Scalable P2P architectures

Size: px
Start display at page:

Download "Scalable P2P architectures"

Transcription

1 Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar

2 Outline Introduction to P2P models: DHT and Unstructured Query Systems Routing Packets on a Small World Properties of real P2P systems (e.g. Gnutella). A model for Power law graphs Percolating Messages on a Graph Design of a new P2P system: Brunet

3 Hash Table A hash table is a simple data structure which can lookup in O(1) time. Each object has a hash code. This hash code is used as an index into an array. As long as each object has a different hash code, lookup happens in O(1). If there are on average m duplicates, look up is O(m). Where's the P2P?

4 Distributed Hash Table (DHT) Rather than keep all the elements of the hash table locally, they could point to nodes in a network:

5 DHT Systems If each node does not have a pointer to every other node, routing schemes are introduced. Each node knows about k other nodes. All queries are routed through these k nodes. The query should be resolved in the fewest number of hops. Most academic work has focused on DHT systems.

6 Hyperspace Routing (Pastry and Tapestry) Messages are routed by matching the prefix of the destination to the current node, and sending to the node which matches the next element. Nodes need O( M (log n)/log M ) neighbors for an alphabet of size M, which gives O( log n/ log M) distance Examples: Routing 101 starting at 000: 000 > 100 > 101 Routing 101 starting at 010: 110 > 100 > 101 Routing 101 starting at 011: 011 > 111 > 101

7 Distance Based Routing A distance metric is defined on the key space. Nodes are connected to their nearest neighbors in the space and usually to remote nodes. Messages are routed to the node which is closest to the destination. Examples: System Space Latency Connections CAN M-dimension torus M N ^{1/M} Neighbors: M Chord Ring log N Neighbors exponentially increasing: log N Symphony Ring (log^2 N)/k Neighbors and k remote Viceroy log N stacked rings log N Neighbors

8 Small World Model High clustering Regular Grid p=0 Large diameter Small World High clustering Low diameter p=1 Classic Random Network D. Watts and S. Strogatz, "Collective dynamics of small-world networks," Nature 393, 440 (1998). Low clustering Low diameter

9 Making a Small World Routable Kleinberg (2000) suggested a connection algorithm to make a ring routable: The ring is of unit circumference with N nodes. Each node has an address which represents its position on the ring. It is connected to its closest neighbor on each side, and one remote node. The probability that the remote node is at a distance L is p (L) ~ 1/L (one can generalize to allow k such connections). By following the path which takes you closest to the

10 The red nodes have connections to distance L with P(L) ~ 1/L A Routable Small World How can we show it is routable?

11 Greedy Routing Works The probability of connections going a distance d: P(d)=1/d log N What's the probability that a connection takes us to a distance less than d: P = d 1 d 1 x log N dx= log 1 log N Distance d Source Distance = d Destination

12 Greedy Routing Works How many such connections are needed to get close: How many nodes (M) do we need to get lucky L times: M P =L M=L log 1 log N log N log d log log N M= log 1 log Since we must be prepared for d = N, then: M = O(log^2 N) Distance d L d=log N L= log log N d log Source Distance = d Destination

13 Almost all are unstructured query networks! DHT Summary DHTs have nice theory associated with them, but they are not suited to all problems. There are many proposals to get poly log communications complexity. Small World systems (Chord, Symphony) are relatively easy to implement. DHTs are excellent in applications where a user knows EXACTLY the object he wants (a specific file, a specific user, a specific node, etc...) However, almost no real P2P systems are DHTs!

14 Unstructured Query Systems Many users will want to perform a search based on query strings and get results that are close to this query string. A user may wish to make a query which is an intersection of two queries: ( mp3 and SIZE > 3MB). Each object in the system might have many properties, and a query might match any subset of those properties. It is an open problem of how to find a way to map this generality onto DHTs.

15 Broadcast Query Systems In a broadcast query system, each node has some records. To query the network, the node sends a query to ALL neighbors. Each query has an identifying number, responses are routed back the way the query came. To query the entire system, a query will need to cross all edges (E), thus query cost is O(E) and E > N for all connected networks.

