SlideShare a Scribd company logo
7
Most read
10
Most read
11
Most read
BY
NANDAKUMAR P,
AP/CSE,
CAHCET
CONTENTS:
 Introduction
 Peer-to-Peer Systems
 Middleware, Routing Overlays
 Case Studies: Pastry, Tapestry
GOAL: To enable the sharing of data and resources on a very large scale by
eliminating any requirement for separately managed servers and their
associated infrastructure.
 Peer-to-peer systems aim to support useful distributed services and
applications using data and computing resources available in the personal
computers and workstations that are present in the Internet.
 Peer-to-Peer applications as ‘applications that exploit resources available
at the edges of the Internet – Storage, cycles, content, human presence’.
PEER - TO - PEER SYSTEMS
CHARACTERISTICS
• Their design ensures that each user contributes resources to the system.
• Although they may differ in the resources that they contribute, all the nodes in
a peer-to-peer system have the same functional capabilities and responsibilities.
• Their correct operation does not depend on the existence of any centrally
administered systems.
• They can be designed to offer a limited degree of anonymity to the providers and
users of resources.
• A key issue for their efficient operation is the choice of an algorithm for the
placement of data across many hosts and subsequent access to it.
Figure (a): Distinctions between IP and overlay routing for
peer-to-peer applications
IP Application-level routing overlay
Scale IPv4 is limitedto 232 addressablenodes.The
IPv6 name space is much moregenerous
(2128), but addresses in bothversions are
hierarchically structured and much of thespace
is pre-allocated according to administrative
requirements.
Peer-to-peer systems can addressmore objects.
The GUID name space is very largeand flat
(>2128), allowing it to be much morefully
occupied.
Load balancing Loads on routers are determined by network
topologyand associated traffic patterns.
Object locations can be randomized and hence
traffic patterns are divorced fromthe network
topology.
Network dynamics
(addition/deletion of
objects/nodes)
IP routingtables are updated asynchronouslyon
a best-efforts basis with time constants onthe
order of1 hour.
Routing tables can be updated synchronouslyor
asynchronouslywithfractions of a second
delays.
Fault tolerance Redundancy is designed intotheIP networkby
its managers, ensuring tolerance of a single
router or network connectivityfailure. n-fold
replication is costly.
Routes and object references can be replicated
n-fold, ensuring tolerance of n failures ofnodes
or connections.
Target identification Each IP address maps to exactly one target
node.
Messages can be routed to thenearestreplicaof
a target object.
Security andanonymity Addressing is only secure when all nodesare
trusted. Anonymity for the owners ofaddresses
is not achievable.
Security can be achieved even in environments
with limited trust.A limited degree of
anonymity can be provided.
NAPSTER
 The first large scale peer-to-peer network was Napster, set up in 1999 to share digital
music files over the Internet.
 While Napster maintained centralized (and replicated) indices, the music files were
created and made available by individuals, usually with music copied from CDs to
computer files.
 Music content owners sued Napster for copyright violations and succeeded in
shutting down the service. Figure (b) documents the process of requesting a music file
from Napster.
Figure (b): Napster: peer-to-peer file sharing with a
centralized, replicated index
Napster server
Index1. File location
2. List of peers
request
offering the file
peers
3. File request
4. File delivered
5. Index update
Napster server
Index
Peer-to-peermiddleware
• The third generation is characterized by the emergence of middleware
layers for the application-independent management of distributed resources
on a global scale.
•Peer-to-peer middleware systems are designed specifically to meet the
need for the automatic placement and subsequent location of the
distributed objects managed by peer-to-peer systems and applications.
• The best-known and most fully developed examples include Pastry
[Rowstron and Druschel 2001], Tapestry [Zhao et al. 2004], CAN
[Ratnasamy et al. 2001], Chord [Stoica et al. 2001] and Kademlia
[Maymounkov and Mazieres 2002].
Functional requirements:
• The function of peer-to-peer middleware is to simplify the construction of
services that are implemented across many hosts in a widely distributed
network.
• Other important requirements include the ability to add new resources and to
remove them at will and to add hosts to the service and remove them.
• Like other middleware, peer-to-peer middleware should offer a simple
programming interface to application programmers that is independent of the
types of distributed resource that the application manipulates.
Non-functional requirements:
•Global scalability
•Load balancing
•Optimization for local interactions between neighboring peers
•Accommodating to highly dynamic host availability
ROUTINGOVERLAYS
• In peer-to-peer systems a distributed algorithm known as a routing overlay takes
responsibility for locating nodes and objects.
• The routing overlay ensures that any node can access any object by routing each
request through a sequence of nodes, exploiting knowledge at each of them to locate the
destination object.
• Peer-to-peer systems usually store multiple replicas of objects to ensure availability.
Main Task:
• Routing of requests to objects
• Insertion of objects
• Deletion of objects
• Node addition and removal
Figure (c): Distribution of information in a routing overlay
Object:
Node:
D
CÕs routing knowledge
DÕs routing knowledgeAÕs routing knowledge
BÕs routing knowledge
C
A
B
Figure (d) : Basic programming interface for a distributed
hash table (DHT) as implemented by the PAST API over
Pastry
put(GUID, data)
The data is stored in replicas at all nodes responsible for the object identified
by GUID.
remove(GUID)
Deletes all references to GUID and the associated data.
value = get(GUID)
The data associated with GUID is retrieved from one of the nodes responsible
it.
Figure (e): Basic programming interface for distributed object
location and routing (DOLR) as implemented by Tapestry
publish(GUID )
GUID can be computed from the object (or some part of it, e.g. its
name). This function makes the node performing a publish operation
the host for the object corresponding to GUID.
unpublish(GUID)
Makes the object corresponding to GUID inaccessible.
sendToObj(msg, GUID, [n])
Following the object-oriented paradigm, an invocation message is sent
to an object in order to access it. This might be a request to open a TCP
connection for data transfer or to return a message containing all or
part of the object’s state. The final optional parameter [n], if present,
requests the delivery of the same message to n replicas of the object.
OVERLAY CASE STUDIES: PASTRY, TAPESTRY
• Pastry is the message routing infrastructure deployed in several applications
including PAST [Druschel and Rowstron 2001], an archival (immutable) file
storage system implemented as a distributed hash table with the API in Figure
(d).
• Pastry has a straightforward but effective design.
• Tapestry is the basis for the OceanStore storage system.
• It has a more complex architecture than Pastry because it aims to support a
wider range of locality approaches.
Unit 3 cs6601 Distributed Systems

