Kelips : Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead
|
|
|
- Shawn Sparks
- 9 years ago
- Views:
Transcription
1 Kelips : Building an Efficient and Stable P2P DHT Through Increased Memory and Background Overhead Indranil Gupta, Ken Birman, Prakash Linga, Al Demers, Robbert van Renesse Cornell University, Ithaca, NY, USA {gupta, ken, linga, ademers, rvr}@cs.cornell.edu Abstract A peer-to-peer (p2p) distributed hash table (DHT) system allows hosts to join and fail silently (or leave), as well as to insert and retrieve files (objects). This paper explores a new point in design space in which increased memory usage and constant background communication overheads are tolerated to reduce file lookup times and increase stability to failures and churn. Our system, called Kelips, uses peer-to-peer gossip to partially replicate file index information. In Kelips, (a) under normal conditions, file lookups are resolved with O() time and complexity (i.e., independent of system size), and (b) membership changes (e.g., even when a large number of nodes fail) are detected and disseminated to the system quickly. Per-node memory requirements are small in medium-sized systems. When there are failures, lookup success is ensured through query rerouting. Kelips achieves load balancing comparable to existing systems. Locality is supported by using topologically aware gossip mechanisms. Initial results of an ongoing experimental study are also discussed. System name derived from kelip-kelip, Malay name for the self-synchronizing fireflies that accumulate after dusk on branches of mangrove trees in Selangor, Malaysia []. Our system organizes similarly into affinity groups, and nodes in a group synchronize loosely to store information for a common set of file indices. The authors were supported in part by DARPA/AFRL- IFGA grant F and in part by a MURI grant AFOSR F , with additional support from the AFRL-IFGA Information Assurance Institute, from Microsoft Research and from the Intel Corporation. Introduction A peer-to-peer (p2p) distributed hash table (DHT) implements operations allowing hosts or processes (nodes) to join the system, and fail silently (or leave the system), as well as to insert and retrieve files with known names. Many DHTs have been deployed (e.g. Fasttrack-based systems such as Kazaa) while several others are a focus of academic research, e.g., Chord [3], Pastry [6], Tapestry, etc. [8]. All p2p systems make tradeoffs between the amount of storage overhead at each node, the communication costs incurred while running, and the costs of file retrieval. With the exception of Gnutella, the work just cited has focused on a design point in which storage costs are logarithmic in system size and hence small, and lookup costs are also logarithmic (unless cache hits shortcut the search). However, a study [9] on file sharing systems such as Gnutella and Napster has shown that a significant fraction of nodes could be connected over high latency / low bandwidth links. The presence of even one such slow logical hop on a logarithmically long path is thus likely. This increases the overall cost of the lookup. We argue that this can be avoided by exploring other potentially interesting points in the design of p2p DHTs. One could vary the soft state memory usage and background network communication overhead at a node in order to realize O() lookup costs. For example, complete replication of soft state achieves this, but this approach has prohibitive memory and bandwidth requirements. The Kelips system uses O( n) space per node, where n is the number of nodes in the system. This soft state suffices to resolve lookups with O() time
2 and message complexity. Continuous background communication with a constant overhead is used to maintain the index structure with high quality, as well as guarantee quick convergence after membership changes. The n design point is of interest because, within Kelips, both the storage overhead associated with the membership data structure and that associated with replication of fileindex (henceforth called filetuple) data impose the same O( n) asymptotic cost. Kelips uses query rerouting to ensure lookup success in spite of failures. The mechanism also allows us to use round trip time estimates to select nearby peers for each node. Memory usage is small for systems with moderate sizes - if million files are inserted into a 0,000-node system, Kelips uses only.93 MB of memory at each node. The system exhibits stability in the face of node failures and packet losses, and hence would be expected to ride out churn arising in wide-area settings from rapid arrival and failure of nodes. This resilience is achieved through the use of a lightweight Epidemic multicast protocol for replication of system membership data and file indexing data [, 4]. We note that whereas many DHT systems treat file replication as well as lookup, our work focuses only on the lookup problem, leaving replication to the application. For reasons of brevity, this paper also omits any discussion of privacy and security considerations. 