Implementing Aggregation/Broadcast over Distributed Hash Tables
|
|
- Kathryn Baker
- 6 years ago
- Views:
Transcription
1 1 Implementing Aggregation/Broadcast over Distributed Hash Tables Ji Li Ben Leong Karen Sollins Abstract We present an algorithm for implementing aggregation/broadcast over existing Distributed Hash Tables (DHTs). Our algorithm builds an aggregation tree in a bottom-up fashion by mapping nodes to their parents in the aggregation tree with pre-determined function and maintains it using soft-state. We believe that the aggregation/broadcast function is a basic service that should be layered over existing DHTs to provide them with the ability to disseminate/collect information efficiently on a global scale and perhaps even to search for answers to arbitrary semistructured queries. I. INTRODUCTION A Distributed Hash Table (DHT) is essentially a distributed resolution mechanism that manages the distribution of data among a changing set of nodes by mapping keys to nodes. DHTs allow member nodes to efficiently locate stored resources by name without using any centralized servers. A large number of DHTs, including Chord [1], Tapestry [2], Pastry [3], and CAN [4], have thus far been proposed and these systems are expected to eventually become the fundamental components of many large scale peer-to-peer distributed applications in the near future. Although the most commonly deployed peer-to-peer applications are file-sharing applications like Napster [5], Gnutella [6], Kazaa [7], and Freenet [8], we believe that the peer-to-peer paradigm will eventually be applied to the organization of centrally administered distributed systems. As highlighted by Bawa et al. [9], the administrators of such systems may want to collect statistical information about the network, even though they may not have direct control over the membership changes. Aggregated information on system parameters, such as network size, lifetime distribution, most popular files, etc., may be used to tune and optimize the performance of a network at runtime. In particular, the recently proposed randomized DHT topologies, like Viceroy [1] and Symphony [11], often require network size estimates to tune routing performance. In the case of a peer-to-peer storage network ([12], [13]), users may want to know about the approximate amount of available storage; in the case of a peer-to-peer computational Grid [14], nodes may want to know about the amount of computation resources available when deciding on how to schedule jobs in the network. More specifically, like Bawa et al. [9], our goal is to solve the node aggregation problem defined as: Devise a scheme to enable any node in a P2P network to issue a query that computes an aggregation function (MIN, MAX, COUNT, SUM, AVG) over data residing at nodes in the network. In our view, a good aggregation/broadcast scheme for DHTs must satisfy two criteria, namely scalability and robustness. With respect to scalability, we want to avoid flooding schemes that generate excessive redundant messages and we also want to ensure that there is good loadbalancing, in the sense that no node in the network should be liable for forwarding a disproportional amount of network traffic. In terms of robustness, we want a scheme that is resilient to the dynamicity of nodes joining, leaving and failing arbitrarily and independently. In this paper, we assume that we have at hand a robust and efficient DHT and our algorithm uses the underlying infrastructure to build efficient aggregation/broadcast trees. Our key idea is to use a family of functions to map a node to its parent node in an aggregation tree, to construct the tree in a bottom-up fashion and to maintain it using soft-state. Our proposed bottom-up approach is better than traditional broadcast based approaches because it generates a minimal amount of network traffic and we are guaranteed to be able to reach all nodes (eventually). II. RELATED WORK Data aggregation over a distributed system has been studied in different contexts such as large scale databases [15], wireless sensor network applications ([16], [17]), etc. In particular, Madden et al. [16] proposed a scheme for declarative aggregate queries to be distributed and executed over sensor networks. They focused mostly on bandwidth- and power-efficient aggregation. We attempt to solve the problem proposed by Bawa et al. [9] with a bottom-up approach and in a different con-
