responses to list Options for next hop key 0xD9A... 0xD xDD1... 0xD53... Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 39
40 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort RT by distance to T» distance (a,b) = a b 2. Query logically nearest for nodes near T 3. Add responses to list 4. Repeat Options for next hop key 0xD9A... 0xD xDD1... 0xD53... Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 40
41 DHT Traversal: Solution End-to-end benefit Target key 0xDABD... Find good trade-off between logical progress and delay Similar opt. in Chord [Dabek 04]. Options for next hop key NC dist. 0xD9A xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 41
42 DHT Traversal: Solution End-to-end benefit Target key 0xDABD... Find good trade-off between logical progress and delay 1. Eliminate logically distant hops» Make similar progress to target Same number of expected hops if fixing same number of bits Options for next hop key NC dist. 0xD9A xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 42
43 DHT Traversal: Solution End-to-end benefit Target key 0xDABD... Find good trade-off between logical progress and delay 1. Eliminate logically distant hops» Make similar progress to target 2. Break ties in favor of lowest predicted latency Options for next hop key NC dist. 0xD9A xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 43
44 DHT Traversal: Evaluation End-to-end benefit Compared four methods: XOR Options for next hop key OptNC OrigNC 0xD9A Optimized Original and Random 0xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 44
45 DHT Traversal: Evaluation End-to-end benefit Experiment Put 250 random keys into Azureus DHT For each key, performed four lookups (once per method)» XOR, OptNC, OrigNC, Random» Permuted method ordering Repeated 10x Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 45
46 DHT Traversal: Evaluation End-to-end benefit Cumulative Distribution of Lookup Delay (faster is better) 0.2 Faster Slower Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 46
47 DHT Traversal: Evaluation End-to-end benefit XOR Long delays Median delay: 196ms Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 47
48 DHT Traversal: Evaluation End-to-end benefit XOR Random Logical detours slow random vs. direct XOR path (23% at median) Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 48
49 DHT Traversal: Evaluation End-to-end benefit OrigNC Random XOR Good choice possible: Unoptimized NCs reduced delay e.g. 24% vs. XOR Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 49
50 1.0 DHT Traversal: Evaluation End-to-end benefit OptNC OrigNC Random OptNC: higher accuracy, faster lookups (e.g. 33% vs XOR, 12% vs OrigNC) 0.2 XOR Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 50
51 DHT Traversal: Evaluation End-to-end benefit OptNC OrigNC XOR Takeaway Coordinates aided locality-aware anycast decisions Lookup Delay (ms) Random Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 51
52 Conclusion Methodology Coarse and fine statistics Limited Horizon Problem Solution: neighbor decay Locality-aware anycast -style decisions DHT traversal Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 52
53 Thanks & Pyxida Check out Pyxida: Same code base Network Coordinate Service for PlanetLab Library Implementation of NC techniques Links to data Thanks. Any Questions? Jonathan Ledlie Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 53
Building Large-scale Distributed Systems with Network Coordinates
Distributed Software Engineering (DSE) Group Department of Computing Building Large-scale Distributed Systems with Network Coordinates Peter Pietzuch prp@doc.ic.ac.uk Distributed Software Engineering (DSE)
More informationNetwork Coordinates in the Wild
Network Coordinates in the Wild Jonathan Ledlie, Paul Gardner, and Margo Seltzer Harvard School of Engineering and Applied Sciences and Aelitis {jonathan,margo}@eecs.harvard.edu, pgardner@aelitis.com Abstract
More informationVivaldi: : A Decentralized Network Coordinate System
Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model
More informationVivaldi Practical, Distributed Internet Coordinates
Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute
More informationA Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays
A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays Jeffrey Shneidman, Peter Pietzuch, Matt Welsh, Margo Seltzer, Mema Roussopoulos Systems Research Group Harvard University
More informationVivaldi Practical, Distributed Internet Coordinates
Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM
More informationVeracity: Practical Secure Network Coordinates via Vote-Based Agreements
Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems
More informationTuning Vivaldi: Achieving Increased Accuracy and Stability
Tuning Vivaldi: Achieving Increased Accuracy and Stability Benedikt Elser, Andreas Förschler, and Thomas Fuhrmann Computer Science Department, Technical University of Munich, Germany {elser,fuhrmann}@so.in.tum.de
More informationVivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04
Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates
More informationPath Optimization in Stream-Based Overlay Networks
Path Optimization in Stream-Based Overlay Networks Peter Pietzuch, prp@eecs.harvard.edu Jeff Shneidman, Jonathan Ledlie, Mema Roussopoulos, Margo Seltzer, Matt Welsh Systems Research Group Harvard University
More informationR/Kademlia: Recursive and Topology-aware Overlay Routing
R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the
More informationMotivation and goal Design concepts and service model Architecture and implementation Performance, and so on...
Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on... Autonomous applications have a demand for grasping the state of hosts and networks for: sustaining
More informationPlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems
PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems Fenglin Liao, Keshava P Subramanya, Veljko Pejovic, Ben Zhao {fenglin, keshava, veljko, ravenben} @ cs.ucsb.edu Abstract - In
More informationTraffic Localization for DHT-based BitTorrent networks
Traffic Localization for DHT-based BitTorrent networks Matteo Varvello and Moritz Steiner Bell Labs, Alcatel-Lucent, USA {matteo.varvello,moritz.steiner}@alcatel-lucent.com Abstract. BitTorrent is currently
More informationWired Geometric Routing
Wired Geometric Routing Jonathan Ledlie, Michael Mitzenmacher, Margo Seltzer Harvard University {jonathan,michaelm,margo}@eecs.harvard.edu Peter Pietzuch Imperial College London prp@doc.ic.ac.uk Abstract
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationPharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction
: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua
More informationRe-imagining Vivaldi with HTML5/WebGL. PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch
Re-imagining Vivaldi with HTML5/WebGL PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch dmirkovic@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne
More informationCoordinate-based Routing:
Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing
More informationDistributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationA Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationHandling Churn in a DHT
Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get
More informationVivaldi: A Decentralized Coordinate System
Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer
More informationSecure and Accurate Network Coordinate Systems
Secure and Accurate Network Coordinate Systems A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY D. Eric Chan-Tin IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
More informationCS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017
CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things
More informationCS 425 / ECE 428 Distributed Systems Fall 2015
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Measurement Studies Lecture 23 Nov 10, 2015 Reading: See links on website All Slides IG 1 Motivation We design algorithms, implement
More informationALTO Problem Statement
ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet
More information416 Distributed Systems. Mar 3, Peer-to-Peer Part 2
416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,
More informationReverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF
Reverse Traceroute Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI, April 2010 This work partially
More informationA view from inside a distributed Internet coordinate system
A view from inside a distributed Internet coordinate system Mohamad JABER, Cao-Cuong NGO and Chadi BARAKAT EPI Planète, INRIA, France Email:{mjaber, cngo, cbarakat}@sophia.inria.fr Abstract The Vivaldi
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationThe Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, and Yongdae Kim University of Minnesota {dchantin,feldman,hopper,kyd}@cs.umn.edu
More informationKademlia: A P2P Informa2on System Based on the XOR Metric
Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg
More informationDrafting Behind Akamai (Travelocity-Based Detouring)
(Travelocity-Based Detouring) Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic and Fabián E. Bustamante Department of EECS Northwestern University ACM SIGCOMM 2006 Drafting Detour 2 Motivation Growing
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationCTracker: a Distributed BitTorrent Tracker Based on Chimera
CTracker: a Distributed BitTorrent Tracker Based on Chimera Raúl JIMÉNEZ, Björn KNUTSSON Kungliga Tekniska högskolan, Isafjordsgatan 39, Stockholm, 164 40, Sweden Tel: +46 8 790 42 85, Fax: +46 8 751 17
More informationOverview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste
Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall
More informationCS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018
CS 43: Computer Networks 14: DHTs and CDNs October 3, 2018 If Alice wants to stream Mad Men over a highspeed Internet connection her browser may choose a video rate A. in the range of Mbps. B. in the range
More informationDistributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationBuilding an Internet-Scale Publish/Subscribe System
Building an Internet-Scale Publish/Subscribe System Ian Rose Mema Roussopoulos Peter Pietzuch Rohan Murty Matt Welsh Jonathan Ledlie Imperial College London Peter R. Pietzuch prp@doc.ic.ac.uk Harvard University
More informationNetwork Layer (Routing)
Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking Forwarding (Longest Matching Prefix) Helpers: ARP and DHCP Fragmentation
More informationPEER-TO-PEER NETWORKS, DHTS, AND CHORD
PEER-TO-PEER NETWORKS, DHTS, AND CHORD George Porter May 25, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license
More informationTarantula: Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs
: Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs Zhuo Chen,YangChen,YiboZhu, Cong Ding, Beixing Deng and Xing Li Department of Electronic Engineering, Tsinghua University,
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationLesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network
Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network 20/03/2017 1 IMPLEMENTATION OF KADEMLIA Kademlia is the protocol used by the largest public DHTs. Vuze ( before known as Azureus),
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationLinear Regression and K-Nearest Neighbors 3/28/18
Linear Regression and K-Nearest Neighbors 3/28/18 Linear Regression Hypothesis Space Supervised learning For every input in the data set, we know the output Regression Outputs are continuous A number,
More informationDemocratizing Content Publication with Coral
Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University NSDI 2004 A problem Feb 3: Google linked banner to julia fractals Users clicking directed to Australian
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationBBS654 Data Mining. Pinar Duygulu. Slides are adapted from Nazli Ikizler
BBS654 Data Mining Pinar Duygulu Slides are adapted from Nazli Ikizler 1 Classification Classification systems: Supervised learning Make a rational prediction given evidence There are several methods for
More informationChoosing a Random Peer
Choosing a Random Peer Jared Saia University of New Mexico Joint Work with Valerie King University of Victoria and Scott Lewis University of New Mexico P2P problems Easy problems on small networks become
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationOverlapping Ring Monitoring Algorithm in TIPC
Overlapping Ring Monitoring Algorithm in TIPC Jon Maloy, Ericsson Canada Inc. Montreal April 7th 2017 PURPOSE When a cluster node becomes unresponsive due to crash, reboot or lost connectivity we want
More informationEE 122: Peer-to-Peer Networks
EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer
More informationFaster Content Access in KAD
Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)
More informationCPSC 340: Machine Learning and Data Mining
CPSC 340: Machine Learning and Data Mining Fundamentals of learning (continued) and the k-nearest neighbours classifier Original version of these slides by Mark Schmidt, with modifications by Mike Gelbart.
