CS5412: TIER 2 OVERLAYS
|
|
|
- Eugenia Richards
- 10 years ago
- Views:
Transcription
1 1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman
2 Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data center itself. It has tiers (tier 1, 2, backend) and a wide range of technologies Many of those use a DHT concept and would be build on a DHT. But we can t use Chord here!
3 Today s focus 3 How can we create distributed hash tables optimized for use in cloud computing settings? If you look deeply into systems like the ones we discussed last time, you ll find DHT technology at the base. So with a DHT you can layer fancier things on top but the DHT determines the speed!
4 First problem with Chord: Cost 4 Internal to a cloud data center a DHT needs to be blindingly fast Put operation should have cost no higher than 1 RPC directly to the nodes where the data will live Get operation could have a cost of 1 RPC In Chord with as few as 1000 participants, costs can include 9 routing hops. So this is unacceptable
5 Another problem : Hot spots 5 As conditions in a network change Some items may become far more popular than others and be referenced often; others rarely: hot/cold spots Members may join that are close to the place a finger pointer should point... but not exactly at the right spot Churn could cause many of the pointers to point to nodes that are no longer in the network, or behind firewalls where they can t be reached This has stimulated work on adaptive overlays
6 Today look at three examples 6 Beehive: A way of extending Chord so that average delay for finding an item drops to a constant: O(1) Pastry: A different way of designing the overlay so that nodes have a choice of where a finger pointer should point, enabling big speedups Kelips: A simple way of creating an O(1) overlay that trades extra memory for faster performance
7 File systems on overlays 7 If time permits, we ll also look at ways that overlays can host true file systems CFS and PAST: Two projects that used Chord and Pastry, respectively, to store blocks OceanStore: An archival storage system for libraries and other long-term storage needs
8 Insight into adaptation 8 Many things in computer networks exhbit Pareto popularity distributions This one graphs frequency by category for problems with cardboard shipping cartons Notice that a small subset of issues account for most problems
9 Beehive insight 9 Small subset of keys will get the majority of Put and Get operations Intuition is simply that everything is Pareto! By replicating data, we can make the search path shorter for a Chord operation... so by replicating in a way proportional to the popularity of an item, we can speed access to popular items!
10 Beehive: Item replicated on N/2 nodes 10 If an item isn t on my side of the Chord ring it must be on the other side In this example, by replicating a (key,value) tuple over half the ring, Beehive is able to guarantee that it will always be found in at most 1 hop. The system generalizes this idea, matching the level of replication to the popularity of the item.
11 Beehive strategy 11 Replicate an item on N nodes to ensure O(0) lookup Replicate on N/2 nodes to ensure O(1) lookup... Replicate on just a single node (the home node) and worst case lookup will be the original O(log n) So use popularity of the item to select replication level
12 Tracking popularity 12 Each key has a home node (the one Chord would pick) Put (key,value) to the home node Get by finding any copy. Increment access counter Periodically, aggregate the counters for a key at the home node, thus learning the access rate over time A leader aggregates all access counters over all keys, then broadcasts the total access rate... enabling Beehive home nodes to learn relative rankings of items they host... and to compute the optimal replication factor for any target O(c) cost!
13 Notice interplay of ideas here 13 Beehive wouldn t work if every item was equally popular: we would need to replicate everything very aggressively. Pareto assumption addresses this Tradeoffs between parallel aspects (counting, creating replicas) and leader-driven aspects (aggregating counts, computing replication factors) We ll see ideas like these in many systems throughout CS5412
14 Pastry 14 A DHT much like Chord or Beehive But the goal here is to have more flexibility in picking finger links In Chord, the node with hashed key H must look for the nodes with keys H/2, H/4, etc... In Pastry, there are a set of possible target nodes and this allows Pastry flexibility to pick one with good network connectivity, RTT (latency), load, etc
15 Pastry also uses a circular number space 15 65a1fc d46a1c Route(d46a1c) d471f1 d467c4 d462ba d4213f d13da3 Difference is in how the fingers are created Pastry uses prefix match rather than binary splitting More flexibility in neighbor selection
16 16 Pastry routing table (for node 65a1fc) Pastry nodes also have a leaf set of immediate neighbors up and down the ring Similar to Chord s list of successors
17 Pastry join 17 X = new node, A = bootstrap, Z = nearest node A finds Z for X In process, A, Z, and all nodes in path send state tables to X X settles on own table Possibly after contacting other nodes X tells everyone who needs to know about itself Pastry paper doesn t give enough information to understand how concurrent joins work 18 th IFIP/ACM, Nov 2001
18 Pastry leave 18 Noticed by leaf set neighbors when leaving node doesn t respond Neighbors ask highest and lowest nodes in leaf set for new leaf set Noticed by routing neighbors when message forward fails Immediately can route to another neighbor Fix entry by asking another neighbor in the same row for its neighbor If this fails, ask somebody a level up
19 19 For instance, this neighbor fails
20 20 Ask other neighbors Try asking some neighbor in the same row for its 655x entry If it doesn t have one, try asking some neighbor in the row below, etc.