2 2 text. In [9], Bawa et al. assume that the peer-to-peer network is unstructured, and hence their proposed schemes are limited to top-down flooding-based techniques. From our work with EpiChord [18], we believe that it is feasible to build and maintain a underlying robust DHT infrastructure at relatively low cost and thus it is useful to attempt to solve the aggregation problem over DHTs. Our approach in using a continuous function to map nodes onto nodes is similar in spirit to the generalized scheme for building DHTs proposed by Naor and Wieder [19]. In their scheme, the functional mapping is used to build the underlying DHT, while in our scheme, we assume a robust DHT and we seek instead to build an additional structure over the underlying DHT infrastructure. Most of the recently proposed randomized DHT routing protocols ([2], [1], [11], [18]), require network size estimates to optimize lookup performance. Most of the current techniques rely on the assumption that node s are uniformly distributed within the address space, and estimates are obtained by extrapolating from observed node densities. These techniques typically require messsages and provide only probabilitistic guarantees on the accuracy, while our scheme requires only messages and have somewhat better accuracy guarantees independent of the actual distribution of node s. By solving the aggregation problem, we have also indirectly solved the broadcast problem. There is a large body of literature in this area. In general, existing schemes can be categoried either as a top-down spanning-tree approach ([21], [22]) or a flooding-based approach ([23], [24]). A major drawback of the former is that when nodes fail in the middle of the hierarchy, large sections of the original spanning tree lose contact with the root, while a major drawback of the latter tend to generate redundant traffic. There are also many related DHT-based application-level multicast proposals ([25], [26], [27]). III. AGGREGATION BY FUNCTIONAL MAPPING In this section, we describe our bottom-up tree construction algorithm. We assume that we have an efficient and robust DHT available as the basic infrastructure 1. The key idea in our aggregation tree-building algorithm is to use a many-to-one function,, to map each node uniquely to a parent node in the aggregation tree based on its. More specifically, the parent node for a node is the node which owns the, where is the minimum number of times that has to be applied In general, any robust DHT will suffice. The only restriction/requirement that we impose is that the DHT must have a circular namespace, i.e. Chord, Tapestry or Pastry. to before the node no longer owns the. If node owns for! #"%$%$%$&"(', then is the root of the aggregation tree. If we consider the nodes in a DHT as nodes in a graph and the child-parent relations determined by to be directed edges, the resulting graph is a directed tree converging at the root. More specifically,, which we also call a Parent Function, is any function that satisfies the following conditions: *)+, ) (1) -. / )"+ (2) (":)+<; (":)+(" =>"? A@CB (3) where ) is an owned by the root of the aggregation tree, is any valid node 3 and "?DE is a distance metric defined for two valid node s and D in the namespace. Theorem 1: If a function satisfies the above conditions, there is a directed path from all nodes to the (root) node that owns the id ). Proof: Theorem 1 is a direct consequence of Condition (2). Given an arbitrary node, We know that there is a path from to ("F>,@!B. Since - GH), there must therefore be a directed path from to ). A. Tree-Building Protocol A node learns about the parent function,, for a DHT when it attempts to joins the network through an existing node. Given a parent function, the tree-building protocol is straightforward: 1) When a node joins the system, it determines and performs a lookup to locate the node responsible for I, say node D. 2) Node sends a message to node D to register itself as a child and node D adds node to its list of child nodes. 3) It is henceforth the responsibility of node to contact node D periodically to refresh its status as a child node; if node D fails to hear from node after a specified expiry duration, node will be deleted from its list of child nodes. 4) As the system evolves, it is possible that node D may fail or it may no longer be responsible for. In the former, node will discover node D s failure when it tries to refresh its status with node D ; in the latter, D will inform node that it is no longer the parent when node tries to refresh its status. In both cases, node will simply perform another lookup for to determine its new parent and register with it instead.
