Survey of DHT Evaluation Methods

Size: px
Start display at page:

Download "Survey of DHT Evaluation Methods"

Transcription

1 Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Abstract In this paper, we present an overview of factors affecting the performance of the DHT-algorithms and give examples of how these factors have been measured from the DHT algorithms. We analyse the strengths and weaknesses of evaluation methods that are based on simulation, and make observations on the growing importance of globally distributed testbeds such as PlanetLab. We conclude that the best evaluation method of DHT is depends on the intended application for the DHT. KEYWORDS: DHT evaluation, P2PSIP 1 Introduction Peer-to-peer (P2P) networks have existed already for several years. The early systems were designed for file-sharing, but in recent years also other types of communication needs, such as Voice over Internet Protocol (VoIP) and streaming video content over the Internet, have been deployed with these technologies. Commercial applications using these technologies already exist, such as Skype [4] and P2PSIP Core Development Kit [1]. Often communication protocols are not standardized and thus applications providing essentially the same service are unable to communicate between each other. There is ongoing standardisation work at the Internet Engineering Task Force(IETF) working group called Peer-to-Peer Session Initiation Protocol(P2PSIP) [2]. The working group is set up to develop a protocol, that could be used to store and retrieve information on a network formed by peers. We refer to this network as a P2PSIP overlay. The goal of the working group is to submit P2PSIP Peer Protocol document to the IESG July 2008 [2], but the development work around the protocol is likely to continue many years forward. At present there are several competing proposal for the P2PSIP protocol. All of the proposals are using a Distributed Hash Table(DHT) algorithm as the key component for making routing decisions between the nodes of a P2PSIP overlay. For example, the DHT algorithm determine how the next hop on the route of a message is selected, and how the overlay changes as a result of nodes joining and leaving. The choice of a DHT algorithm can have a significant effect on the overall performance of the overlay. 1.1 Evaluating Distributed Hash Table Algorithms The basic function of any DHT is to map a key provided by the user to an identifier of a node in the overlay. The overlay consists of nodes, hereinafter called as peers. In order to retrieve the key associated value, a DHT provides a primitive called lookup. Lookup is a query send to the overlay and routed towards the node which is responsible for that portion of the key address space the key belongs to. If the associated value is found, it is then routed back to the initiator of the lookup. The first four DHT algorithms: Chord [21], CAN [17], Pastry [20] and Tapestry [22] were introduced roughly at the same time and the research related to the algorithms has continued active since then. Previous work has evaluated DHTs based on how well they handle churn [19], how fast they perform lookups [22], how well they are suited for interpersonal communication [9] and what the effect of overlays topology is [8]. In addition to these metrics, the DHTs can be evaluated based on how much maintenance traffic they generate, how many connections they create, etc. In this paper we focus on two of these metrics, the amount of the maintenance traffic and the length of the lookup latency. The DHTs can be evaluated from performance point of view by analysing them mathematically [16, 13], by using simulations [10, 8, 19, 11], by running experiments on existing implementations of the algorithms in laboratory networks [19], or by running the experiments over the Internet. The DHTs can also be evaluated based on how well they perform in specific task [9]. Simulations can be used to verify the correctness of the algorithm. Besides that, they can be used for determining the theoretical scalability, bandwith usage, and lookup performance. Simulations allow tests to be made in a scale that would be impractical or even impossible with actual systems. However, using simulators requires time and effort, both in terms of setting up the simulations and in terms of running them. In addition to this, most of the currently available simulators provide very limited means to collect statistics of the simulations [15]. Most of the reviewed simulators [15] did not provide means to tune the parameters of the network layer. However, in real network environments, packets may be lost or delayed and are thus not correctly modelled in the reviewed simulators. In order to get more reliable results, the measurements should be made in large scale using real nodes instead of simulations. The measurements could be made for example by deploying the DHT implementations in the nodes of the PlanetLab [3]. The PlanetLab is network of geographi-

