Network Coordinates in the Wild

Size: px
Start display at page:

Download "Network Coordinates in the Wild"

Transcription

1 Network Coordinates in the Wild Jonathan Ledlie Margo Seltzer Paul Gardner Harvard University Aelitis / Azureus Hourglass Project Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 1

2 Overview Introduction Azureus Very popular BitTorrent client million current users worldwide! Locality essential! Uses network coordinates (NCs) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 2

3 Overview Introduction Azureus Very popular BitTorrent client million current users worldwide! Locality essential! Uses network coordinates (NCs) Problem: inaccurate and unstable :-( Developers found our work on PlanetLab [Ledlie 06] Worked with them to analyze and tame their NC system Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 3

4 BitTorrent Introduction Protocol for file sharing Peers don t download from seed (content source) Instead: discover other peers and download from them Upside Users can provide content without bandwidth hit Downside Consumes huge portion of Internet bandwidth (18-55%) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 4

5 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker tracker Peers? New node Existing swarm Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 5

6 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker 2. Tracker records IP of requester tracker New node Existing swarm Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 6

7 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker 2. Tracker records IP of requester 3. Tracker responds with list of recent peers tracker A A,B,C New node Existing swarm B C Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 7

8 BitTorrent: Peer Discovery Introduction 1. Request list of peers from tracker 2. Tracker records IP of requester 3. Tracker responds with list of recent peers 4. Contact tracker A New node Expanded swarm B C Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 8

9 BitTorrent: Locality Matters Introduction ISP #1 Unbiased swarms tracker Locally-biased swarms ISP #1 tracker ISP #2 Improved b/w for peers Reduced inter-isp b/w Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 9 ISP #2

10 Contributions Introduction Evidence Use NCs for locality-aware anycast decisions Developed new techniques Minimize overhead Churn Data from Internet-scale system Large latency matrix from end-users Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 10

11 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 11

12 Network Coordinates NC Refresher Embed inter-node latencies into metric space Measure to (small) subset of network Establish coordinate Predict missing measurements Low dimensional space 2-5 dimensions in practice 2d Euclidean embedding Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 12

13 Vivaldi Refinement Process NC Refresher Incremental refinement: minimize global prediction error * Vivaldi [Cox 03,Dabek 04] A B Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 13

14 Measurement NC Refresher Incremental refinement: minimize global prediction error 1. A measures latency to B. (100,80) A Coord? B Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 14

15 Reply NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. (100,80) A RTT=60ms Coord? (70,40) B Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 15

16 Computation NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. (100,80) A RTT=60ms (70,40) B Estimate = (100,80)-(70-40) =50ms Error = (60 - Estimate) = 10ms Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 16

17 Adjustment NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. 4. A moves toward ideal coord, relative to B. B (103,84) A A 60ms Estimate = (100,80)-(70-40) =50ms Error = (60 - Estimate) = 10ms Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 17

18 Repeat NC Refresher 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. C (103,84) A D 4. A moves toward ideal coord, relative to B. 5. Repeat with C, D, E. B E Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 18

19 Predict NC Refresher A has never seen or measured RTT to X 1. A starts measurement to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. C (103,84) A D 4. A moves toward ideal coord, relative to B. 5. Repeat with C, D, E. B X E (130,50) 6. Predict to X Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 19

20 Predict NC Refresher A can predict locality of X and Y. 1. A starts measurement to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. 4. A moves toward ideal coord, relative to B. 5. Repeat with C, D, E. C B A X E D Y 6. Predict to X Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 20

21 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 21

22 Goals: Study and Refine NCs Methodology Twin goals: Study and refine Internet-scale network coordinate system Study Observe and understand causes of inaccurate prediction Refine Test new techniques in simulation / local clients / PL Release Repeat Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 22

23 Two Data Collection Processes Methodology Fine: Instrumented Azureus clients run on PlanetLab Logged every update» real RTT, remote coordinate, remote error, per update error Detailed picture + PL-to-non-PL latency matrix Coarse: Added NC statistics message to Azureus Summarizes their coordinates behavior» instantaneous error, neighbor error, stability» other metrics [Lua 05] Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 23

24 Measurement Challenges Methodology ~1.3 million Azureus clients running at any given moment Impossible to acquire all-to-all latency matrix Complicates simulation and testing Simulated with 249x2902 rectangular matrix Impossible to force clients to run latest version Cannot ensure all clients are running algorithm X, parameter Y 10,000 users regularly (and automatically) update to CVS» >50% within one day; >75% within one month. Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 24