3 B ' ) B B. A Simple Parent Function There are many functions that will satisfy Conditions (1) to (3) above. The following is a simple PSfrag replacements example:, mod for B ; mod for ; C where is a node, and is a parameter that determines address space bits the branching factor of the tree, and. As shown in Figure 1, the aggregation tree resulting from this function is rooted at the node owning the B. By direct substition, we can easily verify that this function satisfies the three conditions stated above. The expected height of a spanning tree constructed with this function is 6, where is the size of the network and the expected branching factor is approximately if the node are uniformly distributed in the namespace. PSfrag replacements increasing Fig. 1. Aggregation pattern of the simple parent function. is the root id, and the arrows show the directed edges of the aggregation tree from child to parent. C. A More General Parent Function We can generalize the function described in Section III- B to allow for an arbitrary root ) by a simple change of coordinates. The resulting parent function is as follows:, ) mod! mod (" " for B ; # ) mod $ )% & mod! mod (" for ; )+ mod $ C The resulting aggregation tree is illustrated in Figure 2. A nice property of this aggregation/broadcast tree is that if the node s are uniformly distributed over the address space (which a common assumption for many of the existing DHTs), the resulting tree is likely to be balanced. Nodes s for which )+ mod )(+* B" will converge clockwise to the root, while node s for which, ) G mod -(.* "? will converge counterclockwise. increasing / Fig. 2. Aggregation pattern of the generalized parent function with as the root of the tree. The arrows show the directed edges of the aggregation tree from child to parent. D. An Example of Aggregation - Network Size Estimation Although our goal is to compute aggregation functions (MIN, MAX, COUNT, SUM, AVG), we validate our approach with by evaluating a network size estimation function, since the key to obtaining good estimates of the various aggregation functions is to have robust directed paths from each node to the root of the aggregation tree. To estimate network size, we simply enhance the tree-building protocol described in Section III-A as follows: 1) When a node first joins the system and locates its parent node, it tells its parent node that it has a subtree size of 1. 2) When a node refreshes its status with its parent, it will report its subtree size which is the sum of the subtree sizes of all its child nodes plus one (i.e. itself) to the parent. 3) Eventually, the root of the aggregation tree will have an estimate of the size of the network. Once the root of the aggregation tree obtains an estimate of the network size, what it does with the estimate is a matter of policy and depends on the application/dht. In DHT where nodes require the network size estimate to optimize their performance, the root may wish to broadcast the estimate down the aggregation tree periodically. ) IV. PRACTICAL IMPLEMENTATION We have described an approach for building an aggregation tree rooted at a fixed 3 ). In a practical system, we will want to have the capability to set up aggregation trees rooted at arbitrary node s. To this end, our proposal is to have one permanent aggregation/broadcast tree rooted at a pre-determined well-known )1 for each DHT. If the default tree is the only avaiable broadcast tree in the system and a node, say, wants to construct a new aggregation/broadcast tree rooted at itself, it sends a message to the root of the default tree specifying the parent function with ) as its own. The message is then broadcast down 3
4 4 the default tree and all nodes will eventually receive this message and participate in the new aggregation/broadcast tree rooted at. When a new node joins the network, it will get a list of all currently existing aggregation trees from its parent node. Nodes also periodically exchange information on the existing aggregation trees. In this way, all nodes will eventually discover and participate in all existing aggregation trees. In order to avoid overloading the default broadcast tree, nodes that wish to set up new broadcast trees will randomly choose among all the other existing broadcast trees to perform its initial broadcast, if possible. When the root node of a tree wishes to tear down its aggregation tree, it simply broadcasts a message telling all nodes that the tree should be torn down. The message is guaranteed to eventually reach all nodes. If a root fails without notification, subsequent aggregation messages will eventually end up at a node which discovers that it has become the root of tree that it did not set up. It can decide to keep the tree or it can broadcast a message to tear it down. As highlighted by Bawa et al. in [9], one major drawback of using trees for aggregation is that trees inherently present single points of failure, i.e. the failure of any node in the intermediate levels of the tree will lead to a large number of nodes being cut off temporarily from the root. Although our bottom-up approach is inherently more robust and resilient to failures than