Plaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake
|
|
|
- Laurence Hopkins
- 9 years ago
- Views:
Transcription
1 Plaxton Routing - From a peer - to - peer network point of view Lars P. Wederhake Ferienakademie im Sarntal 2008 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2008
2 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
3 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
4 The Basic Problem... We want to: Share content with others Make content unavailable to others Search for content And that in fact as fast as possible... but... Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
5 Desirable Properties of a P2P - Net There s more than mere performance When evaluating a P2P - Net it is a good idea to consider the following criteria: Scalability Maintenance Reliability Security Anonymity Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
6 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
7 Origin and original intention Part I The W-Questions: Who: C. Greg Plaxton, Rajmohan Rajaraman, Andrea W. Richa University of Texas in Austin What: Accessing Nearby Copies of Replicated Objects in a Distributed Environment When: April 1997 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
8 Origin and original intention Part II Why: (i) High speed networks, (ii) large numbers of geographically dispersed computers Cooperation & Sharing Content (iii) Rapidly growing demand of users... overloading network resources Main goal: Efficient usage of network resources Not intention: A P2P-Net Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
9 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
10 Overlay Network PR defines a routing mechanism and a virtual network structure: A virtual network with Neighbor Concept Messaging via TCP/IP Routing between nodes on application level Nodes usally are no routers in the underlay network Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
11 The Underlying Network To make their network model work: Cost function c : N R +, c(1) = 1 non-decreasing Symmetry: c(u, v) = c(v, u) Triangle inequaltiy: c(u, ω) c(u, v) + c(v, ω) ball with radius r around u is M(u, r) Regularity of metric: min{δ M(u, r), n} M(u, 2r) { M(u, r) } Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
12 Regularity of metric: Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
13 Overview on the Plaxton Model Part I The Plaxton Mesh is a distributed data structure with these properties Naming: random fixed length and unique bit-sequence. Typically hash of host/object name names independent of location and semanctics Structuring: Each node owns a neighbor list which is separated in a (i,j)- primary neighbor (i,j) secondary neighbors reverse neighbors pointer list of entries like: (A, Y, k), A: some object, Y: node Y, k: costs on accessing A on Y. Tree structure: every object is rooted at node with the bit-string nearest to object s one. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
14 Neighconcept: Visualization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
15 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
16 The Routing Procedure Message M Destination address D A Plaxton mesh routes M to the node whose name is numerically closest to D. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
17 Routing illustrated 5 hex digits Namespace: 2 20 Routing from to Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
18 Routing Mechanism Part I Each node has a neighbor map Multiple levels log(n) level i - matching prefix entries for i digits Number of entries per level = the ID base = b Table Size: b log(n) At each entry the closest prefix matching node Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
19 Routing Mechanism Part II Route to node x e.g.: (A5F42) Shared prefix i Look at level i + 1 Match the next digit in destination Send message Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
20 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
21 Content Accessing Locating H(O) := Hash of an object O S := Host of file (Server) A client C wants to find object O. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
22 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
23 Content Accessing Locating H(O) := Hash of an object O S := Host of file (Server) A client C wants to find object O. Evaluates H(O), using same algorithm as the server Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
24 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
25 Content Accessing Locating H(O) := Hash of an object O S := Host of file (Server) A client C wants to find object O. Evaluates H(O), using same algorithm as the server Sends a QUERY message to H(O) Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
26 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
27 Accessinging Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
28 Content Accessing Locating H(O) := Hash of an object O S := Host of file (Server) A client C wants to find object O. Evaluates H(O), using same algorithm as the server Sends a QUERY message to H(O) Forwarded to X, the object root. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
29 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
30 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
31 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
32 Content Accessing Locating H(O) := Hash of an object O S := Host of file (Server) The object root forwards the message to S. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
33 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
34 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
35 Content Accessing Locating H(O) := Hash of an object O S := Host of file (Server) Shortcut - Nodes in the tree of O also know location of O If QUERY message reaches one of these nodes, it is forwarded directly to S. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
36 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
37 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
38 Accessing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
39 Publishing & Sharing Content Exemplifying the algorithm H(O) := Hash of an object O S := Host of file (Server) Server S wants to publish object O S computes H(O), the object ID of O (hash of the name). Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
