Introduction to Peer-to-Peer Networks
|
|
- Carmella Jones
- 5 years ago
- Views:
Transcription
1 Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Structured Peer-to-Peer Systems Chord CAN 1 Prof. Dr. Thomas Schmidt
2 A Peer-to-Peer system is a self-organizing system of equal, autonomous entities (peers) which aims for the shared usage of distributed resources in a networked environment avoiding central services. Andy Oram 2 Prof. Dr. Thomas Schmidt
3 The Old Days NetNews (nntp) DNS Usenet since 1979, initially based on UUCP Exchange (replication) of news articles by subscription Group creation/deletion decentralised Distributed delegation of name authorities: file sharing of host tables Name Servers act as peers Hierarchical information space permits exponential growth Systems are manually configured distributed peers 3 Prof. Dr. Thomas Schmidt
4 Distributed Computing Search for Extraterrestrial Intelligence (SETI) Analyse radio signals from space Globally shared computing res. Idea 1995 First version Mio clnt E.g. Screensaver From Anderson et. al.: SETI@home, Comm. ACM, 45 (11), Nov ongoing 4 Prof. Dr. Thomas Schmidt
5 Napster MAY 1999: Disruption of the Internet community First Generation of File sharing: Introduction of Napster Users not only consume and download, but also offer content Users establish a virtual network, entirely independent from physical network and administrative authorities or restrictions Basis: UDP and TCP connections between the peers Napster provides centralised indexing Clients upload their file list to Napster Server Clients query Index Server and receive full provider list Data exchange directly between peers 5 Prof. Dr. Thomas Schmidt
6 Napster December 1999: RIAA files a lawsuit against Napster Inc. March 2000: University of Wisconsin reports 25 % of its IP traffic is Napster traffic February 2001: 2.79 billion files per month exchanged via Napster July 2001: Napster Inc. is convicted Target of the RIAA: the central lookup server of Napster Napster has to stop the operation of the Napster server Napster network breaks down Napster failed (technically & legally) at its single server point. 6 Prof. Dr. Thomas Schmidt
7 Gnutella File sharing fully decentralised Open source software March 2000: Release 0.4 with network flooding Spring 2001: Release 0.6 improved scalability 7 Prof. Dr. Thomas Schmidt
8 Gnutella 0.4 Pure P2P system no central indexing server Operations: 1. Connect to at least one active peer (address received from bootstrap) 2. Explore your neighborhood (PING/PONG) 3. Submit Query with a list of keywords to your neighbors (they forward it) 4. Select best of correct answers (which we receive after a while) 5. Connect to providing host/peer Scaling Problems due to network flooding 8 Prof. Dr. Thomas Schmidt
9 Gnutella 0.4: How Does It Work 9 Prof. Dr. Thomas Schmidt
10 Gnutella 0.6 Hybrid P2P System Introduction of Superpeers Improved scalability: signalling reduced to Superpeers Election mechanism decides which node becomes a Superpeer or a Leafnode (depending on capabilities (storage, processing power) network connection, the uptime of a node, ) Leafnodes announce their shared content to the Superpeer they are connected to Superpeers carry local routing tables 10 Prof. Dr. Thomas Schmidt
11 Gnutella 0.6: How Does It Work From: J. Eberspächer, R. Schollmeier: First and Second Generation Peer-to-Peer Systems, in LNCS Prof. Dr. Thomas Schmidt
12 The Gnutella Network Measurements from May 2002 From: J. Eberspächer, R. Schollmeier: First and Second Generation Peer-to-Peer Systems, in LNCS Prof. Dr. Thomas Schmidt
13 Skype VoIP conferencing system Released 2003 Central login server Hybrid P2P system otherwise Main focuses: Detect users Traverse NAT & Firewalls (STUN) Elects Superpeers according to network connectivity Uses Superpeers as relays 13 Prof. Dr. Thomas Schmidt
14 Impacts of P2P at the Abilene Backbone Unidentified + data_transfers + file_sharing causes 90% of the traffic Unidentified traffic and data_transfers increased significantly Parts of P2P is hidden (port hopping, ) Some P2P applications use port 80 data_transfers Traffic portions in % per week 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Prof. Dr. Thomas Schmidt Unidentified Data_Transfers File_Sharing Core of Internet2 infrastructure, connecting 190 US universities and research centers Possible data transfers Only Signaling Data source:
15 The Nature of P2P P2P Networks overlay network infrastructure Implemented on application layer Overlay Topology forms a virtual signaling network established via TCP connects Peers are content provider +content requestor +router in the overlay network Address: General Unique ID 15 Prof. Dr. Thomas Schmidt