21 CAN, Chord, Pastry differences 21 CAN, Chord, and Pastry have deep similarities Some (important???) differences exist CAN nodes tend to know of multiple nodes that allow equal progress Can therefore use additional criteria (RTT) to pick next hop Pastry allows greater choice of neighbor Can thus use additional criteria (RTT) to pick neighbor In contrast, Chord has more determinism How might an attacker try to manipulate system?
22 Security issues 22 In many P2P systems, members may be malicious If peers untrusted, all content must be signed to detect forged content Requires certificate authority Like we discussed in secure web services talk This is not hard, so can assume at least this level of security
23 Security issues: Sybil attack 23 Attacker pretends to be multiple system If surrounds a node on the circle, can potentially arrange to capture all traffic Or if not this, at least cause a lot of trouble by being many nodes Chord requires node ID to be an SHA-1 hash of its IP address But to deal with load balance issues, Chord variant allows nodes to replicate themselves A central authority must hand out node IDs and certificates to go with them Not P2P in the Gnutella sense
24 General security rules 24 Check things that can be checked Invariants, such as successor list in Chord Minimize invariants, maximize randomness Hard for an attacker to exploit randomness Avoid any single dependencies Allow multiple paths through the network Allow content to be placed at multiple nodes But all this is expensive
25 Load balancing 25 Query hotspots: given object is popular Cache at neighbors of hotspot, neighbors of neighbors, etc. Classic caching issues Routing hotspot: node is on many paths Of the three, Pastry seems most likely to have this problem, because neighbor selection more flexible (and based on proximity) This doesn t seem adequately studied
26 Load balancing 26 Heterogeneity (variance in bandwidth or node capacity Poor distribution in entries due to hash function inaccuracies One class of solution is to allow each node to be multiple virtual nodes Higher capacity nodes virtualize more often But security makes this harder to do
27 Chord node virtualization 27 10K nodes, 1M objects 20 virtual nodes per node has much better load balance, but each node requires ~400 neighbors!
28 Fireflies 28 Van Renesse uses this same trick (virtual nodes) In his version a form of attack-tolerant agreement is used so that the virtual nodes can repell many kinds of disruptive attacks We won t have time to look at the details today
29 Another major concern: churn 29 Churn: nodes joining and leaving frequently Join or leave requires a change in some number of links Those changes depend on correct routing tables in other nodes Cost of a change is higher if routing tables not correct In chord, ~6% of lookups fail if three failures per stabilization But as more changes occur, probability of incorrect routing tables increases
30 30 Control traffic load generated by churn Chord and Pastry appear to deal with churn differently Chord join involves some immediate work, but repair is done periodically Extra load only due to join messages Pastry join and leave involves immediate repair of all effected nodes tables Routing tables repaired more quickly, but cost of each join/leave goes up with frequency of joins/leaves Scales quadratically with number of changes??? Can result in network meltdown???
31 Kelips takes a different approach 31 Network partitioned into N affinity groups Hash of node ID determines which affinity group a node is in Each node knows: One or more nodes in each group All objects and nodes in own group But this knowledge is soft-state, spread through peer-topeer gossip (epidemic multicast)!
