MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

Size: px
Start display at page:

Download "MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK"

Transcription

1 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi Bandung Jl. Ganesha 10, Bandung, Indonesia ABSTRACT Multi-domain VoIP network requires peering to allow call routing from one domain to other domains. The problem with current VoIP peering solution is because it uses client/server architecture. The DNS server is usually used to provide services to lookup domain and locate the switching server in a domain. In this paper we propose a distributed architecture to provide lookup services using overlay network. This particular application requires an efficient Distributed Hash Table (DHT) protocol as the overlay layer. We also present an efficient DHT with one hop lookup performance and show some simulation results that highlight the performance of the protocol under join and leave events. functions in the proposed architecture. The Lookup Function (LUF) provides the mechanism to reply a signaling request with the target domain, the Location Routing Function (LRF) determines the Signaling Function (SF) at the target domain, the Signaling Function (SF) performs SIP call routing, and the Media Function (MF) that performs media related function such as transcoding. The standard suggests that the lookup function and location routing function should use DNS-based lookup service such as ENUM to resolve a request into its target domain and the signaling function that serve that target domain. ATA IP Phone IP Phone ATA Keywords: overlay network, peer-to-peer, distributed hash table, VoIP peering. Softphone SIP Domain A SIP Domain C Softphone INTRODUCTION Most of the current internet telephony systems are using client/server architecture. Certain number of clients such as gateways, softphones, or IP phones are grouped together into one service domain and served by a service provider. Figure 1 shows the typical multi-domain internet telephony deployment using Session Initiation Protocol (SIP) as the signaling protocol [1]. The similar concept also exists in network with different signaling protocols such as H.323, IAX2, or MGCP. The service provider for a domain provides the switching function (softswitch) to route calls. The switching function is able to route the call originated from its clients to the destinations in other domains only if it has preconfigured the routes to reach those domains. Those routes between domains are built through VoIP peering, which is the interconnection of two service provider (by agreement) for the purpose of routing call signaling between their respective customers [3]. The standard for VoIP peering (SPEERMINT) is currently developed by IETF. It uses Layer-5 peering which employs ENUM as the lookup service and SIP as the signaling protocol [3]. According to the standard [4] there are four main Registrar/DB SIP Proxy ATA Softphone IP Phone SIP Domain B Registrar/DB SIP Proxy SIP Peering SIP Proxy Registrar/DB PSTN/ Mobile Network Gateway Figure 1. Multi-domain VoIP peering using SIP as signaling protocol The problem with client/server protocol such as DNS-based ENUM lookup service is that the DNS server becomes the bottleneck and creates single point of failure. This paper proposes architecture for VoIP peering using distributed approach to address the scalability issue that come with the client/server architecture. Instead of using client/server architecture to provide lookup function (LUF) and location routing function (LRF), we propose a distributed lookup and routing function by leveraging the overlay network that constructed

