Scalable P2P architectures
|
|
- Marybeth Henry
- 5 years ago
- Views:
Transcription
1 Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar
2 Outline Introduction to P2P models: DHT and Unstructured Query Systems Routing Packets on a Small World Properties of real P2P systems (e.g. Gnutella). A model for Power law graphs Percolating Messages on a Graph Design of a new P2P system: Brunet
3 Hash Table A hash table is a simple data structure which can lookup in O(1) time. Each object has a hash code. This hash code is used as an index into an array. As long as each object has a different hash code, lookup happens in O(1). If there are on average m duplicates, look up is O(m). Where's the P2P?
4 Distributed Hash Table (DHT) Rather than keep all the elements of the hash table locally, they could point to nodes in a network:
5 DHT Systems If each node does not have a pointer to every other node, routing schemes are introduced. Each node knows about k other nodes. All queries are routed through these k nodes. The query should be resolved in the fewest number of hops. Most academic work has focused on DHT systems.
6 Hyperspace Routing (Pastry and Tapestry) Messages are routed by matching the prefix of the destination to the current node, and sending to the node which matches the next element. Nodes need O( M (log n)/log M ) neighbors for an alphabet of size M, which gives O( log n/ log M) distance Examples: Routing 101 starting at 000: 000 > 100 > 101 Routing 101 starting at 010: 110 > 100 > 101 Routing 101 starting at 011: 011 > 111 > 101
7 Distance Based Routing A distance metric is defined on the key space. Nodes are connected to their nearest neighbors in the space and usually to remote nodes. Messages are routed to the node which is closest to the destination. Examples: System Space Latency Connections CAN M-dimension torus M N ^{1/M} Neighbors: M Chord Ring log N Neighbors exponentially increasing: log N Symphony Ring (log^2 N)/k Neighbors and k remote Viceroy log N stacked rings log N Neighbors
8 Small World Model High clustering Regular Grid p=0 Large diameter Small World High clustering Low diameter p=1 Classic Random Network D. Watts and S. Strogatz, "Collective dynamics of small-world networks," Nature 393, 440 (1998). Low clustering Low diameter
9 Making a Small World Routable Kleinberg (2000) suggested a connection algorithm to make a ring routable: The ring is of unit circumference with N nodes. Each node has an address which represents its position on the ring. It is connected to its closest neighbor on each side, and one remote node. The probability that the remote node is at a distance L is p (L) ~ 1/L (one can generalize to allow k such connections). By following the path which takes you closest to the
10 The red nodes have connections to distance L with P(L) ~ 1/L A Routable Small World How can we show it is routable?
11 Greedy Routing Works The probability of connections going a distance d: P(d)=1/d log N What's the probability that a connection takes us to a distance less than d: P = d 1 d 1 x log N dx= log 1 log N Distance d Source Distance = d Destination
12 Greedy Routing Works How many such connections are needed to get close: How many nodes (M) do we need to get lucky L times: M P =L M=L log 1 log N log N log d log log N M= log 1 log Since we must be prepared for d = N, then: M = O(log^2 N) Distance d L d=log N L= log log N d log Source Distance = d Destination
13 Almost all are unstructured query networks! DHT Summary DHTs have nice theory associated with them, but they are not suited to all problems. There are many proposals to get poly log communications complexity. Small World systems (Chord, Symphony) are relatively easy to implement. DHTs are excellent in applications where a user knows EXACTLY the object he wants (a specific file, a specific user, a specific node, etc...) However, almost no real P2P systems are DHTs!
14 Unstructured Query Systems Many users will want to perform a search based on query strings and get results that are close to this query string. A user may wish to make a query which is an intersection of two queries: ( mp3 and SIZE > 3MB). Each object in the system might have many properties, and a query might match any subset of those properties. It is an open problem of how to find a way to map this generality onto DHTs.
15 Broadcast Query Systems In a broadcast query system, each node has some records. To query the network, the node sends a query to ALL neighbors. Each query has an identifying number, responses are routed back the way the query came. To query the entire system, a query will need to cross all edges (E), thus query cost is O(E) and E > N for all connected networks.