2 cally distributed servers that provide users an opportunity to test the functionality of their applications at a global scale. Therefore it has been frequently used [5, 18, 12, 6] to provide performance data of DHT algorithms. PlanetLab reveals the performance bottlenecks of DHTs by introducing nodes with poor performance and slow response time [18]. 1.2 Handling Churn in DHTs There are several factors that affect the overall performance of a DHT. One of the most important ones, in terms of lookup time and correctness of lookups, is how well the DHT handles churn. The three most important factors identified in the study [19] by Rhea et al. are: Figure 1: The effect of PNS [19] reactive versus periodic recovery from failures calculation of message timeouts during lookups choice of nearby over distant neighbors Reactive recovery [19] means that a node in the network tries to find a replacement for a failed node immediately after it has detected that one of its neighbors has failed. In contrast, when using periodic recovery, node updates its neighbor information with periodic fixed interval. The study shows that periodic recovery improves the performance by reducing the amount of overlay maintenance traffic. Request are often sent to nodes that do not respond immediately and therefore appear to have left the overlay. In such cases, re-sending the request after a short timeout to an alternative node in the message path may not be the best solution, since the original query may not yet have reached the recipient, the message may still be in processing, or the reply is on the way back. In such cases creating a new query would just generate unnecessary traffic on the overlay. Broken links can be easily created by trusting blindly on the neighbor table information received from closest neighbours. The connectivity to the new nodes should be always checked before adding them to nodes own neighbour table [7]. Some of the DHTs implement a technique called Proximity Neighbor Selection(PNS), which is a process of choosing a neighbor among the potential neighbors for any given routing table entry according to their network latency to the choosing node. The study by Rhea et al. [19] suggest that using a small amount of technique called global sampling is necessary to achieve near optimal PNS. The use of suitable amount of PNS can improve lookup results, and bring performance gains with little or no increase in bandwith consumption, as can be seen in Figure 1. 2 How to Measure Performance 2.1 Comparing the Amount of Signaling Data Desired feature in any DHT algorithm is to keep the the amount of maintenance traffic at a minimum. When the algorithm is used in bandwith limited environment, such as Figure 2: Bandwith vs. lookup latency [11] mobile network, every byte is important. The calculations should also include the amount of traffic that is needed to keep the nodes data up to date [11]. Simulations have shown that there is no major differences in the lookup times of the algorithms, if the algorithms are allowed to use unlimited bandwith for the maintenance operations [11]. Typically the DHT algorithm generates a lot of traffic in the Join process, when the joining node exchanges routing and neighbour table information with its neighbors. After this initial exchange, the number of routing table entries (base) and the stabilization interval have the most decisive effect on the amount of generated data. The reason for this is that on every stabilization the node updates its routing table pointers and more entries means more traffic [11]. 2.2 Comparing Lookup-time The user of a DHT is naturally interested in the lookup time as the main indicator of the system efficiency. The DHT lookup can be compared to the use of a search engine, such as Google. Since all DHTs basically provide the same service, the user naturally, will want to use the fastest one. Reaching faster lookup times often means higher bandwith consumption, and vice versa as can be seen in the Figure 2. Typically, lookup time has been evaluated by running simulations of several DHTs and tweaking their parameters in order to reach faster lookup times[11, 10]. Some of the nodes in the PlanetLab are quite slow [18], which will make all lookups that go through those nodes