2 019 Multi-Domain Voip Peering Using Overlay Network - Herry Imanta Sitepu 117 by switching servers that act as the nodes in the overlay network. Overlay network is the logical network that runs on top of physical network. The logical network, which is the peer-to-peer network is constructed by some peers that running a particular protocol which allows each peer to communicate with each other and allowing access and sharing their resources (such as CPU or storage) directly [1]. Distributed Hash Table (DHT) algorithm is the infrastructure that builds the structured overlay network. DHT allows mapping keys to nodes and provides hash-table-like lookup interface. This paper present a simple yet efficient DHT algorithm with O(1) lookup performance, which means a key lookup can be solved by contacting one node (one hop lookup). The simulation results show that the DHT algorithm is efficient in term of the events distribution latency. The events distribution latency is time duration between the detection of events and the distribution of those events to all nodes in the network. Thus, the DHT is suitable for our application to provide lookup services for VoIP peering. With the architecture that we propose, the VoIP peering can be simpler to deploy as adding new domain to the network will be noticed by other domains without additional configuration. DISTRIBUTED HASH TABLE The interest among researchers in the area of DHT development, analysis, or comparison is increasing because the potential applications that may leverage the DHT algorithm are enormous [2][5][6][7]. Ubiquitous file sharing applications have shown the popularity of peer-to-peer (p2p) application among the user. Nevertheless, the potential application is not limited only to file sharing application, but to DNS services, mobile p2p, content distribution, instant messaging, distributed computing, and many more. DHT algorithm assigned keys to nodes by employing a predefined procedure. A node may lookup for a key and expects to get the address of the node that responsible for that key. The address of the node is used for final retrieval of the data that related with the key from the target node. This lookup interface is similar with common hash-table algorithms. In this section we describe UnoHop protocol, which is a DHT with O(1) lookup performance, which means that the lookup can be resolved by contacting one node (one hop). This lookup performance can be achieved because DHTs with O(1) lookup performance require each node maintain a routing table with complete information about all nodes in the network. UnoHop protocol is the distributed algorithm that allows upper layer application to publish data (which represented as keys) and to lookup data. UnoHop Protocol The main problem that have to be addressed by DHTs with O(1) lookup performance is how to detect and distribute events (nodes join or leave) efficiently. When a node detects that an event has occurred, it must notify other segments of the network about the event, thus the routing table entries in all nodes can be updated and corrected according to the network latest condition. OneHop [7] uses the division of ring into contiguous segments called slices and a slice is further divided into smaller contiguous segments called units s 1 1 Figure 2. Events distribution mechanism 4 f Slice leader Unit leader Ordinary node Each slice is represented by a slice leader, which is a node that collects the events from other slices and notifies its unit leaders. Finally, a unit leader piggybacks the events to its ping messages to its predecessor and successor. With this scheme the ordinary nodes bandwidth usage is decreased but with the consequence of the increased bandwidth usage at the slice leaders. UnoHop protocol uses the similar ring division into segments called slices and units. Instead choosing the fixed slice leader (the successor of mid-point identifier of a slice) and unit leader (the successor of mid-point identifier of a unit) as in OneHop, our algorithm chooses the slice leaders and unit leaders dynamically according the closeness factor. Because each node maintain complete information about all nodes in the network, the

3 118 4 th International Conference Information & Communication Technology and System UnoHop can not employs Proximity Neighbor Selection (PNS) as described by Saroiu et al. [9]. Instead, it uses the Proximity Route Selection (PRS) [9]. By selecting the next hop as the closest node to the sender, then the communication latency can be reduced. The simple approach we use to characterizing closeness between nodes is the communication latency between the sender node and the target node. A slice leader is selected as the closest node in the slice, which has the lowest latency from the node that detects an event. A unit leader is selected as the closest node in the unit from its slice leader. To detect events each node runs stabilization procedure by send ping message to its predecessor and successor periodically at a predefined time interval (t stab ) When the ping is time out, the sender will detect that its predecessor or successor has been leaved the network. The node that detects the events must notify other nodes in the network or the lookup from those nodes to the failed node will return incorrect result. The mechanism to distribute events is depicted by Figure 2. The network contains 10 nodes and divided into 3 slices. Each slice is further divided into 3 units. When a node s detect an event (node f has leaved the network) by running its stabilization procedure (step 1), next it must notify all segments about the event including its own segment. To distribute the event to its own slice, it select a node that act as the slice leader that will further distribute the event. The slice leader is chosen as the closest node in the slice to node s. After found a node that act as its slice leader, then the event is sent to it (step 2). Next, node s distributes its event to other slices. By choosing the slice leader of a slice as the closest node at each slice from node s, then node s sends the event to those slices leaders. Upon receiving an event notification, a slice leader has to distribute the event to all units in its slice. Each unit is represented by a node (unit leader) that has the lowest latency from the node that acts as the slice leader and has received the events sent by the source node s. The slice leader sends the event to all its unit leaders (step 3). When the node that represent a unit (unit leader) receive the events, then it aggregates the events. The aggregated events are piggybacked in the ping message to its predecessor and successor (step 4). The events then piggybacked in ping message from one node to other node in one direction until it reaches the unit border. If a node receives the events from its predecessor then it will piggyback the events in its ping message to the successor. If a node receives the events from its successor then it will piggyback the events in its ping message to the predecessor. With this mechanism there is no duplication in communication. ARCHITECTURE Each node that joins in the overlay network is the switching function that serves a domain. A domain consists of VoIP clients such as gateways, softphones, or IP phones. If a client originates a call to other clients in one domain, then the switching function can directly route the call to the destination. Figure 3 shows the distributed architecture for multi-domain VoIP peering. As the example, we choose that provides switching function in one domain. This is because s usually serve domain with up to hundreds of clients. The architecture gives simple yet powerful solution for enterprises that run multiple s serving branch offices. Internet Telephony Service Providers (ITSPs) that runs larger switching function such as SIP proxies or softswitches may use the architecture as the VoIP peering solution between them. get_route(destination) Internet DHT store_route(destination) Figure 3. Architecture of VoIP peering between using overlay network. When a domain joins the VoIP peering system, its switching function should publish all the E.164 numbers of its clients. By calling store_route() procedure and passing the client s number as the parameter The DHT layer will distribute the information (through the overlay network) related with the number such as its domain name and the location information of the switching function that is responsible to route the call in the domain. Each join events then distributed to other nodes in the overlay network, thus other switches

