Implementing Aggregation/Broadcast over Distributed Hash Tables

Size: px
Start display at page:

Download "Implementing Aggregation/Broadcast over Distributed Hash Tables"

Transcription

1 1 Implementing Aggregation/Broadcast over Distributed Hash Tables Ji Li Ben Leong Karen Sollins Abstract We present an algorithm for implementing aggregation/broadcast over existing Distributed Hash Tables (DHTs). Our algorithm builds an aggregation tree in a bottom-up fashion by mapping nodes to their parents in the aggregation tree with pre-determined function and maintains it using soft-state. We believe that the aggregation/broadcast function is a basic service that should be layered over existing DHTs to provide them with the ability to disseminate/collect information efficiently on a global scale and perhaps even to search for answers to arbitrary semistructured queries. I. INTRODUCTION A Distributed Hash Table (DHT) is essentially a distributed resolution mechanism that manages the distribution of data among a changing set of nodes by mapping keys to nodes. DHTs allow member nodes to efficiently locate stored resources by name without using any centralized servers. A large number of DHTs, including Chord [1], Tapestry [2], Pastry [3], and CAN [4], have thus far been proposed and these systems are expected to eventually become the fundamental components of many large scale peer-to-peer distributed applications in the near future. Although the most commonly deployed peer-to-peer applications are file-sharing applications like Napster [5], Gnutella [6], Kazaa [7], and Freenet [8], we believe that the peer-to-peer paradigm will eventually be applied to the organization of centrally administered distributed systems. As highlighted by Bawa et al. [9], the administrators of such systems may want to collect statistical information about the network, even though they may not have direct control over the membership changes. Aggregated information on system parameters, such as network size, lifetime distribution, most popular files, etc., may be used to tune and optimize the performance of a network at runtime. In particular, the recently proposed randomized DHT topologies, like Viceroy [1] and Symphony [11], often require network size estimates to tune routing performance. In the case of a peer-to-peer storage network ([12], [13]), users may want to know about the approximate amount of available storage; in the case of a peer-to-peer computational Grid [14], nodes may want to know about the amount of computation resources available when deciding on how to schedule jobs in the network. More specifically, like Bawa et al. [9], our goal is to solve the node aggregation problem defined as: Devise a scheme to enable any node in a P2P network to issue a query that computes an aggregation function (MIN, MAX, COUNT, SUM, AVG) over data residing at nodes in the network. In our view, a good aggregation/broadcast scheme for DHTs must satisfy two criteria, namely scalability and robustness. With respect to scalability, we want to avoid flooding schemes that generate excessive redundant messages and we also want to ensure that there is good loadbalancing, in the sense that no node in the network should be liable for forwarding a disproportional amount of network traffic. In terms of robustness, we want a scheme that is resilient to the dynamicity of nodes joining, leaving and failing arbitrarily and independently. In this paper, we assume that we have at hand a robust and efficient DHT and our algorithm uses the underlying infrastructure to build efficient aggregation/broadcast trees. Our key idea is to use a family of functions to map a node to its parent node in an aggregation tree, to construct the tree in a bottom-up fashion and to maintain it using soft-state. Our proposed bottom-up approach is better than traditional broadcast based approaches because it generates a minimal amount of network traffic and we are guaranteed to be able to reach all nodes (eventually). II. RELATED WORK Data aggregation over a distributed system has been studied in different contexts such as large scale databases [15], wireless sensor network applications ([16], [17]), etc. In particular, Madden et al. [16] proposed a scheme for declarative aggregate queries to be distributed and executed over sensor networks. They focused mostly on bandwidth- and power-efficient aggregation. We attempt to solve the problem proposed by Bawa et al. [9] with a bottom-up approach and in a different con-