3 appear extremely slow also. Therefore it is important to use use techniques such as global sampling in order to prevent accepting neighbors that are behind slow links. In global sampling, the lookup functionality of a DHT is used to find new neighbors. Rhea et al. [19] describe the technique like this: "for a routing table entry that requires a neighbor with prefix p, we perform a lookup for a random identifier with prefix p. The node returned by this lookup will almost always have the desired prefix." Another scheme, proposed by Ratnasamy et al. [17], that is used in CAN DHT for PNS is called Landmark ordering. In this scheme the joining node measure its latency to few well known nodes in the overlay and based on this data orders the landmarks in order of increasing Round Trip Time(RTT). The RTT is measured by sending a message to a destination node and measuring the time from sending to the moment the sender has received a response. In CAN DHT a new node utilises its landmark ordering information by joining at random point in the portition of the coordinate space associated with its landmark ordering. 3 Factors Affecting Suitability for Interpersonal Communication DHTs can be evaluated from the viewpoint of interpersonal communication. This means that some characteristics are required in order to make the communication possible for example in mobile environment. In the Figure 3 Hautakorpi et al. [9] have gathered eleven factors that should be considered when choosing a DHT to be used in communication application: Lookup methods Parallel lookups Proximity support Graceful departure Replication & caching Complexity Bandwith consumption Node join & departure Configuration parameters Extendability Notification framework We will now go through few of them to see why these factors are so important. By lookup methods the authors refer into three different ways messages are delivered between the peers of an overlay. These methods are presented in the Figure 4. The simplest way which is generally supported by all of the DHTs is to use iterative routing. This means that during lookup when node A wants to lookup node R, the Figure 4: Routing methods query is first send to the closest node the sender knows which we shall call node B. Node B then replies with the address of which will reply with the address of a even closer node to the destination, which we shall call node C. Now node A makes a new query to the node C, which will reply with a closer match. This activity is carried out until the node R is found, or some intermediary node will determine, that there is no closer match, and the lookup fails. Some DHTs also support recursive routing, which differs from iterative routing in a way that the intermediary nodes forward the messages directly to the closest node they know instead of sending the address of the closest node back to the sender. In this method, the replies are routed back the same path back to the sender. The third method called semi-recursive routing differs from the recursive routing in a way that the replies are send directly back from the destination node to the sender node without going through the intermediate nodes that were on the message path. The iterative and semi-recursive method are not directly applicable in environments where Network Address Translation(NAT) is being used. The semi-recursive method should provide the shortest lookup delays out of these three methods, under assumption that the connections between the nodes are already established. Bandwith consumption is another important factor when it comes to running the algorithm in mobile devices, since every transaction consumes energy and mobile devices typically run on battery [9]. 4 Future Work We are planning to implement Chord and CAN algorithms using C programming language on the Linux platform and in later stage on mobile devices. The performance measurements will be run on both, the nodes of the laboratory test bed, as well as the nodes of the PlanetLab. The evaluation of DHTs will be done from the viewpoint of interpersonal communication. In later stage we are planning to expand our prototype with support to Kademlia DHT [14]. We are trying to determine how well the selected DHTs perform in environment, where NATs or bandwith limitations are present. There is an ongoing discussion in the

4 Figure 3: Feature comparison of DHT algorithms [9] P2PSIP working group [2] of whether a P2PSIP protocol standard should define a default DHT algorithm that must be present at all the protocol implementations. The results of our evaluation work could be used for making the decision on the default DHT. 5 Conclusions In this paper, we have summarized the methods that have been used for evaluating DHTs, and provided justification for some of the evaluation criteria. We discovered that most of the evaluation results so far have been obtained by using simulations. Lately globally distributed testbeds such as PlanetLab are gaining momentum as provider of reliable results. We also discussed the factors that are relevant when measuring the performance of DHT implementations to be used in interpersonal communication, and concluded that lookup time and bandwith usage both play an important role from users perspective. The upcoming P2PSIP protocol will surely increase the interest towards DHT development outside academia. The best evaluation method depends on the intended application for the DHT. In file sharing applications, multiple copies and stale data is not such a big problem, but when using DHT to store SIP contact information, these factors have significant importance. References [1] P2psip core development kit. sipeerior.com/products.php. Referenced [2] P2psip working group. html.charters/p2psip-charter.html. Referenced [3] Planelab. Referenced [4] Skype. Referenced [5] F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek,, and R. Morris. Designing a dht for low latency and high throughput. In USENIX 04: Proceedings of the First Symposium on Networked Systems Design and Implementation, March [6] J. Falkner, M. Piatek, J. P. John, A. Krishnamurthy, and T. Anderson. Profiling a million user dht. In IMC 07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages , New York, NY, USA, ACM. [7] M. J. Freedman, K. Lakshminarayanan, S. Rhea, and I. Stoica. Non-transitive connectivity and DHTs. In WORLDS 05: Proceedings of the Second Workshop on Real, Large Distributed Systems, December [8] K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of DHT routing geometry on resilience and proximity. In SIGCOMM 03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [9] J. Hautakorpi and G. Camarillo. Evaluation of DHTs from the viewpoint of interpersonal communications.

