Building a low-latency, proximity-aware DHT-based P2P network

Size: px
Start display at page:

Download "Building a low-latency, proximity-aware DHT-based P2P network"

Transcription

1 Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan Thuy, Cau Giay, Hanoi, Vietnam Abstract DHT-based P2P networks have a problem of topology mismatch which causes high latency for message routing. This paper focuses on improving the latency of routing process for Chord, which is a typical DHT-based P2P network protocol. We propose a simple method to build a Chord network based on the proximity of nodes in the underlying physical network. The idea of our method is the combination of two techniques: identifier selection in node joining phase and neighbor selection in network stabilization phase, both are performed based on physical network latency. We have evaluated our proposed solution by simulations. In a simulation network with 4096 nodes, the average latency of routing process in our method can reduces 30% comparing with the conventional Chord routing method. Keywords-DHT;Chord;low latency;proximity-aware I. INTRODUCTION Peer-to-peer network applications are becoming more and more popular in the Internet today. Comparing to traditional server-client network model, peer-to-peer networks have many advantages like its scalability, self-organization and fault tolerance. Recently, Distributed Hashing Table (DHT) algorithms such as Chord [1], CAN [2], Pastry [3] attract lots of attention since they can offer a promising solution for scalable and efficient message routing on P2P networks. The algorithm constructs a structure of a virtual key space on a P2P network where each node is responsible for a portion of key space and keys are used as destinations to route messages. Each node also maintains information about a small set of neighbor nodes, which are selected based on the positions of nodes in the virtual key space. The neighbor sets are used to route messages to destination nodes efficiently. However, since the construction of a DHT-based P2P network is performed regardless of physical network topology, there are differences between overlay network topology and physical network topology (called topology mismatch ). For example, two nodes which are near in the underlying physical network (i.e. the latency of message routing between them is small), may be far away (i.e. several hops away) from each other in the DHT-based network. In this case, the latency of message routing between these nodes in the DHT-based network is significantly higher compared with the latency between them in the underlying physical network. This paper focuses on the problem of improving the latency of message routing in Chord, a typical DHT-based P2P network protocol. There are two main approaches to solve this problem: proximity neighbor selection (PNS) [5], [7], [9] and proximity identifier selection (PIS) [4], [8]. In the PNS approach, a node will choose its neighbor nodes based on their proximity. In the PIS approach, each node chooses its node identifier based on its geographic location. To realize the PIS approach, conventional researches [4], [8] map participating nodes into a proximity-based twodimensional space and assigns node identifier in Chord based on the node position in the two-dimensional space such that nodes that are close in identifier are close in the two-dimensional space. This solution has a drawback of requiring a set of landmarks and a pre-processing phase for nodes to compute their own coordinates in the proximitybased two-dimensional space. This paper proposes a simple solution to solve the topology mismatch problem for Chord protocol. The main idea of the solution consists of two modifications of Chord protocol. First, in the node joining phase, a new node can select a position in the Chord ring from a set of randomly selfgenerated positions such that the latency to its successor node and predecessor node is the smallest. Second, in the stabilization phase, each node selects a neighbor node for each finger table entry from a set of candidate nodes such that the latency to each neighbor node is small. Our method is easy to implement and has small overhead comparing with conventional methods. With minor modifications of Chord protocol, however, our method can reduce the latency of message routing compared to the conventional Chord protocol. In order to evaluate the effectiveness of our method, we have built a simulator to simulate the execution of our algorithm and measure the latency of message routing between participating nodes in the network. The simulation results show that our method can reduce the average latency of message routing by approximately 30%, compared to the conventional Chord protocol. Our method also does not affect much on the random mapping of identifier in the Chord ring. The rest of this paper is structured as follows. Section 2 explains Chord protocol and related works with their pros and cons. Section 3 is dedicated to describe our proposal