2 Core Design Kelips consists of k virtual affinity groups, numbered 0 through (k ). Each node lies in an affinity group determined by using a consistent hashing function to map the node s identifier (IP address and port number) into the integer interval [0, k ]. Let n be the number of nodes currently in the system. The use of a cryptographic hash function such as SHA- ensures that with high probability, the number of nodes in each affinity group is around n k. Node soft state consists of the following entries: Affinity Group View: A (partial) set of other nodes lying in the same affinity group. Each entry carries additional fields such as round-trip time estimate, heartbeat count, etc. for the other node. Node group 2 hello.c Affinity Group View id hbeatrtt ms ms contactnodes 432, filename homenode 60, Contacts Filetuples Affinity Group # Figure : Soft State at a Node: A Kelips system with nodes distributed across affinity groups, and soft state at a hypothetical node. Contacts: For each of the other affinity groups in the system, a small (constant-sized) set of nodes lying in the foreign affinity group. Entries contain the same additional fields as in the affinity group view. Filetuples: A (partial) set of tuples, each detailing a file name and host IP address of the node storing the file (called the file s homenode). A node stores a filetuple only if the file s homenode lies in this node s affinity group. Filetuples are also associated with heartbeat counts. Figure illustrates an example. Entries are stored in AVL trees to support efficient operations. Memory Usage at a node: The total storage requirements for a Kelips node are S(k, n) = n k + c (k ) + F k entries (c is the number of contacts per foreign affinity group and F the total number of files present in the system). For fixed n, S(k, n) is minimized at k = n+f c. Assuming the total number of files is proportional to n, and that c is fixed, the optimal k then varies as O( n). The minimum S(k, n) varies as O( n). This is asymptotically larger than Chord or Pastry, but turns out to be reasonably small for most medium-sized p2p systems. Consider a system with n = 0, 000 nodes over k = n = 37 affinity groups. Our current implementation uses 60 B filetuple entries and 40 B membership entries, and maintains 2 contacts per foreign affinity group. Inserting a total of 2
3 million files into the system thus entails.93 MB of node soft state. With such memory requirements, file lookup queries return the location of the file within O() time and message complexity, i.e., these costs are invariant with system size n. 2. Background Overhead Existing view, contact and filetuple entries are refreshed periodically within and across groups. This occurs through a heartbeating mechanism. Each view, contact or filetuple entry stored at a node is associated with an integer heartbeat count. If the heartbeat count for an entry is not updated over a pre-specified time-out period, the entry is deleted. Heartbeat updates originate at the responsible node (for filetuples, this is the homenode) and are disseminated through a peer-to-peer epidemic-style (or gossip-style) protocol [7]. This gossip communication constitutes the background communication within a group. This continuous gossip stream is also used to disseminate new view, contact and filetuple entries to the system. We first outline gossip-style dissemination within one affinity group. A piece of information (e.g., a heartbeat update for a filetuple) is multicasted to the group by using a constant background bandwidth, incurring latency that increases polylogarithmically with group size. Once a node receives the piece of information to be multicast (either from some other node or from the application), the node gossips about this information for a number of rounds, where a round is a fixed local time interval at the node. During each round, the node selects a small constant-sized set of target nodes from the group membership, and sends each of these nodes a copy of the information. Gossiping thus uses constant bandwidth. With high probability, the protocol transmits the multicast to all nodes. The latency can be shown to vary with the logarithm of affinity group size. Gossip messages are transmitted via a lightweight unreliable protocol such as UDP. Gossip target nodes are selected through a weighted scheme based on roundtrip time estimates, preferring nodes that are topologically closer in the network. Kelips uses the spatially weighted gossip proposed in [5] towards this. A node with round-trip time estimate rtt is selected as gossip target with probability proportional to rtt. As suggested in [5], we use a value of r = 2, r where the latency is polylogarithmic (O(log 2 (n)). Analysis and experimental studies have revealed that epidemic style dissemination protocols are robust to network packet losses, as well as to transient and permanent node failures. They maintain stable multicast throughput to the affinity group even in the presence of such failures. See references [, 2, 4]. Information such as heartbeats also need to propagate across affinity groups (e.g., to keep contact entries for this affinity group from expiring). This is achieved by selecting a few of the contacts as gossip targets in each gossip round. Such crossgroup dissemination implies a two-level gossiping scheme similar to [7]. With uniform cross-group target selection, latency is more than that of single group gossip by a multiplicative factor of O(log(k)) (with k = n affinity groups, this is the same as O(log(n))). Gossip messages in Kelips carry not just a single entry, but several filetuple and membership entries. This includes entries that are new, were recently deleted, or have an updated heartbeat. Since Kelips limits bandwidth use at each node, not all the soft state can be packed into a gossip message. Maximum rations are imposed on the numbers of view entries, contact entries and filetuple entries that a gossip message may contain. For each entry type, the ration subdivides equally for fresh entries (ones that have so far been included in fewer than a threshold number of gossip messages sent out from this node) and for older entries. Entries are chosen uniformly at random, and unused rations (e.g., due to fewer fresh entries) are filled with older entries. Ration sizes do not vary with n. With k = n, this increases dissemination latencies a factor of O( n) above that of the Epidemic protocol (since soft state is O( n)). Heartbeat timeouts thus need to vary as O( n log 2 (n)) for view and filetuple entries, and O( n log 3 (n)) for contact entries. These numbers are thus the convergence times for the system after membership changes. Such low convergence times are achieved through only the gossip messages sent and received at a node. This gossip stream imposes a constant per-node background overhead. The gossip stream is able to disseminate heartbeats and new entries despite node and packet delivery failures. 3
4 Number of Members with x Files x = Number of Files 840 files 200 files 900 files Figure 2: Load Balancing I: Number of nodes (y-axis) storing given number of files (x-axis), in a Kelips system with 500 nodes (38 affinity groups). 2.2 File Lookup and Insertion Lookup: Consider a node (querying node) that desires to fetch a given file. The querying node maps the file name to the appropriate affinity group by using the same consistent hashing used to decide node affinity groups. It then sends a lookup request to the topologically closest contact among those it knows for that affinity group. A received lookup request is resolved by searching among the filetuples maintained at the node, and returning to the querying node the address of the homenode storing the file. This scheme returns the homenode address to a querying node in O() time and with O() message complexity. Finally, the querying node fetches the file directly from the homenode. Insertion: A node (origin node) that wants to insert a given file f, maps the file name to the appropriate affinity group, and sends an insert request to the topologically closest known contact for that affinity group. This contact picks a node h from its affinity group, uniformly at random, and forwards the insert request to it. The node h is now the homenode of the file. The file is transferred from the origin node to the homenode. A new filetuple is created to map the file f to homenode h, and is inserted into the gossip stream. Thus, filetuple insertion also occurs in O() time and with O() message complexity. The origin node periodically refreshes the filetuple entry at homenode h in order to keep it from expiring. Clearly, factors such as empty contact sets or incomplete filetuple replication might cause such Stored Per Member File Tuples Files On Disk * Normalized Time (2 file ins per sec) Figure 3: Load Balancing II: Files are inserted into a 00 node system ( affinity groups), 2 insertions per sec between t=0 and t=500. Plot shows variation, over time, of number of files and filetuples at a node (average and one standard deviation). one-hop lookup or insertion to fail. Biased partial membership information might cause uneven load balancing. This is addressed by the general multihop multi-try query routing scheme of Section 3. 3 Auxiliary Protocols and Algorithms We outline Kelips protocols for node arrival, membership and contact maintenance, topological considerations and multi-hop query routing. Joining protocol: Like in several existing p2p systems, a node joins the Kelips system by contacting a well-known introducer node (or group), e.g., a well-known http URL could be used. The joiner view returned by the introducer is used by the new node to warm up its soft state and allow it to start gossiping and populating its view, contact and filetuple set. The gossip stream spreads news about the new node quickly throughout the system. Spatial Considerations: Each node periodically pings a small set of other nodes it knows about. Response times are included in round-trip time estimates used in spatial gossip. Contact maintenance: The maximum number of contacts is fixed, yet the gossip stream supplies potential contacts continuously. Contact replacement policy can affect lookup/insert performance and system partitionability. It could be either proactive or reactive, and takes into account factors such as node distance, accessibility (e.g., firewalls 4
