Databases with Autonomous Nodes Where P2P systems meet database techniques
|
|
- Linda Powell
- 7 years ago
- Views:
Transcription
1 Databases with Autonomous Nodes Where P2P systems meet database techniques Austin Parker University of Maryland Databases with Autonomous Nodes p.1/26
2 What is P2P? Many (relatively) equal peers, all participating in the network of their own volition. They have the ability to leave at any time. Databases with Autonomous Nodes p.2/26
3 What is P2P? Many (relatively) equal peers, all participating in the network of their own volition. They have the ability to leave at any time. Direct connectivity (no central server). Databases with Autonomous Nodes p.2/26
4 What is P2P? Many (relatively) equal peers, all participating in the network of their own volition. They have the ability to leave at any time. Direct connectivity (no central server). Existing P2P programs: Kazaa, BitTorrent, FreeNet, GNUnet, NICE, P5, etc... Databases with Autonomous Nodes p.2/26
5 P2P Systems and Databases Problem: Want large P2P systems for data storage and quick lookup / search of same. Databases with Autonomous Nodes p.3/26
6 P2P Systems and Databases Problem: Want large P2P systems for data storage and quick lookup / search of same. Solution: Existing research in databases allows for ease of storage and quick lookup / search. Databases with Autonomous Nodes p.3/26
7 P2P Systems and Databases Problem: Want large P2P systems for data storage and quick lookup / search of same. Solution: Existing research in databases allows for ease of storage and quick lookup / search. Conflict: Many standard database assumptions are no longer practical (node perpetuity, constant time pointer access, and the importance of load balancing). Databases with Autonomous Nodes p.3/26
8 Research Use existing database solutions under the significantly different P2P philosophy. Has both practical and theoretical interest. New Issues: non-uniformity of data and query frequency, efficient use of network, node fallibility. I.E. CHORD, CAN, SCRAP, P2P R-tree, SWAM-V, and others. Databases with Autonomous Nodes p.4/26
9 Load Balancing Peers join the system voluntarily. Peers will leave if they are treated unfairly: they cannot be asked to do too much more than their share. Thus: any good P2P system needs some sort of load balancing: cannot have overloaded nodes. There are two kinds: storage load and query load. Databases with Autonomous Nodes p.5/26
10 Efficient Use of Network In standard database techniques, links between nodes are pointers to memory (disk or RAM). In P2P systems, links between peers travel over the internet and suffer from various amounts of latency. Thus: in P2P systems, a means less. path length Databases with Autonomous Nodes p.6/26
11 Node Perpetuity Peers are allowed to simply leave the network, without telling anyone (for instance, if the machine crashes). P2P systems should not be breakable by such falures. This is generally solved by adding redundancy to the system (each peer keeps the state of several of its neighbors). Databases with Autonomous Nodes p.7/26
12 CHORD (Stoica, Morris, Darger, Kaashoek, Balakrshnan) A distributed hash using a skiplist. Example. Each peer gets an ID (generally a hash of the node s IP address). Each data item gets an ID (generally a hash of the data s contents). Nodes form a skiplist sorted on their IDs. Data is stored in the peer with the closest ID. Routing / Search algorithm is the same as skiplist traversal. Databases with Autonomous Nodes p.8/26
13 SCRAP (Ganesan, Yang, Garcia-Molina) Modifies CHORD to allow range queries. Instead of each data tuple getting a random ID, it is assigned an ID using a space-filling curve (i.e. z-ordering). To do a range query, one checks each node in the ring from the lowest ID in the range to the highest ID in the range. Databases with Autonomous Nodes p.9/26
14 SCRAP Example Here we have a 4 4 space ordered by row ordering. Red numbers represent IDs of peers in the system. Data items in [2,2] have ID 6 and are stored at the nearest peer with ID less than 6 (in this case, node with ID 5). Databases with Autonomous Nodes p.10/26
15 SCRAP Example To search in range [1,1] to [1,4], we must query all peers with IDs between 1 and 13 (13 queries to cover a 4 square region). Inefficient! (for any spacefilling curve, such situations arise). Databases with Autonomous Nodes p.10/26
16 Theoretics I CHORD and SCRAP (with Lookup time: peers). state kept by each peer. times the latency. SCRAP allows for nearest neighbor searches, CHORD doesn t but gives load balancing qualities. No latency optimizations. Databases with Autonomous Nodes p.11/26
17 CAN (Ratnasamy, Francis, Handley, Karp, Shenker) Generally compared to a K-D tree (though much different). Each peer gets a d-dimensional ID. Neighboring peers know of one another (in dimensions, a neighbor is one who shares an edge of dimension considered to be a torus). also, space is Each peer is responsible for data near their ID. Databases with Autonomous Nodes p.12/26
18 CAN Example Index: Graph: Databases with Autonomous Nodes p.13/26
19 CAN Example Pink Join: New Graph: Databases with Autonomous Nodes p.13/26
20 Relation to K-D tree Similarities: Partitions space similarly. Has similar search and insert algorithms. Differences: Nodes associated with regions, not points. All nodes can contain data no tree structure on top of index. Databases with Autonomous Nodes p.14/26
21 CAN CAN Optimizations: Caching: Nodes remember recently answered queries for a period of time. Replication: Overloaded nodes replicate data on their neighbors, who answer the queries in proxy some percentage of the time. Zone Overloading (binning): Allow up to MAXPEERS nodes in each region before dividing. Databases with Autonomous Nodes p.15/26