16 How do we make scalable query systems? Gnutella is popular protocol for file sharing which uses the unstructured query model. To attempt to solve the scalability problems, they introduced UltraPeers, which are nodes that keep copies of all the records of their LeafPeers. Now, each query costs O(U), if U is the number of UltraPeers. But, if U is a constant fraction of N, then query costs are still O(N), only the constant has changed. Can we do better if we take advantage of network structure?

17 Scale Free Networks Many large networks with interacting nodes, are what is called scale free networks, or power law networks. Many mechanisms have been suggested which can account for such degree distributions. Power law distributions are called scale free because of the following feature: P k = k 1/k P k = k = / k 1/k

18 Power Law Networks: WWW Paper Citations Social Networks File Sharing Networks Networks a. outgoing edge distribution α = 2.41 b. ingoing edge distribution α=2.1 c. diameter of network as function of size. A. Albert, H. Jeong, and A.-L. Barabási, Diameter of the World Wide Web, Nature,401, (1999).

19 Example Parameters from Real Networks (Newman, 2002)

20 Preferential Attachment A simple model which gives rise to a power law degree distribution was proposed by Barabasi, Albert At each time step, a new node joins and selects a node to connect to. The target node is selected with a probability proportional to its degree. The probability we select a node of degree k: Assuming a steady state solution, we want to write a difference equation for the number of nodes with degree k: n k =q k 1 q k k,1 n k = k 1 n k 1 k n k 2 k,1 k 2 n k = k 1 n k 1 k,1 4 n k = k k 1 k 2 1/k 3 q k = k n k 2

21 (Bond) Percolation Problem: If we have a graph and we delete each edge with probability (1 p), as a function of p, what is the size of the largest connected component?

22 Bond Percolation on Random Graphs (with generating functions) Suppose we have a random graph with a constrained degree distribution: p(k). Each node has a degree selected according to this distribution, but its edges are randomly connected. We use a generating function to represent this distribution: P x = k x k p k The mean is the first derivative at x=1: P ' x = k x k 1 k p k P ' 1 = k k p k = k If the random variable Z is the sum of independent random variables: Z = K_1 + K_ K_m, then the generating function is the product: Q x = z x z p z = P x =[P x ] m We can put this together to compute expected cluster sizes!

23 Doing the Calculation Write a consistency equation: Turn it into a generating function: m p C=q 1 m m 1 m l=1 C 1 q 0 k H x =q x m m p m k [ H x ]m 1 Use the generating function to get the mean: m p H ' x =q m m k [ H m m 1 p x m x ]m 1 m [H x ] m 2 H ' x k k k 1 H ' 1 =q 1 H ' 1 k q H ' 1 = k k 1 1 q k Hence we have a threshold on q where size diverges: q k k k 1

24 Details m p C=q 1 m m 1 m l=1 C 1 q 0 k H x =q x m m p m k [ H x ]m 1 m p H ' x =q m m k [H m m 1 p x m x ]m 1 m [ H x ] m 2 H ' x k m p H ' 1 =q m m k [H m m 1 p m 1 ]m 1 m [H 1 ] m 2 H ' 1 k m p H ' 1 =q m m k m m 1 p m m k k k 1 H ' 1 =q 1 H ' 1 k q H ' 1 = k k 1 1 q Threshold: q k k k 1 H ' 1

25 Percolation Thresholds for Example p k = Zeta 3 k 3 k =Zeta 2 /Zeta k 2 =Zeta 1 = q c = k k 2 k =0 p k = Zeta 4 k 4 k =Zeta 3 /Zeta k 2 =Zeta 2 = 2 6 q c = k k 2 k = Graphs What does this mean? p k = Zeta 3.5 k 3.5 k =Zeta 2.5 /Zeta k 2 =Zeta 1.5 =2.61 q c = k k 2 k =0.83 p k = 1 k k = 1 k 2 = q c = k k 2 k = 1 2 We can predict how many edges need to pass a packet to reach a constant fraction of the nodes!

26 Percolation in P2P (due to Nima Sarshar) With probability p we send the query to each neighbor. Each node that gets the query responds with any matches, and sends the query to each of his neighbors with probability p. How small can p be? It must be bigger than q_c!