existing top-down approaches, aggregates obtained by a single-tree approach will experience periodic glitches in a highly dynamic network. To improve the robustness of the estimates, multiple trees can be constructed and the same aggregates can be computed over them. By distributing the s of these trees over the 3 space uniformly and adopting some quorum system or by averaging over the estimates obtained from several trees, we can further improve the robustness of the aggregation computation. V. PERFORMANCE We evaluated our aggregation algorithm by evaluating the accuracy of the network size estimates obtained via simulation. Our simulations were performed with the Epi- Chord [18] network simulator written in Java. Our experiments were run on single-processor Intel P4-2.2GHz machines with 1GByte RAM running Linux with Java(TM) 2 Runtime Environment version A. Simulation Setup Our experiments are divided into discrete time periods. In each period, a number of nodes (determined according to a Poisson distribution) are created and join the network at a randomly chosen node. The node of a new node is uniformly distributed within the namespace. At the point when a node joins the network, we set its departure time according to an exponential distribution and nodes are removed from the network when their lifespans expire. In all our simulations, the default root ) is set to, and is set to 4. In our simulations, we have assumed that the estimates of network size are broadcast to all nodes down the aggregation tree and that the broadcast is done separately from the aggregation. It is possible to adopt another approach where estimates from a parent node to its child nodes are piggybacked on the acknowledgement messages, but we decided to evaluate the two processes separately because the periodicity of the two processes can conceivably be different depending on the application. B. Tree Construction In the first experiment, we evaluated the overhead of our algorithm in terms of network traffic by counting the number of messages sent in both the aggregation and broadcast process. In this experiment, the node failure rate is approximately 1% per time period. The communication cost in terms of messages sent as a function of network size is shown in Figure 3. The number of messages in each round of aggregation or broadcast are at least twice the network size, because in the aggregation each node sends an aggregation message to its parent and receives an acknowledgement (except for the root), and in the broadcast process each node receives a broadcast from its parent and sends back an acknowledgement (except for the root). Additional messages are needed to repair the tree when nodes fail. The children of a failed node have to perform a lookup to find their new parent, which requires extra messages 2. Figure 3 demonstrates that at a node failure rate of 1% per time period, the number of aggregation messages and broadcast messages are only a little more than twice the network size. The height of the resulting aggregate/broadcast tree affects the performance of the algorithm since it determines the time it takes for an aggregation message to propagate from a leaf node to the root and also the time it takes for a broadcast message from the root to propagate to the leaf nodes. Another important property of the aggregation tree is the distribution of the branching factor at the intermediate nodes as it directly affects load balancing. Ideally, The number of lookup messages is dependent on the underlying DHT. EpiChord is relatively efficient and provides a worst case lookup performance of messages in the worst case and a modal lookup performance of messages in most cases.
5 5 35 Aggregation messages Broadcast messages 16 Actual Network Size Average Estimated Network Size Number of messages 2 15 Network size Network size Fig. 3. Communication overhead (in terms of messages) for aggregation and broadcast Time period Fig. 5. Network size estimation. we would like all the intermediate nodes in the aggregation tree to have approximately the same branching factor for all nodes and to have a small spread in the range of branching factors. The relation between tree height, branching factor and the size of the network is shown in Figure Average height of aggregation tree Average branching factor Maximum branching factor 4 35 In order to investigate the robustness of our aggregation/broadcast algorithm, we ran experiments with networks of differing node failure rates. The maximum, minimum and average ratios of the size estimate to the actual network size are shown in Figure 6. Even at a node failure rate of 3%, i.e. 3% of the nodes in the network leave without notification in each time period, our algorithm still maintains an accuracy to within #B of the actual network size, which demonstrates that our algorihm is quite robust. Average height of aggregation tree Network size Fig. 4. Plots of tree height and branching factor against network size. Average branching factor Estimated size (as a proportion of total network size) Average Range of estimates C. Network Size Estimation In Figure 5, we show the evolution of the network size estimate at the root of the aggregation tree for a network with a node failure rate of 5% per time period. As the network is growing, the estimates tend to be smaller than the actual network size as expected. The downward spikes are likely to be due to the failure of intermediate nodes high up in the aggregation tree, leading to temporarily losses in the node count. Our results demonstrate however that our algorithm recovers rapidly from such failures. Fig Node failure rate Network size accuracy under various node failure rates. VI. CONCLUSION AND FUTURE WORK In this paper, we have presented a bottom-up approach for the building of an aggregation/broadcast tree over a DHT by mapping from a continuous function into the discrete node space. The major advantage of our bottom-
