Survey of DHT Evaluation Methods
|
|
- Rudolf Thomas
- 5 years ago
- Views:
Transcription
1 Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Abstract In this paper, we present an overview of factors affecting the performance of the DHT-algorithms and give examples of how these factors have been measured from the DHT algorithms. We analyse the strengths and weaknesses of evaluation methods that are based on simulation, and make observations on the growing importance of globally distributed testbeds such as PlanetLab. We conclude that the best evaluation method of DHT is depends on the intended application for the DHT. KEYWORDS: DHT evaluation, P2PSIP 1 Introduction Peer-to-peer (P2P) networks have existed already for several years. The early systems were designed for file-sharing, but in recent years also other types of communication needs, such as Voice over Internet Protocol (VoIP) and streaming video content over the Internet, have been deployed with these technologies. Commercial applications using these technologies already exist, such as Skype [4] and P2PSIP Core Development Kit [1]. Often communication protocols are not standardized and thus applications providing essentially the same service are unable to communicate between each other. There is ongoing standardisation work at the Internet Engineering Task Force(IETF) working group called Peer-to-Peer Session Initiation Protocol(P2PSIP) [2]. The working group is set up to develop a protocol, that could be used to store and retrieve information on a network formed by peers. We refer to this network as a P2PSIP overlay. The goal of the working group is to submit P2PSIP Peer Protocol document to the IESG July 2008 [2], but the development work around the protocol is likely to continue many years forward. At present there are several competing proposal for the P2PSIP protocol. All of the proposals are using a Distributed Hash Table(DHT) algorithm as the key component for making routing decisions between the nodes of a P2PSIP overlay. For example, the DHT algorithm determine how the next hop on the route of a message is selected, and how the overlay changes as a result of nodes joining and leaving. The choice of a DHT algorithm can have a significant effect on the overall performance of the overlay. 1.1 Evaluating Distributed Hash Table Algorithms The basic function of any DHT is to map a key provided by the user to an identifier of a node in the overlay. The overlay consists of nodes, hereinafter called as peers. In order to retrieve the key associated value, a DHT provides a primitive called lookup. Lookup is a query send to the overlay and routed towards the node which is responsible for that portion of the key address space the key belongs to. If the associated value is found, it is then routed back to the initiator of the lookup. The first four DHT algorithms: Chord [21], CAN [17], Pastry [20] and Tapestry [22] were introduced roughly at the same time and the research related to the algorithms has continued active since then. Previous work has evaluated DHTs based on how well they handle churn [19], how fast they perform lookups [22], how well they are suited for interpersonal communication [9] and what the effect of overlays topology is [8]. In addition to these metrics, the DHTs can be evaluated based on how much maintenance traffic they generate, how many connections they create, etc. In this paper we focus on two of these metrics, the amount of the maintenance traffic and the length of the lookup latency. The DHTs can be evaluated from performance point of view by analysing them mathematically [16, 13], by using simulations [10, 8, 19, 11], by running experiments on existing implementations of the algorithms in laboratory networks [19], or by running the experiments over the Internet. The DHTs can also be evaluated based on how well they perform in specific task [9]. Simulations can be used to verify the correctness of the algorithm. Besides that, they can be used for determining the theoretical scalability, bandwith usage, and lookup performance. Simulations allow tests to be made in a scale that would be impractical or even impossible with actual systems. However, using simulators requires time and effort, both in terms of setting up the simulations and in terms of running them. In addition to this, most of the currently available simulators provide very limited means to collect statistics of the simulations [15]. Most of the reviewed simulators [15] did not provide means to tune the parameters of the network layer. However, in real network environments, packets may be lost or delayed and are thus not correctly modelled in the reviewed simulators. In order to get more reliable results, the measurements should be made in large scale using real nodes instead of simulations. The measurements could be made for example by deploying the DHT implementations in the nodes of the PlanetLab [3]. The PlanetLab is network of geographi-