27 Getting Poly log Scaling in Unstructured Query Systems Assume we have a random network of N nodes, and a degree distribution ~ 1/k^2. There is a maximum degree k_max (which is O(N)). We can get such a network using the protocol from Sarshar, Roychowdhury (PRE 2004) What is the cost of a percolation query at the threshold? C=q c E= q c k N p k = /k 2 2 k = log k max q c = log k max k max log k max C= log k max k max log k max N log k max k 2 = k max Hence we get only O(log^2 N) cost for each query! log 2 k max C= k max / N log k max / N k max =O N C log 2 N

28 Caching Records on High Degree Nodes In fact, in the previous result, we did not explain why sending so few copies of a query would ever reach the node which has a record matching the query. In order to make sure the query finds the record, we cache each record on high degree nodes. Each record is implanted into the network on a random walk path of length Log(N). One can show that it almost surely finds a node of degree k_max/2. One can show that the percolation query almost surely reaches all nodes of degree k_max/2 or greater A Percolation Query almost always finds at least one node from any random walk!

29 Simulation Results A percolation search protocol on a network of size 40,000 with degree distribution ~ 1/k^2 (grown from double preferential attachment).

30 Simulation Results A percolation search protocol on a Gnutella network of size 39,730. The network structure was obtained by Limewire's

31 Brunet: A Hybrid P2P System DHTs cannot resolve general queries. Unstructured systems (usually) require large routing tables to return query hits. Brunet is a new P2P protocol which combines the advantages of both DHTs and Unstructured Power law networks. Brunet offers a general P2P foundation on which a wide variety of protocols and applications can

32 Brunet: A Hybrid P2P System Each node has a 160 bit address which can also be thought of as a 160 bit positive integer. A distance metric using the integer representation. Each node is situated on a routable small world ring with structured connections to its neighbors on the ring, and shortcuts to remote locations. Each node also is on an unstructured network and has unstructured connections to other nodes on that power law network (p_k ~ 1/k^2) Structured Subgraph (small world) Unstructured Subgraph (1/k^2)

33 Brunet Protocol Details Each message on the Brunet system is represented by a packet. The packet has a source address, destination address, hops, time to live, and payload type in the header. The payload can contain arbitrary data. Packets are sent over Edges. An Edge can use any transport (currently we have TcpEdge and UdpEdge). The Address space is partitioned into 160 classes (each half as large as the previous). Some addresses are used for the DHT aspect of the system, some are used for the unstructured system. Some address classes represent unstructured destinations. To send a packet as a percolation message, the address class 126 is used. This class has 32 bits which specify the percolation probability. All Source addresses (currently) are structured addresses. This means nodes do not need to cache routes to particular nodes. Queries can always

34 Stability: How robust is the network to perturbation. We know that random node deletion will not cause problems, but there are many scenarios left to consider (e.g. attack, capacity issues, variance in Practical Issues In practice there are many issues yet to receive full analytic treatment: Firewalls: our protocol connects two nodes as long as one is not firewalled, but we have not analyzed what effects will be manifest as firewalled nodes dramatically increase in number. Bootstrapping: When the network is first forming, there are some interesting problems related to nodes finding their proper place. It is analogous to a distributed sorting algorithm. Convergence: Can we get a proof (including practical issues) that the network properties always converge to the desired properties.

35 Brunet Implementation The first implementation of the Brunet protocol is being completed at UCLA's Complex Networks Group. The code is developed using GNU/Linux and the Mono C# development environment. In addition to a programming library which implements the Brunet protocol, we have developed other tools: Netmodeler: a general C++ network modeling package Brunet Verifier: a protocol debugger for Brunet implementations

36 Open Problems Can the DHT or unstructured systems be used to build an improved model of distributed computing (e.g. how can these P2P models help in mapping task graphs onto resources)? What common primitives can be implemented using P2P systems? (e.g. what kinds of communications costs are incurred building a P2P Database?) What results can be obtained about protocol

37 Summary Using models inspired from social contexts (such as small world and power law networks) we see how some computer networking systems and architectures can be improved. Statistical Mechanics tools (percolation) allow us to analyze some novel networking conditions. By engineering previously ignored structural details of P2P systems, poly log scaling is achieved. The Brunet P2P system puts the DHT model together with the percolation search to get state of the art scaling properties.

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves

More information

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Description of CHORD s Location and routing mechanisms Symphony: Distributed

More information

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.