16 P2P & Distributed Systems Paradigm Coordination among equal components Decentralised & self organising Independence of individual peers Scalability over tremendous ranges High dynamic from volatile members Fault resilience against infrastructure & nodes Incentives instead of control 16 Prof. Dr. Thomas Schmidt
17 P2P & Internetworking Paradigm Loose, stateless coupling among peers Serverless & without infrastructural entities Dynamic adaptation to network infrastructure Overcome of NATs or port barriers Client-Server principle reduced to communication programming, not an application paradigm anymore Somewhat Back to the Internet roots : Freedom of information Freedom of scale But: Freedom of Internet infrastructure & regulation 17 Prof. Dr. Thomas Schmidt
18 P2P Application Areas File sharing Media Conferencing Resource Sharing: Grids Collaborative Communities Content based networking: e.g. Semantic Nets Business Applications: e.g. Market Management Ubiquitous Computing: e.g. Vehicular Communication 18 Prof. Dr. Thomas Schmidt
19 Psychoacoustics From: J. Eberspächer, R. Schollmeier: First and Second Generation Peer-to-Peer Systems, in LNCS Prof. Dr. Thomas Schmidt
20 The Challenge in Peer-to-Peer Systems? I have item D. Where to place D? D? Data item D distributed system I want item D. Where can I find D?? peer-to-peer.info berkeley.edu planet-lab.org Location of resources (data items) distributed among systems Where shall the item be stored by the provider? How does a requester find the actual location of an item? Scalability: limit the complexity for communication and storage Robustness and resilience in case of faults and frequent changes 20 Prof. Dr. Thomas Schmidt
21 Unstructured P2P Revisited Basically two approaches: Centralized Simple, flexible searches at server (O(1)) Single point of failure, O(N) node states at server Decentralized Flooding Fault tolerant, O(1) node states Communication overhead O(N 2 ), search may fail But: No reference structure between nodes imposed 21 Prof. Dr. Thomas Schmidt
22 Unstructured P2P: Complexities Flooding Communication Overhead O(N) O(log N) O(1) Bottleneck: Communication Overhead False negatives? Scalable solution between both extremes? Bottlenecks: Memory, CPU, Network Availability Central Server O(1) O(log N) O(N) 22 Prof. Dr. Thomas Schmidt
23 Idea: Distributed Indexing Initial ideas from distributed shared memories (1987 ff.) Nodes are structured according to some address space Data is mapped into the same address space Intermediate nodes maintain routing information to target nodes Efficient forwarding to destination (content not location) Definitive statement about existence of content H( my data ) = ? Prof. Dr. Thomas Schmidt
24 Scalability of Distributed Indexing Communication effort: O(log(N)) hops Node state: O(log(N)) routing entries Routing in O(log(N)) steps to the node storing the data H( my data ) = ? Nodes store O(log(N)) routing information to other nodes berkeley.edu planet-lab.org peer-to-peer.info Prof. Dr. Thomas Schmidt
25 Distributed Indexing: Complexities Communication Overhead O(N) O(log N) O(1) Flooding Bottleneck: Communication Overhead False negatives Distributed Hash Table Scalability: O(log N) No false negatives Resistant against changes Failures, Attacks Short time users Bottlenecks: Memory, CPU, Network Availability Central Server O(1) O(log N) Node State 25 Prof. Dr. Thomas Schmidt O(N)
26 Fundamentals of Distributed Hash Tables Desired Characteristics: Flexibility, Reliability, Scalability Challenges for designing DHTs Equal distribution of content among nodes Crucial for efficient lookup of content Permanent adaptation to faults, joins, exits of nodes Assignment of responsibilities to new nodes Re-assignment and re-distribution of responsibilities in case of node failure or departure Maintenance of routing information 26 Prof. Dr. Thomas Schmidt
27 Distributed Management of Data 1. Mapping of nodes and data into same address space Peers and content are addressed using flat identifiers (IDs) Nodes are responsible for data in certain parts of the address space Association of data to nodes may change since nodes may disappear 2. Storing / Looking up data in the DHT Search for data = routing to the responsible node Responsible node not necessarily known in advance Deterministic statement about availability of data 27 Prof. Dr. Thomas Schmidt
28 Addressing in Distributed Hash Tables Step 1: Mapping of content/nodes into linear space Usually: 0,, 2 m -1 à number of objects to be stored Mapping of data and nodes into an address space (with hash function) E.g., Hash(String) mod 2 m : H( my data ) 2313 Association of parts of address space to DHT nodes ( ) 2 m -1 0 H(Node Y)=3485 Data item D : H( D )=3107 Y 28 Prof. Dr. Thomas Schmidt X H(Node X)=2906 Often, the address space is viewed as a circle.