2 2 text. In [9], Bawa et al. assume that the peer-to-peer network is unstructured, and hence their proposed schemes are limited to top-down flooding-based techniques. From our work with EpiChord [18], we believe that it is feasible to build and maintain a underlying robust DHT infrastructure at relatively low cost and thus it is useful to attempt to solve the aggregation problem over DHTs. Our approach in using a continuous function to map nodes onto nodes is similar in spirit to the generalized scheme for building DHTs proposed by Naor and Wieder [19]. In their scheme, the functional mapping is used to build the underlying DHT, while in our scheme, we assume a robust DHT and we seek instead to build an additional structure over the underlying DHT infrastructure. Most of the recently proposed randomized DHT routing protocols ([2], [1], [11], [18]), require network size estimates to optimize lookup performance. Most of the current techniques rely on the assumption that node s are uniformly distributed within the address space, and estimates are obtained by extrapolating from observed node densities. These techniques typically require messsages and provide only probabilitistic guarantees on the accuracy, while our scheme requires only messages and have somewhat better accuracy guarantees independent of the actual distribution of node s. By solving the aggregation problem, we have also indirectly solved the broadcast problem. There is a large body of literature in this area. In general, existing schemes can be categoried either as a top-down spanning-tree approach ([21], [22]) or a flooding-based approach ([23], [24]). A major drawback of the former is that when nodes fail in the middle of the hierarchy, large sections of the original spanning tree lose contact with the root, while a major drawback of the latter tend to generate redundant traffic. There are also many related DHT-based application-level multicast proposals ([25], [26], [27]). III. AGGREGATION BY FUNCTIONAL MAPPING In this section, we describe our bottom-up tree construction algorithm. We assume that we have an efficient and robust DHT available as the basic infrastructure 1. The key idea in our aggregation tree-building algorithm is to use a many-to-one function,, to map each node uniquely to a parent node in the aggregation tree based on its. More specifically, the parent node for a node is the node which owns the, where is the minimum number of times that has to be applied In general, any robust DHT will suffice. The only restriction/requirement that we impose is that the DHT must have a circular namespace, i.e. Chord, Tapestry or Pastry. to before the node no longer owns the. If node owns for! #"%$%$%$&"(', then is the root of the aggregation tree. If we consider the nodes in a DHT as nodes in a graph and the child-parent relations determined by to be directed edges, the resulting graph is a directed tree converging at the root. More specifically,, which we also call a Parent Function, is any function that satisfies the following conditions: *)+, ) (1) -. / )"+ (2) (":)+<; (":)+(" =>"? A@CB (3) where ) is an owned by the root of the aggregation tree, is any valid node 3 and "?DE is a distance metric defined for two valid node s and D in the namespace. Theorem 1: If a function satisfies the above conditions, there is a directed path from all nodes to the (root) node that owns the id ). Proof: Theorem 1 is a direct consequence of Condition (2). Given an arbitrary node, We know that there is a path from to ("F>,@!B. Since - GH), there must therefore be a directed path from to ). A. Tree-Building Protocol A node learns about the parent function,, for a DHT when it attempts to joins the network through an existing node. Given a parent function, the tree-building protocol is straightforward: 1) When a node joins the system, it determines and performs a lookup to locate the node responsible for I, say node D. 2) Node sends a message to node D to register itself as a child and node D adds node to its list of child nodes. 3) It is henceforth the responsibility of node to contact node D periodically to refresh its status as a child node; if node D fails to hear from node after a specified expiry duration, node will be deleted from its list of child nodes. 4) As the system evolves, it is possible that node D may fail or it may no longer be responsible for. In the former, node will discover node D s failure when it tries to refresh its status with node D ; in the latter, D will inform node that it is no longer the parent when node tries to refresh its status. In both cases, node will simply perform another lookup for to determine its new parent and register with it instead.

