版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
Why
P
2
P
1
s
t
Generatio2
n
d
Generatio
n
GenericModel
Problems
Conclusion新一代對(duì)等網(wǎng)絡(luò)系統(tǒng)的拓?fù)湫匝芯卡|
為什么要P2P▅
第一代無結(jié)構(gòu)的P2P系統(tǒng)有什么問題▅
新一代有結(jié)構(gòu)的P2P系統(tǒng)有什么好處▅
新一代P2P系統(tǒng)的拓?fù)浣Y(jié)構(gòu)模型▅
新一代P2P系統(tǒng)的研究問題南京大學(xué)軟件新技術(shù)國家重點(diǎn)實(shí)驗(yàn)室陳貴海2003年12月27日“
計(jì)算機(jī)科學(xué)面臨的挑戰(zhàn)”
高層研討會(huì)1So
all
together,
we
can
summarize
such
5
propertiesof
P2P
systems:1)Equality2)Dynamicity3)Scalability4)Reliability5)AnonymityWhat
is
P2P
Network—one
version
[Dynamic
operability]
P2P
applications
must
keepoperating
transparently
although
hosts
join
and
leavenetwork
frequently.
[Performance
and
scalability]
P2P
applications
exhibiwhat
economists
call
the
“network
effect”
in
which
anetwork’s
value
to
an
individual
user
scales
with
thetotal
number
of
participants.
[Reliability]
External
attacks
should
not
cause
signidata
or
performance
loss.
[Anonymity]
The
application
should
protect
the
privacpeople
seeking
or
providing
sensitive
information.---M.Ripeaunu,A.Lamnitchi,andI.Foster,“MappingtheGnutellaNetwork”,IEEEIC,No.1,22Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionAccordingtomyversion,someP2PsystemsshouldbeexcludedsuchasNapster,FastTrack().Somyversioncanberegardedasthedefinitionofpure(100%pure)P2Psystems.What
is
P2P
Network—
My
version[Equality]
All
peers
assume
equal
role.[Non
Centralized]
No
centralized
server
in
thespace.[Robust]
Highly
robust,
resilient,
and
self-organizing.[Zero
Hardware
Cost]
No
further
investments
inhardware
or
bandwidth.[A
hot
topic]
But
huge
investment
in
research,e.g,
IRIS
got
$
12M.3Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionHow
Did
it
Start?A
killer
application:
Napster-
Free
music
over
the
Internet
Key
idea:
share
the
storage
and
bandwidth
ofindividual
(home)
usersInternet4Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionNapster:
ExampleABCDEFm1m2m3m4m5m6
m1
A
m2
B
m3
Cm4
Dm5
Em6
FE?m5E?E5Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionNapster:
Historyhistory: 5/99:ShawnFanning(freshman,NortheastenU.)foundsNapsterOnlinemusicservice12/99:firstlawsuit3/00:25%UWisctrafficNapster2000:est.60Musers2/01:USCircuitCourtofAppeals:Napsterknewusersviolatingcopyrightlaws7/01:#simultaneousonlineusers:Napster160K,Gnutella:40K,Now:trytocomeback:6Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionButNapsterisstillcalledasP2Psystem?Itmightbebecausethatinteractionorcommunicationbetweenuseranduserispeer-to-peeralthoughthemanagementofcommunicationismonitoredbyacentralserver.Thisisverymuchsimilartothemobilephone.Conversationbetweenuseranduserispeer-to-peerbutthephonecompanycanmonitoreverything.Napster:
problemscentralized
server:single
logical
point
of
failurecan
load
balance
among
servers
using
DNS
notationpotential
for
congestionNapster
“in
control”
(freedom
is
an
illusion)no
security:passwords
in
plain
textno
authenticationno
anonymityNapster
is
the
1st
P2P
system,
but
it
is
actually
not
a
P2P
system.7Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionGnutellaDistribute
file
location
and
decentralize
lookup.Idea:
multicast
the
requestHot
to
find
a
file:Send
request
to
all
neighborsNeighbors
recursively
multicast
the
request
Eventually
a
machine
that
has
the
file
receives
the
request,and
it
sends
back
the
answerAdvantages:Totally
decentralized,
highly
robustDisadvantages:
Not
scalable;
the
entire
network
can
be
swamped
withrequest
(to
alleviate
this
problem,
each
request
has
a
TTL)8Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionQuestion:
how
to
maintain
the
neighbors’
information?