2 cally distributed servers that provide users an opportunity to test the functionality of their applications at a global scale. Therefore it has been frequently used [5, 18, 12, 6] to provide performance data of DHT algorithms. PlanetLab reveals the performance bottlenecks of DHTs by introducing nodes with poor performance and slow response time [18]. 1.2 Handling Churn in DHTs There are several factors that affect the overall performance of a DHT. One of the most important ones, in terms of lookup time and correctness of lookups, is how well the DHT handles churn. The three most important factors identified in the study [19] by Rhea et al. are: Figure 1: The effect of PNS [19] reactive versus periodic recovery from failures calculation of message timeouts during lookups choice of nearby over distant neighbors Reactive recovery [19] means that a node in the network tries to find a replacement for a failed node immediately after it has detected that one of its neighbors has failed. In contrast, when using periodic recovery, node updates its neighbor information with periodic fixed interval. The study shows that periodic recovery improves the performance by reducing the amount of overlay maintenance traffic. Request are often sent to nodes that do not respond immediately and therefore appear to have left the overlay. In such cases, re-sending the request after a short timeout to an alternative node in the message path may not be the best solution, since the original query may not yet have reached the recipient, the message may still be in processing, or the reply is on the way back. In such cases creating a new query would just generate unnecessary traffic on the overlay. Broken links can be easily created by trusting blindly on the neighbor table information received from closest neighbours. The connectivity to the new nodes should be always checked before adding them to nodes own neighbour table [7]. Some of the DHTs implement a technique called Proximity Neighbor Selection(PNS), which is a process of choosing a neighbor among the potential neighbors for any given routing table entry according to their network latency to the choosing node. The study by Rhea et al. [19] suggest that using a small amount of technique called global sampling is necessary to achieve near optimal PNS. The use of suitable amount of PNS can improve lookup results, and bring performance gains with little or no increase in bandwith consumption, as can be seen in Figure 1. 2 How to Measure Performance 2.1 Comparing the Amount of Signaling Data Desired feature in any DHT algorithm is to keep the the amount of maintenance traffic at a minimum. When the algorithm is used in bandwith limited environment, such as Figure 2: Bandwith vs. lookup latency [11] mobile network, every byte is important. The calculations should also include the amount of traffic that is needed to keep the nodes data up to date [11]. Simulations have shown that there is no major differences in the lookup times of the algorithms, if the algorithms are allowed to use unlimited bandwith for the maintenance operations [11]. Typically the DHT algorithm generates a lot of traffic in the Join process, when the joining node exchanges routing and neighbour table information with its neighbors. After this initial exchange, the number of routing table entries (base) and the stabilization interval have the most decisive effect on the amount of generated data. The reason for this is that on every stabilization the node updates its routing table pointers and more entries means more traffic [11]. 2.2 Comparing Lookup-time The user of a DHT is naturally interested in the lookup time as the main indicator of the system efficiency. The DHT lookup can be compared to the use of a search engine, such as Google. Since all DHTs basically provide the same service, the user naturally, will want to use the fastest one. Reaching faster lookup times often means higher bandwith consumption, and vice versa as can be seen in the Figure 2. Typically, lookup time has been evaluated by running simulations of several DHTs and tweaking their parameters in order to reach faster lookup times[11, 10]. Some of the nodes in the PlanetLab are quite slow [18], which will make all lookups that go through those nodes
3 appear extremely slow also. Therefore it is important to use use techniques such as global sampling in order to prevent accepting neighbors that are behind slow links. In global sampling, the lookup functionality of a DHT is used to find new neighbors. Rhea et al. [19] describe the technique like this: "for a routing table entry that requires a neighbor with prefix p, we perform a lookup for a random identifier with prefix p. The node returned by this lookup will almost always have the desired prefix." Another scheme, proposed by Ratnasamy et al. [17], that is used in CAN DHT for PNS is called Landmark ordering. In this scheme the joining node measure its latency to few well known nodes in the overlay and based on this data orders the landmarks in order of increasing Round Trip Time(RTT). The RTT is measured by sending a message to a destination node and measuring the time from sending to the moment the sender has received a response. In CAN DHT a new node utilises its landmark ordering information by joining at random point in the portition of the coordinate space associated with its landmark ordering. 