2 method. Section 4 describes our simulator and simulation results. Conclusion is written in section 5. A. Chord protocol II. BACKGROUND Chord is a typical structured peer-to-peer network protocol using an m-bit address space which includes 2 m identifiers arranged in a circle topology called a Chord ring (Fig. 1). Using a consistent hash function, each participating node randomly chooses an identifier and then joins to a position in the ring by a joining phase. A resource is distributed to a Chord network by the use of key-value pairs: the key is the resourcefs identifier and the value is the resource itself. Each key-value pair is stored in the node which is nearest the key in Chord ring clockwise (i.e. the successor of the key). In this paper, we focus on the construction of Chord ring, which includes a joining phase and a finger table building phase. The joining phase of a node to a Chord network is rather simple. When a node wants to join a Chord network, it will generate its identifier by making use of a consistent hash function on its own information such as its IP/Port pair. The joining node then sends a joining message to a well-known node in the Chord network (so-called bootstrap node ), in order to query for its identifier s successor. Once the successor information is returned, the joining node will contact to the successor to join the position next to the successor counter-clockwise in Chord ring. After that, the node performs a finger table building phase to build its own finger table. In an m-bit address space, each participating node builds a finger table which has m entries. Assuming that the identifier of the current node is k, the i th entry in the table holds the information about the successor node of identifier (k+2 i 1 ). Finger tables are used to route messages between nodes in the network. When a node receives a message destined to an identifier in the Chord ring, it will look up its finger table to find the nearest node to the identifier counter-clockwise and forward the message to that node. The forwarded node will recursively repeats the same operation. The process continues until the message reaches the successor of the destination identifier. In Chord protocol, the construction of a finger table is performed regardless of physical network topology (i.e. the latency between nodes). Therefore, the latency of message routing between two nodes in Chord network may be significantly higher compared with the latency between these nodes in the underlying physical network. Chord also defines some other operations such as node leaving, network recovery from a node failure... The interested reader is referred to [1] for these details. 1) Related works: There are several conventional solutions for Chord protocol to improve the latency of message Figure 1. An example of a Chord ring routing due to the differences between overlay network topology and underlying physical network topology. In the approach of Proximity Neighbor Selection (PNS), each finger table entry holds the information of a node that is selected from a number of nodes, which belong to a predetermined interval of identifiers, based on their proximity. The effectiveness of this approach is showed in [5], [7], [9]. However, actual realization of this approach is different between conventional researches. In [7], the authors propose a method that makes use of latency information collected from lookup process on the overlay network. After a node joins a Chord network, it will gradually obtain lowlatency finger table by updating its finger table entries based on collected latency information. In [9], the authors propose the use of Vivaldi algorithm [11] to calculate the position of a node on a virtual two-dimensional space so that distances in the space approximate distances in the underlying physical network. Each node then selects neighbor nodes that are physically nearby by looking up for nodes that are close to it on the virtual 2-dimension space. In the approach of Proximity Identifier Selection (PIS), a node will choose its node identifier based on its geographic location. Like [9], the work [4] and Quasi-Chord [8] uses a set of landmarks to map nodes into points in a twodimensional space. The identifier of nodes are selected such that nodes are close in a two-dimensional space are close in the identifier space. In common, both of approaches try to decrease the latency of message routing on a DHT network. However, they require a set of landmarks and a preprocessing phase for nodes to compute their own coordinates in the proximity-based two-dimensional space.

3 A. Overview III. OUR APPROACH In this chapter, we propose a new solution for the topology mismatch problem of Chord protocol. The solution achieves the same goals as related works, but with another approach which requires less cost and can be deployed in a large-scale network easily. The idea of our approach is that a node can select a position that it can join in a Chord ring such that nodes that are close to it in the Chord ring are physically nearby to it. As the result, nodes are close in a Chord ring will be close regarding to physical network positions. The idea comes from a consideration that the proximity neighbor selection approach is not effective in upper entries of finger table. It is because the number of nodes that can be selected as an upper entry of a finger table (i.e. belong to a predetermined interval of identifiers) is often small. Since the very last hops of message routing in Chord usually use the upper entries of finger tables, we need to improve the latency due to the last hops by keeping physically nearby nodes as close together in a Chord ring as possible. Unlike conventional researches which force a joining node to calculate its physical position, in our method, we allow a joining node to select its identifier in a set of randomly generated identifiers, each of which corresponds to a position in the Chord ring. The node selects an identifier as its joining position such that the latency to the successor node and the predecessor node of the selected identifier is the smallest in the set of candidate identifiers. Our method also includes a proximity neighbor selection phase. The i th entry of the finger table of a node k will be selected from a set of candidate nodes which are next to the successor node of the identifier (k+2 i 1 ). The selected node must satisfy the condition that the latency from the selected node to node k is the smallest in the set of candidate nodes. The details of our method are described as follows. B. Our method Our method includes two phases. Proximity-based identifier selection phase When a new node joins in a Chord network, instead of having the node to generate only one identifier to join in the network, we let the node to generate a set C of identifiers. The set C is generated randomly by making use of a hash function on the combination of the nodefs own information and a random value. The node then contacts to a bootstrap node in the Chord network to query the successor node and the predecessor node of each identifier in the set C. We call CHOICE the size of set C of identifiers. The node then measures the network latency from it to the successor node and the predecessor node of each identifier. The latency to a node can be simply measured by a ping protocol. It then selects the identifier, Figure 2. Pseudo-code of proximity-based identifier selection phase. CHOICE: the size of set C of identifiers Figure 3. Pseudo-code of proximity-based neighbor selection phase which successor node or predecessor node has the smallest latency to it, as its identifier to join in the Chord network. The pseudo-code for the algorithm is shown in Fig. 2. Proximity-based neighbor selection phase