40 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
41 Publishing & Sharing Content Exemplifying the algorithm Server S wants to publish object O S computes H(O), the object ID of O (hash of the name). S sends a PUBLISH message to node H(O). Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
42 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
43 Publishing & Sharing Content Exemplifying the algorithm Server S wants to publish object O S computes H(O), the object ID of O (hash of the name). S sends a PUBLISH message to node H(O). Nodes visited by the PUBLISH message associate H(O) with physical address of S (including root node) These nodes are the tree of the object O Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
44 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
45 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
46 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
47 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
48 Publishing & Sharing Content Exemplifying the algorithm Node H(O) might not exist. No problem. Message forwarded deterministically to node X with address closest to H(O). X - root node for object O Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
49 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
50 Making Content Unavailable Demonstrating the algorithm Server S wants to unshare object O Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
51 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
52 Making Content Unavailable Demonstrating the algorithm Server S wants to unshare object O S deletes the entry (O, S, 0) from its pointer list Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
53 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
54 Making Content Unavailable Demonstrating the algorithm Server S wants to unshare object O S deletes the entry (O, S, 0) from its pointer list S asks its reverse neighbors for a copy of O S chooses that node/entry with smallest costs Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
55 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
56 Making Content Unavailable Demonstrating the algorithm Server S wants to unshare object O S deletes the entry (O, S, 0) from its pointer list S asks its reverse neighbors for the nearest copy of O If copy of O S receives success messages. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
57 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
58 Making Content Unavailable Demonstrating the algorithm S passes the delete request along the S Stops on not finding an entry or when on root. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
59 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
60 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
61 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
62 Publishing Visulization Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
63 Theorem 1 Hypothesis Theorem 1: Let x be any node in V and let A be any object in A. If y is the nearest node to x that holds a shared copy of A, then the expected cost of a read operation is: O(f (l(a)) c(x, y)). Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
64 Sketch of Proof Theorem 1 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
65 Sketch of Proof Theorem 1 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
66 Sketch of Proof Theorem 1 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
67 Sketch of Proof Theorem 1 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
68 Sketch of Proof Theorem 1 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
69 Sketch of Proof Theorem 1 Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
70 Sketch of Proof - Theorem 1 Let k be = M(u, c(u, v)). What is the probability that u is a primary (i,j)-neighbor of v, if distance is c(u,v) Cancel nodes in ball within that radius until only those two are left Pr[P j (u)holds] = (1/2) (i+1)b (1 (1/2) (i+1)b ) NumberofNodesinarea Nodes in area are k/ 2. k minus v and u. upper bounded by e (k/ 2)/2(i+1)b Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
71 Sketch of Proof - Theorem 1 Corrollary: N(u, 2 ib log(n)) contains (i,j)-primary neighbor of v whp. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
72 Sketch of Proof - Theorem 1 We will proove u V, i [log(n)/b] Numberofi leaves(u) = O(2 ib log(n)) v i leaf (u) v N(u, c 0 2 ib log(n)); c R Corol. 1 j [i], v j N(v j+1, c 1 2 j+1 log(n)) Proof by Induction: Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
73 Sketch of Proof - Theorem 1 Hypothesis: j [i + 1], v = v 0 N(v j, c 0 2 jb log(n)) whp Induction base j=0 trivial Induction step : Assumption: v N(v j, c 0 2 jb log(n)) By Corol1 : v j N(v j+1, c 0 2 ib log(n) remember if v N(u, k 0 )andω N(v, k 1 ) w N(u, 2 k 0 + k 1 ) but set u = v j+1, v = v j and ω = v j 1 v N(v j+1, ( 2 k 0 + k 1 ) 2 jb log(n) Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
74 Sketch fo Proof - Theorem 1 set ( 2 k 0 + k 1 ) = c, that is a constant factor finally v N(v j+1, c 2 (j+1) b ) N(u, O(2 ib log(n)) Since by reg. of metric we can derive that the radius increases only by a constant factor, too. only finite number of steps => O(c(x, y) we won t proove: E[ c(x i, x i+1 ) + c(y i, y i+1 ))] O(c(x, y)) 0 i<τ Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
75 Theorem 2 Hypothesis Theorem 2: The expected cost of an insert operation is O(C), and that of a delete operation is O(C logn). Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
76 Theorem 3 Hypthesis Theorem 3: Let q be the number of objects that can be stored in the main memory of each node. The size of the auxiliary memory at each node is O(q log 2 n) words whp. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
77 Theorem 4 Hypothesis Definition 4.1: Adaptability: The number of nodes whose auxiliary memory is updated upon the addition or removal of a node. Theorem 4 The adaptability of our scheme is O(logn) expected and O(log 2 n) whp. Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