5 In MUM 07: Proceedings of the 6th international conference on Mobile and ubiquitous multimedia, pages 74 83, New York, NY, USA, ACM. [10] D. Kato and T. Kamiya. Evaluating DHT implementations in complex environments by network emulator. In IPTPS 07: Proceedings of the 6th International Workshop on Peer-to-Peer Systems, Bellevue, WA, USA, February [11] J. Li, J. Stribling, T. M. Gil, R. Morris, and M. F. Kaashoek. Comparing the performance of distributed hash tables under churn. In IPTPS 04: Proceedings of the 3rd International Workshop on Peer-to-Peer Systems, San Diego, CA, USA, February [12] J. Li, J. Stribling, R. Morris, M. Kaashoek, and T. Gil. A performance vs. cost framework for evaluating DHT design tradeoffs under churn. In INFOCOM 2005: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, [20] A. I. T. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for largescale peer-to-peer systems. In Middleware 01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pages , London, UK, Springer-Verlag. [21] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM 01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [22] B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical report, Berkeley, CA, USA, April [13] D. Liben-Nowell, H. Balakrishnan, and D. Karger. Analysis of the evolution of peer-to-peer systems. In PODC 02: Proceedings of the twenty-first annual symposium on Principles of distributed computing, pages , New York, NY, USA, ACM. [14] P. Maymounkov and D. Mazières. Kademlia: A peerto-peer information system based on the XOR metric. In IPTPS 01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pages 53 65, London, UK, Springer-Verlag. [15] S. Naicken, B. Livingston, A. Basu, S. Rodhetbhai, I. Wakeman, and D. Chalmers. The state of peer-topeer simulators and simulations. SIGCOMM Comput. Commun. Rev., 37(2):95 98, [16] D. Qiu and R. Srikant. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In SIGCOMM 04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [17] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker. A scalable content-addressable network. In SIGCOMM 01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages , New York, NY, USA, ACM. [18] S. Rhea, B. Chun, J. Kubiatowicz, and S. Shenker. Fixing the embarrassing slowness of OpenDHT on planetlab. In WORLDS 05: Proceedings of the Second Workshop on Real, Large Distributed Systems, December [19] S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz. Handling churn in a DHT. In Proceedings of the USENIX 2004 Annual Technical Conference, Boston, MA, USA, June 2004.

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

R/Kademlia: Recursive and Topology-aware Overlay Routing

R/Kademlia: Recursive and Topology-aware Overlay Routing R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, 11/02/2010, KIT University of the State of Baden-Wuerttemberg and National Research Center of the

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Comparing the performance of distributed hash tables under churn

Comparing the performance of distributed hash tables under churn Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

Faster Content Access in KAD

Faster Content Access in KAD Faster Content Access in KAD Moritz Steiner, Damiano Carra, and Ernst W. Biersack Eurécom, Sophia Antipolis, France {steiner carra erbi}@eurecom.fr Abstract Many different Distributed Hash Tables (DHTs)

More information

E. Shim Panasonic October 16, 2006

E. Shim Panasonic October 16, 2006 SIPPING WG Internet-Draft Expires: April 19, 2007 S. Baset H. Schulzrinne Columbia University E. Shim Panasonic October 16, 2006 Status of this Memo A Protocol for Implementing Various DHT Algorithms draft-baset-sipping-p2pcommon-00

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo, JAPAN Email:

More information

Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar

Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar Jean-François Wauthy FUNDP - The University of Namur jfwauthy@student.fundp.ac.be Laurent Schumacher FUNDP - The University

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi

Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi 1 Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi Michael Parker, Amir Nader-Tehrani, Alok Nandan, Giovanni Pau Computer Science Department University of California Los Angeles Los Angeles,

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

Evolution of Peer-to-peer algorithms: Past, present and future.