25 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 25

26 Zero Maintenance Limited Horizon Azureus maintains DHT routing table (RT) Heartbeat messages» Frequent: several per minute Tests new nodes for entry into RT» Less frequent: one per 3-5 minutes NC maintenance piggybacks on these messages Good: Zero additional messages! Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 26

27 Problem: Limited Horizon Limited Horizon Bad: Limits view of network to routing table RT (+ neighbor set) biased to nearby nodes Local bias damages accuracy [Dabek 04, Ledlie 05] Creates islands: poor estimation beyond horizon Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 27

28 Strawman Limited Horizon Make tug proportional to distance Boost impact of (occasional) long range contacts Problems What s the right weight? Produces instability Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 28

29 Insight: Expand Horizon over time Limited Horizon Optimize coordinate against (recent) whole network Don t boost all at once; extend period of effect Scale push/pull per neighbor by age Staleness of infomation Decaying tug of neighbor over time: neighbor decay In Effect Limits impact of high frequency (nearby) neighbors Extends impact of low frequency (longer-distance) ones Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 29

30 Original Adjustment Step Limited Horizon A optimizes with respect to B 1. A measures latency to B. 2. B replies with its coord. A deduces RTT. 3. A computes estimate and error. 4. A moves toward ideal coord, relative to B. B (103,84) A A 60ms Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 30

31 Neighbor Decay Adjustment Step Limited Horizon As springs age, they get looser Force F = 0 d for (n : neighbors) { Compute force F n Norm F n by age n 4 minutes old C A A D 2 min F += F n } A += F B E 3min 0min Older information gets less weight Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 31

32 Reading the Neighbor Decay Video Limited Horizon No ND: -300 Red Neighbor Decay Comparison Pct. improvement in accuracy (30-50%) ms Two coords - same node With ND: Green -200 Neighbors: Bluems Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 32 0h 51m Error: 0.472% w/nd no ND Elapsed Time Accuracy ms 3d Euclidean ms x ms x ms

33 Neighbor Decay Video Limited Horizon [First half hour in the life of two coordinates on Azureus with and without neighbor decay] Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 33

34 Outline Introduction A Network Coordinate Refresher Methodology Two Problems and our Solutions Limited Horizon Slow DHT Lookups Conclusion Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 34

35 Improved Accuracy, but End-to-end benefit That s nice that accuracy improves, but Do NCs actually improve app-level performance? Aid in decisions involving node locality? Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 35

36 DHT Traversal: Problem End-to-end benefit Problem: Azureus frequently performs DHT lookups. Need to be as fast as possible! E.g.:» Distributed tracker run within DHT» Want to find these trackers faster Can we use latency prediction to speed up its lookups? Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 36

37 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort routing table by distance to T» distance (a,b) = a b Options for next hop key 0xDD1... 0xD53... Kademlia [Maymounkov 02] Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 37

38 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort RT by distance to T» distance (a,b) = a b 2. Query logically nearest for nodes near T Options for next hop key 0xDD1... 0xD53... Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 38

39 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort RT by distance to T» distance (a,b) = a b 2. Query logically nearest for nodes near T 3. Add responses to list Options for next hop key 0xD9A... 0xD xDD1... 0xD53... Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 39

40 Kademlia s Iterative Lookups End-to-end benefit Target key 0xDABD Sort RT by distance to T» distance (a,b) = a b 2. Query logically nearest for nodes near T 3. Add responses to list 4. Repeat Options for next hop key 0xD9A... 0xD xDD1... 0xD53... Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 40

41 DHT Traversal: Solution End-to-end benefit Target key 0xDABD... Find good trade-off between logical progress and delay Similar opt. in Chord [Dabek 04]. Options for next hop key NC dist. 0xD9A xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 41

42 DHT Traversal: Solution End-to-end benefit Target key 0xDABD... Find good trade-off between logical progress and delay 1. Eliminate logically distant hops» Make similar progress to target Same number of expected hops if fixing same number of bits Options for next hop key NC dist. 0xD9A xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 42

43 DHT Traversal: Solution End-to-end benefit Target key 0xDABD... Find good trade-off between logical progress and delay 1. Eliminate logically distant hops» Make similar progress to target 2. Break ties in favor of lowest predicted latency Options for next hop key NC dist. 0xD9A xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 43