3 B ' ) B B. A Simple Parent Function There are many functions that will satisfy Conditions (1) to (3) above. The following is a simple PSfrag replacements example:, mod for B ; mod for ; C where is a node, and is a parameter that determines address space bits the branching factor of the tree, and. As shown in Figure 1, the aggregation tree resulting from this function is rooted at the node owning the B. By direct substition, we can easily verify that this function satisfies the three conditions stated above. The expected height of a spanning tree constructed with this function is 6, where is the size of the network and the expected branching factor is approximately if the node are uniformly distributed in the namespace. PSfrag replacements increasing Fig. 1. Aggregation pattern of the simple parent function. is the root id, and the arrows show the directed edges of the aggregation tree from child to parent. C. A More General Parent Function We can generalize the function described in Section III- B to allow for an arbitrary root ) by a simple change of coordinates. The resulting parent function is as follows:, ) mod! mod (" " for B ; # ) mod $ )% & mod! mod (" for ; )+ mod $ C The resulting aggregation tree is illustrated in Figure 2. A nice property of this aggregation/broadcast tree is that if the node s are uniformly distributed over the address space (which a common assumption for many of the existing DHTs), the resulting tree is likely to be balanced. Nodes s for which )+ mod )(+* B" will converge clockwise to the root, while node s for which, ) G mod -(.* "? will converge counterclockwise. increasing / Fig. 2. Aggregation pattern of the generalized parent function with as the root of the tree. The arrows show the directed edges of the aggregation tree from child to parent. D. An Example of Aggregation - Network Size Estimation Although our goal is to compute aggregation functions (MIN, MAX, COUNT, SUM, AVG), we validate our approach with by evaluating a network size estimation function, since the key to obtaining good estimates of the various aggregation functions is to have robust directed paths from each node to the root of the aggregation tree. To estimate network size, we simply enhance the tree-building protocol described in Section III-A as follows: 1) When a node first joins the system and locates its parent node, it tells its parent node that it has a subtree size of 1. 2) When a node refreshes its status with its parent, it will report its subtree size which is the sum of the subtree sizes of all its child nodes plus one (i.e. itself) to the parent. 3) Eventually, the root of the aggregation tree will have an estimate of the size of the network. Once the root of the aggregation tree obtains an estimate of the network size, what it does with the estimate is a matter of policy and depends on the application/dht. In DHT where nodes require the network size estimate to optimize their performance, the root may wish to broadcast the estimate down the aggregation tree periodically. ) IV. PRACTICAL IMPLEMENTATION We have described an approach for building an aggregation tree rooted at a fixed 3 ). In a practical system, we will want to have the capability to set up aggregation trees rooted at arbitrary node s. To this end, our proposal is to have one permanent aggregation/broadcast tree rooted at a pre-determined well-known )1 for each DHT. If the default tree is the only avaiable broadcast tree in the system and a node, say, wants to construct a new aggregation/broadcast tree rooted at itself, it sends a message to the root of the default tree specifying the parent function with ) as its own. The message is then broadcast down 3