More information

Peer-To-Peer Techniques

Peer-To-Peer Techniques PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems

More information

arxiv: v1 [cs.dc] 25 Sep 2007

arxiv: v1 [cs.dc] 25 Sep 2007 arxiv:0709.4048v1 [cs.dc] 25 Sep 2007 A Symphony Conducted by BruNet P. Oscar Boykin Department of Electrical and Computer Engineering University of Florida Joseph S. Kong Electrical Engineering Department

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

A SCALABLE AND FLEXIBLE UNSTRUCTURED SEARCH SYSTEM AND DISTRIBUTED DATA STRUCTURES FOR PEER-TO-PEER NETWORKS

A SCALABLE AND FLEXIBLE UNSTRUCTURED SEARCH SYSTEM AND DISTRIBUTED DATA STRUCTURES FOR PEER-TO-PEER NETWORKS A SCALABLE AND FLEXIBLE UNSTRUCTURED SEARCH SYSTEM AND DISTRIBUTED DATA STRUCTURES FOR PEER-TO-PEER NETWORKS By TAE WOONG CHOI A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Plan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks

Plan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks Plan of the lecture I. INTRODUCTION I. Networks: definitions, statistical characterization, examples II. Modeling frameworks II. DYNAMICAL PROCESSES I. Resilience, vulnerability II. Random walks III. Epidemic

More information

Kademlia: A P2P Informa2on System Based on the XOR Metric

Kademlia: A P2P Informa2on System Based on the XOR Metric Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg

More information

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9 Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication

More information

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis

Motivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Karthik Lakshminarayanan at P2P Systems class (Slides liberally borrowed from Krishna s SIGCOMM talk) Krishna Gummadi, Ramakrishna

More information

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation

The Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Noorullah Moghul Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion Stoica Acknowledgement

More information

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich (Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes

More information

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World Distributed Hashing in a Small World Gurmeet Singh Manku Stanford University with Mayank Bawa and Prabhakar Raghavan Acknowledgement The following slides are borrowed from the author s talk at USITS 2003.

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

LECT-05, S-1 FP2P, Javed I.

LECT-05, S-1 FP2P, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer

More information

Page 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"

Page 1. How Did it Start? Model Main Challenge CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth

More information

Peer-to-Peer Internet Applications: A Review

Peer-to-Peer Internet Applications: A Review Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15

Resilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15 Resilient Networking Thorsten Strufe Module 3: Graph Analysis Disclaimer Dresden, SS 15 Module Outline Why bother with theory? Graphs and their representations Important graph metrics Some graph generators

More information

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:

More information

Kademlia: A peer-to peer information system based on XOR. based on XOR Metric,by P. Maymounkov and D. Mazieres

Kademlia: A peer-to peer information system based on XOR. based on XOR Metric,by P. Maymounkov and D. Mazieres : A peer-to peer information system based on XOR Metric,by P. Maymounkov and D. Mazieres March 10, 2009 : A peer-to peer information system based on XOR Features From past p2p experiences, it has been

More information

Fast Topology Management in Large Overlay Networks

Fast Topology Management in Large Overlay Networks Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology

More information

Network Mathematics - Why is it a Small World? Oskar Sandberg

Network Mathematics - Why is it a Small World? Oskar Sandberg Network Mathematics - Why is it a Small World? Oskar Sandberg 1 Networks Formally, a network is a collection of points and connections between them. 2 Networks Formally, a network is a collection of points

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen

Overlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Kleinberg s Small-World Networks. Normalization constant have to be calculated:

Kleinberg s Small-World Networks. Normalization constant have to be calculated: Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)

More information

A Generating Function Approach to Analyze Random Graphs

A Generating Function Approach to Analyze Random Graphs A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 7 Jun 2004

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 7 Jun 2004 Scalable Percolation Search in Power Law Networks arxiv:cond-mat/04065v [cond-mat.dis-nn] 7 Jun 004 Nima Sarshar, P. Oscar Boykin, and Vwani Roychowdhury Department of Electrical Engineering, University

More information

Peer-to-Peer Networks Pastry & Tapestry 4th Week

Peer-to-Peer Networks Pastry & Tapestry 4th Week Peer-to-Peer Networks Pastry & Tapestry 4th Week Department of Computer Science 1 Peer-to-Peer Networks Pastry 2 2 Pastry Peter Druschel Rice University, Houston, Texas now head of Max-Planck-Institute