4 To update an entry in the finger table, first the node, which identifier is k for instance, queries the successor node s of the identifier (k + 2 i 1 ) based on the Chord protocol. Then, node k queries the successor node s and nodes next to the successor node to get a set of candidate nodes which are next to the successor clockwise and counter-clockwise in the Chord ring. The set of candidate nodes has 2 * EXPANSION + 1 nodes including the successor node s, EXPANSION nodes next to node s counter-clockwise and EXPANSION nodes next to s clockwise. Here, we call EXPANSION the spread degree. To avoid duplication of nodes in multiple entries of the finger table, nodes in the set which are not between k + 2 i 1 and k + 2 i+1 will be not considered. The pseudo-code for the algorithm is shown in Fig. 3. By probing for the latency from node k to each node in the set of candidate nodes, we can select the desired node for the entry of the finger table which latency from node k to the selected node is the smallest in the set. The update of finger table entries is performed whenever the network stabilization phase of Chord protocol is run. Hence, it can adapt to the join/leave of nodes. With high probability, the selection of node identifier based on network latency can keep the latency among nearby nodes in a Chord network relative small. Hence, it takes a short time to route messages of which destinations are nearby in a Chord ring. Furthermore, the update of finger tables based on network latency can reduce routing time to forward query messages among nodes. Therefore, our solution can achieve the goal of reducing latency of message routing among participating nodes in a Chord network. The solution has a drawback of delaying the joining process of new nodes. Comparing to the original Chord protocol, the solution requires a time interval to probe for the latency from a joining node to a number of randomly generated set of node IDs. Updating routing table process also needs some time interval to select one node from a set of candidate nodes. The more nodes or identifiers there are in the sets, the more optimal degree of latency we get and the longer time it takes for nodes to join in the network or update routing tables. It is a trade-off and we need to run simulations to get reasonable parameter values. IV. EVALUATION To evaluate the efficiency of the proposed solution, we have performed experiments with a simple network simulator. Our simulation focuses on measuring the difference of message routing latency between the conventional Chord and our proposed method. A. Simulator We build a simulator which generates a physical network topology of participating nodes and maps it to conventional and improved Chord overlay network. Generated queries are routed among participating nodes based on routing Figure 4. Average query latency comparison information and the returned results are collected to build statistics. The simulation network topology is divided into separated domains. Each domain has a number of participating nodes. Nodes in the same domain are connected to each other to create a star topology with a center switch. All the domains switches are connected directly to each other. Each of connections between nodes and their domainfs switch, and between switches has its own latency. The latency between node A and node B is calculated by summing up the latency between node A and its domain s switch and the latency between the switch to node B if A and B are in the same domain. Otherwise, the latency is calculated as the sum of the latency between node A and its domain s switch, the latency between the switch of A s domain and the switch of B s domain and the latency between the switch of B s domain and node B. With the simulator, we can specify following parameters: number of participating nodes, number of domains, and number of nodes in a domain and latency of connections. We divide experiment time into intervals of time called round. To simulate the join/leave of nodes, the simulator makes nodes join in and leave the network randomly after each round. The join/leave timing of nodes is generated based on the Pareto distribution. Then, all the nodes routing tables are updated and the simulator generates queries. The average latency in each round after updating routing tables and the overall average latency of the experiment are stored to build the statistics for reviewing later. B. Simulation results The first experiment aims to compare our solution s efficiency to conventional Chord s. The simulator creates 4096 nodes which are divided into 32 domains, with EXPANSION value of 3 and CHOICE value of 8 and 16 respectively. The latency of connections between nodes in a domain is assigned randomly from 1 to 30 ms, and the latency between