3 Factors Affecting Suitability for Interpersonal Communication DHTs can be evaluated from the viewpoint of interpersonal communication. This means that some characteristics are required in order to make the communication possible for example in mobile environment. In the Figure 3 Hautakorpi et al. [9] have gathered eleven factors that should be considered when choosing a DHT to be used in communication application: Lookup methods Parallel lookups Proximity support Graceful departure Replication & caching Complexity Bandwith consumption Node join & departure Configuration parameters Extendability Notification framework We will now go through few of them to see why these factors are so important. By lookup methods the authors refer into three different ways messages are delivered between the peers of an overlay. These methods are presented in the Figure 4. The simplest way which is generally supported by all of the DHTs is to use iterative routing. This means that during lookup when node A wants to lookup node R, the Figure 4: Routing methods query is first send to the closest node the sender knows which we shall call node B. Node B then replies with the address of which will reply with the address of a even closer node to the destination, which we shall call node C. Now node A makes a new query to the node C, which will reply with a closer match. This activity is carried out until the node R is found, or some intermediary node will determine, that there is no closer match, and the lookup fails. Some DHTs also support recursive routing, which differs from iterative routing in a way that the intermediary nodes forward the messages directly to the closest node they know instead of sending the address of the closest node back to the sender. In this method, the replies are routed back the same path back to the sender. The third method called semi-recursive routing differs from the recursive routing in a way that the replies are send directly back from the destination node to the sender node without going through the intermediate nodes that were on the message path. The iterative and semi-recursive method are not directly applicable in environments where Network Address Translation(NAT) is being used. The semi-recursive method should provide the shortest lookup delays out of these three methods, under assumption that the connections between the nodes are already established. Bandwith consumption is another important factor when it comes to running the algorithm in mobile devices, since every transaction consumes energy and mobile devices typically run on battery [9]. 4 Future Work We are planning to implement Chord and CAN algorithms using C programming language on the Linux platform and in later stage on mobile devices. The performance measurements will be run on both, the nodes of the laboratory test bed, as well as the nodes of the PlanetLab. The evaluation of DHTs will be done from the viewpoint of interpersonal communication. In later stage we are planning to expand our prototype with support to Kademlia DHT [14]. We are trying to determine how well the selected DHTs perform in environment, where NATs or bandwith limitations are present. There is an ongoing discussion in the
4 Figure 3: Feature comparison of DHT algorithms [9] P2PSIP working group [2] of whether a P2PSIP protocol standard should define a default DHT algorithm that must be present at all the protocol implementations. The results of our evaluation work could be used for making the decision on the default DHT. 5 Conclusions In this paper, we have summarized the methods that have been used for evaluating DHTs, and provided justification for some of the evaluation criteria. We discovered that most of the evaluation results so far have been obtained by using simulations. Lately globally distributed testbeds such as PlanetLab are gaining momentum as provider of reliable results. We also discussed the factors that are relevant when measuring the performance of DHT implementations to be used in interpersonal communication, and concluded that lookup time and bandwith usage both play an important role from users perspective. The upcoming P2PSIP protocol will surely increase the interest towards DHT development outside academia. The best evaluation method depends on the intended application for the DHT. In file sharing applications, multiple copies and stale data is not such a big problem, but when using DHT to store SIP contact information, these factors have significant importance. References [1] P2psip core development kit. sipeerior.com/products.php. Referenced [2] P2psip working group. html.charters/p2psip-charter.html. Referenced [3] Planelab. Referenced [4] Skype. Referenced [5] F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek,, and R. Morris. Designing a dht for low latency and high throughput. In USENIX 04: Proceedings of the First Symposium on Networked Systems Design and Implementation, March [6] J. Falkner, M. Piatek, J. P. John, A. Krishnamurthy, and T. Anderson. Profiling a million user dht. In IMC 07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages , New York, NY, USA, ACM. [7] M. J. Freedman, K. Lakshminarayanan, S. Rhea, and I. Stoica. Non-transitive connectivity and DHTs. In WORLDS 05: Proceedings of the Second Workshop on Real, Large Distributed Systems, December [8] K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of DHT routing geometry on resilience and proximity. In SIGCOMM 03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [9] J. Hautakorpi and G. Camarillo. Evaluation of DHTs from the viewpoint of interpersonal communications.