More Related Content

PPT
Peer to Peer services and File systems
PPTX
Replication in Distributed Systems
PPT
4.file service architecture
PPT
Lamport’s algorithm for mutual exclusion
PPTX
Virtual machine security
PPT
Process Management-Process Migration
Peer to Peer services and File systems
Replication in Distributed Systems
4.file service architecture
Lamport’s algorithm for mutual exclusion
Virtual machine security
Process Management-Process Migration

What's hot (20)

PPT
System models in distributed system
PPT
Chapter 4 a interprocess communication
PPT
distributed shared memory
PPTX
Fault tolerance in distributed systems
PDF
Google App Engine
PPT
File replication
PPT
Operating system support in distributed system
PPTX
Processor allocation in Distributed Systems
PPTX
Message passing in Distributed Computing Systems
PPT
Client Centric Consistency Model
DOCX
VIRTUALIZATION STRUCTURES TOOLS.docx
PDF
Design issues of dos
PPT
Synchronization in distributed systems
PPTX
Routing algorithm
PPTX
Security in distributed systems
PPTX
Congestion on computer network
PPTX
Multicast routing protocols in adhoc networks
PDF
Network security & cryptography full notes
PPTX
Distributed file system
PPT
Clock synchronization in distributed system
System models in distributed system
Chapter 4 a interprocess communication
distributed shared memory
Fault tolerance in distributed systems
Google App Engine
File replication
Operating system support in distributed system
Processor allocation in Distributed Systems
Message passing in Distributed Computing Systems
Client Centric Consistency Model
VIRTUALIZATION STRUCTURES TOOLS.docx
Design issues of dos
Synchronization in distributed systems
Routing algorithm
Security in distributed systems
Congestion on computer network
Multicast routing protocols in adhoc networks
Network security & cryptography full notes
Distributed file system
Clock synchronization in distributed system
Ad

Similar to Unit 3 cs6601 Distributed Systems (20)