29 Mapping Address Space to Nodes Each node is responsible for part of the value range Often with redundancy (overlapping of parts) Continuous adaptation Real (underlay) and logical (overlay) topology so far uncorrelated Node 3485 is responsible for data items in range 2907 to 3485 (in case of a Chord-DHT) Logical view of the Distributed Hash Table Mapping on the real topology 29 Prof. Dr. Thomas Schmidt
30 Routing to a Data Item? Step 2: Locating the data (content-based routing) Routing to a Key-Value-pair H( my data ) = 3107 Start lookup at arbitrary node of DHT Routing to requested data item (key) recursively according to node tables Key = H( my data ) Node 3485 manages keys , Initial node (arbitrary) (3107, (ip, port)) 30 Prof. Dr. Thomas Schmidt Value = pointer to location of data
31 Routing to a Data Item (2) Getting the content K/V-pair is delivered to requester Requester analyzes K/V-tuple (and downloads data from actual location in case of indirect storage) H( my data ) = Get_Data(ip, port) In case of indirect storage: After knowing the actual Location, data is requested? Node 3485 sends (3107, (ip/port)) to requester 31 Prof. Dr. Thomas Schmidt
32 DHT Algorithms Lookup algorithm for nearby objects (Plaxton et al 1997) Before P2P later used in Tapestry Chord (Stoica et al 2001) Straight forward 1-dim. DHT Pastry (Rowstron & Druschel 2001) Proximity neighbour selection CAN (Ratnasamy et al 2001) Route optimisation in a multidimensional identifier space Kademlia (Maymounkov & Mazières 2002) 32 Prof. Dr. Thomas Schmidt
33 Chord: Overview Early and successful algorithm Simple & elegant easy to understand and implement many improvements and optimizations exist Main responsibilities: Routing Flat logical address space: l-bit identifiers instead of IPs Efficient routing in large systems: log(n) hops, with N number of total nodes Self-organization Handle node arrival, departure, and failure 33 Prof. Dr. Thomas Schmidt
34 Chord: Topology Hash-table storage put (key, value) inserts data into Chord Value = get (key) retrieves data from Chord Identifiers from consistent hashing Uses monotonic, load balancing hash function E.g. SHA-1, 160-bit output 0 <= identifier < Key associated with data item E.g. key = sha-1(value) ID associated with host E.g. id = sha-1 (IP address, port) 34 Prof. Dr. Thomas Schmidt
35 Chord: Topology Keys and IDs on ring, i.e., all arithmetic modulo (key, value) pairs managed by clockwise next node: successor successor(1) = 1 successor(6) = Chord Ring 2 2 successor(2) = X Identifier Node Key 35 Prof. Dr. Thomas Schmidt
36 Chord: Topology Topology determined by links between nodes Link: knowledge about another node Stored in routing table on each node Simplest topology: circular linked list Each node has link to clockwise next node Prof. Dr. Thomas Schmidt
37 Routing on Ring? Primitive routing: Forward query for key x until successor(x) is found Return result to source of query Pros: Simple Little node state Cons: Poor lookup efficiency: O(1/2 * N) hops on average (with N nodes) Node failure breaks circle 37 Prof. Dr. Thomas Schmidt Node 0 Key 6?