16 How do we make scalable query systems? Gnutella is popular protocol for file sharing which uses the unstructured query model. To attempt to solve the scalability problems, they introduced UltraPeers, which are nodes that keep copies of all the records of their LeafPeers. Now, each query costs O(U), if U is the number of UltraPeers. But, if U is a constant fraction of N, then query costs are still O(N), only the constant has changed. Can we do better if we take advantage of network structure?
17 Scale Free Networks Many large networks with interacting nodes, are what is called scale free networks, or power law networks. Many mechanisms have been suggested which can account for such degree distributions. Power law distributions are called scale free because of the following feature: P k = k 1/k P k = k = / k 1/k
18 Power Law Networks: WWW Paper Citations Social Networks File Sharing Networks Networks a. outgoing edge distribution α = 2.41 b. ingoing edge distribution α=2.1 c. diameter of network as function of size. A. Albert, H. Jeong, and A.-L. Barabási, Diameter of the World Wide Web, Nature,401, (1999).
19 Example Parameters from Real Networks (Newman, 2002)
20 Preferential Attachment A simple model which gives rise to a power law degree distribution was proposed by Barabasi, Albert At each time step, a new node joins and selects a node to connect to. The target node is selected with a probability proportional to its degree. The probability we select a node of degree k: Assuming a steady state solution, we want to write a difference equation for the number of nodes with degree k: n k =q k 1 q k k,1 n k = k 1 n k 1 k n k 2 k,1 k 2 n k = k 1 n k 1 k,1 4 n k = k k 1 k 2 1/k 3 q k = k n k 2
21 (Bond) Percolation Problem: If we have a graph and we delete each edge with probability (1 p), as a function of p, what is the size of the largest connected component?
22 Bond Percolation on Random Graphs (with generating functions) Suppose we have a random graph with a constrained degree distribution: p(k). Each node has a degree selected according to this distribution, but its edges are randomly connected. We use a generating function to represent this distribution: P x = k x k p k The mean is the first derivative at x=1: P ' x = k x k 1 k p k P ' 1 = k k p k = k If the random variable Z is the sum of independent random variables: Z = K_1 + K_ K_m, then the generating function is the product: Q x = z x z p z = P x =[P x ] m We can put this together to compute expected cluster sizes!
23 Doing the Calculation Write a consistency equation: Turn it into a generating function: m p C=q 1 m m 1 m l=1 C 1 q 0 k H x =q x m m p m k [ H x ]m 1 Use the generating function to get the mean: m p H ' x =q m m k [ H m m 1 p x m x ]m 1 m [H x ] m 2 H ' x k k k 1 H ' 1 =q 1 H ' 1 k q H ' 1 = k k 1 1 q k Hence we have a threshold on q where size diverges: q k k k 1
24 Details m p C=q 1 m m 1 m l=1 C 1 q 0 k H x =q x m m p m k [ H x ]m 1 m p H ' x =q m m k [H m m 1 p x m x ]m 1 m [ H x ] m 2 H ' x k m p H ' 1 =q m m k [H m m 1 p m 1 ]m 1 m [H 1 ] m 2 H ' 1 k m p H ' 1 =q m m k m m 1 p m m k k k 1 H ' 1 =q 1 H ' 1 k q H ' 1 = k k 1 1 q Threshold: q k k k 1 H ' 1
25 Percolation Thresholds for Example p k = Zeta 3 k 3 k =Zeta 2 /Zeta k 2 =Zeta 1 = q c = k k 2 k =0 p k = Zeta 4 k 4 k =Zeta 3 /Zeta k 2 =Zeta 2 = 2 6 q c = k k 2 k = Graphs What does this mean? p k = Zeta 3.5 k 3.5 k =Zeta 2.5 /Zeta k 2 =Zeta 1.5 =2.61 q c = k k 2 k =0.83 p k = 1 k k = 1 k 2 = q c = k k 2 k = 1 2 We can predict how many edges need to pass a packet to reach a constant fraction of the nodes!