5 In MUM 07: Proceedings of the 6th international conference on Mobile and ubiquitous multimedia, pages 74 83, New York, NY, USA, ACM. [10] D. Kato and T. Kamiya. Evaluating DHT implementations in complex environments by network emulator. In IPTPS 07: Proceedings of the 6th International Workshop on Peer-to-Peer Systems, Bellevue, WA, USA, February [11] J. Li, J. Stribling, T. M. Gil, R. Morris, and M. F. Kaashoek. Comparing the performance of distributed hash tables under churn. In IPTPS 04: Proceedings of the 3rd International Workshop on Peer-to-Peer Systems, San Diego, CA, USA, February [12] J. Li, J. Stribling, R. Morris, M. Kaashoek, and T. Gil. A performance vs. cost framework for evaluating DHT design tradeoffs under churn. In INFOCOM 2005: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, [20] A. I. T. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for largescale peer-to-peer systems. In Middleware 01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pages , London, UK, Springer-Verlag. [21] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM 01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [22] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical report, Berkeley, CA, USA, April [13] D. Liben-Nowell, H. Balakrishnan, and D. Karger. Analysis of the evolution of peer-to-peer systems. In PODC 02: Proceedings of the twenty-first annual symposium on Principles of distributed computing, pages , New York, NY, USA, ACM. [14] P. Maymounkov and D. Mazières. Kademlia: A peerto-peer information system based on the XOR metric. In IPTPS 01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pages 53 65, London, UK, Springer-Verlag. [15] S. Naicken, B. Livingston, A. Basu, S. Rodhetbhai, I. Wakeman, and D. Chalmers. The state of peer-topeer simulators and simulations. SIGCOMM Comput. Commun. Rev., 37(2):95 98, [16] D. Qiu and R. Srikant. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM 04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [17] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In SIGCOMM 01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [18] S. Rhea, B. Chun, J. Kubiatowicz, and S. Shenker. Fixing the embarrassing slowness of OpenDHT on planetlab. In WORLDS 05: Proceedings of the Second Workshop on Real, Large Distributed Systems, December [19] S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz. Handling churn in a DHT. In Proceedings of the USENIX 2004 Annual Technical Conference, Boston, MA, USA, June 2004.
Building a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationMULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK
116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi
More informationA Super-Peer Based Lookup in Structured Peer-to-Peer Systems
A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University
More informationR/Kademlia: Recursive and Topology-aware Overlay Routing
R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the
More informationScalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou
Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization
More informationComparing the performance of distributed hash tables under churn
Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory
More informationShould we build Gnutella on a structured overlay? We believe
Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured
More informationA Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables
A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,
More informationPERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS
International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury
More informationAthens University of Economics and Business. Dept. of Informatics
Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service
More informationImplications of Neighbor Selection on DHT Overlays
Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract
More informationFaster Content Access in KAD
Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)
More informationE. Shim Panasonic October 16, 2006
SIPPING WG Internet-Draft Expires: April 19, 2007 S. Baset H. Schulzrinne Columbia University E. Shim Panasonic October 16, 2006 Status of this Memo A Protocol for Implementing Various DHT Algorithms draft-baset-sipping-p2pcommon-00
More informationUC Berkeley UC Berkeley Previously Published Works
UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationA Method for Designing Proximity-aware Routing Algorithms for Structured Overlays
A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo, JAPAN Email:
More informationImplementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar
Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Jean-François Wauthy FUNDP - The University of Namur jfwauthy@student.fundp.ac.be Laurent Schumacher FUNDP - The University
More informationDistributed Hash Table
Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ
More informationP2P: Distributed Hash Tables
P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)
More informationDRing: A Layered Scheme for Range Queries over DHTs
DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,
More informationA Directed-multicast Routing Approach with Path Replication in Content Addressable Network
2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationIntelligent Neighbor Selection in P2P with CapProbe and Vivaldi
1 Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi Michael Parker, Amir Nader-Tehrani, Alok Nandan, Giovanni Pau Computer Science Department University of California Los Angeles Los Angeles,
More informationDynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others
Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel
More informationFault Resilience of Structured P2P Systems
Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2
More informationRelaxing Routing Table to Alleviate Dynamism in P2P Systems
Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,
More informationUnderstanding Chord Performance
CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system
More informationEvolution of Peer-to-peer algorithms: Past, present and future.
Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different
More informationSurvive Under High Churn in Structured P2P Systems: Evaluation and Strategy
Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing
More informationTinyTorrent: Implementing a Kademlia Based DHT for File Sharing
1 TinyTorrent: Implementing a Kademlia Based DHT for File Sharing A CS244B Project Report By Sierra Kaplan-Nelson, Jestin Ma, Jake Rachleff {sierrakn, jestinm, jakerach}@cs.stanford.edu Abstract We implemented
More informationStructured Peer-to-Peer Networks
Structured Peer-to-Peer Networks The P2P Scaling Problem Unstructured P2P Revisited Distributed Indexing Fundamentals of Distributed Hash Tables DHT Algorithms Chord Pastry Can Programming a DHT Graphics
More informationDorina Luminiţa COPACI, Constantin Alin COPACI
THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and
More informationAn Efficient and Secure Peer-to-Peer Overlay Network
An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,
More informationDefending against Eclipse attacks on overlay networks
Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract
More informationA Framework for Peer-To-Peer Lookup Services based on k-ary search
A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology
More informationA Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery
A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca
More informationPAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables
IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,
More informationDesign of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem
Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois
More informationLocation Efficient Proximity and Interest Clustered P2p File Sharing System
Location Efficient Proximity and Interest Clustered P2p File Sharing System B.Ajay Kumar M.Tech, Dept of Computer Science & Engineering, Usharama College of Engineering & Technology, A.P, India. Abstract:
More informationProviding Administrative Control and Autonomy in Structured Peer-to-Peer Overlays
Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide
More informationDYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS
DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,
More informationAn Agenda for Robust Peer-to-Peer Storage
An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a
More informationSubway : Peer-To-Peer Clustering of Clients for Web Proxy
Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More informationExploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks
Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract
More informationPublication III. c 2010 IEEE. Reprinted with permission.
Publication III Jouni Mäenpää and Jaime Jiménez Bolonio. Performance of REsource LOcation And Discovery (RELOAD) on Mobile Phones. In 2010 IEEE Wireless Communications and Networking Conference (WCNC),
More informationTime-related replication for p2p storage system
Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,
More informationLarge-Scale Monitoring of DHT Traffic
Large-Scale Monitoring of DHT Traffic Ghulam Memon, Reza Rejaie University of Oregon {gmemon, reza}@cs.uoregon.edu Yang Guo Corporate Research, Thomson Yang.Guo@thomson.net Daniel Stutzbach Stutzbach Enterprises
More informationHyCube: A distributed hash table based on a hierarchical hypercube geometry
HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents
More informationImpact of Neighbor Selection on Performance and Resilience of Structured P2P Networks
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Byung-Gon Chun, Ben Y. Zhao 2, and John D. Kubiatowicz Computer Science Division, U.C. Berkeley {bgchun, kubitron}@cs.berkeley.edu
More informationMill: Scalable Area Management for P2P Network based on Geographical Location
Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School
More informationShaking Service Requests in Peer-to-Peer Video Systems
Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract
More informationPChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity
546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and
More informationReCord: A Distributed Hash Table with Recursive Structure
ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-
More informationDistriubted Hash Tables and Scalable Content Adressable Network (CAN)
Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................
More informationStructured Peer-to-Peer Overlays Need Application-Driven Benchmarks
Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks Sean Rhea, Timothy Roscoe, and John Kubiatowicz IRB-TR-3-2 February, 23 Proceedings of the 2 nd International Peer-to-Peer Systems Workshop
More informationImplementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables
Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Nuno Lopes and Carlos Baquero CCTC-Department of Informatics University of Minho Braga, Portugal Abstract. Range
More informationFPN: A Distributed Hash Table for Commercial Applications
FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed
More informationDATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems
LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable
More informationThe Lonely NATed Node
The Lonely NATed Node Chad Yoshikawa University of Cincinnati yoshikco@ececs.uc.edu Brent Chun Intel Research Berkeley bnc@intel-research.net Amin Vahdat U.C. San Diego vahdat@cs.ucsd.edu Abstract In this
More informationSecurity Considerations for Peer-to-Peer Distributed Hash Tables
Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.