5 Figure 5. Average query latency comparison Figure 7. Average latency with EXPANSION adjustment Figure 6. Average latency with CHOICE adjustment Figure 8. The distribution of ID intervals between adjoining nodes in a Chord ring two switches is assigned randomly from 50 to 250ms. The experiment is carried out in 360 rounds and there are about 1000 queries generated in each round. The average latency of the network in the first 100 rounds is presented in Fig. 4. The result indicates that applying our proposed method can make average query latency in each round be steady and reduce significantly comparing to the conventional Chord protocol. After 360 rounds, the average latency in our method with CHOICE=8 is about 759 ms, which equals to 67% of conventional Chordfs result (about 1123 ms). With CHOICE=16, the average latency is improved slightly to 731 ms. We also perform the same experiment but increase the number of nodes in a Chord network. Figure 5 shows that our solution can reduce the latency of message routing about 33% comparing with conventional Chord protocol even when the number of nodes in a network increases. The second experiment focuses on examining the latency optimization degree when we adjust CHOICE value - the number of randomly generated node IDs in the joining phase. The simulator parameters are the same as the first experiment: 4096 nodes are divided into 32 domains, EX- PANSION value is 3, but there are 3600 rounds and about 1000 queries generated in each round. The result is presented in Fig. 6. The case in which CHOICE value is 1 can be viewed as conventional Chordfs joining phase and only the selection of routing table entries based on network latency is applied. In this case, the average latency is 814ms. The more choices of ID for a node in the joining phase are, the better latency optimization degree we can achieve. When the CHOICE value is 32, the average latency is 660 ms. The third experiment focuses on examining optimization degree of the solution when we adjust EXPANSION value - the number of candidate nodes in the neighbor selection phase. As the EXPANSION value increases, each node has more choices to select a node for a routing table entry. Hence, we get better latency optimization degree (Fig. 7). The random mapping of identifier in Chord rings is one of Chord advantages that we needs to keep. Conventional Chord protocol uses a consistent hash algorithm to assign

6 one ID to each newly joining node. In our solution, an ID is assigned to a newly joining node based on node proximity. Because of the difference between two joining algorithms, we need to examine the affects of our solution on the random mapping of identifier in the Chord ring. The simulation of our method is performed with CHOICE=8, EXPANSION =3. The simulator results show the statistics of ID intervals between every pair of adjoining nodes in a Chord ring. As shown in Fig. 8, with about 2000 available nodes existed in the network, the distribution of ID intervals between adjoining nodes in a Chord ring in the case of our method is similar to the one in the case of conventional Chord protocol. It means that our method does not affect much on the random mapping of identifier in the Chord ring. V. CONCLUSION AND FUTURE WORKS In the paper, we have proposed a method to optimize Chord topology based on underlying network latency. The solution focuses on two modifications of the Chord protocol: selecting the ID in a set of randomly generated IDs from which latency to its next and previous node is smallest and updating routing table by selecting neighbor nodes based on network latency. By doing experiments with simulator, we have proved that our method can reduce average query latency significantly but does not affect much on the random mapping of identifier in the Chord ring. Moreover, it is rather simple to deploy the solution in Chord-based applications. In the near future, we are going to continue to evaluate the efficiency of our method in a real network topology and deployed our method in Chord-based applications. [6] F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek and R. Morris, Designing a DHT for low latency and high throughput, Proceedings of 1st Symposium on Networked Systems Design and Implementation, March 2004 [7] A. Goel, R. Govindan, H. Zhang, Improving Lookup Latency in Distributed Hash Table Systems using Random Sampling, IEEE/ACM Transactions on Networking, Volume 13, February 2005 [8] M. Sun, Z. Zhang, Quasi-Chord: physical topology aware structured P2P network, Proceedings of the 11th Joint Conference on Information Sciences December [9] H. Duan, X. Lu, H. Tang, X. Zhou, Z. Zhao, Proximity Neighbor Selection in Structured P2P Network, Proceedings of The Sixth IEEE International Conference on Computer and Information Technology, September [10] T. S. Eugene Ng and H. Zhang, Predicting Internet Network Distance with Coordinates-Based Approaches, Proceedings of INFOCOM 2002 [11] R. Cox, F. Dabek, F. Kaashoek, J. Li, and R. Morris, Practical, distributed network coordinates, Proceedings of the Second workshop on Hot Topics in Networks (HotNets- II) (Nov. 2003). ACKNOWLEDGMENT This work is partly supported by the research project No. QC granted by Vietnam National University, Hanoi REFERENCES [1] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrisnan, Chord: A Scalable peer-to-peer lookup service for Internet applications, In Proceedings of ACM SIGCOMMf01, August 2001 [2] S. Ratnasamy, P. Francis, M. Handley and R. Karp, A Scalable Content-Addressable Network, In Proceedings of ACM SIGCOMMf01, Aug [3] A. Rowstron and P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems, In Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms, Nov [4] S. Ratnasamy, M. Handley, R. Karp and S. Shenker, Topologically-Aware Overlay Construction and Server Selection, Proceedings of the INFOCOM [5] K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy and S. Shenker, I. Stoica, The Impact of DHT Routing Geometry on Resilience and Proximity, Proceedings of SIGCOMM 2003