38 Improved Routing on Ring? Improved routing: Store links to z next neighbors, Forward queries for k to farthest known predecessor of k For z = N: fully meshed routing system Lookup efficiency: O(1) Per-node state: O(N) Still poor scalability in linear routing progress Scalable routing: Mix of short- and long-distance links required: Accurate routing in node s vicinity Fast routing progress over large distances Bounded number of links per node 38 Prof. Dr. Thomas Schmidt
39 Chord: Routing Chord s routing table: finger table Stores log(n) links per node Covers exponentially increasing distances: Node n: entry i points to successor(n + 2 i ) (i-th finger) finger table i start succ. keys finger table i start succ keys finger table i start succ. keys Prof. Dr. Thomas Schmidt
40 Chord: Routing Chord s routing algorithm: Each node n forwards query for key k clockwise To farthest finger preceding k Until n = predecessor(k) and successor(n) = successor(k) Return successor(n) to source of query i 2^i Target Link i 2^i 40 43Target 42 45Link lookup (44) (44) = Prof. Dr. Thomas Schmidt
41 Chord: Self-Organization Handle changing network environment Failure of nodes Network failures Arrival of new nodes Departure of participating nodes Maintain consistent system state for routing Keep routing information up to date Routing correctness depends on correct successor information Routing efficiency depends on correct finger tables Failure tolerance required for all operations 41 Prof. Dr. Thomas Schmidt
42 Chord: Failure Tolerance in Storage Layered design Chord DHT mainly responsible for routing Data storage managed by application persistence consistency Chord soft-state approach: Nodes delete (key, value) pairs after timeout Applications need to refresh (key, value) pairs periodically Worst case: data unavailable for refresh interval after node failure 42 Prof. Dr. Thomas Schmidt
43 Chord: Failure Tolerance in Routing Finger failures during routing query cannot be forwarded to finger forward to previous finger (do not overshoot destination node) trigger repair mechanism: replace finger with its successor Active finger maintenance periodically check fingers fix_fingers replace with correct nodes on failures trade-off: maintenance traffic vs. correctness & timeliness 43 Prof. Dr. Thomas Schmidt
44 Chord: Failure Tolerance in Routing Successor failure during routing Last step of routing can return node failure to source of query -> all queries for successor fail Store n successors in successor list successor[0] fails -> use successor[1] etc. routing fails only if n consecutive nodes fail simultaneously Active maintenance of successor list periodic checks similar to finger table maintenance stabilize uses predecessor pointer crucial for correct routing 44 Prof. Dr. Thomas Schmidt
45 Chord: Node Arrival New node picks ID Contact existing node (known from bootstrapping) Initiates search on personal ID -> successor returned Retrieve (key, value) pairs from successor Construct finger table via standard routing/lookup() finger table i start succ keys finger table i start succ keys 1 finger table i start succ keys finger table i start succ keys 2 45 Prof. Dr. Thomas Schmidt
46 Chord: Node Departure Deliberate node departure clean shutdown instead of failure For simplicity: treat as failure system already failure tolerant soft state: automatic state restoration state is lost briefly invalid finger table entries: reduced routing efficiency For efficiency: handle explicitly notification by departing node to successor, predecessor, nodes at finger distances copy (key, value) pairs before shutdown 46 Prof. Dr. Thomas Schmidt
47 Chord: Summary Complexity Messages per lookup: O(log N) Memory per node: O(log N) Messages per management action (join/leave/fail): O(log² N) Advantages Theoretical models and proofs about complexity Simple & flexible Disadvantages No notion of node proximity and proximity-based routing optimizations Chord rings may become disjoint in realistic settings Many improvements published e.g. proximity, bi-directional links, load balancing, etc. 47 Prof. Dr. Thomas Schmidt
48 CAN: Overview Maps node IDs to regions, which partition d-dimensional space correspondingly are coordinate points in a ddim. torus: <k1,, kd> Keys Routing from neighbour to neighbour neighbourhood enhanced in high dimensionality d 48 tuning parameter of the system Prof. Dr. Thomas Schmidt