4 019 Multi-Domain Voip Peering Using Overlay Network - Herry Imanta Sitepu 119 recognize that there is a new domain has join the VoIP peering system. If a client in a domain request its switching function that serve its domain to make a call to the destination which not existed in its domain, then the switch must route call to other switch that serve the target domain. Before route the call to another domain, the switch call get_route() procedure and passing the destination number. The DHT layer then send lookup with the destination number as the key through the overlay network. With a successful lookup, the requesting node receives the address of the node that responsible for the key. Next, the node retrieves the information such as the domain name and the location of the switch that serve that domain. The information that received through the lookup is used by the switch to route the call to the switch at the target domain. Figure 4 shows the software layer that is required to implement the functionalities for publishing and lookup telephone number. Extension logic is the function within that route calls. If the extension logic finds out that the destination number is outside its service domain, then it will send Remote Procedure Call (RPC) to the DHash layer [10]. DHash is actually the layer that provides block storage system. It provides a simple put and get interface to store and retrieve objects. Extension Logic DHash UnoHop DHT get_route(destination) Extension Logic DHash UnoHop DHT the destination domain through the switch that serve the domain. ENVIRONMENTAL SETUP We use p2psim [8] packet level simulator to simulate UnoHop algorithm. The simulator only focus on the lookup performance described by lookup latency and lookup failure rate and bandwidth usage of the routing table maintenance procedure, thus it is appropriate to analyze the routing performance of a DHT. The simulator can collect some important data such as total number of lookup, total number of lookup failures, bandwidth usage per node, and other data for further analysis. As the protocol parameters we use slice with size 10 and unit with size 5. The stabilization interval is chosen as 1 second. We use some network topologies for the simulation. First, our simulation uses network that consists of 1024 nodes. The latency matrix of 1024 nodes is collected using King s technique that uses recursive DNS queries to approximate the latency between nodes [9]. Second, our simulation uses network that consists of 400, 600, and 3000 nodes where each node has the Euclidean coordinate that chosen randomly. The latency between nodes is calculated as the Euclidean distance between nodes. Both network topology have round trip delay with mean 178 ms. We also generate lookup events for each node to lookup random key at interval that chosen randomly. The lookup interval is calculated by following exponential distribution with mean 1 lookup per second. TCP/IP Lookup message Lookup response TCP/IP Internet Figure 4. Architecture of VoIP peering between using overlay network. DHash layer may use different routing protocol. For our particular application we use UnoHop DHT to provide routing and lookup in the overlay network. A Lookup message is constructed by the DHT layer and sent across the internet. If the DHT protocol return a successful result, then the requesting node receive the address of the destination node. That address is used to construct the message to retrieve the information that stored at that node. DHash layer translate the retrieved data into the information that can processed by the extension logic. Extension logic layer will look for domain name and the location of the switch that serve that domain. Next the switch route the call to Figure 5. Fraction of one hop lookup failure of 1024 nodes running UnoHop protocol.