5 Time (round trip times) st try 2nd try 3rd try 4th try Failure Normalized Time (2 file ins per sec) Figure 4: File Insertion: Turnaround times (in roundtrip time units) for file insertion in a 00-node Kelips system ( affinity groups). in between), etc. Currently, we use a proactive policy that chooses the farthest contact as victim for replacement. Multi-hop Query routing: When a file lookup or insert query fails, the querying node retries the query. Query (re-) tries may occur along several axes: a) the querying node could ask multiple contacts, b) contacts could be asked to forward the query within their affinity group (up to a specified TTL), c) the querying node could request the query to be executed at another node in its own affinity group (if this is different from the file s affinity group). Query routing occurs as a random walk within the file affinity group in (b), and within the querying node s affinity group in (c). TTL values on multi-hop routed queries and the maximum numbers of tries trade off between lookup query success rate and maximum processing time. The normal case lookup processing time and message complexity stay O(). File insertion occurs through a similar multi-hop multi-try scheme, except the file is inserted exactly at the node where the TTL expires. This helps achieve good load balancing, although it increases the normal case insertion time to grow as O(log( n)). However, this is competitive with existing systems. 4 Experimental Results We are evaluating a C WinAPI prototype implementation of Kelips. This section reveals preliminary numbers from trace-based experiments, most done along similar lines as previous work [3, 6]. Multiple nodes were run on a single host ( GHz Lookup Result Code 3 2 Failure (file on healthy node) [3] Failure (file on failed node) [2] Success [] Normalized Time (2 file lookups per sec) Figure 5: Fault-tolerance of Lookups I: In a 00 node ( affinity groups) system, lookups are generated 2 per sec. At time t = 0, 500 nodes are selected at random and caused to fail. This plot shows for each lookup if it was successful [y axis = ], or if it failed because the homenode failed [y axis = 2], or if it failed in spite of the homenode being alive [y axis = 3]. CPU, GB RAM, Win2K) with an emulated network topology layer. Unfortunately, limitations on resources and memory requirements restrict currently simulated system sizes to a few thousand. Background overhead in the current configuration consists of each node gossiping once every 2 (normalized) seconds. Rations limit gossip message size to 272 B. 6 gossip targets are chosen, 3 of them among contacts. Load Balancing: Files are inserted into a stable Kelips system. The file name distribution used is a set of anonymized web URLs obtained from the Berkeley Home IP traces at []. The load balancing characteristics are better than exponential (Figure 2). File and filetuple distribution as files are inserted (2 insertions per normalized second of time) is shown in Figure 3; the plot shows that filetuple distribution has small deviation around the mean. File Insertion: This occurs through a multi-try (4 tries) and multi-hop scheme (TTL set to 3 logn logical hops). Figure 4 shows the turnaround times for insertion of 00 different files. 66.2% complete in try, 33% take 2 tries, and 0.8% take 3 tries. None fail or require more than 3 tries. Views were found to be well replicated in this instance. In a different experiment with 500 nodes and views only 55.8% of the maximum size, 47.2% inserts required try, 47.04% required 2 tries, 3.76% required 3 tries, 0.96% needed 4 tries, and.04% failed. Multi-hop routing thus provides resilience 5
6 Average Affinity Group View Size Normalized Time Figure 6: Fault-tolerance of Lookups II: At time t=0, 500 out of 00 nodes in a affinity group system fail. This plot shows that failure detection and view (and hence filetuple) stabilization occurs by time t=380. to incomplete replication of soft state. Fault-tolerance: P2P DHTs are required to be tolerant to dynamic conditions and high churn rates. We measure the resilience of Kelips to a scenario where half of the nodes in the system are caused to fail simultaneously. Figures 5 and 6 show the effectiveness of using background gossip communication. Lookups were initiated at a constant rate and were found to fail only if the homenode had also failed (Figure 5). In other words, multihop rerouting and redundant membership information ensures successful lookups despite failures. Responsiveness to failures is good, and membership and filetuple entry information stabilize quickly after a membership change (Figure 6). 