78 Overview 1 Introduction Motivation for studying PR The Background of PR 2 General Ideas and Concepts Plaxton Mesh under the Overlay The Routing Algorithm Content Related Operations 3 Results Advantages and Drawbacks of PR Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
79 Benefits of PR Locality Simple fault handling Scalable Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
80 Shortcomings of PR Global knowledge required to build routing tables Expensive to initialize the network Static network Bad for P2P Root node vulnerability Causes moderate maitenance Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
81 Conclusion PR provides a scalable, quite realiable, static network structure PR exploits locality Outlook How does it acquit itself on arbitrary cost functions? Is there any chance to improve the adaptability? How about hotspots or taking network bandwith into account? Lars (Ferienakademie im Sarntal 2008) Plaxton Routing Sept / 81
Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
- Easy to insert & delete in O(1) time - Don t need to estimate total memory needed. - Hard to search in less than O(n) time
Skip Lists CMSC 420 Linked Lists Benefits & Drawbacks Benefits: - Easy to insert & delete in O(1) time - Don t need to estimate total memory needed Drawbacks: - Hard to search in less than O(n) time (binary
PEER-TO-PEER (P2P) systems have emerged as an appealing
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 21, NO. 4, APRIL 2009 595 Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems Quang Hieu Vu, Member, IEEE, Beng Chin Ooi,
RELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf [email protected] Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
A Survey of Peer-to-Peer File Sharing Technologies
Athens University of Economics and Business The ebusiness Centre (www.eltrun.gr) A Survey of Peer-to-Peer File Sharing Technologies White Paper Page 1 of 1 A Survey of Peer-to-Peer File Sharing Technologies
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems
DPTree: A Balanced Tree Based Indexing Framework for Peer-to-Peer Systems Mei Li Wang-Chien Lee Anand Sivasubramaniam Department of Computer Science and Engineering Pennsylvania State University University
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes
% " #$! IEEE COMMUNICATIONS SURVEY AND TUTORIAL, MARCH 2004 1 A Survey and Comparison of Peer-to-Peer Overlay Network Schemes Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim Abstract
5. Peer-to-peer (P2P) networks
5. Peer-to-peer (P2P) networks PA191: Advanced Computer Networking I. Eva Hladká Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Autumn 2015 Eva Hladká (FI MU) 5. P2P networks Autumn 2015
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
Content Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
A binary search tree is a binary tree with a special property called the BST-property, which is given as follows:
Chapter 12: Binary Search Trees A binary search tree is a binary tree with a special property called the BST-property, which is given as follows: For all nodes x and y, if y belongs to the left subtree
Analysis of Algorithms I: Binary Search Trees
Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary
Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
New Algorithms for Load Balancing in Peer-to-Peer Systems
New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Join and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
query enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
T he Electronic Magazine of O riginal Peer-Reviewed Survey Articles ABSTRACT
SECOND QUARTER 2005, VOLUME 7, NO. 2 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal -Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY AND COMPARISON OF PEER-TO-PEER OVERLAY
Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web
% Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web David Karger Eric Lehman Tom Leighton Matthew Levine Daniel Lewin Rina Panigrahy We describe
How Asymmetry Helps Load Balancing
How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
B+ Tree Properties B+ Tree Searching B+ Tree Insertion B+ Tree Deletion Static Hashing Extendable Hashing Questions in pass papers
B+ Tree and Hashing B+ Tree Properties B+ Tree Searching B+ Tree Insertion B+ Tree Deletion Static Hashing Extendable Hashing Questions in pass papers B+ Tree Properties Balanced Tree Same height for paths
Lecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
Universal hashing. In other words, the probability of a collision for two different keys x and y given a hash function randomly chosen from H is 1/m.
Universal hashing No matter how we choose our hash function, it is always possible to devise a set of keys that will hash to the same slot, making the hash scheme perform poorly. To circumvent this, we
The Advantages and Disadvantages of Network Computing Nodes
Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data
Tornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao [email protected] Chung-Ta King* [email protected] Department of Computer Science National Tsing Hua University Hsinchu,
6 March 2007 1. Array Implementation of Binary Trees
Heaps CSE 0 Winter 00 March 00 1 Array Implementation of Binary Trees Each node v is stored at index i defined as follows: If v is the root, i = 1 The left child of v is in position i The right child of
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
Multiple-Choice Random Network for Server Load Balancing
Multiple-Choice Random Network for Server Load Balancing Ye Xia, Alin Dobra and Sueng Chul Han Computer and Information Science and Engineering Department University of Florida Gainesville, FL 36-6 Email:
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
root node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain
inary Trees 1 A binary tree is either empty, or it consists of a node called the root together with two binary trees called the left subtree and the right subtree of the root, which are disjoint from each
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
Lecture 6 Online and streaming algorithms for clustering
CSE 291: Unsupervised learning Spring 2008 Lecture 6 Online and streaming algorithms for clustering 6.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
Sorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2)
Sorting revisited How did we use a binary search tree to sort an array of elements? Tree Sort Algorithm Given: An array of elements to sort 1. Build a binary search tree out of the elements 2. Traverse
LOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Chord. A scalable peer-to-peer look-up protocol for internet applications
Chord A scalable peer-to-peer look-up protocol for internet applications by Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Overview Introduction The Chord Algorithm Construction
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child
Binary Search Trees Data in each node Larger than the data in its left child Smaller than the data in its right child FIGURE 11-6 Arbitrary binary tree FIGURE 11-7 Binary search tree Data Structures Using
Network File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
CS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
recursion, O(n), linked lists 6/14
recursion, O(n), linked lists 6/14 recursion reducing the amount of data to process and processing a smaller amount of data example: process one item in a list, recursively process the rest of the list
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Databases and Information Systems 1 Part 3: Storage Structures and Indices
bases and Information Systems 1 Part 3: Storage Structures and Indices Prof. Dr. Stefan Böttcher Fakultät EIM, Institut für Informatik Universität Paderborn WS 2009 / 2010 Contents: - database buffer -
Lecture 6: Binary Search Trees CSCI 700 - Algorithms I. Andrew Rosenberg
Lecture 6: Binary Search Trees CSCI 700 - Algorithms I Andrew Rosenberg Last Time Linear Time Sorting Counting Sort Radix Sort Bucket Sort Today Binary Search Trees Data Structures Data structure is a
Distributed Computing over Communication Networks: Maximal Independent Set
Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
Heterogeneity and Load Balance in Distributed Hash Tables
Heterogeneity and Load Balance in Distributed Hash Tables P. Brighten Godfrey and Ion Stoica Computer Science Division, University of California, Berkeley {pbg,istoica}@cs.berkeley.edu Abstract Existing
www.alcatel-lucent.com
Dynamic Compact Routing Project www.alcatel-lucent.com Kick-off meeting - Jan 16, 2009 INRIA Sophia-Antipolis Dimitri Papadimitriou Alcatel-Lucent BELL NV [email protected] 1 September
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN) Luca Bettosini Universität Bern Outline > Goals / Motivation ( CAN ) > Content Addressable Network > CAN Multicast
Methods & Tools Peer-to-Peer Jakob Jenkov
Methods & Tools Peer-to-Peer Jakob Jenkov Peer-to-Peer (P2P) Definition(s) Potential Routing and Locating Proxy through firewalls and NAT Searching Security Pure P2P There is no central server or router.
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications. Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu
A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications Hao Zhang, Yonggang Wen, Haiyong Xie, and Nenghai Yu July 5, 2013 2 ABSTRACT Distributed Hash Table (DHT) plays an important
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks K.N.Sirisha *, S.Bhagya Rekha M.Tech,Software Engineering Noble college of Engineering & Technology for Women Web Technologies
2015 Internet Traffic Analysis
2015 Internet Traffic nalysis Computer Networks Sandvine s Global Internet Phenomena Report: https://www.sandvine.com/trends/global-internet-phenomena/ Lecture 8: Content Delivery Infrastructure: Peer-to-Peer
Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.
Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support
Persistent Data Structures and Planar Point Location
Persistent Data Structures and Planar Point Location Inge Li Gørtz Persistent Data Structures Ephemeral Partial persistence Full persistence Confluent persistence V1 V1 V1 V1 V2 q ue V2 V2 V5 V2 V4 V4
Unit 4.3 - Storage Structures 1. Storage Structures. Unit 4.3
Storage Structures Unit 4.3 Unit 4.3 - Storage Structures 1 The Physical Store Storage Capacity Medium Transfer Rate Seek Time Main Memory 800 MB/s 500 MB Instant Hard Drive 10 MB/s 120 GB 10 ms CD-ROM
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12
Middleware and Distributed Systems Peer-to-Peer Systems Martin v. Löwis Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers)
A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called heap-order property
CmSc 250 Intro to Algorithms Chapter 6. Transform and Conquer Binary Heaps 1. Definition A binary heap is a complete binary tree, where each node has a higher priority than its children. This is called
HBase Schema Design. NoSQL Ma4ers, Cologne, April 2013. Lars George Director EMEA Services
HBase Schema Design NoSQL Ma4ers, Cologne, April 2013 Lars George Director EMEA Services About Me Director EMEA Services @ Cloudera ConsulFng on Hadoop projects (everywhere) Apache Commi4er HBase and Whirr
Scalable Prefix Matching for Internet Packet Forwarding
Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth
Classification/Decision Trees (II)
Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: [email protected] Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).
Physical Data Organization
Physical Data Organization Database design using logical model of the database - appropriate level for users to focus on - user independence from implementation details Performance - other major factor
Virtual Landmarks for the Internet
Virtual Landmarks for the Internet Liying Tang Mark Crovella Boston University Computer Science Internet Distance Matters! Useful for configuring Content delivery networks Peer to peer applications Multiuser
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
Identity Theft Protection in Structured Overlays
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005 Background: Structured Overlays network abstraction IDs, not IPs app level
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries
PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries Jyoti Ahuja, Jun-Hong Cui, Shigang Chen, Li Lao [email protected], [email protected], [email protected], [email protected]