5 120 4 th International Conference Information & Communication Technology and System SIMULATION RESULTS To show how efficient the events distribution mechanism that used by both algorithms when some nodes crash, we generate crash events at time 200 second from the start of the simulation that trigger 40% of the nodes in the network to leave the network (crashed). The nodes are chosen randomly and one node is crashed at a time every 1 ms. For network topology consists of 1024 nodes, all 40% randomly chosen nodes completely crashed after 410 ms. After that crashes all lookup to those nodes will fail thus increasing failure rate of the system and decreasing lookup performance. To show how efficient each algorithm to distribute join events, we generate rejoin events for nodes that previously crashed. One node is rejoined at a time with interval 1 ms at time around 1000 second. After rejoin, there are also some movements of the keys which some keys are reassigned to the newly joined nodes. Because all other nodes still have old entries in the routing table and do not know about newly joined nodes, then the fraction of one hop lookup failure will increase again. Figure 5 shows the increase of one hop lookup failure at time 200 second and 1000 second. At 200 second 40% of randomly chosen nodes are crashed one at a time. The other nodes in the network that still have entries about those crashed nodes in their routing table will get failed lookup result. The increase of one hop lookup failure is the impact of the inaccuracy of the routing table. After the event distribution procedure is running, and then the lookup failure rate is decreasing gradually. The efficiency of the event distribution mechanism is shown by the time that required by the protocol to update the routing table at all other nodes. The faster the distribution delay the more efficient the distribution algorithm that used. UnoHop requires 50 seconds for decreasing the one hop lookup failure from 35% to 0.5%. Figure 6. Average of maintenance bandwidth per node of 1024 nodes running UnoHop protocol When all the nodes that have been crashed are rejoined back at time 1000 second, the lookup failure rate is increasing again. This is because of the movements of some keys to the newly joined nodes. UnoHop distribute join event aggressively and requires 10 seconds for decreasing the one hop lookup failure rate from 13% back to 0.6%. The performance that comes with UnoHop algorithm is increasing the average bandwidth requirement per node. Figure 6 shows the significant increase of bandwidth usage (929.5 bytes/s) for distributing join events compared with the increase of bandwidth usage (251.5 bytes/s) to propagate routing table update at crash events. This significant different of bandwidth usage is because we design the protocol that have the capability to update all nodes in the network when adding new node to the system. At real deployment, 410 nodes addition is rare and for lower size concurrent nodes join the network then the bandwidth requirement will be much lower. Figure 7 shows different number of crashed nodes. Proportional with the increase of the fraction of crashed nodes, the one hop lookup failure is increasing too. Nevertheless, the distribution delay that required by UnoHop is not increase significantly. With crashing 20%, 30%, 40%, and 50% of nodes, the distribution delay is increase slowly. We also simulate different network size with 400, 600, 1024, and 3000 nodes. In all of these simulations, we generate events to crashed 40% of nodes. Figure 7 shows that despite the increase of network size, the distribution delay only shows a slight variation. This behavior is required for our application to allow the application become scalable with network size up to thousands of nodes.