26 Percolation in P2P (due to Nima Sarshar) With probability p we send the query to each neighbor. Each node that gets the query responds with any matches, and sends the query to each of his neighbors with probability p. How small can p be? It must be bigger than q_c!
27 Getting Poly log Scaling in Unstructured Query Systems Assume we have a random network of N nodes, and a degree distribution ~ 1/k^2. There is a maximum degree k_max (which is O(N)). We can get such a network using the protocol from Sarshar, Roychowdhury (PRE 2004) What is the cost of a percolation query at the threshold? C=q c E= q c k N p k = /k 2 2 k = log k max q c = log k max k max log k max C= log k max k max log k max N log k max k 2 = k max Hence we get only O(log^2 N) cost for each query! log 2 k max C= k max / N log k max / N k max =O N C log 2 N
28 Caching Records on High Degree Nodes In fact, in the previous result, we did not explain why sending so few copies of a query would ever reach the node which has a record matching the query. In order to make sure the query finds the record, we cache each record on high degree nodes. Each record is implanted into the network on a random walk path of length Log(N). One can show that it almost surely finds a node of degree k_max/2. One can show that the percolation query almost surely reaches all nodes of degree k_max/2 or greater A Percolation Query almost always finds at least one node from any random walk!
29 Simulation Results A percolation search protocol on a network of size 40,000 with degree distribution ~ 1/k^2 (grown from double preferential attachment).
30 Simulation Results A percolation search protocol on a Gnutella network of size 39,730. The network structure was obtained by Limewire's
31 Brunet: A Hybrid P2P System DHTs cannot resolve general queries. Unstructured systems (usually) require large routing tables to return query hits. Brunet is a new P2P protocol which combines the advantages of both DHTs and Unstructured Power law networks. Brunet offers a general P2P foundation on which a wide variety of protocols and applications can
32 Brunet: A Hybrid P2P System Each node has a 160 bit address which can also be thought of as a 160 bit positive integer. A distance metric using the integer representation. Each node is situated on a routable small world ring with structured connections to its neighbors on the ring, and shortcuts to remote locations. Each node also is on an unstructured network and has unstructured connections to other nodes on that power law network (p_k ~ 1/k^2) Structured Subgraph (small world) Unstructured Subgraph (1/k^2)
33 Brunet Protocol Details Each message on the Brunet system is represented by a packet. The packet has a source address, destination address, hops, time to live, and payload type in the header. The payload can contain arbitrary data. Packets are sent over Edges. An Edge can use any transport (currently we have TcpEdge and UdpEdge). The Address space is partitioned into 160 classes (each half as large as the previous). Some addresses are used for the DHT aspect of the system, some are used for the unstructured system. Some address classes represent unstructured destinations. To send a packet as a percolation message, the address class 126 is used. This class has 32 bits which specify the percolation probability. All Source addresses (currently) are structured addresses. This means nodes do not need to cache routes to particular nodes. Queries can always
34 Stability: How robust is the network to perturbation. We know that random node deletion will not cause problems, but there are many scenarios left to consider (e.g. attack, capacity issues, variance in Practical Issues In practice there are many issues yet to receive full analytic treatment: Firewalls: our protocol connects two nodes as long as one is not firewalled, but we have not analyzed what effects will be manifest as firewalled nodes dramatically increase in number. Bootstrapping: When the network is first forming, there are some interesting problems related to nodes finding their proper place. It is analogous to a distributed sorting algorithm. Convergence: Can we get a proof (including practical issues) that the network properties always converge to the desired properties.
35 Brunet Implementation The first implementation of the Brunet protocol is being completed at UCLA's Complex Networks Group. The code is developed using GNU/Linux and the Mono C# development environment. In addition to a programming library which implements the Brunet protocol, we have developed other tools: Netmodeler: a general C++ network modeling package Brunet Verifier: a protocol debugger for Brunet implementations
36 Open Problems Can the DHT or unstructured systems be used to build an improved model of distributed computing (e.g. how can these P2P models help in mapping task graphs onto resources)? What common primitives can be implemented using P2P systems? (e.g. what kinds of communications costs are incurred building a P2P Database?) What results can be obtained about protocol
37 Summary Using models inspired from social contexts (such as small world and power law networks) we see how some computer networking systems and architectures can be improved. Statistical Mechanics tools (percolation) allow us to analyze some novel networking conditions. By engineering previously ignored structural details of P2P systems, poly log scaling is achieved. The Brunet P2P system puts the DHT model together with the percolation search to get state of the art scaling properties.
Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems
Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationBayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination
Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves
More informationP2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili
P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Description of CHORD s Location and routing mechanisms Symphony: Distributed
More informationPeer-to-peer networks: pioneers, self-organisation, small-world-phenomenons
Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................
More informationMaking Gnutella-like P2P Systems Scalable
Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationPeer-To-Peer Techniques
PG DynaSearch Markus Benter 31th October, 2013 Introduction Centralized P2P-Networks Unstructured P2P-Networks Structured P2P-Networks Misc 1 What is a Peer-to-Peer System? Definition Peer-to-peer systems
More informationarxiv: v1 [cs.dc] 25 Sep 2007
arxiv:0709.4048v1 [cs.dc] 25 Sep 2007 A Symphony Conducted by BruNet P. Oscar Boykin Department of Electrical and Computer Engineering University of Florida Joseph S. Kong Electrical Engineering Department
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationCPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University
CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet
More informationP2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili
P2P Network Structured Networks: Distributed Hash Tables Pedro García López Universitat Rovira I Virgili Pedro.garcia@urv.net Index Introduction to DHT s Origins of structured overlays Case studies Chord
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationA SCALABLE AND FLEXIBLE UNSTRUCTURED SEARCH SYSTEM AND DISTRIBUTED DATA STRUCTURES FOR PEER-TO-PEER NETWORKS
A SCALABLE AND FLEXIBLE UNSTRUCTURED SEARCH SYSTEM AND DISTRIBUTED DATA STRUCTURES FOR PEER-TO-PEER NETWORKS By TAE WOONG CHOI A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA
More information08 Distributed Hash Tables
08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per
More informationPlan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks
Plan of the lecture I. INTRODUCTION I. Networks: definitions, statistical characterization, examples II. Modeling frameworks II. DYNAMICAL PROCESSES I. Resilience, vulnerability II. Random walks III. Epidemic
More informationKademlia: A P2P Informa2on System Based on the XOR Metric
Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg
More informationFlooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9
Peer-to-Peer Networks -: Computer Networking L-: PP Typically each member stores/provides access to content Has quickly grown in popularity Bulk of traffic from/to CMU is Kazaa! Basically a replication
More informationMotivation. The Impact of DHT Routing Geometry on Resilience and Proximity. Different components of analysis. Approach:Component-based analysis
The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Karthik Lakshminarayanan at P2P Systems class (Slides liberally borrowed from Krishna s SIGCOMM talk) Krishna Gummadi, Ramakrishna
More informationThe Impact of DHT Routing Geometry on Resilience and Proximity. Acknowledgement. Motivation
The Impact of DHT Routing Geometry on Resilience and Proximity Presented by Noorullah Moghul Krishna Gummadi, Ramakrishna Gummadi, Sylvia Ratnasamy, Steve Gribble, Scott Shenker, Ion Stoica Acknowledgement
More information(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich
(Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [P2P SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Byzantine failures vs malicious nodes
More informationSymphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World
Distributed Hashing in a Small World Gurmeet Singh Manku Stanford University with Mayank Bawa and Prabhakar Raghavan Acknowledgement The following slides are borrowed from the author s talk at USITS 2003.
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationLECT-05, S-1 FP2P, Javed I.