32 Rationale? 32 Kelips has a completely predictable behavior under worst-case conditions It may do better but won t do worse Bounded message sizes and rates that never exceed what the administrator picks no matter how much churn occurs Main impact of disruption: Kelips may need longer before Get is guaranteed to return value from prior Put with the same key
33 33 Kelips Affinity group view id hbeat rtt Affinity Groups: peer membership thru consistent hash 110 knows about other members 230, ms ms N N members per affinity group Affinity group pointers
34 Kelips 34 Affinity group view id hbeat rtt ms ms Affinity Groups: peer membership thru consistent hash is a contact for 110 in group 2 N - 1 Contacts group contactnode N members per affinity group Contact pointers
35 35 Kelips Affinity group view id hbeat rtt ms ms cnn.com maps to group 2. So 110 tells group 2 to route inquiries about cnn.com to it. Affinity Groups: peer membership thru consistent hash N - 1 Contacts group contactnode N members per affinity group Resource Tuples resource info cnn.com 110 Gossip protocol replicates data cheaply
36 How it works 36 Kelips is entirely gossip based! Gossip about membership Gossip to replicate and repair data Gossip about last heard from time used to discard failed nodes Gossip channel uses fixed bandwidth fixed rate, packets of limited size
37 Gossip Suppose that I know something I m sitting next to Fred, and I tell him Now 2 of us know Later, he tells Mimi and I tell Anne Now 4 This is an example of a push epidemic Push-pull occurs if we exchange data
38 % infected Gossip scales very nicely 38 Participants loads independent of size Network load linear in system size Information spreads in log(system size) time Time
39 Gossip in distributed systems 39 We can gossip about membership Need a bootstrap mechanism, but then discuss failures, new members Gossip to repair faults in replicated data I have 6 updates from Charlie If we aren t in a hurry, gossip to replicate data too
40 Gossip about membership 40 Start with a bootstrap protocol For example, processes go to some web site and it lists a dozen nodes where the system has been stable for a long time Pick one at random Then track processes I ve heard from recently and processes other people have heard from recently Use push gossip to spread the word
41 Gossip about membership 41 Until messages get full, everyone will known when everyone else last sent a message With delay of log(n) gossip rounds But messages will have bounded size Perhaps 8K bytes Then use some form of prioritization to decide what to omit but never send more, or larger messages Thus: load has a fixed, constant upper bound except on the network itself, which usually has infinite capacity
42 Back to Kelips: Quick reminder 42 Affinity group view id hbeat rtt ms ms Affinity Groups: peer membership thru consistent hash N - 1 Contacts group contactnode N members per affinity group Contact pointers
43 43 How Kelips works Node 175 is a contact for Node 102 in some affinity Hmm Node 19 looks like a much better group contact in affinity group Node Gossip data stream Gossip about everything Heuristic to pick contacts: periodically ping contacts to check liveness, RTT swap so-so ones for better ones.
44 Replication makes it robust 44 Kelips should work even during disruptive episodes After all, tuples are replicated to N nodes Query k nodes concurrently to overcome isolated crashes, also reduces risk that very recent data could be missed we often overlook importance of showing that systems work while recovering from a disruption
45 45 Control traffic load generated by churn None O(changes) O(Changes x Nodes)? Kelips Chord Pastry
46 Summary 46 Adaptive behaviors can improve overlays Reduce costs for inserting or looking up information Improve robustness to churn or serious disruption As we move from CAN to Chord to Beehive or Pastry one could argue that complexity increases Kelips gets to a similar place and yet is very simple, but pays a higher storage cost than Chord/Pastry
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN) Luca Bettosini Universität Bern Outline > Goals / Motivation ( CAN ) > Content Addressable Network > CAN Multicast
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
Kelips : Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead
Kelips : Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead Indranil Gupta, Ken Birman, Prakash Linga, Al Demers, Robbert van Renesse Cornell University, Ithaca,
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
Load Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
Peer-to-peer systems and overlays
Peer-to-peer systems and overlays Marco Aiello, University of Groningen [email protected] Distributed Systems Seminars @ La Sapienza Univ. di Roma 29 April 2010 1 Summary A bit of history Overlay networks
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
Distributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology [email protected] Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
LOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
PEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes
% " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
Peer-to-Peer and Grid Computing. Chapter 4: Peer-to-Peer Storage
Peer-to-Peer and Grid Computing Chapter 4: Peer-to-Peer Storage Chapter Outline Using DHTs to build more complex systems How DHT can help? What problems DHTs solve? What problems are left unsolved? P2P
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Data Warehousing und Data Mining
Data Warehousing und Data Mining Multidimensionale Indexstrukturen Ulf Leser Wissensmanagement in der Bioinformatik Content of this Lecture Multidimensional Indexing Grid-Files Kd-trees Ulf Leser: Data
query enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
Scalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
Dr Markus Hagenbuchner [email protected] CSCI319. Distributed Systems
Dr Markus Hagenbuchner [email protected] CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
P2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
T he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT
SECOND QUARTER 2005, VOLUME 7, NO. 2 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal -Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY AND COMPARISON OF PEER-TO-PEER OVERLAY
Cloud Computing at Google. Architecture
Cloud Computing at Google Google File System Web Systems and Algorithms Google Chris Brooks Department of Computer Science University of San Francisco Google has developed a layered system to handle webscale
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside
Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among
Tornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao [email protected] Chung-Ta King* [email protected] Department of Computer Science National Tsing Hua University Hsinchu,
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science [email protected]
Chord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
Tracker vs. DHT Performance Comparison for P2P Streaming
Tracker vs. DHT Performance Comparison for P2P Streaming draft-hu-ppsp-tracker-dht-performance-comparison Yan Hu, NEC Labs China Yong Xia, NEC Labs China Jan Seedorf, NEC Labs Europe Outline Introduction
A Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling
AKAMAI WHITE PAPER Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling Delivering Dynamic Web Content in Cloud Computing Applications 1 Overview
Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Domain Name System for PeerHosting
Domain Name System for PeerHosting Arnav Aggarwal, B.Tech A dissertation submitted to the University of Dublin, in partial fulfilment of the requirements for degree of Master of Science in Computer Science
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao [email protected], [email protected], [email protected], [email protected]
D1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
Improving Query Processing Performance in Large Distributed Database Management Systems
Norvald H. Ryeng Improving Query Processing Performance in Large Distributed Database Management Systems Thesis for the degree of Philosophiae Doctor Trondheim, November 2011 Norwegian University of Science
CS 360 Internet Programming
Peer-to-Peer Networking File Sharing, and Computer Science Brigham Young University 1 Peer-to-Peer File Sharing with Ultrapeers Overview Peer-to-Peer File Sharing with Ultrapeers peer-to-peer peers exchange
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
Calto: A Self Sufficient Presence System for Autonomous Networks
Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central
WINDOWS AZURE DATA MANAGEMENT AND BUSINESS ANALYTICS
WINDOWS AZURE DATA MANAGEMENT AND BUSINESS ANALYTICS Managing and analyzing data in the cloud is just as important as it is anywhere else. To let you do this, Windows Azure provides a range of technologies
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
A SENSIBLE GUIDE TO LATENCY MANAGEMENT
A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former
EECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Identity Theft Protection in Structured Overlays
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005 Background: Structured Overlays network abstraction IDs, not IPs app level
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Hashing in Networked Systems
LB Server Cluster Switches Hashing in Networked Systems COS 461: Computer Networks Spring 2011 Mike Freedman h@p://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Hash funcion Hashing FuncIon that
Naming vs. Locating Entities
Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address
Tools for Peer-to-Peer Network Simulation
Tools for Peer-to-Peer Network Simulation draft-irtf-p2prg-core-simulators-00.txt Alan Brown and Mario Kolberg University of Stirling, UK IETF65 P2PRG - March 24, 2006 1 Overview Provide survey of tools
SwanLink: Mobile P2P Environment for Graphical Content Management System
SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
Architectures and protocols in Peer-to-Peer networks
Architectures and protocols in Peer-to-Peer networks Ing. Michele Amoretti [[email protected]] II INFN SECURITY WORKSHOP Parma 24-25 February 2004 Contents - Definition of Peer-to-Peer network - P2P
CS5412: TORRENTS AND TIT-FOR-TAT
1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VI Ken Birman BitTorrent 2 Today we ll be focusing on BitTorrent The technology really has three aspects A standard tht BitTorrent client systems follow Some
P2P Networking - Advantages and Disadvantages of Virtualization
Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park [email protected] 1 Introduction
Design and Implementation of a P2P Cloud System
Design and Implementation of a P2P Cloud Ozalp Babaoglu, Moreno Marzolla, Michele Tamburini {babaoglu, marzolla}@cs.unibo.it, [email protected] Our Goal Assemble a Cloud out of individual devices E.g.
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Giving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
Data Center Content Delivery Network
BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay
A Survey of Peer-to-Peer File Sharing Technologies
Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies
PEER TO PEER CLOUD FILE STORAGE ---- OPTIMIZATION OF CHORD AND DHASH. COEN283 Term Project Group 1 Name: Ang Cheng Tiong, Qiong Liu
PEER TO PEER CLOUD FILE STORAGE ---- OPTIMIZATION OF CHORD AND DHASH COEN283 Term Project Group 1 Name: Ang Cheng Tiong, Qiong Liu 1 Abstract CHORD/DHash is a very useful algorithm for uploading data and
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