4 4 the default tree and all nodes will eventually receive this message and participate in the new aggregation/broadcast tree rooted at. When a new node joins the network, it will get a list of all currently existing aggregation trees from its parent node. Nodes also periodically exchange information on the existing aggregation trees. In this way, all nodes will eventually discover and participate in all existing aggregation trees. In order to avoid overloading the default broadcast tree, nodes that wish to set up new broadcast trees will randomly choose among all the other existing broadcast trees to perform its initial broadcast, if possible. When the root node of a tree wishes to tear down its aggregation tree, it simply broadcasts a message telling all nodes that the tree should be torn down. The message is guaranteed to eventually reach all nodes. If a root fails without notification, subsequent aggregation messages will eventually end up at a node which discovers that it has become the root of tree that it did not set up. It can decide to keep the tree or it can broadcast a message to tear it down. As highlighted by Bawa et al. in [9], one major drawback of using trees for aggregation is that trees inherently present single points of failure, i.e. the failure of any node in the intermediate levels of the tree will lead to a large number of nodes being cut off temporarily from the root. Although our bottom-up approach is inherently more robust and resilient to failures than existing top-down approaches, aggregates obtained by a single-tree approach will experience periodic glitches in a highly dynamic network. To improve the robustness of the estimates, multiple trees can be constructed and the same aggregates can be computed over them. By distributing the s of these trees over the 3 space uniformly and adopting some quorum system or by averaging over the estimates obtained from several trees, we can further improve the robustness of the aggregation computation. V. PERFORMANCE We evaluated our aggregation algorithm by evaluating the accuracy of the network size estimates obtained via simulation. Our simulations were performed with the Epi- Chord [18] network simulator written in Java. Our experiments were run on single-processor Intel P4-2.2GHz machines with 1GByte RAM running Linux with Java(TM) 2 Runtime Environment version A. Simulation Setup Our experiments are divided into discrete time periods. In each period, a number of nodes (determined according to a Poisson distribution) are created and join the network at a randomly chosen node. The node of a new node is uniformly distributed within the namespace. At the point when a node joins the network, we set its departure time according to an exponential distribution and nodes are removed from the network when their lifespans expire. In all our simulations, the default root ) is set to, and is set to 4. In our simulations, we have assumed that the estimates of network size are broadcast to all nodes down the aggregation tree and that the broadcast is done separately from the aggregation. It is possible to adopt another approach where estimates from a parent node to its child nodes are piggybacked on the acknowledgement messages, but we decided to evaluate the two processes separately because the periodicity of the two processes can conceivably be different depending on the application. B. Tree Construction In the first experiment, we evaluated the overhead of our algorithm in terms of network traffic by counting the number of messages sent in both the aggregation and broadcast process. In this experiment, the node failure rate is approximately 1% per time period. The communication cost in terms of messages sent as a function of network size is shown in Figure 3. The number of messages in each round of aggregation or broadcast are at least twice the network size, because in the aggregation each node sends an aggregation message to its parent and receives an acknowledgement (except for the root), and in the broadcast process each node receives a broadcast from its parent and sends back an acknowledgement (except for the root). Additional messages are needed to repair the tree when nodes fail. The children of a failed node have to perform a lookup to find their new parent, which requires extra messages 2. Figure 3 demonstrates that at a node failure rate of 1% per time period, the number of aggregation messages and broadcast messages are only a little more than twice the network size. The height of the resulting aggregate/broadcast tree affects the performance of the algorithm since it determines the time it takes for an aggregation message to propagate from a leaf node to the root and also the time it takes for a broadcast message from the root to propagate to the leaf nodes. Another important property of the aggregation tree is the distribution of the branching factor at the intermediate nodes as it directly affects load balancing. Ideally, The number of lookup messages is dependent on the underlying DHT. EpiChord is relatively efficient and provides a worst case lookup performance of messages in the worst case and a modal lookup performance of messages in most cases.

5 5 35 Aggregation messages Broadcast messages 16 Actual Network Size Average Estimated Network Size Number of messages 2 15 Network size Network size Fig. 3. Communication overhead (in terms of messages) for aggregation and broadcast Time period Fig. 5. Network size estimation. we would like all the intermediate nodes in the aggregation tree to have approximately the same branching factor for all nodes and to have a small spread in the range of branching factors. The relation between tree height, branching factor and the size of the network is shown in Figure Average height of aggregation tree Average branching factor Maximum branching factor 4 35 In order to investigate the robustness of our aggregation/broadcast algorithm, we ran experiments with networks of differing node failure rates. The maximum, minimum and average ratios of the size estimate to the actual network size are shown in Figure 6. Even at a node failure rate of 3%, i.e. 3% of the nodes in the network leave without notification in each time period, our algorithm still maintains an accuracy to within #B of the actual network size, which demonstrates that our algorihm is quite robust. Average height of aggregation tree Network size Fig. 4. Plots of tree height and branching factor against network size. Average branching factor Estimated size (as a proportion of total network size) Average Range of estimates C. Network Size Estimation In Figure 5, we show the evolution of the network size estimate at the root of the aggregation tree for a network with a node failure rate of 5% per time period. As the network is growing, the estimates tend to be smaller than the actual network size as expected. The downward spikes are likely to be due to the failure of intermediate nodes high up in the aggregation tree, leading to temporarily losses in the node count. Our results demonstrate however that our algorithm recovers rapidly from such failures. Fig Node failure rate Network size accuracy under various node failure rates. VI. CONCLUSION AND FUTURE WORK In this paper, we have presented a bottom-up approach for the building of an aggregation/broadcast tree over a DHT by mapping from a continuous function into the discrete node space. The major advantage of our bottom-