Evolution of Peer-to-peer algorithms: Past, present and future. Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different

More information

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing

More information

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing

TinyTorrent: Implementing a Kademlia Based DHT for File Sharing 1 TinyTorrent: Implementing a Kademlia Based DHT for File Sharing A CS244B Project Report By Sierra Kaplan-Nelson, Jestin Ma, Jake Rachleff {sierrakn, jestinm, jakerach}@cs.stanford.edu Abstract We implemented

More information

Structured Peer-to-Peer Networks

Structured Peer-to-Peer Networks Structured Peer-to-Peer Networks The P2P Scaling Problem Unstructured P2P Revisited Distributed Indexing Fundamentals of Distributed Hash Tables DHT Algorithms Chord Pastry Can Programming a DHT Graphics

More information

Dorina Luminiţa COPACI, Constantin Alin COPACI

Dorina Luminiţa COPACI, Constantin Alin COPACI THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and

More information

An Efficient and Secure Peer-to-Peer Overlay Network

An Efficient and Secure Peer-to-Peer Overlay Network An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,

More information

Defending against Eclipse attacks on overlay networks

Defending against Eclipse attacks on overlay networks Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Location Efficient Proximity and Interest Clustered P2p File Sharing System

Location Efficient Proximity and Interest Clustered P2p File Sharing System Location Efficient Proximity and Interest Clustered P2p File Sharing System B.Ajay Kumar M.Tech, Dept of Computer Science & Engineering, Usharama College of Engineering & Technology, A.P, India. Abstract:

More information

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

Subway : Peer-To-Peer Clustering of Clients for Web Proxy

Subway : Peer-To-Peer Clustering of Clients for Web Proxy Subway : Peer-To-Peer Clustering of Clients for Web Proxy Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

Publication III. c 2010 IEEE. Reprinted with permission.

Publication III. c 2010 IEEE. Reprinted with permission. Publication III Jouni Mäenpää and Jaime Jiménez Bolonio. Performance of REsource LOcation And Discovery (RELOAD) on Mobile Phones. In 2010 IEEE Wireless Communications and Networking Conference (WCNC),

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Large-Scale Monitoring of DHT Traffic

Large-Scale Monitoring of DHT Traffic Large-Scale Monitoring of DHT Traffic Ghulam Memon, Reza Rejaie University of Oregon {gmemon, reza}@cs.uoregon.edu Yang Guo Corporate Research, Thomson Yang.Guo@thomson.net Daniel Stutzbach Stutzbach Enterprises

More information

HyCube: A distributed hash table based on a hierarchical hypercube geometry

HyCube: A distributed hash table based on a hierarchical hypercube geometry HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents

More information

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Byung-Gon Chun, Ben Y. Zhao 2, and John D. Kubiatowicz Computer Science Division, U.C. Berkeley {bgchun, kubitron}@cs.berkeley.edu

More information

Mill: Scalable Area Management for P2P Network based on Geographical Location

Mill: Scalable Area Management for P2P Network based on Geographical Location Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School

More information

Shaking Service Requests in Peer-to-Peer Video Systems

Shaking Service Requests in Peer-to-Peer Video Systems Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks

Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks Structured Peer-to-Peer Overlays Need Application-Driven Benchmarks Sean Rhea, Timothy Roscoe, and John Kubiatowicz IRB-TR-3-2 February, 23 Proceedings of the 2 nd International Peer-to-Peer Systems Workshop

More information

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables

Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Implementing Range Queries with a Decentralized Balanced Tree Over Distributed Hash Tables Nuno Lopes and Carlos Baquero CCTC-Department of Informatics University of Minho Braga, Portugal Abstract. Range

More information

FPN: A Distributed Hash Table for Commercial Applications

FPN: A Distributed Hash Table for Commercial Applications FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

The Lonely NATed Node

The Lonely NATed Node The Lonely NATed Node Chad Yoshikawa University of Cincinnati yoshikco@ececs.uc.edu Brent Chun Intel Research Berkeley bnc@intel-research.net Amin Vahdat U.C. San Diego vahdat@cs.ucsd.edu Abstract In this

More information

Security Considerations for Peer-to-Peer Distributed Hash Tables

Security Considerations for Peer-to-Peer Distributed Hash Tables Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.