44 DHT Traversal: Evaluation End-to-end benefit Compared four methods: XOR Options for next hop key OptNC OrigNC 0xD9A Optimized Original and Random 0xD xD xD9F xDD xD Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 44

45 DHT Traversal: Evaluation End-to-end benefit Experiment Put 250 random keys into Azureus DHT For each key, performed four lookups (once per method)» XOR, OptNC, OrigNC, Random» Permuted method ordering Repeated 10x Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 45

46 DHT Traversal: Evaluation End-to-end benefit Cumulative Distribution of Lookup Delay (faster is better) 0.2 Faster Slower Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 46

47 DHT Traversal: Evaluation End-to-end benefit XOR Long delays Median delay: 196ms Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 47

48 DHT Traversal: Evaluation End-to-end benefit XOR Random Logical detours slow random vs. direct XOR path (23% at median) Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 48

49 DHT Traversal: Evaluation End-to-end benefit OrigNC Random XOR Good choice possible: Unoptimized NCs reduced delay e.g. 24% vs. XOR Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 49

50 1.0 DHT Traversal: Evaluation End-to-end benefit OptNC OrigNC Random OptNC: higher accuracy, faster lookups (e.g. 33% vs XOR, 12% vs OrigNC) 0.2 XOR Lookup Delay (ms) Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 50

51 DHT Traversal: Evaluation End-to-end benefit OptNC OrigNC XOR Takeaway Coordinates aided locality-aware anycast decisions Lookup Delay (ms) Random Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 51

52 Conclusion Methodology Coarse and fine statistics Limited Horizon Problem Solution: neighbor decay Locality-aware anycast -style decisions DHT traversal Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 52

53 Thanks & Pyxida Check out Pyxida: Same code base Network Coordinate Service for PlanetLab Library Implementation of NC techniques Links to data Thanks. Any Questions? Jonathan Ledlie Jonathan Ledlie - Harvard University - NSDI - April 07 - Slide 53

Building Large-scale Distributed Systems with Network Coordinates

Building Large-scale Distributed Systems with Network Coordinates Distributed Software Engineering (DSE) Group Department of Computing Building Large-scale Distributed Systems with Network Coordinates Peter Pietzuch prp@doc.ic.ac.uk Distributed Software Engineering (DSE)

More information

Network Coordinates in the Wild

Network Coordinates in the Wild Network Coordinates in the Wild Jonathan Ledlie, Paul Gardner, and Margo Seltzer Harvard School of Engineering and Applied Sciences and Aelitis {jonathan,margo}@eecs.harvard.edu, pgardner@aelitis.com Abstract

More information

Vivaldi: : A Decentralized Network Coordinate System

Vivaldi: : A Decentralized Network Coordinate System Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute

More information

A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays

A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays Jeffrey Shneidman, Peter Pietzuch, Matt Welsh, Margo Seltzer, Mema Roussopoulos Systems Research Group Harvard University

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM

More information

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems

More information

Tuning Vivaldi: Achieving Increased Accuracy and Stability

Tuning Vivaldi: Achieving Increased Accuracy and Stability Tuning Vivaldi: Achieving Increased Accuracy and Stability Benedikt Elser, Andreas Förschler, and Thomas Fuhrmann Computer Science Department, Technical University of Munich, Germany {elser,fuhrmann}@so.in.tum.de

More information

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates

More information

Path Optimization in Stream-Based Overlay Networks

Path Optimization in Stream-Based Overlay Networks Path Optimization in Stream-Based Overlay Networks Peter Pietzuch, prp@eecs.harvard.edu Jeff Shneidman, Jonathan Ledlie, Mema Roussopoulos, Margo Seltzer, Matt Welsh Systems Research Group Harvard University

More information

R/Kademlia: Recursive and Topology-aware Overlay Routing

R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the

More information

Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on...

Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on... Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on... Autonomous applications have a demand for grasping the state of hosts and networks for: sustaining

More information

PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems

PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems Fenglin Liao, Keshava P Subramanya, Veljko Pejovic, Ben Zhao {fenglin, keshava, veljko, ravenben} @ cs.ucsb.edu Abstract - In

More information

Traffic Localization for DHT-based BitTorrent networks

Traffic Localization for DHT-based BitTorrent networks Traffic Localization for DHT-based BitTorrent networks Matteo Varvello and Moritz Steiner Bell Labs, Alcatel-Lucent, USA {matteo.varvello,moritz.steiner}@alcatel-lucent.com Abstract. BitTorrent is currently

More information

Wired Geometric Routing

Wired Geometric Routing Wired Geometric Routing Jonathan Ledlie, Michael Mitzenmacher, Margo Seltzer Harvard University {jonathan,michaelm,margo}@eecs.harvard.edu Peter Pietzuch Imperial College London prp@doc.ic.ac.uk Abstract

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction : A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua

More information

Re-imagining Vivaldi with HTML5/WebGL. PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch

Re-imagining Vivaldi with HTML5/WebGL. PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch Re-imagining Vivaldi with HTML5/WebGL PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch dmirkovic@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne

More information

Coordinate-based Routing:

Coordinate-based Routing: Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

Vivaldi: A Decentralized Coordinate System

Vivaldi: A Decentralized Coordinate System Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer

More information

Secure and Accurate Network Coordinate Systems

Secure and Accurate Network Coordinate Systems Secure and Accurate Network Coordinate Systems A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY D. Eric Chan-Tin IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

More information

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017 CS 43: Computer Networks BitTorrent & Content Distribution Kevin Webb Swarthmore College September 28, 2017 Agenda BitTorrent Cooperative file transfers Briefly: Distributed Hash Tables Finding things

More information

CS 425 / ECE 428 Distributed Systems Fall 2015

CS 425 / ECE 428 Distributed Systems Fall 2015 CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Measurement Studies Lecture 23 Nov 10, 2015 Reading: See links on website All Slides IG 1 Motivation We design algorithms, implement

More information

ALTO Problem Statement

ALTO Problem Statement ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet

More information

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2

416 Distributed Systems. Mar 3, Peer-to-Peer Part 2 416 Distributed Systems Mar 3, Peer-to-Peer Part 2 Scaling Problem Millions of clients server and network meltdown 2 P2P System Leverage the resources of client machines (peers) Traditional: Computation,

More information

Reverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF

Reverse Traceroute. NSDI, April 2010 This work partially supported by Cisco, Google, NSF Reverse Traceroute Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay K. Adhikari, Colin Scott, Justine Sherry, Peter van Wesep, Arvind Krishnamurthy, Thomas Anderson NSDI, April 2010 This work partially

More information

A view from inside a distributed Internet coordinate system

A view from inside a distributed Internet coordinate system A view from inside a distributed Internet coordinate system Mohamad JABER, Cao-Cuong NGO and Chadi BARAKAT EPI Planète, INRIA, France Email:{mjaber, cngo, cbarakat}@sophia.inria.fr Abstract The Vivaldi

More information

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.

BitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved. BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and

More information

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems

The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, and Yongdae Kim University of Minnesota {dchantin,feldman,hopper,kyd}@cs.umn.edu

More information

Kademlia: A P2P Informa2on System Based on the XOR Metric

Kademlia: A P2P Informa2on System Based on the XOR Metric Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg

More information

Drafting Behind Akamai (Travelocity-Based Detouring)

Drafting Behind Akamai (Travelocity-Based Detouring) (Travelocity-Based Detouring) Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic and Fabián E. Bustamante Department of EECS Northwestern University ACM SIGCOMM 2006 Drafting Detour 2 Motivation Growing

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Lecture 8: Application Layer P2P Applications and DHTs

Lecture 8: Application Layer P2P Applications and DHTs Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

CTracker: a Distributed BitTorrent Tracker Based on Chimera

CTracker: a Distributed BitTorrent Tracker Based on Chimera CTracker: a Distributed BitTorrent Tracker Based on Chimera Raúl JIMÉNEZ, Björn KNUTSSON Kungliga Tekniska högskolan, Isafjordsgatan 39, Stockholm, 164 40, Sweden Tel: +46 8 790 42 85, Fax: +46 8 751 17

More information

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste

Overview Computer Networking Lecture 16: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Overview 5-44 5-44 Computer Networking 5-64 Lecture 6: Delivering Content: Peer to Peer and CDNs Peter Steenkiste Web Consistent hashing Peer-to-peer Motivation Architectures Discussion CDN Video Fall

More information

CS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018

CS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018 CS 43: Computer Networks 14: DHTs and CDNs October 3, 2018 If Alice wants to stream Mad Men over a highspeed Internet connection her browser may choose a video rate A. in the range of Mbps. B. in the range

More information

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 16. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 16. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2017 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

Extreme Computing. BitTorrent and incentive-based overlay networks.