6 6 up function-based aggregation scheme compared to existing top-down and flooding-based approaches, is that it has a relatively low overhead and yet is guaranteed to eventually reach all nodes in the network. By having each node determine its parent in the aggregation tree at runtime based on the parent function, the system is robust and recovers quickly from node failures. Our scheme is also flexible in that parameters in the function can be changed to control the structure and characteristics (i.e. height and branching factor) of the resulting aggregation tree. There are many possible parent functions that can conceivably be adopted in our approach. We have only thus far explored a very simple one. It is conceivable that by adopting a different, we may be able to improve the performance of the algorithm. REFERENCES [1] Ion Stoica, Robert Morris, David Karger, Frans Kaashoek, and Hari Balakrishnan, Chord: A scalable Peer-To-Peer lookup service for internet applications, in Proceedings of the 21 ACM SIGCOMM Conference, 21, pp [2] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph, Tapestry: An infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD , UC Berkeley, April 21. [3] Antony Rowstron and Peter Druschel, Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Lecture Notes in Computer Science, vol. 2218, pp. 329??, 21. [4] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker, A scalable content addressable network, Tech. Rep. TR--1, Berkeley, CA, 2. [5] Napster, [6] Gnutella, [7] KaZaA, [8] Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong, Freenet: A distributed anonymous information storage and retrieval system, Lecture Notes in Computer Science, vol. 29, pp. 46+, 21. [9] M. Bawa, H. Garcia-Molina, A. Gionis, and R. Motwani, Estimating aggregates on a peer-to-peer network, in Submitted for publication, 23. [1] Dahlia Malkhi, Moni Naor, and David Ratajczak, Viceroy: A scalable and dynamic emulation of the butterfly, in Proceedings of 21st ACM Conf. on Principles of Distributed Computing (PODC 2), July 22. [11] Gurmeet Manku, Mayank Bawa, and Prabhakar Raghavan, Symphony: Distributed hashing in a small world, in Proceedings of 4th USENIX Symposium on Internet Technologies and Systems, March 23. [12] Frank Dabek, A cooperative file system, M.S. thesis, MIT, September 21. [13] Athicha Muthitacharoen, Robert Morris, Thomer M. Gil, and Benjie Chen, Ivy: A read/write peer-to-peer file system, in Proceedings of 5th Symposium on Operating Systems Design and Implementation, 22. [14] Ben Paechter, T. Baeck, M. Schoenauer, A.E. Eiben, and J. Merelo, A distributed resource evolutionary algorithm machine, in Proceedings of the 2 Congress on Evolutionary Computation (CEC 2), San Diego, USA, 2, IEEE, pp , IEEE Press. [15] Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew Layman, Don Reichart, Murali Venkatrao, Frank Pellow, and Hamid Pirahesh, Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals, J. Data Mining and Knowledge Discovery, vol. 1, no. 1, pp , [16] S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong., Tag: a tiny aggregation service for ad-hoc sensor networks, in 5th Symposium on Operating Systems Design and Implementation (OSDI), 22. [17] Jerry Zhao, Ramesh Govindan, and Deborah Estrin, Computing aggregates for monitoring wireless sensor networks, in Proc. 1st IEEE Intl. Workshop on Sensor Network Protocols and Applications (SNPA), 23. [18] Ben Leong, Erik D. Demaine, and Ji Li, Epichord: Implementing parallized DHT lookup with epidemic caching., July 23. Submitted to IEEE Infocomm 24. [19] Moni Naor and Udi Wieder, Novel architectures for P2P applications: the continuous-discrete approach, 22. [2] Gurmeet Singh Manku, Routing networks for distributed hash tables, in Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 23), Boston, Massachusetts, July 23, ACM. [21] Sameh El-Ansary, Luc Onana Alima, Per Brand, and Seif Haridi, Efficient broadcast in structured P2P networks, in 2nd International Workshop on Peer-to-Peer Systems (IPTPS 3), Berkeley, CA, 23. [22] Y. Chawathe and M. Seshadri, Broadcast federation: An application-layer broadcast internetwork, in Intnl. Workshop on Network and Operating Systems Support for Digital Audio and Video, 22. [23] M.-J. Lin, K.Marzullo, and S.Masini, Gossip versus deterministic flooding: Low message overhead and high reliability for broadcasting on small networks, Tech. Rep. Technical Report CS , University of California, San Diego, [24] M. Portmann and A. Seneviratne, Cost-effective broadcast for fully decentralized peer-to-peer networks, Computer Communication, vol. Special Issue on Ubiquitous Computing, Elsevier Science, 22. [25] Sylvia Ratnasamy, Mark Handley, Richard Karp, and Scott Shenker, Application-level multicast using content-addressable networks, in 3rd International Workshop on Networked Group Communication, November 21. [26] Antony I. T. Rowstron, Anne-Marie Kermarrec, Miguel Castro, and Peter Druschel, SCRIBE: The design of a large-scale event notification infrastructure, in Networked Group Communication, 21, pp [27] Rongmei Zhang and Y. Charlie Hu, Borg: A hybrid protocol for scalable application-level multicast in peer-to-peer networks, in The 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSS- DAV), Monterey, California, 23.