22 Theoretics II CAN (with dimensional hash ftn and peers). state kept by each peer. Lookup time: times the latency. Doesn t allow for nearest neighbor searches. Note: CAN s optimizations can significantly reduce latency and improve average peer query load. Databases with Autonomous Nodes p.16/26
23 MURK (Ganesan, Yang, Garcia-Molina) MURK is a variant of CAN. Differences: Data is no longer hashed: Grid s dimension depends on data s dimension. Add a constant number of skip pointers at each peer. Handles range queries, doesn t handle nonuniform data. Databases with Autonomous Nodes p.17/26
24 Theoretics III MURK (with -dimensional data, random links, and peers) Lookup time: state kept by each peer. times the latency. Allows for nearest neighbor searches. Databases with Autonomous Nodes p.18/26
25 P2PR-tree (Mondal, Lifu, Kitsuregawa) This is an attempt to harness the pruning power of an rtree in P2P. Divide the space statically into blocks, divide each block statically into groups. Inside each group, divide into subgroups using MBRs. Subgroups can be further divided into groups a la RTree techniques. Databases with Autonomous Nodes p.19/26
26 P2PR-tree CON T It seems that each peer has pointers to At least one peer from each block. One peer for groups in the same block. One peer for subgroups in the same group. All peers in the same subgroup. Each query is given counter, whose value determines the level to which the query should be forwarded (if 0, it goes to a block, if 1, a group, etc). Databases with Autonomous Nodes p.20/26
27 Theoretics IV P2PR-tree (with peers) state per peer (though it is unclear from the paper exactly what this would be). Lookup time: times the latency (though average time lookup will be significantly smaller). Allows for nearest neighbor searches. Databases with Autonomous Nodes p.21/26
28 SWAM (Banaei-Kashani, Shahabi) Small World Access Methods A family of P2P data storage methods satisfying: Monotonic approach towards key (always possible to forward query to a closer peer). Localized index topology (similar data objects are likely to be connected). Logarithmic forwarding-path length. Databases with Autonomous Nodes p.22/26
29 SWAM CON T Each data item has its own node (one p2p peer can function as multiple nodes in the mesh). SWAMs combine a grid and a random graph. Taken from CKIM, nov 2004, p308. Databases with Autonomous Nodes p.23/26
30 SWAM-V A proof-of-concept for SWAM. Structure based off of Voronoi diagrams. Each peer links to adjoining neighbors and one random node whose distance from the peer is large (Delaunay graph plus a 1-random graph). Databases with Autonomous Nodes p.24/26
31 Theoretics IV SWAM-V (with data items). State per peer: 6 links to other peers per stored data item (on average). Lookup time: average ( times the latency on in the worst case). Allows nearest neighbor searches. Databases with Autonomous Nodes p.25/26
32 Conclusion P2P data storage techniques harness database techniques. P2P data storage algorithms require different sets of assumptions. The solutions are interesting and usable. This a wonderful oppurtunity to Database people to learn some networking and for some networking people to learn databases. Databases with Autonomous Nodes p.26/26
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationTornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,
More informationNew Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
More informationDistributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
More informationDistributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationChord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
More informationSecurity in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
More informationIPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha
IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand
More informationDPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems Mei Li Wang-Chien Lee Anand Sivasubramaniam Department of Computer Science and Engineering Pennsylvania State University University
More informationLoad Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
More information1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
More informationCS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
More informationChord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
More informationP2P Networking - Advantages and Disadvantages of Virtualization
Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction
More informationPlaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake
Plaxton Routing - From a peer - to - peer network point of view Lars P. Wederhake Ferienakademie im Sarntal 2008 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2008 Overview 1 Introduction
More informationLOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
More informationTopological Properties
Advanced Computer Architecture Topological Properties Routing Distance: Number of links on route Node degree: Number of channels per node Network diameter: Longest minimum routing distance between any
More informationLoad Balancing in Distributed Systems: A survey
Load Balancing in Distributed Systems: A survey Amit S Hanamakkanavar * and Prof. Vidya S.Handur # * (amitsh2190@gmail.com) Dept of Computer Science & Engg, B.V.B.College of Engg. & Tech, Hubli # (vidya_handur@bvb.edu)
More informationPlaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl michael.welzl@uibk.ac.at DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