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo, JAPAN Email:

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

Quasi-Chord: physical topology aware structured P2P network

Quasi-Chord: physical topology aware structured P2P network Quasi-Chord: physical topology aware structured PP network UN Mingsong ZHANG Zhongqiu Network Information Center, Harbin University of cience and Technology, China College of Computer ci&tech, Harbin University

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

HyCube: A distributed hash table based on a hierarchical hypercube geometry

HyCube: A distributed hash table based on a hierarchical hypercube geometry HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 1651 PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE,

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Peer Clustering and Firework Query Model

Peer Clustering and Firework Query Model Peer Clustering and Firework Query Model Cheuk Hang Ng, Ka Cheung Sia Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR {chng,kcsia}@cse.cuhk.edu.hk

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Scalable and Self-configurable Eduroam by using Distributed Hash Table

Scalable and Self-configurable Eduroam by using Distributed Hash Table Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report Computer Communications and Networking (SC 546) Professor D. Starobinksi Brian Mitchell U09-62-9095 James Nunan U38-03-0277

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

: Scalable Lookup

: Scalable Lookup 6.824 2006: Scalable Lookup Prior focus has been on traditional distributed systems e.g. NFS, DSM/Hypervisor, Harp Machine room: well maintained, centrally located. Relatively stable population: can be

More information

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and

More information

Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi

Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi 1 Intelligent Neighbor Selection in P2P with CapProbe and Vivaldi Michael Parker, Amir Nader-Tehrani, Alok Nandan, Giovanni Pau Computer Science Department University of California Los Angeles Los Angeles,

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Byung-Gon Chun, Ben Y. Zhao 2, and John D. Kubiatowicz Computer Science Division, U.C. Berkeley {bgchun, kubitron}@cs.berkeley.edu

More information

A DHT-Based Grid Resource Indexing and Discovery Scheme

A DHT-Based Grid Resource Indexing and Discovery Scheme SINGAPORE-MIT ALLIANCE SYMPOSIUM 2005 1 A DHT-Based Grid Resource Indexing and Discovery Scheme Yong Meng TEO 1,2, Verdi March 2 and Xianbing Wang 1 1 Singapore-MIT Alliance, 2 Department of Computer Science,

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute

More information

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de

More information

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems

Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems Decentralized Object Location In Dynamic Peer-to-Peer Distributed Systems George Fletcher Project 3, B649, Dr. Plale July 16, 2003 1 Introduction One of the key requirements for global level scalability

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING

EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING MOHAMMAD H. NADIMI-SHAHRAKI*, FARAMARZ SAFI, ELNAZ SHAFIGH FARD Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

PIC: Practical Internet Coordinates for Distance Estimation

PIC: Practical Internet Coordinates for Distance Estimation PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB3 FB, UK Abstract This paper introduces PIC, a practical