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

Implementing Aggregation and Broadcast over Distributed Hash Tables

Implementing Aggregation and Broadcast over Distributed Hash Tables Implementing Aggregation and Broadcast over Distributed Hash Tables Ji Li jli@csail.mit.edu Karen Sollins sollins@csail.mit.edu MIT Computer Science and Artificial Intelligence Laboratory 3 Vassar Street

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Self-Correcting Broadcast in Distributed Hash Tables

Self-Correcting Broadcast in Distributed Hash Tables Self-Correcting Broadcast in Distributed Hash Tables Ali Ghsi 1,Luc Onana Alima 1, Sameh El-Ansary 2, Per Brand 2 and Seif Haridi 1 1 IMIT-Royal Institute of Technology, Kista, Sweden 2 Swedish Institute

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

A Distributed Codec Placement Algorithm for Network-Embedded FEC

A Distributed Codec Placement Algorithm for Network-Embedded FEC A Distributed Codec Placement Algorithm for Network-Embedded FEC Mingquan Wu and Hayder Radha Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48823 {wumingqu,

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Towards a Scalable Distributed Information Management System

Towards a Scalable Distributed Information Management System Towards a Praveen Yalagandula and Mike Dahlin University of Texas at Austin Abstract This paper makes a case for developing a general large-scale networked systems, provides detailed views of nearby information

More information

Data Indexing and Querying in DHT Peer-to-Peer Networks

Data Indexing and Querying in DHT Peer-to-Peer Networks Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data

More information

Query Processing Over Peer-To-Peer Data Sharing Systems

Query Processing Over Peer-To-Peer Data Sharing Systems Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,

More information

Distributed hash table - Wikipedia, the free encyclopedia

Distributed hash table - Wikipedia, the free encyclopedia Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Structured Peer-to to-peer Networks Wolf-Tilo Balke and Wolf Siberski 3..6 *Original slides provided by K. Wehrle, S. Götz, S. Rieche (University of Tübingen) Peer-to-Peer Systems

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

Defending against Eclipse attacks on overlay networks

Defending against Eclipse attacks on overlay networks Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

Flexible Information Discovery in Decentralized Distributed Systems

Flexible Information Discovery in Decentralized Distributed Systems Flexible Information Discovery in Decentralized Distributed Systems Cristina Schmidt and Manish Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering, Rutgers

More information

Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

More information

Comparing the performance of distributed hash tables under churn

Comparing the performance of distributed hash tables under churn Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory

More information

Evolution of Peer-to-peer algorithms: Past, present and future.