Extreme Computing. BitTorrent and incentive-based overlay networks. Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some

More information

Building an Internet-Scale Publish/Subscribe System

Building an Internet-Scale Publish/Subscribe System Building an Internet-Scale Publish/Subscribe System Ian Rose Mema Roussopoulos Peter Pietzuch Rohan Murty Matt Welsh Jonathan Ledlie Imperial College London Peter R. Pietzuch prp@doc.ic.ac.uk Harvard University

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking Forwarding (Longest Matching Prefix) Helpers: ARP and DHCP Fragmentation

More information

PEER-TO-PEER NETWORKS, DHTS, AND CHORD

PEER-TO-PEER NETWORKS, DHTS, AND CHORD PEER-TO-PEER NETWORKS, DHTS, AND CHORD George Porter May 25, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license

More information

Tarantula: Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs

Tarantula: Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs : Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs Zhuo Chen,YangChen,YiboZhu, Cong Ding, Beixing Deng and Xing Li Department of Electronic Engineering, Tsinghua University,

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network

Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network 20/03/2017 1 IMPLEMENTATION OF KADEMLIA Kademlia is the protocol used by the largest public DHTs. Vuze ( before known as Azureus),

More information

Peer to Peer Systems and Probabilistic Protocols

Peer to Peer Systems and Probabilistic Protocols Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

Linear Regression and K-Nearest Neighbors 3/28/18

Linear Regression and K-Nearest Neighbors 3/28/18 Linear Regression and K-Nearest Neighbors 3/28/18 Linear Regression Hypothesis Space Supervised learning For every input in the data set, we know the output Regression Outputs are continuous A number,

More information

Democratizing Content Publication with Coral

Democratizing Content Publication with Coral Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University NSDI 2004 A problem Feb 3: Google linked banner to julia fractals Users clicking directed to Australian

More information

Lecture 17: Peer-to-Peer System and BitTorrent

Lecture 17: Peer-to-Peer System and BitTorrent CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and

More information

BBS654 Data Mining. Pinar Duygulu. Slides are adapted from Nazli Ikizler

BBS654 Data Mining. Pinar Duygulu. Slides are adapted from Nazli Ikizler BBS654 Data Mining Pinar Duygulu Slides are adapted from Nazli Ikizler 1 Classification Classification systems: Supervised learning Make a rational prediction given evidence There are several methods for

More information

Choosing a Random Peer

Choosing a Random Peer Choosing a Random Peer Jared Saia University of New Mexico Joint Work with Valerie King University of Victoria and Scott Lewis University of New Mexico P2P problems Easy problems on small networks become

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Overlapping Ring Monitoring Algorithm in TIPC

Overlapping Ring Monitoring Algorithm in TIPC Overlapping Ring Monitoring Algorithm in TIPC Jon Maloy, Ericsson Canada Inc. Montreal April 7th 2017 PURPOSE When a cluster node becomes unresponsive due to crash, reboot or lost connectivity we want

More information

EE 122: Peer-to-Peer Networks

EE 122: Peer-to-Peer Networks EE 122: Peer-to-Peer Networks Ion Stoica (and Brighten Godfrey) TAs: Lucian Popa, David Zats and Ganesh Ananthanarayanan http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer

More information

Faster Content Access in KAD

Faster Content Access in KAD Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)

More information

CPSC 340: Machine Learning and Data Mining

CPSC 340: Machine Learning and Data Mining CPSC 340: Machine Learning and Data Mining Fundamentals of learning (continued) and the k-nearest neighbours classifier Original version of these slides by Mark Schmidt, with modifications by Mike Gelbart.

More information

Hierarchical Clustering 4/5/17

Hierarchical Clustering 4/5/17 Hierarchical Clustering 4/5/17 Hypothesis Space Continuous inputs Output is a binary tree with data points as leaves. Useful for explaining the training data. Not useful for making new predictions. Direction

More information

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured

More information

QOS Quality Of Service

QOS Quality Of Service QOS Quality Of Service Michael Schär Seminar in Distributed Computing Outline Definition QOS Attempts and problems in the past (2 Papers) A possible solution for the future: Overlay networks (2 Papers)

More information

Load balancing in Content Delivery Networks in Novel Distributed Equilibrium

Load balancing in Content Delivery Networks in Novel Distributed Equilibrium International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Load balancing in Content Delivery Networks in Novel Distributed Equilibrium V. Kamakshamma 1, D. Anil 2 1 Department of CSE, VEC,