More informationA Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
More informationINTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
[Kavita, 2(4): April, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Histogram Based Live Streaming in Peer to Peer Dynamic Balancing & Clustering System
More informationRELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
More informationLecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
More informationGISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
More informationA Scalable Content-Addressable Network
A Scalable Content-Addressable Network Sylvia Ratnasamy 1 2 Paul Francis 2 Mark Handley 2 Richard Karp 1 2 Scott Shenker 2 1 Dept. of Electrical Eng. & Comp. Sci. 2 ACIRI University of California, Berkeley
More informationInternational journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
More informationA Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
More informationExploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS
Exploring the Design Space of Distributed and Peer-to-Peer Systems: Comparing the Web, TRIAD, and Chord/CFS Stefan Saroiu, P. Krishna Gummadi, Steven D. Gribble University of Washington Abstract: Despite
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationPort evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
More information1 Introduction to Internet Content Distribution
OS 521: Advanced Algorithm Design Hashing / ontent Distribution 02/09/12 Scribe: Shilpa Nadimpalli Professor: Sanjeev Arora 1 Introduction to Internet ontent Distribution 1.1 The Hot-Spot Problem 1 ertain
More informationR-trees. R-Trees: A Dynamic Index Structure For Spatial Searching. R-Tree. Invariants
R-Trees: A Dynamic Index Structure For Spatial Searching A. Guttman R-trees Generalization of B+-trees to higher dimensions Disk-based index structure Occupancy guarantee Multiple search paths Insertions
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationSCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France Maha.Abdallah@lip6.fr Hung Cuong Le
More informationDUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
More informationData Warehousing und Data Mining
Data Warehousing und Data Mining Multidimensionale Indexstrukturen Ulf Leser Wissensmanagement in der Bioinformatik Content of this Lecture Multidimensional Indexing Grid-Files Kd-trees Ulf Leser: Data
More informationHow To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip
Globally Distributed Content (Using BGP to Take Over the World) Horms (Simon Horman) horms@vergenet.net November 2001 http://supersparrow.org/ 1 Introduction Electronic content is becoming increasingly
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationAsync: Secure File Synchronization
Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de
More informationImproving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
More informationP2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
More informationChord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science chord@lcs.mit.edu
More informationICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
More informationLoad Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
More informationJoin and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
More informationThe Effectiveness of Request Redirection on CDN Robustness
The Effectiveness of Request Redirection on CDN Robustness Limin Wang, Vivek Pai and Larry Peterson Presented by: Eric Leshay Ian McBride Kai Rasmussen 1 Outline! Introduction! Redirection Strategies!
More informationA Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu
A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important
More informationPEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
More informationSecure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate
More informationAn Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
More informationHow To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
More informationA P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
More informationKrunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer
More informationLoad balancing in a heterogeneous computer system by self-organizing Kohonen network
Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.
More informationGraph Database Proof of Concept Report
Objectivity, Inc. Graph Database Proof of Concept Report Managing The Internet of Things Table of Contents Executive Summary 3 Background 3 Proof of Concept 4 Dataset 4 Process 4 Query Catalog 4 Environment
More informationVector storage and access; algorithms in GIS. This is lecture 6
Vector storage and access; algorithms in GIS This is lecture 6 Vector data storage and access Vectors are built from points, line and areas. (x,y) Surface: (x,y,z) Vector data access Access to vector
More information5. Peer-to-peer (P2P) networks
5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015
More informationMultiple-Choice Random Network for Server Load Balancing
Multiple-Choice Random Network for Server Load Balancing Ye Xia, Alin Dobra and Sueng Chul Han Computer and Information Science and Engineering Department University of Florida Gainesville, FL 36-6 Email:
More informationChapter 2 Data Storage
Chapter 2 22 CHAPTER 2. DATA STORAGE 2.1. THE MEMORY HIERARCHY 23 26 CHAPTER 2. DATA STORAGE main memory, yet is essentially random-access, with relatively small differences Figure 2.4: A typical
More informationEfficient Data Structures for Decision Diagrams
Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...
More informationLOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
More informationScalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationDATABASE DESIGN - 1DL400
DATABASE DESIGN - 1DL400 Spring 2015 A course on modern database systems!! http://www.it.uu.se/research/group/udbl/kurser/dbii_vt15/ Kjell Orsborn! Uppsala Database Laboratory! Department of Information
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationChapter 13: Query Processing. Basic Steps in Query Processing
Chapter 13: Query Processing! Overview! Measures of Query Cost! Selection Operation! Sorting! Join Operation! Other Operations! Evaluation of Expressions 13.1 Basic Steps in Query Processing 1. Parsing
More informationA Survey of Peer-to-Peer File Sharing Technologies
Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies
More informationDFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More information- Easy to insert & delete in O(1) time - Don t need to estimate total memory needed. - Hard to search in less than O(n) time
Skip Lists CMSC 420 Linked Lists Benefits & Drawbacks Benefits: - Easy to insert & delete in O(1) time - Don t need to estimate total memory needed Drawbacks: - Hard to search in less than O(n) time (binary
More informationInformation Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
More informationAcknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS
Mihai Horia Zaharia, Florin Leon, Dan Galea (3) A Simulator for Load Balancing Analysis in Distributed Systems in A. Valachi, D. Galea, A. M. Florea, M. Craus (eds.) - Tehnologii informationale, Editura
More informationEvaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network
Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute
More informationHigh Availability and Clustering
High Availability and Clustering AdvOSS-HA is a software application that enables High Availability and Clustering; a critical requirement for any carrier grade solution. It implements multiple redundancy
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationMIDAS: Multi-Attribute Indexing for Distributed Architecture Systems
MIDAS: Multi-Attribute Indexing for Distributed Architecture Systems George Tsatsanifos (NTUA) Dimitris Sacharidis (R.C. Athena ) Timos Sellis (NTUA, R.C. Athena ) 12 th International Symposium on Spatial
More informationquery enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
More informationCarnegie Mellon Computer Science Department. 15-744 Spring 2007 Theory Problem Set 2
Carnegie Mellon Computer Science Department. - Spring Theory Problem Set This problem set has questions. Answer them as clearly and concisely as possible. You may discuss ideas with others in the class,
More informationA PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
More informationA Comparison of Dictionary Implementations
A Comparison of Dictionary Implementations Mark P Neyer April 10, 2009 1 Introduction A common problem in computer science is the representation of a mapping between two sets. A mapping f : A B is a function
More informationChord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica Robert Morris David Liben-Nowell David Karger M. Frans Kaashoek Frank Dabek Hari Balakrishnan January 10, 2002 Abstract
More informationA COOL AND PRACTICAL ALTERNATIVE TO TRADITIONAL HASH TABLES
A COOL AND PRACTICAL ALTERNATIVE TO TRADITIONAL HASH TABLES ULFAR ERLINGSSON, MARK MANASSE, FRANK MCSHERRY MICROSOFT RESEARCH SILICON VALLEY MOUNTAIN VIEW, CALIFORNIA, USA ABSTRACT Recent advances in the
More informationPROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
More informationMASHUPS are an icon of Web 2.0 applications. A
, 23-25 October, 2013, San Francisco, USA MashChord: A Structured Peer-to-Peer Architecture for Mashups Based on Chord Osama Al-Haj Hassan, Ashraf Odeh, and Anas Abu Taleb Abstract Mashups are key category
More informationA Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
More informationNew Algorithms for Load Balancing in Peer-to-Peer Systems
New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing
More informationSeminar. Path planning using Voronoi diagrams and B-Splines. Stefano Martina stefano.martina@stud.unifi.it
Seminar Path planning using Voronoi diagrams and B-Splines Stefano Martina stefano.martina@stud.unifi.it 23 may 2016 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International
More informationCS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
More informationPeer-to-Peer Replication
Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................
More informationSimple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationInfiniteGraph: The Distributed Graph Database
A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086
More informationA Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal
More informationIntroduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationMulticast Group Management for Interactive Distributed Applications
Multicast Group Management for Interactive Distributed Applications Carsten Griwodz griff@simula.no September 25, 2008 based on the thesis work of Knut-Helge Vik, knuthelv@simula.no Group communication
More information