Evolution of Peer-to-peer algorithms: Past, present and future. Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica fananthar, karthik, sonesh, karp, istoicag@cs.berkeley.edu Abstract Most P2P systems

More information

Chapter 6 PEER-TO-PEER COMPUTING

Chapter 6 PEER-TO-PEER COMPUTING Chapter 6 PEER-TO-PEER COMPUTING Distributed Computing Group Computer Networks Winter 23 / 24 Overview What is Peer-to-Peer? Dictionary Distributed Hashing Search Join & Leave Other systems Case study:

More information

Small World Overlay P2P Networks

Small World Overlay P2P Networks Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Efficient Broadcast in P2P Grids

Efficient Broadcast in P2P Grids Efficient Broadcast in P2P Grids Peter Merz, Katja Gorunova {pmerz,gorunova}@informatik.uni-kl.de University of Kaiserslautern Dept. of Computer Science Germany Abstract In this paper, we present an efficient

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays

Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Journal of Computer Science (): xx-xx, ISS 49-66 Science Publications Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Surya Bahadur Kathayat,

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World Distributed Hashing in a Small World Gurmeet Singh Manku Stanford University with Mayank Bawa and Prabhakar Raghavan Acknowledgement The following slides are borrowed from the author s talk at USITS 2003.

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu, Wayne State University, Detroit, MI 48202 Guihai Chen, Nanjing University, Nanjing, China {shy,czxu,gchen}@ece.eng.wayne.edu

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

L3S Research Center, University of Hannover

L3S Research Center, University of Hannover , University of Hannover Dynamics of Wolf-Tilo Balke and Wolf Siberski 21.11.2007 *Original slides provided by S. Rieche, H. Niedermayer, S. Götz, K. Wehrle (University of Tübingen) and A. Datta, K. Aberer

More information

Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test

Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland

More information

PIC: Practical Internet Coordinates for Distance Estimation

PIC: Practical Internet Coordinates for Distance Estimation PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB2 3NH, UK September 23 Technical Report MSR-TR-23-53

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

FPN: A Distributed Hash Table for Commercial Applications

FPN: A Distributed Hash Table for Commercial Applications FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network

Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Evaluation Study of a Distributed Caching Based on Query Similarity in a P2P Network Mouna Kacimi Max-Planck Institut fur Informatik 66123 Saarbrucken, Germany mkacimi@mpi-inf.mpg.de ABSTRACT Several caching

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks

BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks : A Balanced Kautz Tree Structure for Peer-to-Peer Networks Deke Guo, Honghui Chen, Yunhao Liu, and Xiangyang Li College of Information Systems and Management, National University of Defense Technology,

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

RAQ: A Range-Queriable Distributed Data Structure

RAQ: A Range-Queriable Distributed Data Structure RAQ: A Range-Queriable Distributed Data Structure Hamid Nazerzadeh Mohammad Ghodsi Abstract Different structures are used in peer-to-peer networks to represent their inherently distributed, self-organized

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Multicast Presented by Hakim Weatherspoon Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Midterm report abstract, introduction, background, related work, and design section. These sections should

More information

QoS Enabled Multicast for Structured P2P Networks

QoS Enabled Multicast for Structured P2P Networks QoS Enabled Multicast for Structured P2P Networks Marc Brogle, Dragan Milic and Torsten Braun Computer Networks and Distributed Systems Institute of Computer Science and Applied Mathematics University

More information

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez and Matthew Wilkinson Lewis & Clark

More information

Exploiting Semantic Clustering in the edonkey P2P Network

Exploiting Semantic Clustering in the edonkey P2P Network Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems George Fletcher Project 3, B649, Dr. Plale July 16, 2003 1 Introduction One of the key requirements for global level scalability