More information

SNA 8: network resilience. Lada Adamic

SNA 8: network resilience. Lada Adamic SNA 8: network resilience Lada Adamic Outline Node vs. edge percolation Resilience of randomly vs. preferentially grown networks Resilience in real-world networks network resilience Q: If a given fraction

More information

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Ken Y.K. Hui John C. S. Lui David K.Y. Yau Dept. of Computer Science & Engineering Computer Science Department The Chinese

More information

Badri Nath Rutgers University

Badri Nath Rutgers University lookup services Badri Nath Rutgers University badri@cs.rutgers.edu 1. CAN: A scalable content addressable network, Sylvia Ratnasamy et.al. SIGCOMM 2001 2. Chord: A scalable peer-to-peer lookup protocol

More information

PEER-TO-PEER (P2P) systems are now one of the most

PEER-TO-PEER (P2P) systems are now one of the most IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 15 Enhancing Peer-to-Peer Systems Through Redundancy Paola Flocchini, Amiya Nayak, Senior Member, IEEE, and Ming Xie Abstract

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm - Efficient

More information

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks , University of Hannover Random Graphs, Small-Worlds, and Scale-Free Networks Wolf-Tilo Balke and Wolf Siberski 05.12.07 * Original slides provided by K.A. Lehmann (University Tübingen, Germany) 6. Overview

More information

Peer-to-Peer Networks 15 Self-Organization. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 15 Self-Organization. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 15 Self-Organization Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Gnutella Connecting Protokoll - Ping Ping participants query

More information

Minimizing Churn in Distributed Systems

Minimizing Churn in Distributed Systems Minimizing Churn in Distributed Systems by P. Brighten Godfrey, Scott Shenker, and Ion Stoica appearing in SIGCOMM 2006 presented by Todd Sproull Introduction Problem: nodes joining or leaving distributed

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 10. Networkmodels 1. Introduction Motivation

More information

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations. Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley

More information

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find

More information

Constructing Overlay Networks through Gossip

Constructing Overlay Networks through Gossip Constructing Overlay Networks through Gossip Márk Jelasity Università di Bologna Project funded by the Future and Emerging Technologies arm of the IST Programme The Four Main Theses 1: Topology (network

More information

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)

*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.

More information

Information Retrieval in Peer to Peer Systems. Sharif University of Technology. Fall Dr Hassan Abolhassani. Author: Seyyed Mohsen Jamali

Information Retrieval in Peer to Peer Systems. Sharif University of Technology. Fall Dr Hassan Abolhassani. Author: Seyyed Mohsen Jamali Information Retrieval in Peer to Peer Systems Sharif University of Technology Fall 2005 Dr Hassan Abolhassani Author: Seyyed Mohsen Jamali [Slide 2] Introduction Peer-to-Peer systems are application layer

More information

ON COVERAGE BOUNDS OF UNSTRUCTURED PEER-TO-PEER NETWORKS

ON COVERAGE BOUNDS OF UNSTRUCTURED PEER-TO-PEER NETWORKS Advances in Complex Systems, Vol. 14, No. 4 (211) 611 633 c World Scientific Publishing Company DOI: 1.1142/S2195259113141 ON COVERAGE BOUNDS OF UNSTRUCTURED PEER-TO-PEER NETWORKS JOYDEEP CHANDRA and NILOY

More information

Network Thinking. Complexity: A Guided Tour, Chapters 15-16

Network Thinking. Complexity: A Guided Tour, Chapters 15-16 Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/

More information

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in

More information

Peer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.3 Structured Networks

Peer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.3 Structured Networks Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Peer-to-Peer Systems and Security IN2194 Chapter 1 Peer-to-Peer Systems 1.3 Structured Networks Prof. Dr.-Ing.