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

Dorina Luminiţa COPACI, Constantin Alin COPACI

Dorina Luminiţa COPACI, Constantin Alin COPACI THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and

More information

Location Efficient Proximity and Interest Clustered P2p File Sharing System

Location Efficient Proximity and Interest Clustered P2p File Sharing System Location Efficient Proximity and Interest Clustered P2p File Sharing System B.Ajay Kumar M.Tech, Dept of Computer Science & Engineering, Usharama College of Engineering & Technology, A.P, India. Abstract:

More information

P2P Overlay Networks of Constant Degree

P2P Overlay Networks of Constant Degree P2P Overlay Networks of Constant Degree Guihai Chen,2, Chengzhong Xu 2, Haiying Shen 2, and Daoxu Chen State Key Lab of Novel Software Technology, Nanjing University, China 2 Department of Electrical and

More information

Resilient GIA. Keywords-component; GIA; peer to peer; Resilient; Unstructured; Voting Algorithm

Resilient GIA. Keywords-component; GIA; peer to peer; Resilient; Unstructured; Voting Algorithm Rusheel Jain 1 Computer Science & Information Systems Department BITS Pilani, Hyderabad Campus Hyderabad, A.P. (INDIA) F2008901@bits-hyderabad.ac.in Chittaranjan Hota 2 Computer Science & Information Systems

More information

Structured Peer-to-Peer Networks

Structured Peer-to-Peer Networks Structured Peer-to-Peer Networks The P2P Scaling Problem Unstructured P2P Revisited Distributed Indexing Fundamentals of Distributed Hash Tables DHT Algorithms Chord Pastry Can Programming a DHT Graphics

More information

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma

Overlay and P2P Networks. Structured Networks and DHTs. Prof. Sasu Tarkoma Overlay and P2P Networks Structured Networks and DHTs Prof. Sasu Tarkoma 6.2.2014 Contents Today Semantic free indexing Consistent Hashing Distributed Hash Tables (DHTs) Thursday (Dr. Samu Varjonen) DHTs

More information

An Efficient and Secure Peer-to-Peer Overlay Network

An Efficient and Secure Peer-to-Peer Overlay Network An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,

More information

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Routing Table Construction Method Solely Based on Query Flows for Structured Overlays Yasuhiro Ando, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology Abstract In structured

More information

Adaptive Load Balancing for DHT Lookups

Adaptive Load Balancing for DHT Lookups Adaptive Load Balancing for DHT Lookups Silvia Bianchi, Sabina Serbu, Pascal Felber and Peter Kropf University of Neuchâtel, CH-, Neuchâtel, Switzerland {silvia.bianchi, sabina.serbu, pascal.felber, peter.kropf}@unine.ch

More information

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University CPSC 4/5 PP Lookup Service Ennan Zhai Computer Science Department Yale University Recall: Lec- Network basics: - OSI model and how Internet works - Socket APIs red PP network (Gnutella, KaZaA, etc.) UseNet

More information

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems

Update Propagation Through Replica Chain in Decentralized and Unstructured P2P Systems Update Propagation Through Replica Chain in Decentralized and Unstructured PP Systems Zhijun Wang, Sajal K. Das, Mohan Kumar and Huaping Shen Center for Research in Wireless Mobility and Networking (CReWMaN)

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Three Layer Hierarchical Model for Chord

Three Layer Hierarchical Model for Chord Three Layer Hierarchical Model for Chord Waqas A. Imtiaz, Shimul Shil, A.K.M Mahfuzur Rahman Abstract Increasing popularity of decentralized Peer-to-Peer (P2P) architecture emphasizes on the need to come

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

LECT-05, S-1 FP2P, Javed I.