6 6 up function-based aggregation scheme compared to existing top-down and flooding-based approaches, is that it has a relatively low overhead and yet is guaranteed to eventually reach all nodes in the network. By having each node determine its parent in the aggregation tree at runtime based on the parent function, the system is robust and recovers quickly from node failures. Our scheme is also flexible in that parameters in the function can be changed to control the structure and characteristics (i.e. height and branching factor) of the resulting aggregation tree. There are many possible parent functions that can conceivably be adopted in our approach. We have only thus far explored a very simple one. It is conceivable that by adopting a different, we may be able to improve the performance of the algorithm. REFERENCES [1] Ion Stoica, Robert Morris, David Karger, Frans Kaashoek, and Hari Balakrishnan, Chord: A scalable Peer-To-Peer lookup service for internet applications, in Proceedings of the 21 ACM SIGCOMM Conference, 21, pp [2] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, Tapestry: An infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD , UC Berkeley, April 21. [3] Antony Rowstron and Peter Druschel, Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Lecture Notes in Computer Science, vol. 2218, pp. 329??, 21. [4] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker, A scalable content addressable network, Tech. Rep. TR--1, Berkeley, CA, 2. [5] Napster, [6] Gnutella, [7] KaZaA, [8] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong, Freenet: A distributed anonymous information storage and retrieval system, Lecture Notes in Computer Science, vol. 29, pp. 46+, 21. [9] M. Bawa, H. Garcia-Molina, A. Gionis, and R. Motwani, Estimating aggregates on a peer-to-peer network, in Submitted for publication, 23. [1] Dahlia Malkhi, Moni Naor, and David Ratajczak, Viceroy: A scalable and dynamic emulation of the butterfly, in Proceedings of 21st ACM Conf. on Principles of Distributed Computing (PODC 2), July 22. [11] Gurmeet Manku, Mayank Bawa, and Prabhakar Raghavan, Symphony: Distributed hashing in a small world, in Proceedings of 4th USENIX Symposium on Internet Technologies and Systems, March 23. [12] Frank Dabek, A cooperative file system, M.S. thesis, MIT, September 21. [13] Athicha Muthitacharoen, Robert Morris, Thomer M. Gil, and Benjie Chen, Ivy: A read/write peer-to-peer file system, in Proceedings of 5th Symposium on Operating Systems Design and Implementation, 22. [14] Ben Paechter, T. Baeck, M. Schoenauer, A.E. Eiben, and J. Merelo, A distributed resource evolutionary algorithm machine, in Proceedings of the 2 Congress on Evolutionary Computation (CEC 2), San Diego, USA, 2, IEEE, pp , IEEE Press. [15] Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don Reichart, Murali Venkatrao, Frank Pellow, and Hamid Pirahesh, Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals, J. Data Mining and Knowledge Discovery, vol. 1, no. 1, pp , [16] S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong., Tag: a tiny aggregation service for ad-hoc sensor networks, in 5th Symposium on Operating Systems Design and Implementation (OSDI), 22. [17] Jerry Zhao, Ramesh Govindan, and Deborah Estrin, Computing aggregates for monitoring wireless sensor networks, in Proc. 1st IEEE Intl. Workshop on Sensor Network Protocols and Applications (SNPA), 23. [18] Ben Leong, Erik D. Demaine, and Ji Li, Epichord: Implementing parallized DHT lookup with epidemic caching., July 23. Submitted to IEEE Infocomm 24. [19] Moni Naor and Udi Wieder, Novel architectures for P2P applications: the continuous-discrete approach, 22. [2] Gurmeet Singh Manku, Routing networks for distributed hash tables, in Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 23), Boston, Massachusetts, July 23, ACM. [21] Sameh El-Ansary, Luc Onana Alima, Per Brand, and Seif Haridi, Efficient broadcast in structured P2P networks, in 2nd International Workshop on Peer-to-Peer Systems (IPTPS 3), Berkeley, CA, 23. [22] Y. Chawathe and M. Seshadri, Broadcast federation: An application-layer broadcast internetwork, in Intnl. Workshop on Network and Operating Systems Support for Digital Audio and Video, 22. [23] M.