49 CAN: Space Partitioning Keys mapped into [0,1] d (or other numerical interval) Node s regions always cover the entire torus Data is placed on node, who owns zone of its key Zone management is done by splitting / re-merging regions Dimensional ordering to retain spatial coherence 49 Prof. Dr. Thomas Schmidt
50 CAN Routing Each node maintains a coordinate neighbour set (Neighbours overlap in (d-1) dim. and abut in the remaining dim.) Routing is done from neighbour to neighbour along the straight line path from source to destination: Forwarding is done to that neighbour with coordinate zone closest to destination 50 Prof. Dr. Thomas Schmidt
51 CAN Node Arrival The new node 1. Picks a random coordinate 2. Contacts any CAN node and routes a join to the owner of the corresponding zone 3. Splits zone to acquire region of its picked point & learns neighbours from previous owner 4. Advertises its presence to neighbours 51 Prof. Dr. Thomas Schmidt
52 Node Failure / Departure Node failure detected by missing update messages Leaving gracefully, a node notifies neighbours and copies its content On node s disappearance zone needs re-occupation in a size-balancing approach: Neighbours start timers invers. proportional to their zone size On timeout a neighbour requests takeover, responded only by those nodes with smaller zone sizes 52 Prof. Dr. Thomas Schmidt
53 CAN Optimisations Redundancy: Multiple simultaneous coordinate spaces - Realities Expedited Routing: Cartesian Distance weighted by network-level measures Path-length reduction: Overloading coordinate zones Proximity neighbouring: Topologically sensitive construction of overlay (landmarking) 53 Prof. Dr. Thomas Schmidt
54 CAN: Summary Complexity Messages per lookup: O(N 1/d ) Messages per mgmt. action (join/leave/fail): O( d/2 N 1/d )/O(2 d) Memory per node: O(d) Advantages Performance parametrisable through dimensionality Simple basic principle, easy to analyse & improve Disadvantages Lookup complexity is not logarithmically bound Due to its simple construction, CAN is open to many variants, improvements and customisations 54 Prof. Dr. Thomas Schmidt
55 References Andy Oram (ed.): Peer-to-Peer, O Reilly, R. Steinmetz, K. Wehrle (eds.): Peer-to-Peer Systems and Applications, Springer LNCS 3485, C.Plaxton, R. Rajaraman, A. Richa: Accessing Nearby Copies of Replicated Objects in a Distributed Environment, Proc. of 9th ACM Sympos. on parallel Algor. and Arch. (SPAA), pp , June I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan: Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. Proc. of the 2001 ACM SigComm, pp , ACM Press, S. Ratnasamy, P. Francis, M. Handley, R. Karp: A Scalable Content-Addressable Network. Proc. of the 2001 ACM SigComm, pp , ACM Press, Prof. Dr. Thomas Schmidt
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt
More informationStructured Peer-to-Peer Networks
Structured Peer-to-Peer Networks The P2P Scaling Problem Unstructured P2P Revisited Distributed Indexing Fundamentals of Distributed Hash Tables DHT Algorithms Chord Pastry Can Programming a DHT Graphics
More informationL3S Research Center, University of Hannover
, University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems
More informationLECT-05, S-1 FP2P, Javed I.
A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationDistributed Hash Tables (DHT)
Distributed Hash Tables (DHT) Jukka K. Nurminen Aalto University *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationSearching for Shared Resources: DHT in General
1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationSearching for Shared Resources: DHT in General
1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationMarch 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE
for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized
More informationPart 1: Introducing DHTs
Uni Innsbruck Informatik - Peer-to to-peer Systems Structured PP file sharing systems Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg Institute of Computer
More informationAdvanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems
Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationL3S Research Center, University of Hannover
, University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer
More informationDistributed Knowledge Organization and Peer-to-Peer Networks
Knowledge Organization and Peer-to-Peer Networks Klaus Wehrle Group Chair of Computer Science IV RWTH Aachen University http://ds.cs.rwth-aachen.de 1 Organization of Information Essential challenge in?