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network

More information

The Scalability of Swarming Peer-to-Peer Content Delivery

The Scalability of Swarming Peer-to-Peer Content Delivery The Scalability of Swarming Peer-to-Peer Content Delivery Daniel Zappala Brigham Young University zappala@cs.byu.edu with Daniel Stutzbach Reza Rejaie University of Oregon Page 1 Motivation Small web sites

More information

Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems

Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems Exploiting Communities for Enhancing Lookup Performance in Structured P2P Systems H. M. N. Dilum Bandara and Anura P. Jayasumana Colorado State University Anura.Jayasumana@ColoState.edu Contribution Community-aware

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Peer-to-peer computing research a fad?

Peer-to-peer computing research a fad? Peer-to-peer computing research a fad? Frans Kaashoek kaashoek@lcs.mit.edu NSF Project IRIS http://www.project-iris.net Berkeley, ICSI, MIT, NYU, Rice What is a P2P system? Node Node Node Internet Node

More information

P2P content distribution

P2P content distribution P2P content distribution T-110.7100 Applications and Services in Internet, Fall 2010 Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials Steps of content sharing Share content Find content Transfer

More information

A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems

A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems A Lightweight Approach for Improving the Lookup Performance in Kademlia-type Systems Technical Report Hani Salah Stefanie Roos Thorsten Strufe TU Darmstadt, Germany TU Dresden, Germany hsalah(at)cstu-darmstadtde,

More information

Charm: A charming network coordinate system

Charm: A charming network coordinate system Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm

More information

Unsupervised Learning

Unsupervised Learning Outline Unsupervised Learning Basic concepts K-means algorithm Representation of clusters Hierarchical clustering Distance functions Which clustering algorithm to use? NN Supervised learning vs. unsupervised

More information

Internet Anycast: Performance, Problems and Potential

Internet Anycast: Performance, Problems and Potential Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

LECT-05, S-1 FP2P, Javed I.

LECT-05, S-1 FP2P, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals.

Overlay Networks: Motivations. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Motivations (cont d) Goals. Overlay Networks: Motivations CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University

More information

The hidden locality in swarms

The hidden locality in swarms The hidden locality in swarms John S. Otto and Fabián E. Bustamante Northwestern University {jotto,fabianb}@eecs.northwestern.edu Abstract People use P2P systems such as BitTorrent to share an unprecedented

More information

Democratizing Content Publication with Coral

Democratizing Content Publication with Coral Democratizing Content Publication with Mike Freedman Eric Freudenthal David Mazières New York University www.scs.cs.nyu.edu/coral A problem Feb 3: Google linked banner to julia fractals Users clicking

More information

Fixing the Embarrassing Slowness of OpenDHT on PlanetLab

Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker University of California, Berkeley opendht@opendht.org Introduction The distributed

More information

A Distributed Web Cache using Load-Aware Network Coordinates

A Distributed Web Cache using Load-Aware Network Coordinates A Distributed Web Cache using Load-Aware Network Coordinates Nicholas Ball Department of Computing Imperial College, London Supervisor: Peter Pietzuch Second Marker: Alexander L. Wolf June 17, 2008 Abstract

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic

Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic Optimizing Capacity-Heterogeneous Unstructured P2P Networks for Random-Walk Traffic Chandan Rama Reddy Microsoft Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer

More information

Lecture 6: Securing Distributed and Networked Systems. CS 598: Network Security Matthew Caesar March 12, 2013

Lecture 6: Securing Distributed and Networked Systems. CS 598: Network Security Matthew Caesar March 12, 2013 Lecture 6: Securing Distributed and Networked Systems CS 598: Network Security Matthew Caesar March 12, 2013 1 Today: Distributed Internet Services Previous cycle: how to build Internet services that run

More information

Instance-based Learning

Instance-based Learning Instance-based Learning Nearest Neighbor 1-nearest neighbor algorithm: Remember all your data points When prediction needed for a new point Find the nearest saved data point Return the answer associated

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Peer-to-Peer Systems and Distributed Hash Tables

Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected

More information

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80

More information

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables

Today. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup

More information

AVMEM: Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems

AVMEM: Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems AVMEM: Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems Ramsés Morales, Brian Cho and Indranil Gupta Dept. of Computer Science University of Illinois at Urbana-Champaign

More information