6 019 Multi-Domain Voip Peering Using Overlay Network - Herry Imanta Sitepu 121 Figure 7. Fraction of one hop lookup failure of 1024 nodes with different number of crashed nodes. Figure 8. Fraction of one hop lookup failure with different network size. All use the same fraction of crashed nodes (40%). CONCLUSION AND FUTURE WORK VoIP peering requires some client/server architecture for lookup function that process call requests and retrieve the domain and next hop destination to process call. The client/server architecture requires the server having redundancy and high availability mechanisms. Otherwise, the server will become the bottleneck and single point of failure. In this paper we propose a distributed architecture to process lookup in VoIP peering. Before route the call to other domains, the switching function in a domain may perform lookup the overlay network using destination number as the key. The result from lookup contains information about the domain where the destination is served and the switching function that responsible to route the call to the destination. This simple architecture provide a distributed and robust mechanism for VoIP peering. DHT is the layer that provides routing mechanism at the overlay network. A key that represent data is assigned to a node that responsible to store the key. We present an efficient one hop DHT that can be used as the distributed layer. UnoHop has low latency for distributing events such as nodes join or leave. Our simulation results also show that UnoHop is scalable for larger network size up to 3000 nodes. The variation is not significant as the network size is growing. As the future work we will minimize the bandwidth requirement, which can be done by aggregating some events at predefined interval before distributing those events further. Another work is to test the application on the real network and collecting some statistic data to be compared with the simulation results. REFERENCE [1] S. Androutsellis-Theotokis, dan D. Spinellis, A survey of peer-to-peer con-tent distribution technologies. ACM Computing Surveys (CSUR) 36: , [2] Stoica, I., Morris, R., Karger, D., Kaashoek, F. M. dan Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM 01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, 31. New York, NY, USA: ACM Press, [3] [4] [5] P. Maymounkov and D. Maziã res. Kademlia: A peer-to- peer information system based on the xor metric. First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7-8, [6] B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications,22(1):41 53,2004. [7] A. Gupta, B. Liskov, and R. Rodrigues. Efficient routing for peer-to-peer overlays. In Proc. First Symposium on Networked Systems Design and Implementation (NSDI 04), March [8] J. Li, J. Stribling, R. Morris, M. F. Kaashoek, and T. M. Gil. A performance vs. cost framework for evaluating dht design tradeoffs under churn. In

7 122 4 th International Conference Information & Communication Technology and System Proceedings of the 24th INFOCOM, Miami, FL, March,2005. [9] K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of dht routing geometry on resilience and proximity. In SIGCOMM 03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM Press. [10] F. Dabek, A Distributed Hash Table. Ph.D. thesis, Massachusetts Institute of Technology

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

Comparing the performance of distributed hash tables under churn

Comparing the performance of distributed hash tables under churn Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

R/Kademlia: Recursive and Topology-aware Overlay Routing

R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the

More information

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo, JAPAN Email:

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

CIS 700/005 Networking Meets Databases

CIS 700/005 Networking Meets Databases Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Effects of Churn on Structured P2P Overlay Networks

Effects of Churn on Structured P2P Overlay Networks International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar

Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Jean-François Wauthy FUNDP - The University of Namur jfwauthy@student.fundp.ac.be Laurent Schumacher FUNDP - The University

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi

Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi 1 Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi Michael Parker, Amir Nader-Tehrani, Alok Nandan, Giovanni Pau Computer Science Department University of California Los Angeles Los Angeles,

More information

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department of Computer Science & Engineering University

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Layer Optimization for DHT-based Peer-to-Peer Network

Layer Optimization for DHT-based Peer-to-Peer Network Layer Optimization for DHT-based Peer-to-Peer Network Jun Li *, Cuilian Li, Zhaoxi Fang Department of Telecommunication Zhejiang Wanli University Ningbo, China xxllj, licl@zwu.edu.cn, zhaoxifang@gmail.com

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

A Comparison Of Replication Strategies for Reliable Decentralised Storage

A Comparison Of Replication Strategies for Reliable Decentralised Storage 36 JOURNAL OF NETWORKS, VOL. 1, NO. 6, NOVEMBER/DECEMBER 26 A Comparison Of Replication Strategies for Reliable Decentralised Storage Matthew Leslie 1,2, Jim Davies 1, and Todd Huffman 2 1 Oxford University

More information

Faster Content Access in KAD

Faster Content Access in KAD Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

Congestion Control for Distributed Hash Tables

Congestion Control for Distributed Hash Tables Congestion Control for Distributed Hash Tables Fabius Klemm, Jean-Yves Le Boudec, and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne,