More informationHierarchical Clustering 4/5/17
Hierarchical Clustering 4/5/17 Hypothesis Space Continuous inputs Output is a binary tree with data points as leaves. Useful for explaining the training data. Not useful for making new predictions. Direction
More informationRouting Table Construction Method Solely Based on Query Flows for Structured Overlays
Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured
More informationQOS Quality Of Service
QOS Quality Of Service Michael Schär Seminar in Distributed Computing Outline Definition QOS Attempts and problems in the past (2 Papers) A possible solution for the future: Overlay networks (2 Papers)
More informationLoad balancing in Content Delivery Networks in Novel Distributed Equilibrium
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Load balancing in Content Delivery Networks in Novel Distributed Equilibrium V. Kamakshamma 1, D. Anil 2 1 Department of CSE, VEC,
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationThe Scalability of Swarming Peer-to-Peer Content Delivery
The Scalability of Swarming Peer-to-Peer Content Delivery Daniel Zappala Brigham Young University zappala@cs.byu.edu with Daniel Stutzbach Reza Rejaie University of Oregon Page 1 Motivation Small web sites
More informationExploiting Communities for Enhancing Lookup Performance in Structured P2P Systems
Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems H. M. N. Dilum Bandara and Anura P. Jayasumana Colorado State University Anura.Jayasumana@ColoState.edu Contribution Community-aware
More informationSurvey of DHT Evaluation Methods
Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationImproving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems
Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2
More informationMarch 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE
for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationPeer-to-peer computing research a fad?
Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node
More informationP2P content distribution
P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer
More informationA Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems
A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems Technical Report Hani Salah Stefanie Roos Thorsten Strufe TU Darmstadt, Germany TU Dresden, Germany hsalah(at)cstu-darmstadtde,
More informationCharm: A charming network coordinate system
Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm
More informationUnsupervised Learning
Outline Unsupervised Learning Basic concepts K-means algorithm Representation of clusters Hierarchical clustering Distance functions Which clustering algorithm to use? NN Supervised learning vs. unsupervised
More informationInternet Anycast: Performance, Problems and Potential
Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationOverlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology
CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer
More informationGoals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.
Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley
More informationLECT-05, S-1 FP2P, Javed I.
A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer
More informationPlanning for Information Network
Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including
More informationOverlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.
Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University
More informationThe hidden locality in swarms
The hidden locality in swarms John S. Otto and Fabián E. Bustamante Northwestern University {jotto,fabianb}@eecs.northwestern.edu Abstract People use P2P systems such as BitTorrent to share an unprecedented
More informationDemocratizing Content Publication with Coral
Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University www.scs.cs.nyu.edu/coral A problem Feb 3: Google linked banner to julia fractals Users clicking
More informationFixing the Embarrassing Slowness of OpenDHT on PlanetLab
Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker University of California, Berkeley opendht@opendht.org Introduction The distributed
More informationA Distributed Web Cache using Load-Aware Network Coordinates
A Distributed Web Cache using Load-Aware Network Coordinates Nicholas Ball Department of Computing Imperial College, London Supervisor: Peter Pietzuch Second Marker: Alexander L. Wolf June 17, 2008 Abstract
More informationA Directed-multicast Routing Approach with Path Replication in Content Addressable Network
2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationOptimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic
Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic Chandan Rama Reddy Microsoft Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer
More informationLecture 6: Securing Distributed and Networked Systems. CS 598: Network Security Matthew Caesar March 12, 2013
Lecture 6: Securing Distributed and Networked Systems CS 598: Network Security Matthew Caesar March 12, 2013 1 Today: Distributed Internet Services Previous cycle: how to build Internet services that run
More informationInstance-based Learning
Instance-based Learning Nearest Neighbor 1-nearest neighbor algorithm: Remember all your data points When prediction needed for a new point Find the nearest saved data point Return the answer associated
More informationEECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations
EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley
More informationPeer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationToday. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup
More informationAVMEM: Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems
AVMEM: Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems Ramsés Morales, Brian Cho and Indranil Gupta Dept. of Computer Science University of Illinois at Urbana-Champaign
More information