More information

Locality in Structured Peer-to-Peer Networks

Locality in Structured Peer-to-Peer Networks Locality in Structured Peer-to-Peer Networks Ronaldo A. Ferreira Suresh Jagannathan Ananth Grama Department of Computer Sciences Purdue University 25 N. University Street West Lafayette, IN, USA, 4797-266

More information

Distributed Hash Tables (DHT)

Distributed Hash Tables (DHT) Distributed Hash Tables (DHT) Jukka K. Nurminen Aalto University *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed

More information

Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies

Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Gerald Fry and Richard West Boston University Boston, MA 02215 {gfry,richwest}@cs.bu.edu Introduction Internet growth

More information

Randomized Algorithms for Network Security and Peer-to-Peer Systems

Randomized Algorithms for Network Security and Peer-to-Peer Systems Randomized Algorithms for Network Security and Peer-to-Peer Systems Micah Adler University of Massachusetts, Amherst Talk Outline Probabilistic Packet Marking for IP Traceback Network Security Appeared

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline

More information

An Expresway over Chord in Peer-to-Peer Systems

An Expresway over Chord in Peer-to-Peer Systems An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An

More information

CIS 700/005 Networking Meets Databases

CIS 700/005 Networking Meets Databases Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable

More information

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility

Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Mayukh Nilay Khan May 13, 2010 Abstract Inspired by empirical studies researchers have tried to model various

More information

Exercise set #2 (29 pts)

Exercise set #2 (29 pts) (29 pts) The deadline for handing in your solutions is Nov 16th 2015 07:00. Return your solutions (one.pdf le and one.zip le containing Python code) via e- mail to Becs-114.4150@aalto.fi. Additionally,

More information

: Scalable Lookup

: Scalable Lookup 6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be

More information

Understanding Disconnection and Stabilization of Chord

Understanding Disconnection and Stabilization of Chord Understanding Disconnection and Stabilization of Chord Zhongmei Yao Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University, College Station, TX 77843

More information

ECE 158A - Data Networks

ECE 158A - Data Networks ECE 158A - Data Networks Homework 2 - due Tuesday Nov 5 in class Problem 1 - Clustering coefficient and diameter In this problem, we will compute the diameter and the clustering coefficient of a set of

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Distributed lookup services

Distributed lookup services Distributed lookup services lookup services Badri Nath Rutgers University badri@cs.rutgers.edu A set of nodes cooperating Peers Run special purpose algorithms/software Doesn t have to be deployed at every

More information

6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model

6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model 6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model Daron Acemoglu and Asu Ozdaglar MIT September 23, 2009 1 Outline Generalized random graph models Graphs with prescribed

More information

Debunking some myths about structured and unstructured overlays

Debunking some myths about structured and unstructured overlays Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured

More information

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application

More information

Peer to Peer I II 1 CS 138. Copyright 2015 Thomas W. Doeppner, Rodrigo Fonseca. All rights reserved.

Peer to Peer I II 1 CS 138. Copyright 2015 Thomas W. Doeppner, Rodrigo Fonseca. All rights reserved. Peer to Peer I II 1 Roadmap This course will feature key concepts in Distributed Systems, often illustrated by their use in example systems Start with Peer-to-Peer systems, which will be useful for your

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm

More information

Impact of Clustering on Epidemics in Random Networks

Impact of Clustering on Epidemics in Random Networks Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction

More information

Peer to Peer Networks

Peer to Peer Networks Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer

More information

Peer to peer systems: An overview

Peer to peer systems: An overview Peer to peer systems: An overview Gaurav Veda (Y1148) gveda@cse.iitk.ac.in Computer Science & Engineering Indian Institute of Technology Kanpur, UP, INDIA - 208016 Abstract Peer-to-peer (p2p) systems is

More information

Small World Overlay P2P Networks

Small World Overlay P2P Networks Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.

More information

15-744: Computer Networking P2P/DHT

15-744: Computer Networking P2P/DHT 15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access

More information

Enabling Dynamic Querying over Distributed Hash Tables

Enabling Dynamic Querying over Distributed Hash Tables Enabling Dynamic Querying over Distributed Hash Tables Domenico Talia a,b, Paolo Trunfio,a a DEIS, University of Calabria, Via P. Bucci C, 736 Rende (CS), Italy b ICAR-CNR, Via P. Bucci C, 736 Rende (CS),

More information

On Static and Dynamic Partitioning Behavior of Large-Scale Networks

On Static and Dynamic Partitioning Behavior of Large-Scale Networks On Static and Dynamic Partitioning Behavior of Large-Scale Networks Derek Leonard Department of Computer Science Texas A&M University College Station, TX 77843 27th October 2005 Derek Leonard On Static

More information

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

DHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have..

DHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have.. DHT Overview P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar DHTs provide a simple primitive put (key,value) get (key) Data/Nodes distributed over a key-space High-level idea: Move

More information