More information

CTracker: a Distributed BitTorrent Tracker Based on Chimera

CTracker: a Distributed BitTorrent Tracker Based on Chimera CTracker: a Distributed BitTorrent Tracker Based on Chimera Raúl JIMÉNEZ, Björn KNUTSSON Kungliga Tekniska högskolan, Isafjordsgatan 39, Stockholm, 164 40, Sweden Tel: +46 8 790 42 85, Fax: +46 8 751 17

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Scalable and Self-configurable Eduroam by using Distributed Hash Table

Scalable and Self-configurable Eduroam by using Distributed Hash Table Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,

More information

A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING *

A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING * A LIGHTWEIGHT FRAMEWORK FOR PEER-TO-PEER PROGRAMMING * Nadeem Abdul Hamid Berry College 2277 Martha Berry Hwy. Mount Berry, Georgia 30165 (706) 368-5632 nadeem@acm.org ABSTRACT Peer-to-peer systems (P2P)

More information

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q

Overlay networks. To do. Overlay networks. P2P evolution DHTs in general, Chord and Kademlia. Turtles all the way down. q q q Overlay networks To do q q q Overlay networks P2P evolution DHTs in general, Chord and Kademlia Turtles all the way down Overlay networks virtual networks Different applications with a wide range of needs

More information

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de

More information

Congestion Control for Distributed Hash Tables

Congestion Control for Distributed Hash Tables Congestion Control for Distributed Hash Tables Fabius Klemm, Jean-Yves Le Boudec, and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne,

More information

Performance Modelling of Peer-to-Peer Routing

Performance Modelling of Peer-to-Peer Routing Performance Modelling of Peer-to-Peer Routing Idris A. Rai, Andrew Brampton, Andrew MacQuire and Laurent Mathy Computing Department, Lancaster University {rai,brampton,macquire,laurent}@comp.lancs.ac.uk

More information

Effects of Churn on Structured P2P Overlay Networks

Effects of Churn on Structured P2P Overlay Networks International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology

Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Discovery of Stable Peers in a Self-Organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha,jdowling,rcnnnghm,rmeier}@cs.tcd.ie

More information

Data Indexing and Querying in DHT Peer-to-Peer Networks

Data Indexing and Querying in DHT Peer-to-Peer Networks Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

To Unify Structured and Unstructured P2P Systems

To Unify Structured and Unstructured P2P Systems To Unify Structured and Unstructured P2P Systems Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati e-mail: {wanghong,

More information

CIS 700/005 Networking Meets Databases

CIS 700/005 Networking Meets Databases Announcements CIS / Networking Meets Databases Boon Thau Loo Spring Lecture Paper summaries due at noon today. Office hours: Wed - pm ( Levine) Project proposal: due Feb. Student presenter: rd Jan: A Scalable

More information

AN EFFICIENT SYSTEM FOR COLLABORATIVE CACHING AND MEASURING DELAY

AN EFFICIENT SYSTEM FOR COLLABORATIVE CACHING AND MEASURING DELAY http:// AN EFFICIENT SYSTEM FOR COLLABORATIVE CACHING AND MEASURING DELAY 1 Mohd Husain, 2 Ayushi Prakash, 3 Ravi Kant Yadav 1 Department of C.S.E, MGIMT, Lucknow, (India) 2 Department of C.S.E, Dr. KNMIET,

More information

On the Cost of Participating in a Peer-to-Peer Network

On the Cost of Participating in a Peer-to-Peer Network On the Cost of Participating in a Peer-to-Peer etwork icolas Christin and John Chuang School of Information Management and Systems, University of California, Berkeley {christin,chuang}@sims.berkeley.edu