-J. Lin, K.Marzullo, and S.Masini, Gossip versus deterministic flooding: Low message overhead and high reliability for broadcasting on small networks, Tech. Rep. Technical Report CS , University of California, San Diego, [24] M. Portmann and A. Seneviratne, Cost-effective broadcast for fully decentralized peer-to-peer networks, Computer Communication, vol. Special Issue on Ubiquitous Computing, Elsevier Science, 22. [25] Sylvia Ratnasamy, Mark Handley, Richard Karp, and Scott Shenker, Application-level multicast using content-addressable networks, in 3rd International Workshop on Networked Group Communication, November 21. [26] Antony I. T. Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Druschel, SCRIBE: The design of a large-scale event notification infrastructure, in Networked Group Communication, 21, pp [27] Rongmei Zhang and Y. Charlie Hu, Borg: A hybrid protocol for scalable application-level multicast in peer-to-peer networks, in The 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSS- DAV), Monterey, California, 23.
A Framework for Peer-To-Peer Lookup Services based on k-ary search
A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology
More informationImplementing Aggregation and Broadcast over Distributed Hash Tables
Implementing Aggregation and Broadcast over Distributed Hash Tables Ji Li jli@csail.mit.edu Karen Sollins sollins@csail.mit.edu MIT Computer Science and Artificial Intelligence Laboratory 3 Vassar Street
More informationShould we build Gnutella on a structured overlay? We believe
Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured
More informationDYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS
DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationReCord: A Distributed Hash Table with Recursive Structure
ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-
More informationAthens University of Economics and Business. Dept. of Informatics
Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service
More informationEffect of Links on DHT Routing Algorithms 1
Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationSelf-Correcting Broadcast in Distributed Hash Tables
Self-Correcting Broadcast in Distributed Hash Tables Ali Ghsi 1,Luc Onana Alima 1, Sameh El-Ansary 2, Per Brand 2 and Seif Haridi 1 1 IMIT-Royal Institute of Technology, Kista, Sweden 2 Swedish Institute
More informationA Super-Peer Based Lookup in Structured Peer-to-Peer Systems
A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University
More informationDegree Optimal Deterministic Routing for P2P Systems
Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup
More informationA Distributed Codec Placement Algorithm for Network-Embedded FEC
A Distributed Codec Placement Algorithm for Network-Embedded FEC Mingquan Wu and Hayder Radha Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48823 {wumingqu,
More informationRelaxing Routing Table to Alleviate Dynamism in P2P Systems
Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,
More informationLessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems
LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,
More informationOverlay Networks for Multimedia Contents Distribution
Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)
More informationDATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems
LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationTowards a Scalable Distributed Information Management System
Towards a Praveen Yalagandula and Mike Dahlin University of Texas at Austin Abstract This paper makes a case for developing a general large-scale networked systems, provides detailed views of nearby information
More informationData Indexing and Querying in DHT Peer-to-Peer Networks
Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data
More informationQuery Processing Over Peer-To-Peer Data Sharing Systems
Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,
More informationDistributed hash table - Wikipedia, the free encyclopedia
Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash
More informationApplication Layer Multicast For Efficient Peer-to-Peer Applications
Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology
More informationA Directed-multicast Routing Approach with Path Replication in Content Addressable Network
2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,
More informationL3S Research Center, University of Hannover
, University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems
More informationA P2P File Sharing Technique by Indexed-Priority Metric
A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication
More informationDefending against Eclipse attacks on overlay networks
Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract
More informationA New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture
A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org
More informationFlexible Information Discovery in Decentralized Distributed Systems
Flexible Information Discovery in Decentralized Distributed Systems Cristina Schmidt and Manish Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering, Rutgers
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationComparing the performance of distributed hash tables under churn
Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory
More informationEvolution of Peer-to-peer algorithms: Past, present and future.
Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different
More informationA Top Catching Scheme Consistency Controlling in Hybrid P2P Network
A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationLoad Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica fananthar, karthik, sonesh, karp, istoicag@cs.berkeley.edu Abstract Most P2P systems
More informationChapter 6 PEER-TO-PEER COMPUTING
Chapter 6 PEER-TO-PEER COMPUTING Distributed Computing Group Computer Networks Winter 23 / 24 Overview What is Peer-to-Peer? Dictionary Distributed Hashing Search Join & Leave Other systems Case study:
More informationSmall World Overlay P2P Networks
Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.
More informationUpdate Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems
Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)
More informationBOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS
BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationA Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery
A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca
More informationEfficient Broadcast in P2P Grids
Efficient Broadcast in P2P Grids Peter Merz, Katja Gorunova {pmerz,gorunova}@informatik.uni-kl.de University of Kaiserslautern Dept. of Computer Science Germany Abstract In this paper, we present an efficient
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationEvaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays
Journal of Computer Science (): xx-xx, ISS 49-66 Science Publications Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Surya Bahadur Kathayat,
More informationEffective File Replication and Consistency Maintenance Mechanism in P2P Systems
Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationSymphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World
Distributed Hashing in a Small World Gurmeet Singh Manku Stanford University with Mayank Bawa and Prabhakar Raghavan Acknowledgement The following slides are borrowed from the author s talk at USITS 2003.
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationCycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network
Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu, Wayne State University, Detroit, MI 48202 Guihai Chen, Nanjing University, Nanjing, China {shy,czxu,gchen}@ece.eng.wayne.edu
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationPeer-to-Peer Systems. Chapter General Characteristics
Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include
More informationL3S Research Center, University of Hannover
, University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer
More informationAggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test
Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
More informationPIC: Practical Internet Coordinates for Distance Estimation
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB2 3NH, UK September 23 Technical Report MSR-TR-23-53
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationFPN: A Distributed Hash Table for Commercial Applications
FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed
More informationDynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others
Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel
More informationPeer Clustering and Firework Query Model
Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk
More informationDesign of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem
Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois
More informationEvaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network
Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Mouna Kacimi Max-Planck Institut fur Informatik 66123 Saarbrucken, Germany mkacimi@mpi-inf.mpg.de ABSTRACT Several caching
More informationAn Agenda for Robust Peer-to-Peer Storage
An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a
More informationBAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks
: A Balanced Kautz Tree Structure for Peer-to-Peer Networks Deke Guo, Honghui Chen, Yunhao Liu, and Xiangyang Li College of Information Systems and Management, National University of Defense Technology,
More informationEARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.