More information

Large-Scale Monitoring of DHT Traffic

Large-Scale Monitoring of DHT Traffic Large-Scale Monitoring of DHT Traffic Ghulam Memon, Reza Rejaie University of Oregon {gmemon, reza}@cs.uoregon.edu Yang Guo Corporate Research, Thomson Yang.Guo@thomson.net Daniel Stutzbach Stutzbach Enterprises

More information

Peer-To-Peer Techniques

Peer-To-Peer Techniques PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

FPN: A Distributed Hash Table for Commercial Applications

FPN: A Distributed Hash Table for Commercial Applications FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

Proceedings of the First Symposium on Networked Systems Design and Implementation

Proceedings of the First Symposium on Networked Systems Design and Implementation USENIX Association Proceedings of the First Symposium on Networked Systems Design and Implementation San Francisco, CA, USA March 9 31, 004 004 by The USENIX Association All Rights Reserved For more information

More information

A Survey of Peer-to-Peer Content Distribution Technologies

A Survey of Peer-to-Peer Content Distribution Technologies A Survey of Peer-to-Peer Content Distribution Technologies Stephanos Androutsellis-Theotokis and Diomidis Spinellis ACM Computing Surveys, December 2004 Presenter: Seung-hwan Baek Ja-eun Choi Outline Overview

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

HyCube: A distributed hash table based on a hierarchical hypercube geometry

HyCube: A distributed hash table based on a hierarchical hypercube geometry HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

D1HT: A Distributed One Hop Hash Table

D1HT: A Distributed One Hop Hash Table D1HT: A Distributed One Hop Hash Table Luiz R. Monnerat, and Claudio L. Amorim COPPE - Computer and Systems Engineering TI/TI-E&P/STEP Federal University of Rio de Janeiro PETROBRAS {monnerat,claudio}@cos.ufrj.br

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Karthik Lakshminarayanan at P2P Systems class (Slides liberally borrowed from Krishna s SIGCOMM talk) Krishna Gummadi, Ramakrishna

More information

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems George Fletcher Project 3, B649, Dr. Plale July 16, 2003 1 Introduction One of the key requirements for global level scalability

More information

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Noorullah Moghul Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion Stoica Acknowledgement

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Byung-Gon Chun, Ben Y. Zhao 2, and John D. Kubiatowicz Computer Science Division, U.C. Berkeley {bgchun, kubitron}@cs.berkeley.edu

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

E. Shim Panasonic October 16, 2006

E. Shim Panasonic October 16, 2006 SIPPING WG Internet-Draft Expires: April 19, 2007 S. Baset H. Schulzrinne Columbia University E. Shim Panasonic October 16, 2006 Status of this Memo A Protocol for Implementing Various DHT Algorithms draft-baset-sipping-p2pcommon-00

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Semester Thesis on Chord/CFS: Towards Compatibility with Firewalls and a Keyword Search

Semester Thesis on Chord/CFS: Towards Compatibility with Firewalls and a Keyword Search Semester Thesis on Chord/CFS: Towards Compatibility with Firewalls and a Keyword Search David Baer Student of Computer Science Dept. of Computer Science Swiss Federal Institute of Technology (ETH) ETH-Zentrum,

More information

Dorina Luminiţa COPACI, Constantin Alin COPACI

Dorina Luminiţa COPACI, Constantin Alin COPACI THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and

More information

Introduction to P2P Computing

Introduction to P2P Computing Introduction to P2P Computing Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction A. Peer-to-Peer vs. Client/Server B. Overlay Networks 2. Common Topologies 3. Data Location 4. Gnutella

More information

Badri Nath Rutgers University

Badri Nath Rutgers University lookup services Badri Nath Rutgers University badri@cs.rutgers.edu 1. CAN: A scalable content addressable network, Sylvia Ratnasamy et.al. SIGCOMM 2001 2. Chord: A scalable peer-to-peer lookup protocol

