Lecture 15 October 31

Similar documents
Distributed Hash Table

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

P2P: Distributed Hash Tables

A Framework for Peer-To-Peer Lookup Services based on k-ary search

Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications

Chord: A Scalable Peer-to-peer Lookup Service For Internet Applications

Finding Data in the Cloud using Distributed Hash Tables (Chord) IBM Haifa Research Storage Systems

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems

Semester Thesis on Chord/CFS: Towards Compatibility with Firewalls and a Keyword Search

CSE 486/586 Distributed Systems

CIS 700/005 Networking Meets Databases

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Ch06. NoSQL Part III.

Finding Data in the Cloud using Distributed Hash Tables (Chord) IBM Haifa Research Storage Systems

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Dorina Luminiţa COPACI, Constantin Alin COPACI

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

A Scalable Content- Addressable Network

CS535 Big Data Fall 2017 Colorado State University 11/7/2017 Sangmi Lee Pallickara Week 12- A.

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays

E. Shim Panasonic October 16, 2006

Query Processing Over Peer-To-Peer Data Sharing Systems

An Indexing Framework for Structured P2P Systems

CS 223 Final Project CuckooRings: A Data Structure for Reducing Maximum Load in Consistent Hashing

Comparing the performance of distributed hash tables under churn

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

Building a low-latency, proximity-aware DHT-based P2P network

Routing Table Construction Method Solely Based on Query Flows for Structured Overlays

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Distributed Hash Tables

Effect of Links on DHT Routing Algorithms 1

Flexible Information Discovery in Decentralized Distributed Systems

A Real-time Distributed Storage System for Multi-Resolution Virtual Synchrophasor

L3S Research Center, University of Hannover

A Simple Fault Tolerant Distributed Hash Table

Securing Chord for ShadowWalker. Nandit Tiku Department of Computer Science University of Illinois at Urbana-Champaign

Using Approximation Methods to Implement Quota Mechanism in Peer-to-Peer System

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

DRing: A Layered Scheme for Range Queries over DHTs

ReCord: A Distributed Hash Table with Recursive Structure

Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

L3S Research Center, University of Hannover

Passive/Active Load Balancing with Informed Node Placement in DHTs

6 Distributed data management I Hashing

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

CSE-E5430 Scalable Cloud Computing Lecture 10

Understanding Chord Performance

Chapter 6 PEER-TO-PEER COMPUTING

Distributed Storage for Tor Hidden Service Descriptors

INFORMATION MANAGEMENT IN MOBILE AD HOC NETWORKS

Evolution of Peer-to-peer algorithms: Past, present and future.

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

ProRenaTa: Proactive and Reactive Tuning to Scale a Distributed Storage System

CS514: Intermediate Course in Computer Systems

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General

Lecture 8: Orthogonal Range Searching

Load Balancing in Structured P2P Systems

Degree Optimal Deterministic Routing for P2P Systems

search(i): Returns an element in the data structure associated with key i

Distributed Balanced Tables: Not Making a Hash of it All

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer

Architectures for Distributed Systems

Passive/Active Load Balancing with Informed Node Placement in DHTs

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks

Structured Peer-to-Peer Networks

An Adaptive Stabilization Framework for Distributed Hash Tables

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks

Resource Discovery in a Dynamic Grid Environment

Adaptive Load Balancing for DHT Lookups

Trustworthy Service Caching: Cooperative Search in P2P Information Systems

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Goals. EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Solution. Overlay Networks: Motivations.

NodeId Verification Method against Routing Table Poisoning Attack in Chord DHT

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Structured P2P. Complexity O(log N)

Athens University of Economics and Business. Dept. of Informatics

Survey of DHT Evaluation Methods

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

Sloppy hashing and self-organizing clusters

The Cost of Inconsistency in DHTs

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

Theory of Computing Systems 2006 Springer Science+Business Media, Inc.

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Dynamic Characteristics of k-ary n-cube Networks for Real-time Communication

A DHT-Based Grid Resource Indexing and Discovery Scheme

Badri Nath Rutgers University

Babelchord: a Social Tower of DHT-Based Overlay Networks

DHT Routing Using Social Links

Transcription:

CS559: ALGORITHMIC ASPECTS OF COMPUTER NETWORKSFall 2007 Lecture 15 October 31 Lecturer: John Byers BOSTON UNIVERSITY Scribe: Georgios Smaragdakis In today s lecture, we elaborate more on structured eer-to-eer systems based on Distributed Hashing Tables (DHTs). We resent two of them, (1) the Chord system [3], and (2) the Content-Addressable Network (CAN) [2]. Both systems are motivated by very large storage alications, where a large universe of items has to be laced and retrieved in a large network. 15.1 DHT Basics Main functions of DHTs are: Looku; given a key, the key is maed onto a node, resulting a < key, value > air. The metric that is used to evaluate the erformance of looku is the number of messages to erform a looku. DHTs eliminate the need for bootstraing. Maintenance, i.e. reairs and udates. Correctness, i.e. maintain the invariance of the system under churn, is a requirement. The erformance metric is the number of messages needed to erform a restoration due to the arrival of a new node in the system, dearture or failure of a node (the restoration comlexity is identical). 15.2 Chord In Chord, both the nodes and the items are hashed on [0, R], where R is the maximum value in the hashing sace (the hash sace in not any more a line, but a ring). Consider a system with N nodes and I items or keys (henceforth, we will use the terms items and keys interchangeably). A node in osition stores its successors (the finger table): i succ ( + R 2 i mod R ), i [1, 2,..., log R] (see Figure 15.1). For routing uroses, a node needs to store its successor and the intervals that each successor is resonsible for. Thus, the sace requirements for the routing table is log R ointers and intervals. Each node is also connected to the immediate neighbor (to guarantee that a request always rogresses). Note that the aforementioned system achieves load balancing of storage, if hashing is also used to lace objects. On average, I/N items are stored in each node. It is also roved that the distance to an object is halved after each ho, with high robability. 15-1

Figure 15.1. Grahical illustration of the overlay neighbors that node with id maintains. examle: = 50, R = 100 Routing table: 3 [3 49] 78 [78 2] 63 [63 77]... 15.2.1 An alternative view of the Chord structure Diagrammatically looks different than random trees [1]. Nevertheless, Chord structure is similar to an unbalanced k-ary tree, like random tree (see Figure 15.2). Ideas like threshold-relication can be also alied in Chord. Notice that different aths traverse the same links before reaching a target node. 15.2.2 Node insertions and deartures Node Insertion Initially, a newcomer node should have an entry oint, i.e. connect to at least one node that already articiates in the network. Then it roceeds to the following stes: 15-2

long jums smaller jums Figure 15.2. Reduction of Chord to Random Tree structure. Chord CAN Looku O(log N) O(d N 1/d ) for d = log N, O(log N) Restoration O(log 2 N) O(d N 1/d ) (log N ointers have to be adjusted for d = log N, O(log N) and each one is located in log N stes) Table 15.1. Comlexity (robabilistic bounds) of looku and restoration in Chord and CAN. N is the number of nodes in the system and d is the dimensionality of sace in CAN. 1. Find the successor and redecessor, in O(log N) stes. The newcomer lookus the hash value for key and node id that are maed to the same sace, and selects the resonsible node id as successor (or redecessor accordingly). The selection is strictly based on the has value and not any network or geograhical distance metric. 2. Migrate < key, value > airs. 3. Udate finger table (entries that oint to the interval [x, ]). There are log N intervals each of size dist(x, ) that have to be corrected. Locating the first node in each of these intervals amounts a looku that takes O(log N) time. Interval width is exected to be a small (see also Figure 15.3). Note that each node has a constant out-degree and in-degree. Node Dearture When a node dearts (or fails), the aforementioned stes have to be undone. Note that now the successor and the redecessor of the dearting node are known. 15-3

Figure 15.3. Node is a newcomer in the system. Shaded area denotes that hash area that has to be reassigned. Figure 15.4. Node is leaving the system. Shaded area denotes that hash area that has to be reassigned. 15-4

15.3 CAN In CAN, items are laced in a d-dimensional lattice (coordinate system). Servers are resonsible for zones (regions) in the d-dimensional sace. Requests are routed to neighboring regions, resulting a worse routing time of d N 1/d (roduct of dimensions and side length of dimension, see Figure 15.6). Insertion of a server causes a zone to be slit, along with migration of < key, value > airs, and udate of neighboring servers in the coordinate system. Deartures of servers causes zones to be merged (along with migration of airs and udates of neighboring servers). 0 1 N N 1/3 N 1/3 1 N N 1/3 Figure 15.5. CAN defines a d-dimensional sace. It can be abstracted as a d-grid with N 1/d oints in each dimension. A 0.25 B 0.25 Figure 15.6. Forwarding in (2-dimensional) CAN. 15-5

Bibliograhy [1] David Karger, Eric Lehman, Tom Leighton, Rina Panigrahy, Matthew Levine, and Daniel Lewin. Consistent hashing and random trees: distributed caching rotocols for relieving hot sots on the world wide web. In STOC 97, 1997. [2] Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Kar, and Scott Schenker. A scalable content-addressable network. In SIGCOMM 01, 2001. [3] Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, and Hari Balakrishnan. Chord: a scalable eer-to-eer looku rotocol for internet alications. IEEE/ACM Trans. Netw., 11(1):17 32, 2003. 6