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test

Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Aggregation of a Term Vocabulary for P2P-IR: a DHT Stress Test Fabius Klemm and Karl Aberer School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

A Service-Oriented Peer-to-Peer Architecture for a Digital Ecosystem

A Service-Oriented Peer-to-Peer Architecture for a Digital Ecosystem 1 A Service-Oriented Peer-to-Peer Architecture for a Digital Ecosystem Jan Sacha, Bartosz Biskupski, Dominik Dahlem, Raymond Cunningham, Jim Dowling, and René Meier Distributed Systems Group, Trinity College

More information

Exploiting Route Redundancy via Structured Peer to Peer Overlays

Exploiting Route Redundancy via Structured Peer to Peer Overlays Exploiting Route Redundancy ia Structured Peer to Peer Oerlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz Uniersity of California, Berkeley Challenges Facing

More information

automating server selection with OASIS

automating server selection with OASIS MICHAEL J. FREEDMAN automating server selection with OASIS Michael J. Freedman is a doctoral student at NYU, currently visiting Stanford University, and received his M.Eng. and S.B. degrees from MIT. His

More information

Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology

Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Discovery of Stable Peers in a Self-organising Peer-to-Peer Gradient Topology Jan Sacha, Jim Dowling, Raymond Cunningham, and René Meier Distributed Systems Group, Trinity College, Dublin {jsacha, jdowling,

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

AW2 Report. Christian Vogt. DHT Design Comparison and Applicability for WebRTC-based Systems

AW2 Report. Christian Vogt. DHT Design Comparison and Applicability for WebRTC-based Systems AW2 Report Christian Vogt DHT Design Comparison and Applicability for WebRTC-based Systems Fakultät Technik und Informatik Studiendepartment Informatik Faculty of Engineering and Computer Science Department

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

RAQNet: A Topology-Aware Overlay Network

RAQNet: A Topology-Aware Overlay Network RAQNet: A Topology-Aware Overlay Network Seyed Iman Mirrezaei 1, Javad Shahparian 1, and Mohammad Ghodsi 1,2, 1 Computer Engineering Department, Sharif University of Technology, Tehran, Iran 2 IPM School

More information

Kademlia: A P2P Informa2on System Based on the XOR Metric

Kademlia: A P2P Informa2on System Based on the XOR Metric Kademlia: A P2P Informa2on System Based on the XOR Metric Today! By Petar Mayamounkov and David Mazières, presented at IPTPS 22 Next! Paper presentation and discussion Image from http://www.vs.inf.ethz.ch/about/zeit.jpg

More information

Handling Churn in a DHT

Handling Churn in a DHT Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz UC Berkeley and Intel Research Berkeley What s a DHT? Distributed Hash Table Peer-to-peer algorithm to offering put/get

More information

Non-Transitive Connectivity and DHTs

Non-Transitive Connectivity and DHTs Non-Transitive Connectivity and DHTs Michael J. Freedman, Karthik Lakshminarayanan, ean hea, and Ion toica New York University and University of California, Berkeley mfreed@cs.nyu.edu, {karthik,srhea,istoica}@cs.berkeley.edu

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current

More information

Coordinate-based Routing:

Coordinate-based Routing: Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing

More information

This is the published version:

This is the published version: This is the published version: Zhou, Wanlei and Casey, J. 2008, Reducing cache lookup and publish overhead through locality awareness in P2P web caching, in HPCC 2008 : Proceedings of the 10th IEEE International

More information

A Distributed Codec Placement Algorithm for Network-Embedded FEC

A Distributed Codec Placement Algorithm for Network-Embedded FEC A Distributed Codec Placement Algorithm for Network-Embedded FEC Mingquan Wu and Hayder Radha Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48823 {wumingqu,

More information

A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications

A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications Oliver Haase, Alfred Toth, and Jürgen Wäsch HTWG Konstanz - University of Applied Sciences, Constance, Germany Abstract. We propose

More information