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing 1 TinyTorrent: Implementing a Kademlia Based DHT for File Sharing A CS244B Project Report By Sierra Kaplan-Nelson, Jestin Ma, Jake Rachleff {sierrakn, jestinm, jakerach}@cs.stanford.edu Abstract We implemented

More information

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured

More information

Peer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.4 Other Issues

Peer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.4 Other Issues Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Peer-to-Peer Systems and Security IN2194 Chapter 1 Peer-to-Peer Systems 1.4 Other Issues Dr. Heiko Niedermayer

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Peer-to-Peer (P2P) Systems

Peer-to-Peer (P2P) Systems Peer-to-Peer (P2P) Systems What Does Peer-to-Peer Mean? A generic name for systems in which peers communicate directly and not through a server Characteristics: decentralized self-organizing distributed

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

Finding Data in the Cloud using Distributed Hash Tables (Chord) IBM Haifa Research Storage Systems

Finding Data in the Cloud using Distributed Hash Tables (Chord) IBM Haifa Research Storage Systems Finding Data in the Cloud using Distributed Hash Tables (Chord) IBM Haifa Research Storage Systems 1 Motivation from the File Systems World The App needs to know the path /home/user/my pictures/ The Filesystem

More information

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Exploiting Route Redundancy via Structured Peer to Peer Overlays

Exploiting Route Redundancy via Structured Peer to Peer Overlays Exploiting Route Redundancy ia Structured Peer to Peer Oerlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz Uniersity of California, Berkeley Challenges Facing

More information

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

An Expresway over Chord in Peer-to-Peer Systems

An Expresway over Chord in Peer-to-Peer Systems An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks

Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks Sean Rhea, Timothy Roscoe, and John Kubiatowicz IRB-TR-3-2 February, 23 Proceedings of the 2 nd International Peer-to-Peer Systems Workshop

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM

More information

Overlay Networks in ScaleNet

Overlay Networks in ScaleNet Overlay Networks in ScaleNet Dipl-Inform. Ingmar Baumgart Prof. Dr. Martina Zitterbart VDE ITG 5.2.1 Fachgruppentreffen, Ericsson, Aachen, 5.5.06, The ScaleNet Project : Scalable, efficient and flexible

More information

Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications

Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented by Jibin Yuan ION STOICA Professor of CS

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Adaptive Load Balancing for DHT Lookups

Adaptive Load Balancing for DHT Lookups Adaptive Load Balancing for DHT Lookups Silvia Bianchi, Sabina Serbu, Pascal Felber and Peter Kropf University of Neuchâtel, CH-, Neuchâtel, Switzerland {silvia.bianchi, sabina.serbu, pascal.felber, peter.kropf}@unine.ch

More information

Minimizing Churn in Distributed Systems

Minimizing Churn in Distributed Systems Minimizing Churn in Distributed Systems by P. Brighten Godfrey, Scott Shenker, and Ion Stoica appearing in SIGCOMM 2006 presented by Todd Sproull Introduction Problem: nodes joining or leaving distributed

More information

Fixing the Embarrassing Slowness of OpenDHT on PlanetLab

Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker University of California, Berkeley opendht@opendht.org Introduction The distributed

More information

Challenges in the Wide-area. Tapestry: Decentralized Routing and Location. Global Computation Model. Cluster-based Applications

Challenges in the Wide-area. Tapestry: Decentralized Routing and Location. Global Computation Model. Cluster-based Applications Challenges in the Wide-area Tapestry: Decentralized Routing and Location System Seminar S 0 Ben Y. Zhao CS Division, U. C. Berkeley Trends: Exponential growth in CPU, b/w, storage Network expanding in

More information

Arpeggio: Metadata Searching and Content Sharing with Chord

Arpeggio: Metadata Searching and Content Sharing with Chord Arpeggio: Metadata Searching and Content Sharing with Chord Austin T. Clements, Dan R.K. Ports, and David R. Karger MIT Computer Science and Artificial Intelligence Laboratory, 32 Vassar St., Cambridge

More information