: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department
More informationComparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks
Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit
More informationA Peer-to-Peer Architecture to Enable Versatile Lookup System Design
A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The
More informationRAQ: A Range-Queriable Distributed Data Structure
RAQ: A Range-Queriable Distributed Data Structure Hamid Nazerzadeh Mohammad Ghodsi Abstract Different structures are used in peer-to-peer networks to represent their inherently distributed, self-organized
More informationSubway : Peer-To-Peer Clustering of Clients for Web Proxy
Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More informationMulticast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010
Multicast Presented by Hakim Weatherspoon Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Midterm report abstract, introduction, background, related work, and design section. These sections should
More informationQoS Enabled Multicast for Structured P2P Networks
QoS Enabled Multicast for Structured P2P Networks Marc Brogle, Dragan Milic and Torsten Braun Computer Networks and Distributed Systems Institute of Computer Science and Applied Mathematics University
More informationModifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries
Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez and Matthew Wilkinson Lewis & Clark
More informationExploiting Semantic Clustering in the edonkey P2P Network
Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs
More informationLoad Sharing in Peer-to-Peer Networks using Dynamic Replication
Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia
More informationDecentralized Object Location In Dynamic Peer-to-Peer Distributed Systems
Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems George Fletcher Project 3, B649, Dr. Plale July 16, 2003 1 Introduction One of the key requirements for global level scalability
More informationExploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks
Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract
More informationPAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables
IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,
More informationA Large-scale and Decentralized Infrastructure for Multiple Queries Optimization and Aggregation
A Large-scale and Decentralized Infrastructure for Multiple Queries Optimization and Aggregation Xiaoyu Yang and Yiming Hu Department of Electrical and Computer Engineering University of Cincinnati, Cincinnati,
More informationPeer-to-Peer Networks Pastry & Tapestry 4th Week
Peer-to-Peer Networks Pastry & Tapestry 4th Week Department of Computer Science 1 Peer-to-Peer Networks Pastry 2 2 Pastry Peter Druschel Rice University, Houston, Texas now head of Max-Planck-Institute
More informationA Simple Fault Tolerant Distributed Hash Table
A Simple ault Tolerant Distributed Hash Table Moni Naor Udi Wieder Abstract We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation We show two lookup algorithms The
More informationData Replication under Latency Constraints Siu Kee Kate Ho
Data Replication under Latency Constraints Siu Kee Kate Ho (siho@cs.brown.edu) Abstract To maintain good quality of service, data providers have to satisfy requests within some specified amount of time.
More informationDorina Luminiţa COPACI, Constantin Alin COPACI
THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationDynamic Characteristics of k-ary n-cube Networks for Real-time Communication
Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication Gerald Fry and Richard West Computer Science Department Boston University Boston, MA 02215 {gfry,richwest@cs.bu.edu Abstract
More informationProviding Administrative Control and Autonomy in Structured Peer-to-Peer Overlays
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide
More informationHandling Network Partitions and Mergers in Structured Overlay Networks
Handling Network Partitions and Mergers in Structured Overlay Networks Tallat M. Shafaat Ali Ghodsi Seif Haridi Royal Institute of Technology (KTH), {tallat,haridi}(at)kth.se Swedish Institute of Computer
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationA Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables
A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,
More informationSearching for Shared Resources: DHT in General
1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationSearching for Shared Resources: DHT in General
1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original
More informationBrocade: Landmark Routing on Overlay Networks
Abstract Brocade: Landmark Routing on Overlay Networks CS262A Fall 2001 Yitao Duan, Ling Huang University of California, Berkeley duan@cs.berkeley.edu, hlion@newton.berkeley.edu Peer-to-peer networks offer
More informationPUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks
PUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks Duc A. Tran Cuong Pham Network Information Systems Lab (NISLab) Dept. of Computer Science University of Massachusetts,
More informationImproving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities
Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University
More informationHybrid Overlay Structure Based on Random Walks
Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft
More informationCycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network
Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engg. Wayne State University, Detroit, MI 48202 {shy,czxu}@ece.eng.wayne.edu
More informationSecurity Considerations for Peer-to-Peer Distributed Hash Tables
Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.
More informationExcogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks
Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Bollimuntha Kishore Babu #1, Divya Vadlamudi #2, Movva
More informationP2P: Distributed Hash Tables
P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)
More informationChord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide
More informationINF5071 Performance in distributed systems: Distribution Part III
INF5071 Performance in distributed systems: Distribution Part III 5 November 2010 Client-Server Traditional distributed computing Successful architecture, and will continue to be so (adding proxy servers)
More information