PPTX
UNIT III DIS.pptx
PPT
Peer-to-peer Systems.ppt
PPTX
Peer to peer services
PPT
Ods chapter7
PPTX
Tapestry
PPT
Andrea Sini Thesis
PDF
Download full ebook of JXTA 1st Edition Brendon J. Wilson instant download pdf
PPT
Peer to peer system - Mạng ngang hàng.
PDF
chapter 2 architecture
PDF
Comparative Analysis of Peer to Peer Networks
PDF
Download full ebook of JXTA 1st Edition Brendon J. Wilson instant download pdf
PDF
Download full ebook of JXTA 1st Edition Brendon J. Wilson instant download pdf
PDF
Download full ebook of Jxta 1st Edition Brendon J Wilson instant download pdf
PDF
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
PPTX
Final peersimp pt
PDF
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
PPTX
Peer Sim & P2P
PPT
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
PPT
Lecture - Network Technologies: Peer-to-Peer Networks
PPT
P2P Lecture for better understanding of processed
UNIT III DIS.pptx
Peer-to-peer Systems.ppt
Peer to peer services
Ods chapter7
Tapestry
Andrea Sini Thesis
Download full ebook of JXTA 1st Edition Brendon J. Wilson instant download pdf
Peer to peer system - Mạng ngang hàng.
chapter 2 architecture
Comparative Analysis of Peer to Peer Networks
Download full ebook of JXTA 1st Edition Brendon J. Wilson instant download pdf
Download full ebook of JXTA 1st Edition Brendon J. Wilson instant download pdf
Download full ebook of Jxta 1st Edition Brendon J Wilson instant download pdf
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
Final peersimp pt
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTING
Peer Sim & P2P
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
Lecture - Network Technologies: Peer-to-Peer Networks
P2P Lecture for better understanding of processed
Ad

More from Nandakumar P (17)

PPTX
UNIT - 5: Data Warehousing and Data Mining
PPTX
UNIT - 4: Data Warehousing and Data Mining
PPTX
UNIT 3: Data Warehousing and Data Mining
PPTX
UNIT 2: Part 2: Data Warehousing and Data Mining
PPT
UNIT 2: Part 1: Data Warehousing and Data Mining
PPTX
UNIT - 1 Part 2: Data Warehousing and Data Mining
PPT
UNIT - 1 : Part 1: Data Warehousing and Data Mining
PPTX
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
PPTX
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
PPTX
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
PPTX
Python Course for Beginners
PPT
CS6601-Unit 4 Distributed Systems
PPT
Unit-4 Professional Ethics in Engineering
PPT
Unit-3 Professional Ethics in Engineering
PPT
Naming in Distributed Systems
PPT
Unit 3.1 cs6601 Distributed File System
PPT
Professional Ethics in Engineering
UNIT - 5: Data Warehousing and Data Mining
UNIT - 4: Data Warehousing and Data Mining
UNIT 3: Data Warehousing and Data Mining
UNIT 2: Part 2: Data Warehousing and Data Mining
UNIT 2: Part 1: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 : Part 1: Data Warehousing and Data Mining
UNIT - 5 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT - 2 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
UNIT-1 : 20ACS04 – PROBLEM SOLVING AND PROGRAMMING USING PYTHON
Python Course for Beginners
CS6601-Unit 4 Distributed Systems
Unit-4 Professional Ethics in Engineering
Unit-3 Professional Ethics in Engineering
Naming in Distributed Systems
Unit 3.1 cs6601 Distributed File System
Professional Ethics in Engineering

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Cell Types and Its function , kingdom of life
PPTX
Institutional Correction lecture only . . .
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Business Ethics Teaching Materials for college
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Cell Types and Its function , kingdom of life
Institutional Correction lecture only . . .
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Cell Structure & Organelles in detailed.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Basic Mud Logging Guide for educational purpose
FourierSeries-QuestionsWithAnswers(Part-A).pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Renaissance Architecture: A Journey from Faith to Humanism
2.FourierTransform-ShortQuestionswithAnswers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Business Ethics Teaching Materials for college
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf

Unit 3 cs6601 Distributed Systems

  • 2. CONTENTS:  Introduction  Peer-to-Peer Systems  Middleware, Routing Overlays  Case Studies: Pastry, Tapestry
  • 3. GOAL: To enable the sharing of data and resources on a very large scale by eliminating any requirement for separately managed servers and their associated infrastructure.  Peer-to-peer systems aim to support useful distributed services and applications using data and computing resources available in the personal computers and workstations that are present in the Internet.  Peer-to-Peer applications as ‘applications that exploit resources available at the edges of the Internet – Storage, cycles, content, human presence’. PEER - TO - PEER SYSTEMS
  • 4. CHARACTERISTICS • Their design ensures that each user contributes resources to the system. • Although they may differ in the resources that they contribute, all the nodes in a peer-to-peer system have the same functional capabilities and responsibilities. • Their correct operation does not depend on the existence of any centrally administered systems. • They can be designed to offer a limited degree of anonymity to the providers and users of resources. • A key issue for their efficient operation is the choice of an algorithm for the placement of data across many hosts and subsequent access to it.
  • 5. Figure (a): Distinctions between IP and overlay routing for peer-to-peer applications IP Application-level routing overlay Scale IPv4 is limitedto 232 addressablenodes.The IPv6 name space is much moregenerous (2128), but addresses in bothversions are hierarchically structured and much of thespace is pre-allocated according to administrative requirements. Peer-to-peer systems can addressmore objects. The GUID name space is very largeand flat (>2128), allowing it to be much morefully occupied. Load balancing Loads on routers are determined by network topologyand associated traffic patterns. Object locations can be randomized and hence traffic patterns are divorced fromthe network topology. Network dynamics (addition/deletion of objects/nodes) IP routingtables are updated asynchronouslyon a best-efforts basis with time constants onthe order of1 hour. Routing tables can be updated synchronouslyor asynchronouslywithfractions of a second delays. Fault tolerance Redundancy is designed intotheIP networkby its managers, ensuring tolerance of a single router or network connectivityfailure. n-fold replication is costly. Routes and object references can be replicated n-fold, ensuring tolerance of n failures ofnodes or connections. Target identification Each IP address maps to exactly one target node. Messages can be routed to thenearestreplicaof a target object. Security andanonymity Addressing is only secure when all nodesare trusted. Anonymity for the owners ofaddresses is not achievable. Security can be achieved even in environments with limited trust.A limited degree of anonymity can be provided.
  • 6. NAPSTER  The first large scale peer-to-peer network was Napster, set up in 1999 to share digital music files over the Internet.  While Napster maintained centralized (and replicated) indices, the music files were created and made available by individuals, usually with music copied from CDs to computer files.  Music content owners sued Napster for copyright violations and succeeded in shutting down the service. Figure (b) documents the process of requesting a music file from Napster.
  • 7. Figure (b): Napster: peer-to-peer file sharing with a centralized, replicated index Napster server Index1. File location 2. List of peers request offering the file peers 3. File request 4. File delivered 5. Index update Napster server Index
  • 8. Peer-to-peermiddleware • The third generation is characterized by the emergence of middleware layers for the application-independent management of distributed resources on a global scale. •Peer-to-peer middleware systems are designed specifically to meet the need for the automatic placement and subsequent location of the distributed objects managed by peer-to-peer systems and applications. • The best-known and most fully developed examples include Pastry [Rowstron and Druschel 2001], Tapestry [Zhao et al. 2004], CAN [Ratnasamy et al. 2001], Chord [Stoica et al. 2001] and Kademlia [Maymounkov and Mazieres 2002].
  • 9. Functional requirements: • The function of peer-to-peer middleware is to simplify the construction of services that are implemented across many hosts in a widely distributed network. • Other important requirements include the ability to add new resources and to remove them at will and to add hosts to the service and remove them. • Like other middleware, peer-to-peer middleware should offer a simple programming interface to application programmers that is independent of the types of distributed resource that the application manipulates. Non-functional requirements: •Global scalability •Load balancing •Optimization for local interactions between neighboring peers •Accommodating to highly dynamic host availability
  • 10. ROUTINGOVERLAYS • In peer-to-peer systems a distributed algorithm known as a routing overlay takes responsibility for locating nodes and objects. • The routing overlay ensures that any node can access any object by routing each request through a sequence of nodes, exploiting knowledge at each of them to locate the destination object. • Peer-to-peer systems usually store multiple replicas of objects to ensure availability. Main Task: • Routing of requests to objects • Insertion of objects • Deletion of objects • Node addition and removal
  • 11. Figure (c): Distribution of information in a routing overlay Object: Node: D CÕs routing knowledge DÕs routing knowledgeAÕs routing knowledge BÕs routing knowledge C A B
  • 12. Figure (d) : Basic programming interface for a distributed hash table (DHT) as implemented by the PAST API over Pastry put(GUID, data) The data is stored in replicas at all nodes responsible for the object identified by GUID. remove(GUID) Deletes all references to GUID and the associated data. value = get(GUID) The data associated with GUID is retrieved from one of the nodes responsible it.
  • 13. Figure (e): Basic programming interface for distributed object location and routing (DOLR) as implemented by Tapestry publish(GUID ) GUID can be computed from the object (or some part of it, e.g. its name). This function makes the node performing a publish operation the host for the object corresponding to GUID. unpublish(GUID) Makes the object corresponding to GUID inaccessible. sendToObj(msg, GUID, [n]) Following the object-oriented paradigm, an invocation message is sent to an object in order to access it. This might be a request to open a TCP connection for data transfer or to return a message containing all or part of the object’s state. The final optional parameter [n], if present, requests the delivery of the same message to n replicas of the object.
  • 14. OVERLAY CASE STUDIES: PASTRY, TAPESTRY • Pastry is the message routing infrastructure deployed in several applications including PAST [Druschel and Rowstron 2001], an archival (immutable) file storage system implemented as a distributed hash table with the API in Figure (d). • Pastry has a straightforward but effective design. • Tapestry is the basis for the OceanStore storage system. • It has a more complex architecture than Pastry because it aims to support a wider range of locality approaches.