More informationCTracker: a Distributed BitTorrent Tracker Based on Chimera
CTracker: a Distributed BitTorrent Tracker Based on Chimera Raúl JIMÉNEZ, Björn KNUTSSON Kungliga Tekniska högskolan, Isafjordsgatan 39, Stockholm, 164 40, Sweden Tel: +46 8 790 42 85, Fax: +46 8 751 17
More informationApplication Layer Multicast For Efficient Peer-to-Peer Applications
Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology
More informationScalable and Self-configurable Eduroam by using Distributed Hash Table
Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,
More informationA LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING *
A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING * Nadeem Abdul Hamid Berry College 2277 Martha Berry Hwy. Mount Berry, Georgia 30165 (706) 368-5632 nadeem@acm.org ABSTRACT Peer-to-peer systems (P2P)
More informationOverlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q
Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs
More informationBOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS
BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de
More informationCongestion Control for Distributed Hash Tables
Congestion Control for Distributed Hash Tables Fabius Klemm, Jean-Yves Le Boudec, and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne,
More informationPerformance Modelling of Peer-to-Peer Routing
Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk
More informationEffects of Churn on Structured P2P Overlay Networks
International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks
More informationProblems in Reputation based Methods in P2P Networks
WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics
More informationDiscovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology
Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha,jdowling,rcnnnghm,rmeier}@cs.tcd.ie
More informationData Indexing and Querying in DHT Peer-to-Peer Networks
Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data
More informationLessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems
LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationTo Unify Structured and Unstructured P2P Systems
To Unify Structured and Unstructured P2P Systems Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati e-mail: {wanghong,
More informationCIS 700/005 Networking Meets Databases
Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable
More informationAN EFFICIENT SYSTEM FOR COLLABORATIVE CACHING AND MEASURING DELAY
http:// AN EFFICIENT SYSTEM FOR COLLABORATIVE CACHING AND MEASURING DELAY 1 Mohd Husain, 2 Ayushi Prakash, 3 Ravi Kant Yadav 1 Department of C.S.E, MGIMT, Lucknow, (India) 2 Department of C.S.E, Dr. KNMIET,
More informationOn the Cost of Participating in a Peer-to-Peer Network
On the Cost of Participating in a Peer-to-Peer etwork icolas Christin and John Chuang School of Information Management and Systems, University of California, Berkeley {christin,chuang}@sims.berkeley.edu
More informationArchitectures for Distributed Systems
Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced
More informationAggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test
Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
More informationProximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution
Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea
More informationA P2P File Sharing Technique by Indexed-Priority Metric
A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication
More informationA Service-Oriented Peer-to-Peer Architecture for a Digital Ecosystem
1 A Service-Oriented Peer-to-Peer Architecture for a Digital Ecosystem Jan Sacha, Bartosz Biskupski, Dominik Dahlem, Raymond Cunningham, Jim Dowling, and René Meier Distributed Systems Group, Trinity College
More informationExploiting Route Redundancy via Structured Peer to Peer Overlays
Exploiting Route Redundancy ia Structured Peer to Peer Oerlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz Uniersity of California, Berkeley Challenges Facing
More informationautomating server selection with OASIS
MICHAEL J. FREEDMAN automating server selection with OASIS Michael J. Freedman is a doctoral student at NYU, currently visiting Stanford University, and received his M.Eng. and S.B. degrees from MIT. His
More informationDiscovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology
Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha, jdowling,
More informationLecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011
Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared
More informationAW2 Report. Christian Vogt. DHT Design Comparison and Applicability for WebRTC-based Systems
AW2 Report Christian Vogt DHT Design Comparison and Applicability for WebRTC-based Systems Fakultät Technik und Informatik Studiendepartment Informatik Faculty of Engineering and Computer Science Department
More informationOverlay Networks for Multimedia Contents Distribution
Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)
More informationRAQNet: A Topology-Aware Overlay Network
RAQNet: A Topology-Aware Overlay Network Seyed Iman Mirrezaei 1, Javad Shahparian 1, and Mohammad Ghodsi 1,2, 1 Computer Engineering Department, Sharif University of Technology, Tehran, Iran 2 IPM School
More informationKademlia: A P2P Informa2on System Based on the XOR Metric
Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg
More informationHandling Churn in a DHT
Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get
More informationNon-Transitive Connectivity and DHTs
Non-Transitive Connectivity and DHTs Michael J. Freedman, Karthik Lakshminarayanan, ean hea, and Ion toica New York University and University of California, Berkeley mfreed@cs.nyu.edu, {karthik,srhea,istoica}@cs.berkeley.edu
More informationHybrid Overlay Structure Based on Random Walks
Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft
More informationAPSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing
APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current
More informationCoordinate-based Routing:
Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing
More informationThis is the published version:
This is the published version: Zhou, Wanlei and Casey, J. 2008, Reducing cache lookup and publish overhead through locality awareness in P2P web caching, in HPCC 2008 : Proceedings of the 10th IEEE International
More informationA Distributed Codec Placement Algorithm for Network-Embedded FEC
A Distributed Codec Placement Algorithm for Network-Embedded FEC Mingquan Wu and Hayder Radha Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48823 {wumingqu,
More informationA Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications
A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications Oliver Haase, Alfred Toth, and Jürgen Wäsch HTWG Konstanz - University of Applied Sciences, Constance, Germany Abstract. We propose
More information