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

A Large-scale and Decentralized Infrastructure for Multiple Queries Optimization and Aggregation

A Large-scale and Decentralized Infrastructure for Multiple Queries Optimization and Aggregation A Large-scale and Decentralized Infrastructure for Multiple Queries Optimization and Aggregation Xiaoyu Yang and Yiming Hu Department of Electrical and Computer Engineering University of Cincinnati, Cincinnati,

More information

Peer-to-Peer Networks Pastry & Tapestry 4th Week

Peer-to-Peer Networks Pastry & Tapestry 4th Week Peer-to-Peer Networks Pastry & Tapestry 4th Week Department of Computer Science 1 Peer-to-Peer Networks Pastry 2 2 Pastry Peter Druschel Rice University, Houston, Texas now head of Max-Planck-Institute

More information

A Simple Fault Tolerant Distributed Hash Table

A Simple Fault Tolerant Distributed Hash Table A Simple ault Tolerant Distributed Hash Table Moni Naor Udi Wieder Abstract We introduce a distributed hash table (DHT) with logarithmic degree and logarithmic dilation We show two lookup algorithms The

More information

Data Replication under Latency Constraints Siu Kee Kate Ho

Data Replication under Latency Constraints Siu Kee Kate Ho Data Replication under Latency Constraints Siu Kee Kate Ho (siho@cs.brown.edu) Abstract To maintain good quality of service, data providers have to satisfy requests within some specified amount of time.

More information

Dorina Luminiţa COPACI, Constantin Alin COPACI

Dorina Luminiţa COPACI, Constantin Alin COPACI THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and

More information

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.

More information

Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication

Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication Gerald Fry and Richard West Computer Science Department Boston University Boston, MA 02215 {gfry,richwest@cs.bu.edu Abstract

More information

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide

More information

Handling Network Partitions and Mergers in Structured Overlay Networks

Handling Network Partitions and Mergers in Structured Overlay Networks Handling Network Partitions and Mergers in Structured Overlay Networks Tallat M. Shafaat Ali Ghodsi Seif Haridi Royal Institute of Technology (KTH), {tallat,haridi}(at)kth.se Swedish Institute of Computer

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53206 Peer-to-Peer Networks Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General 1 ELT-53207 P2P & IoT Systems Searching for Shared Resources: DHT in General Mathieu Devos Tampere University of Technology Department of Electronics and Communications Engineering Based on the original

More information

Brocade: Landmark Routing on Overlay Networks

Brocade: Landmark Routing on Overlay Networks Abstract Brocade: Landmark Routing on Overlay Networks CS262A Fall 2001 Yitao Duan, Ling Huang University of California, Berkeley duan@cs.berkeley.edu, hlion@newton.berkeley.edu Peer-to-peer networks offer

More information

PUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks

PUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks PUB-2-SUB: A Content-Based Publish/Subscribe Framework for Cooperative P2P Networks Duc A. Tran Cuong Pham Network Information Systems Lab (NISLab) Dept. of Computer Science University of Massachusetts,

More information

Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities

Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engg. Wayne State University, Detroit, MI 48202 {shy,czxu}@ece.eng.wayne.edu

More information

Security Considerations for Peer-to-Peer Distributed Hash Tables

Security Considerations for Peer-to-Peer Distributed Hash Tables Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.

More information

Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks

Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Excogitating File Replication and Consistency maintenance strategies intended for Providing High Performance at low Cost in Peer-to-Peer Networks Bollimuntha Kishore Babu #1, Divya Vadlamudi #2, Movva

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide

More information

INF5071 Performance in distributed systems: Distribution Part III

INF5071 Performance in distributed systems: Distribution Part III INF5071 Performance in distributed systems: Distribution Part III 5 November 2010 Client-Server Traditional distributed computing Successful architecture, and will continue to be so (adding proxy servers)

More information