LECT-05, S-1 FP2P, Javed I. A Course on Foundations of Peer-to-Peer Systems & Applications LECT-, S- FPP, javed@kent.edu Javed I. Khan@8 CS /99 Foundation of Peer-to-Peer Applications & Systems Kent State University Dept. of Computer

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment

Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed, Shervin Shirmohammadi Distributed & Collaborative Virtual Environments Research Laboratory School of Information

More information

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

Comparing the performance of distributed hash tables under churn

Comparing the performance of distributed hash tables under churn Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory

More information

Coordinate-based Routing:

Coordinate-based Routing: Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Mill: Scalable Area Management for P2P Network based on Geographical Location

Mill: Scalable Area Management for P2P Network based on Geographical Location Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu, Wayne State University, Detroit, MI 48202 Guihai Chen, Nanjing University, Nanjing, China {shy,czxu,gchen}@ece.eng.wayne.edu

More information

Flexible Information Discovery in Decentralized Distributed Systems

Flexible Information Discovery in Decentralized Distributed Systems Flexible Information Discovery in Decentralized Distributed Systems Cristina Schmidt and Manish Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering, Rutgers

More information

TSP-Chord: An Improved Chord Model with Physical Topology Awareness

TSP-Chord: An Improved Chord Model with Physical Topology Awareness 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore TSP-Chord: An Improved Chord Model with Physical Topology Awareness

More information

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT 1 Avinash Chaudhari, 2 Pradeep Gamit 1 L.D. College of Engineering, Information Technology, Ahmedabad India 1 Chaudhari.avi4u@gmail.com,

More information

08 Distributed Hash Tables

08 Distributed Hash Tables 08 Distributed Hash Tables 2/59 Chord Lookup Algorithm Properties Interface: lookup(key) IP address Efficient: O(log N) messages per lookup N is the total number of servers Scalable: O(log N) state per

More information

Effects of Churn on Structured P2P Overlay Networks

Effects of Churn on Structured P2P Overlay Networks International Conference on Automation, Control, Engineering and Computer Science (ACECS'14) Proceedings - Copyright IPCO-214, pp.164-17 ISSN 2356-568 Effects of Churn on Structured P2P Overlay Networks

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

A Two-dimensional Structured Overlay Based on Flexible Routing Tables

A Two-dimensional Structured Overlay Based on Flexible Routing Tables A Two-dimensional Structured Overlay Based on Flexible Routing Tables Masashi Hojo, Hiroya Nagao, Takehiro Miyao and Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8552

More information

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department of Computer Science & Engineering University

More information

Security Considerations for Peer-to-Peer Distributed Hash Tables

Security Considerations for Peer-to-Peer Distributed Hash Tables Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.

More information

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS

PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS International Journal of Computer Networks & Communications (IJCNC) Vol.9, No.5, September 27 PERFORMANCE ANALYSIS OF R/KADEMLIA, PASTRY AND BAMBOO USING RECURSIVE ROUTING IN MOBILE NETWORKS Farida Chowdhury

More information

Query Processing Over Peer-To-Peer Data Sharing Systems

Query Processing Over Peer-To-Peer Data Sharing Systems Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,

More information

Towards Location-aware Topology in both Unstructured and Structured P2P Systems

Towards Location-aware Topology in both Unstructured and Structured P2P Systems Towards Location-aware Topology in both Unstructured and Structured P2P Systems Tongqing Qiu, Guihai Chen, Mao Ye State Key Lab of Novel Software Nanjing University Ben Y. Zhao Department of Computer Science

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems Distributed Hash Tables (DHT) Overview and Issues Paul Francis CS514: Intermediate Course in Computer Systems Lecture 26: Nov 19, 2003 Distributed Hash Tables (DHT): Overview and Issues What is a Distributed

More information

Brocade: Landmark Routing on Overlay Networks

Brocade: Landmark Routing on Overlay Networks Abstract Brocade: Landmark Routing on Overlay Networks CS262A Fall 2001 Yitao Duan, Ling Huang University of California, Berkeley duan@cs.berkeley.edu, hlion@newton.berkeley.edu Peer-to-peer networks offer

More information

INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS

INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS Mansoor Mohsin Ravi Prakash Department of Computer Science The University of Texas at Dallas Richardson, TX 75083-0688 {mmohsin,ravip}@utdallas.edu Abstract

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Evolution of Peer-to-peer algorithms: Past, present and future.

Evolution of Peer-to-peer algorithms: Past, present and future. Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different

More information

An Architecture for Peer-to-Peer Information Retrieval

An Architecture for Peer-to-Peer Information Retrieval An Architecture for Peer-to-Peer Information Retrieval Karl Aberer, Fabius Klemm, Martin Rajman, Jie Wu School of Computer and Communication Sciences EPFL, Lausanne, Switzerland July 2, 2004 Abstract Peer-to-Peer

More information