5 Conclusion We are investigating a new design point for DHT systems, based on increased memory usage (for replication of filetuple and membership information), as well as a constant and low background overhead at a node, in order to enable O() file lookup operations and ensure stability despite high failure and churn rates. Per-node memory requirements are small in medium-sized systems (less than 2 MB with million files in a 0,000 node system). Multi-hop (and multi-try) query routing enables file lookup and insertion to succeed even when bandwidth limitations or network disconnectivity lead to only partial replication of soft state. We observe satisfactory load balancing. Kelips and other DHTs: Memory usage can be traded off for faster lookup times in systems like Chord, Pastry, Tapestry, e.g., by varying the value of the base (the parameter d in Pastry, base value of 2 in Chord) that determines the branching factor of the overlay structure. This would however make routing table entries large and lead to high network traffic to keep them updated as nodes join, leave and fail. Kelips is loosely structured, and it does not need to maintain a structure and invariants (e.g., the ring, routing table entries, etc.) the soft state allows object lookups and insertions to succeed in spite of stale membership or contact entries. References [] N.T.J. Bailey, Epidemic Theory of Infectious Diseases and its Applications, Hafner Press, Second Edition, 975. [2] K.P. Birman, M. Hayden, O. Ozkasap, Z. Xiao, M. Budiu, Y. Minsky, Bimodal Multicast, ACM Trans. Comp. Syst., 7:2, pp. 4-88, May 999. [3] F. Dabek, E. Brunskill, M. F. Kaashoek, D. Karger, Building peer-to-peer systems with Chord, a distributed lookup service, Proc. 8 th Wshop. Hot Topics in Operating Syst., (HOTOS- VIII), May 200. [4] A. Demers, D.H. Greene, J. Hauser, W. Irish, J. Larson, Epidemic algorithms for replicated database maintenance, Proc. 6 th ACM Symp. Principles of Distributed Computing (PODC), pp. -2, 987. [5] D. Kempe, J. Kleinberg, A. Demers. Spatial gossip and resource location protocols, Proc. 33rd ACM Symp. Theory of Computing (STOC), pp , 200. [6] A. Rowstron, P. Druschel, Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems, Proc. IFIP/ACM Middleware, 200. [7] R. van Renesse, Y. Minsky, M. Hayden, A gossipstyle failure detection service, Proc. IFIP Middleware, 998. [8] Proc. st Intnl. Wshop. Peer-to-Peer Systems (IPTPS), LNCS 2429, Springer-Verlag, [9] S. Saroiu, P.K. Gummadi, S.D. Gribble, A measurement study of peer-to-peer file sharing systems, Proc. Multimedia Computing and Networking (MMCN), [] Internet Traffic Archive, [] Fireflies of Selangor River, Malaysia, 6
A Churn-Resistant Peer-to-Peer Web Caching System
A Churn-Resistant Peer-to-Peer Web Caching System Prakash Linga Cornell University Ithaca, NY 14853 [email protected] Indranil Gupta Univ. of Illinois, Urbana-Champaign Champaign, IL 6181 [email protected]
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
CS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
Distributed Hash Tables in P2P Systems - A literary survey
Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology [email protected] Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer
How To Create A P2P Network
Peer-to-peer systems INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Frank Eliassen & Roman Vitenberg 1 Motivation for peer-to-peer Inherent restrictions of the standard client/server model Centralised
Tornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao [email protected] Chung-Ta King* [email protected] Department of Computer Science National Tsing Hua University Hsinchu,
DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
LOOKING UP DATA IN P2P SYSTEMS
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica MIT Laboratory for Computer Science 1. Introduction The recent success of some widely deployed
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
Chord - A Distributed Hash Table
Kurt Tutschku Vertretung - Professur Rechnernetze und verteilte Systeme Chord - A Distributed Hash Table Outline Lookup problem in Peer-to-Peer systems and Solutions Chord Algorithm Consistent Hashing
The Case for a Hybrid P2P Search Infrastructure
The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo Ryan Huebsch Ion Stoica Joseph M. Hellerstein University of California at Berkeley Intel Research Berkeley boonloo, huebsch, istoica, jmh @cs.berkeley.edu
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France [email protected] Hung Cuong Le
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A SURVEY OF P2P OVERLAYS IN VARIOUS NETWORKS
A SURVEY OF P2P OVERLAYS IN VARIOUS Mrs. A. Anitha Dr. J. JayaKumari Department of computer science & engineering Department of Electronics & communication Engineering [email protected] [email protected]
Load Balancing in Structured P2P Systems
1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems
Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3
Uni Innsbruck Informatik Uni Innsbruck Informatik Peerto topeer Systems DHT examples, part (Pastry, Tapestry and Kademlia) Michael Welzl [email protected] DPS NSG Team http://dps.uibk.ac.at dps.uibk.ac.at/nsg
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Acknowledgements. Peer to Peer File Storage Systems. Target Uses. P2P File Systems CS 699. Serving data with inexpensive hosts:
Acknowledgements Peer to Peer File Storage Systems CS 699 Some of the followings slides are borrowed from a talk by Robert Morris (MIT) 1 2 P2P File Systems Target Uses File Sharing is one of the most
Clustering in Peer-to-Peer File Sharing Workloads
Clustering in Peer-to-Peer File Sharing Workloads F. Le Fessant, S. Handurukande, A.-M. Kermarrec & L. Massoulié INRIA-Futurs and LIX, Palaiseau, France EPFL, Lausanne, Switzerland Microsoft Research,
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems
Optimizing and Balancing Load in Fully Distributed P2P File Sharing Systems (Scalable and Efficient Keyword Searching) Anh-Tuan Gai INRIA Rocquencourt [email protected] Laurent Viennot INRIA Rocquencourt
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems
GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes
P2P Networking - Advantages and Disadvantages of Virtualization
Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park [email protected] 1 Introduction
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
How To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems
Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems Matei Ripeanu, Ian Foster {matei, foster}@cs.uchicago.edu Abstract Despite recent excitement generated by the peer-to-peer
Calto: A Self Sufficient Presence System for Autonomous Networks
Calto: A Self Sufficient Presence System for Autonomous Networks Abstract In recent years much attention has been paid to spontaneously formed Ad Hoc networks. These networks can be formed without central
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid
Caching & CDN s 15-44: Computer Networking L-21: Caching and CDNs HTTP APIs Assigned reading [FCAB9] Summary Cache: A Scalable Wide- Area Cache Sharing Protocol [Cla00] Freenet: A Distributed Anonymous
Peer-to-Peer Replication
Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................
P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
Deploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
New Algorithms for Load Balancing in Peer-to-Peer Systems
New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing
File sharing using IP-Multicast
File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: [email protected] Abstract: File sharing systems cause a huge portion
Identity Theft Protection in Structured Overlays
Appears in Proceedings of the 1st Workshop on Secure Network Protocols (NPSec 5) Identity Theft Protection in Structured Overlays Lakshmi Ganesh and Ben Y. Zhao Computer Science Department, U. C. Santa
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
Join and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT
A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,
Concept of Cache in web proxies
Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems Ragib Hasan Zahid Anwar William Yurcik Larry Brumbaugh Roy Campbell National Center for Supercomputing Applications Department of
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
A Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
Reliable Peer-to-peer End System Multicasting through Replication
Reliable Peer-to-peer End System Multicasting through Replication Jianjun Zhang, Ling Liu, Calton Pu and Mostafa Ammar College of Computing, Georgia Institute of Technology {zhangjj, lingliu, calton, ammar}@cc.gatech.edu
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Middleware and Distributed Systems. Peer-to-Peer Systems. Martin v. Löwis. Montag, 30. Januar 12
Middleware and Distributed Systems Peer-to-Peer Systems Martin v. Löwis Peer-to-Peer Systems (P2P) Concept of a decentralized large-scale distributed system Large number of networked computers (peers)
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia
A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
Locality-Aware Randomized Load Balancing Algorithms for DHT Networks
Locality-Aware ized Load Balancing Algorithms for DHT Networks Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engineering Wayne State University, Detroit, MI 4822 {shy,czxu}@ece.eng.wayne.edu
Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2
CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol
Disfer. Sink - Sensor Connectivity and Sensor Android Application. Protocol implementation: Charilaos Stais (stais AT aueb.gr)
Disfer Sink - Sensor Connectivity and Sensor Android Application Protocol implementation: Charilaos Stais (stais AT aueb.gr) Android development: Dimitri Balerinas (dimi.balerinas AT gmail.com) Supervised
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security
Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security Ehsan Saboori and Shahriar Mohammadi Abstract One of the most important issues in peer-to-peer networks is anonymity.
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany [email protected] Abstract. Network infrastructures are nowadays
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Globule: a Platform for Self-Replicating Web Documents
Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
Cassandra A Decentralized, Structured Storage System
Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