A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer
More informationPage 1. How Did it Start?" Model" Main Challenge" CS162 Operating Systems and Systems Programming Lecture 24. Peer-to-Peer Networks"
How Did it Start?" CS162 Operating Systems and Systems Programming Lecture 24 Peer-to-Peer Networks" A killer application: Napster (1999) Free music over the Internet Key idea: share the storage and bandwidth
More informationPeer-to-Peer Internet Applications: A Review
Peer-to-Peer Internet Applications: A Review Davide Quaglia 01/14/10 Introduction Key points Lookup task Outline Centralized (Napster) Query flooding (Gnutella) Distributed Hash Table (Chord) Simulation
More informationECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks
ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web
More informationNick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell
Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when
More informationCSCI5070 Advanced Topics in Social Computing
CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of
More informationResilient Networking. Thorsten Strufe. Module 3: Graph Analysis. Disclaimer. Dresden, SS 15
Resilient Networking Thorsten Strufe Module 3: Graph Analysis Disclaimer Dresden, SS 15 Module Outline Why bother with theory? Graphs and their representations Important graph metrics Some graph generators
More informationSmall-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov
Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:
More informationKademlia: A peer-to peer information system based on XOR. based on XOR Metric,by P. Maymounkov and D. Mazieres
: A peer-to peer information system based on XOR Metric,by P. Maymounkov and D. Mazieres March 10, 2009 : A peer-to peer information system based on XOR Features From past p2p experiences, it has been
More informationFast Topology Management in Large Overlay Networks
Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology
More informationNetwork Mathematics - Why is it a Small World? Oskar Sandberg
Network Mathematics - Why is it a Small World? Oskar Sandberg 1 Networks Formally, a network is a collection of points and connections between them. 2 Networks Formally, a network is a collection of points
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationP2P: Distributed Hash Tables
P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)
More informationOverlay and P2P Networks. Unstructured networks. PhD. Samu Varjonen
Overlay and P2P Networks Unstructured networks PhD. Samu Varjonen 25.1.2016 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationKleinberg s Small-World Networks. Normalization constant have to be calculated:
Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)
More informationA Generating Function Approach to Analyze Random Graphs
A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation
More informationarxiv:cond-mat/ v1 [cond-mat.dis-nn] 7 Jun 2004
Scalable Percolation Search in Power Law Networks arxiv:cond-mat/04065v [cond-mat.dis-nn] 7 Jun 004 Nima Sarshar, P. Oscar Boykin, and Vwani Roychowdhury Department of Electrical Engineering, University
More informationPeer-to-Peer Networks Pastry & Tapestry 4th Week
Peer-to-Peer Networks Pastry & Tapestry 4th Week Department of Computer Science 1 Peer-to-Peer Networks Pastry 2 2 Pastry Peter Druschel Rice University, Houston, Texas now head of Max-Planck-Institute
More informationSNA 8: network resilience. Lada Adamic
SNA 8: network resilience Lada Adamic Outline Node vs. edge percolation Resilience of randomly vs. preferentially grown networks Resilience in real-world networks network resilience Q: If a given fraction
More informationSmall-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd
Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Ken Y.K. Hui John C. S. Lui David K.Y. Yau Dept. of Computer Science & Engineering Computer Science Department The Chinese
More informationBadri Nath Rutgers University
lookup services Badri Nath Rutgers University badri@cs.rutgers.edu 1. CAN: A scalable content addressable network, Sylvia Ratnasamy et.al. SIGCOMM 2001 2. Chord: A scalable peer-to-peer lookup protocol
More informationPEER-TO-PEER (P2P) systems are now one of the most
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 15 Enhancing Peer-to-Peer Systems Through Redundancy Paola Flocchini, Amiya Nayak, Senior Member, IEEE, and Ming Xie Abstract
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationGraph Algorithms. Many problems in networks can be modeled as graph problems.
Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm - Efficient
More information6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks
, University of Hannover Random Graphs, Small-Worlds, and Scale-Free Networks Wolf-Tilo Balke and Wolf Siberski 05.12.07 * Original slides provided by K.A. Lehmann (University Tübingen, Germany) 6. Overview
More informationPeer-to-Peer Networks 15 Self-Organization. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 15 Self-Organization Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Gnutella Connecting Protokoll - Ping Ping participants query
More informationMinimizing Churn in Distributed Systems
Minimizing Churn in Distributed Systems by P. Brighten Godfrey, Scott Shenker, and Ion Stoica appearing in SIGCOMM 2006 presented by Todd Sproull Introduction Problem: nodes joining or leaving distributed
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationReCord: A Distributed Hash Table with Recursive Structure
ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-
More informationContent Overlays. Nick Feamster CS 7260 March 12, 2007
Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not
More informationPeer-to-Peer Data Management
Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 10. Networkmodels 1. Introduction Motivation
More informationGoals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.