More informationA Framework for Peer-To-Peer Lookup Services based on k-ary search
A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology
More informationOverlay Multicast. Application Layer Multicast. Structured Overlays Unstructured Overlays. CAN Flooding Centralised. Scribe/SplitStream Distributed
Overlay Multicast Application Layer Multicast Structured Overlays Unstructured Overlays CAN Flooding Centralised Scribe/SplitStream Distributed PeerCast 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt
More informationIntroduction to P2P Computing
Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella
More informationOverlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma
Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs
More informationP2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili
P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationA Survey of Peer-to-Peer Content Distribution Technologies
A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationBadri Nath Rutgers University
lookup services Badri Nath Rutgers University badri@cs.rutgers.edu 1. CAN: A scalable content addressable network, Sylvia Ratnasamy et.al. SIGCOMM 2001 2. Chord: A scalable peer-to-peer lookup protocol
More informationCS514: Intermediate Course in Computer Systems
Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationAthens University of Economics and Business. Dept. of Informatics
Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationCIS 700/005 Networking Meets Databases
Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationDistributed Data Management. Profr. Dr. Wolf-Tilo Balke Institut für Informationssysteme Technische Universität Braunschweig
Distributed Data Management Profr. Dr. Wolf-Tilo Balke Institut für Informationssysteme Technische Universität Braunschweig 6 Structured P2P Networks 6.1 Hash Tables 6.2 Distributed Hash Tables 6.3 CHORD
More informationCS 347 Parallel and Distributed Data Processing
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 9: Peer-to-Peer Systems Previous Topics Data Database design Queries Query processing Localization Operators Optimization Transactions
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More information6 Structured P2P Networks
6 Structured P2P Networks Distributed Data Management Wolf-Tilo Balke Christoph Lofi Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 6.1 Hash Tables 6.3
More informationPeer to peer systems: An overview
Peer to peer systems: An overview Gaurav Veda (Y1148) gveda@cse.iitk.ac.in Computer Science & Engineering Indian Institute of Technology Kanpur, UP, INDIA - 208016 Abstract Peer-to-peer (p2p) systems is
More informationDecentralized Object Location In Dynamic Peer-to-Peer Distributed Systems
Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems George Fletcher Project 3, B649, Dr. Plale July 16, 2003 1 Introduction One of the key requirements for global level scalability
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationChord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide
More informationStructured P2P. Complexity O(log N)
Structured P2P. Complexity O(log N) Student: Santiago Peña Luque Communication Technologies 1 Year : 2005 INDEX 1. Introduction to P2P systems 2. Complexity 3. Structured Systems:DHT 4. Specific DHT algorithms
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationPeer-to-Peer (P2P) Systems
Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed
More information08 Distributed Hash Tables
08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per
More informationDistributed Hash Tables: Chord
Distributed Hash Tables: Chord Brad Karp (with many slides contributed by Robert Morris) UCL Computer Science CS M038 / GZ06 12 th February 2016 Today: DHTs, P2P Distributed Hash Tables: a building block
More informationOverlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q
Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs
More informationContent Search. Unstructured P2P
Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided
More informationDistributed Hash Tables
Distributed Hash Tables Chord Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Chord 1/29 Outline Overview 1 Overview 2 3 Smruti R. Sarangi
More information: Scalable Lookup
6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be
More informationDistributed lookup services
Distributed lookup services lookup services Badri Nath Rutgers University badri@cs.rutgers.edu A set of nodes cooperating Peers Run special purpose algorithms/software Doesn t have to be deployed at every
More informationP2P: Distributed Hash Tables
P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)
More information12/5/16. Peer to Peer Systems. Peer-to-peer - definitions. Client-Server vs. Peer-to-peer. P2P use case file sharing. Topics
// Topics Peer to Peer Systems Introduction Client-server vs peer to peer Peer-to-peer networks Routing Overlays Structured vs unstructured Example PP Systems Skype login server Peer-to-peer - definitions
More informationUnit background and administrivia. Foundations of Peer-to- Peer Applications & Systems
A Course on Foundations of Peer-to-Peer Systems & Applications CS 6/75995 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer Science www.cs.kent.edu/~javed/class-p2p08/
More informationChallenges in the Wide-area. Tapestry: Decentralized Routing and Location. Global Computation Model. Cluster-based Applications
Challenges in the Wide-area Tapestry: Decentralized Routing and Location System Seminar S 0 Ben Y. Zhao CS Division, U. C. Berkeley Trends: Exponential growth in CPU, b/w, storage Network expanding in
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationChallenges in the Wide-area. Tapestry: Decentralized Routing and Location. Key: Location and Routing. Driving Applications
Challenges in the Wide-area Tapestry: Decentralized Routing and Location SPAM Summer 00 Ben Y. Zhao CS Division, U. C. Berkeley! Trends: Exponential growth in CPU, b/w, storage Network expanding in reach
More informationReCord: A Distributed Hash Table with Recursive Structure
ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-
More informationOverlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma
Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 2.2.2015 Contents Today Geometries revisited Distributed Hash Tables (DHTs) Thursday Power-law networks Geometries revisited The
More informationDISTRIBUTED SYSTEMS CSCI 4963/ /4/2015
1 DISTRIBUTED SYSTEMS CSCI 4963/6963 12/4/2015 2 Info Quiz 7 on Tuesday. Project 2 submission URL is posted on the web site Submit your source code and project report (PDF!!!) in a single zip file. If
More informationA Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables
A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,
More informationGoals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.
Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley
More informationCRESCENDO GEORGE S. NOMIKOS. Advisor: Dr. George Xylomenos
CRESCENDO Implementation of Hierarchical Chord (Crescendo), according to Canon paradigm and evaluation, via simulation over realistic network topologies, of the Crescendo's advantages in comparison to
More informationUnit 8 Peer-to-Peer Networking
Unit 8 Peer-to-Peer Networking P2P Systems Use the vast resources of machines at the edge of the Internet to build a network that allows resource sharing without any central authority. Client/Server System
More informationEffect of Links on DHT Routing Algorithms 1
Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn
More informationLecture-2 Content Sharing in P2P Networks Different P2P Protocols
Lecture-2 Content Sharing in P2P Networks Different P2P Protocols Zhou Shuigeng March 10, 2005 Outline Classification of content sharing P2P systems Content sharing P2P systems Napster; Gnutella; Freenet
More informationDistributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016
Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can
More informationSurvey of DHT Evaluation Methods
Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the
More informationShould we build Gnutella on a structured overlay? We believe
Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationPeer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables CS 240: Computing Systems and Concurrency Lecture 8 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Selected
More informationChapter 6 PEER-TO-PEER COMPUTING
Chapter 6 PEER-TO-PEER COMPUTING Distributed Computing Group Computer Networks Winter 23 / 24 Overview What is Peer-to-Peer? Dictionary Distributed Hashing Search Join & Leave Other systems Case study:
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationDATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems
LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2018 Networking Laboratory P2P Applications Traditional P2P applications: for file sharing BitTorrent, Emule
More informationCycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network
Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu, Wayne State University, Detroit, MI 48202 Guihai Chen, Nanjing University, Nanjing, China {shy,czxu,gchen}@ece.eng.wayne.edu
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationEvolution of Peer-to-peer algorithms: Past, present and future.
Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 20.1.2014 Contents P2P index revisited Unstructured networks Gnutella Bloom filters BitTorrent Freenet Summary of unstructured networks
More informationToday. Why might P2P be a win? What is a Peer-to-Peer (P2P) system? Peer-to-Peer Systems and Distributed Hash Tables
Peer-to-Peer Systems and Distributed Hash Tables COS 418: Distributed Systems Lecture 7 Today 1. Peer-to-Peer Systems Napster, Gnutella, BitTorrent, challenges 2. Distributed Hash Tables 3. The Chord Lookup
More informationAdvanced Computer Networks
Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)
More informationAn Expresway over Chord in Peer-to-Peer Systems
An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An
More informationCSE 124 Finding objects in distributed systems: Distributed hash tables and consistent hashing. March 8, 2016 Prof. George Porter
CSE 124 Finding objects in distributed systems: Distributed hash tables and consistent hashing March 8, 2016 rof. George orter Outline Today: eer-to-peer networking Distributed hash tables Consistent hashing
More informationSplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks
SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso
More informationOverlay Multicast/Broadcast
Overlay Multicast/Broadcast Broadcast/Multicast Introduction Structured Overlays Application Layer Multicast Flooding: CAN & Prefix Flood. Unstructured Overlays Centralised Distributed Tree-based: Scribe/
More informationCSE 486/586 Distributed Systems
CSE 486/586 Distributed Systems Distributed Hash Tables Slides by Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Evolution of peer-to-peer Central directory (Napster)
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationFlexible Information Discovery in Decentralized Distributed Systems
Flexible Information Discovery in Decentralized Distributed Systems Cristina Schmidt and Manish Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering, Rutgers
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationBack-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs
Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook
More information15-744: Computer Networking P2P/DHT
15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access
More information