Goals CS : Introduction to Computer Networks Overlay Networks and PP Networks Ion Stoica Computer Science Division Department of lectrical ngineering and Computer Sciences University of California, Berkeley
More informationOverlay and P2P Networks. Unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Unstructured networks Prof. Sasu Tarkoma 19.1.2015 Contents Unstructured networks Last week Napster Skype This week: Gnutella BitTorrent P2P Index It is crucial to be able to find
More informationConstructing Overlay Networks through Gossip
Constructing Overlay Networks through Gossip Márk Jelasity Università di Bologna Project funded by the Future and Emerging Technologies arm of the IST Programme The Four Main Theses 1: Topology (network
More information*Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server Peer-to-Peer.
More informationInformation Retrieval in Peer to Peer Systems. Sharif University of Technology. Fall Dr Hassan Abolhassani. Author: Seyyed Mohsen Jamali
Information Retrieval in Peer to Peer Systems Sharif University of Technology Fall 2005 Dr Hassan Abolhassani Author: Seyyed Mohsen Jamali [Slide 2] Introduction Peer-to-Peer systems are application layer
More informationON COVERAGE BOUNDS OF UNSTRUCTURED PEER-TO-PEER NETWORKS
Advances in Complex Systems, Vol. 14, No. 4 (211) 611 633 c World Scientific Publishing Company DOI: 1.1142/S2195259113141 ON COVERAGE BOUNDS OF UNSTRUCTURED PEER-TO-PEER NETWORKS JOYDEEP CHANDRA and NILOY
More informationNetwork Thinking. Complexity: A Guided Tour, Chapters 15-16
Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/
More informationMAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds
MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in
More informationPeer-to-Peer Systems and Security IN2194. Chapter 1 Peer-to-Peer Systems 1.3 Structured Networks
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Peer-to-Peer Systems and Security IN2194 Chapter 1 Peer-to-Peer Systems 1.3 Structured Networks Prof. Dr.-Ing.
More informationLocality in Structured Peer-to-Peer Networks
Locality in Structured Peer-to-Peer Networks Ronaldo A. Ferreira Suresh Jagannathan Ananth Grama Department of Computer Sciences Purdue University 25 N. University Street West Lafayette, IN, USA, 4797-266
More informationDistributed Hash Tables (DHT)
Distributed Hash Tables (DHT) Jukka K. Nurminen Aalto University *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen) The Architectures of st and nd Gen. PP Client-Server
More informationOverlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma
Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs
More informationDegree Optimal Deterministic Routing for P2P Systems
Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup
More informationEffect of Links on DHT Routing Algorithms 1
Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn
More informationCS514: Intermediate Course in Computer Systems
Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed
More informationAdaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies
Adaptive Routing of QoS-Constrained Media Streams over Scalable Overlay Topologies Gerald Fry and Richard West Boston University Boston, MA 02215 {gfry,richwest}@cs.bu.edu Introduction Internet growth
More informationRandomized Algorithms for Network Security and Peer-to-Peer Systems
Randomized Algorithms for Network Security and Peer-to-Peer Systems Micah Adler University of Massachusetts, Amherst Talk Outline Probabilistic Packet Marking for IP Traceback Network Security Appeared
More informationAdvanced Computer Networks
Advanced Computer Networks P2P Systems Jianping Pan Summer 2007 5/30/07 csc485b/586b/seng480b 1 C/S vs P2P Client-server server is well-known server may become a bottleneck Peer-to-peer everyone is a (potential)
More informationDistributed Information Processing
Distributed Information Processing 14 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2016 Eom, Hyeonsang All Rights Reserved Outline
More informationAn Expresway over Chord in Peer-to-Peer Systems
An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An
More informationCIS 700/005 Networking Meets Databases
Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable
More informationPhase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility
Phase Transitions in Random Graphs- Outbreak of Epidemics to Network Robustness and fragility Mayukh Nilay Khan May 13, 2010 Abstract Inspired by empirical studies researchers have tried to model various
More informationExercise set #2 (29 pts)
(29 pts) The deadline for handing in your solutions is Nov 16th 2015 07:00. Return your solutions (one.pdf le and one.zip le containing Python code) via e- mail to Becs-114.4150@aalto.fi. Additionally,
More information: Scalable Lookup
6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be
More informationUnderstanding Disconnection and Stabilization of Chord
Understanding Disconnection and Stabilization of Chord Zhongmei Yao Joint work with Dmitri Loguinov Internet Research Lab Department of Computer Science Texas A&M University, College Station, TX 77843
More informationECE 158A - Data Networks
ECE 158A - Data Networks Homework 2 - due Tuesday Nov 5 in class Problem 1 - Clustering coefficient and diameter In this problem, we will compute the diameter and the clustering coefficient of a set of
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationDistributed lookup services
Distributed lookup services lookup services Badri Nath Rutgers University badri@cs.rutgers.edu A set of nodes cooperating Peers Run special purpose algorithms/software Doesn t have to be deployed at every
More information6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model
6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model Daron Acemoglu and Asu Ozdaglar MIT September 23, 2009 1 Outline Generalized random graph models Graphs with prescribed
More informationDebunking some myths about structured and unstructured overlays
Debunking some myths about structured and unstructured overlays Miguel Castro Manuel Costa Antony Rowstron Microsoft Research, 7 J J Thomson Avenue, Cambridge, UK Abstract We present a comparison of structured
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationPeer to Peer I II 1 CS 138. Copyright 2015 Thomas W. Doeppner, Rodrigo Fonseca. All rights reserved.
Peer to Peer I II 1 Roadmap This course will feature key concepts in Distributed Systems, often illustrated by their use in example systems Start with Peer-to-Peer systems, which will be useful for your
More informationGraph Algorithms. Many problems in networks can be modeled as graph problems.
Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm
More informationImpact of Clustering on Epidemics in Random Networks
Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction
More informationPeer to Peer Networks
Sungkyunkwan University Peer to Peer Networks Prepared by T. Le-Duc and H. Choo Copyright 2000-2017 Networking Laboratory Presentation Outline 2.1 Introduction 2.2 Client-Server Paradigm 2.3 Peer-To-Peer
More informationPeer to peer systems: An overview
Peer to peer systems: An overview Gaurav Veda (Y1148) gveda@cse.iitk.ac.in Computer Science & Engineering Indian Institute of Technology Kanpur, UP, INDIA - 208016 Abstract Peer-to-peer (p2p) systems is
More informationSmall World Overlay P2P Networks
Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.
More information15-744: Computer Networking P2P/DHT
15-744: Computer Networking P2P/DHT Overview P2P Lookup Overview Centralized/Flooded Lookups Routed Lookups Chord Comparison of DHTs 2 Peer-to-Peer Networks Typically each member stores/provides access
More informationEnabling Dynamic Querying over Distributed Hash Tables
Enabling Dynamic Querying over Distributed Hash Tables Domenico Talia a,b, Paolo Trunfio,a a DEIS, University of Calabria, Via P. Bucci C, 736 Rende (CS), Italy b ICAR-CNR, Via P. Bucci C, 736 Rende (CS),
More informationOn Static and Dynamic Partitioning Behavior of Large-Scale Networks
On Static and Dynamic Partitioning Behavior of Large-Scale Networks Derek Leonard Department of Computer Science Texas A&M University College Station, TX 77843 27th October 2005 Derek Leonard On Static
More informationOverlay (and P2P) Networks
Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationA Framework for Peer-To-Peer Lookup Services based on k-ary search
A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology
More informationDHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have..
DHT Overview P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar DHTs provide a simple primitive put (key,value) get (key) Data/Nodes distributed over a key-space High-level idea: Move
More information