Is
there
a
neighbor
table
on
each
node?Gnutella:
Example·
Assume:
m1’s
neighbors
are
m2
and
m3;
m3’sneighbors
are
m4
and
m5;…ABCDEFm1m2m3m4m5m6E?E?E?E?E9Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionGnutella:
problems
Not
scalable:
the
entire
network
can
be
swamped
withrequest
(to
alleviate
this
problem,
each
request
has
a
TTL
Not
anonymous:
The
person
you
are
getting
the
file
fromknows
who
you
are.Not
anymore
than
it’s
non-centralized.What
we
care
about:√How
much
traffic
does
one
query
generate?√how
many
hosts
can
it
support
at
once?√What
is
the
latency
associated
with
querying?√Is
there
a
bottleneck?10Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionNew
Solutions
to
the
Location
Problem11Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionOverlay
Networks:applications,
running
at
various
sites
create
“l(fā)ogical”
links
(e.g.,
TCP
or
UDP
connections)
pairwise
betweeneach
other
each
logical
link:
multiple
physical
links,
routing
defined
by
native
InroutingGoal:
Scalability,
Resilient,
Security.Abstraction:
a
distributed
hash-table
data
structure
+
routing
tKey
=
hash(data);Key
=
hash(IP)data=
lookup(key);Note:
data
can
be
anything:
a
data
object,
document,
file,
pointer
to
a
fProposals-
Koorde[MIT]-
Viceroy[Weizman]-Cycloid[南京大學(xué)]CAN
(ACIRI/Berkeley)Chord
(MIT)Pastry
(Rice)Tapestry
(Berkeley)Overlay
Networks:
Consistent
Hashing12Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionSHA-1:/PICS/DSig/SHA1_1_0.htmlDavid
Karger,
Eric
Lehman,
Tom
Leighton,
Mathhew
Levine,
DanLewin,
Rina
Panigrahy,
Consistent
Hashing
and
Random
TreeDistributed
Caching
Protocols
for
Relieving
Hot
Spots
onWorld
Wide
Web,
ACM
Symposium
on
Theory
of
Computing,
1997Overlay
Networks:
Typical
Systems
1Ring
Mesh
HypercubeSystemsChord[MIT]
CAN[Berkeley]PersonsRatnasamy,ShenkerStoica(formerly
in
MIT)Pastry[Rice],Tapestry[Berkeley]Druschel,RowstronApplicationsDabekKaashoekStoicaCFSPAST,
SCRIBE,
OceanStoreKey
space1-dimensional
cycle2
or
d-dimensional
torus1-dimensional
cycleSpace-timecomplexityDatadistributionEach
node
holds
a
zone
Each
node
holds
a
segment
ofof
data
keys
where
itself
data
keys
that
are
the
closestresides numerically.lookup(k) region(k)lookup(k)
nearest(k)DatalocationRoutingtableEach
node
holds
a
segmentof
data
keys
betweenpredecessor
and
itself.lookup(k)
successor(k)Successor
set
+fingersneighborsleaf
set
+proximity
set
+neighobrs13Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionOverlay
Networks:
Typical
Systems
2DeBruijn
Butterfly
CCCSystemsViceroy[Weizman]
Cycloid[NJU,Wayne]PersonsKoorde[MIT]ODRI[Texas
A&M]Kaashoek,
Karger,Malkhi,
Naor,
RatajczakGuihai
ChenChengzhong
XuApplicationsLoguinov,Kumar,
Rai?
?
??
?
?Key
space1-dimensional
cycle1-dimensional
cycle2-dimensional
cycleSpace-timecomplexityDatadistributionEach
node
holds
asegment
of
keys
that
areEach
node
holds
a
segment
ofdata
keys
that
are
the
closesttheclosestnumerically.numerically.DatalocationRoutingtableEach
node
holds
a
segmentof
data
keys
betweenpredecessor
and
itself.lookup(k)
successor(k)Successor
set
+fingerslookup(k)
nearest(k)
lookup(k)
nearest(k)7neighbors 5neighbors?
??14Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionOverlay
Networks:
a
generic
model15Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionOverlay
Networks:
criteria,
issues
or
topics16Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionCan
one
network
be
modified
as
a
P2P
overlay
network?Ordered
Key
Space:
a
necessary
measurement
of
distance.
Convergent
Routing
Algorithm:
arriving
at
the
destination
afterfixed
number
of
stepsResilient
Connection
Pattern:
node
maintain
continuousconnections
to
neighbors.Factors
affecting
the
performance
of
P2P
systemsDegree:
the
number
of
neighborsRouting
length:
the
number
of
hopsfault
tolerance:
what
fraction
of
nodes
can
fail
Maintenance
overhead:
how
many
messages
are
passed
tomaintain
coherenceload
balance:
how
evenly
keys
are
distributed,
how
often
eachnode
works
as
an
intermediate
node
for
other
routs.Security
and
ProtectionTrustAnonymityReputationIntelligent
Agents/Web-based
ServicesMatchmakingService
DescriptionDistributed
DatabasesQuery
DecompositionQuery
DistributionMediationP2PSociometry
Small
World
PhenomenaPower-Law
NetworksBusiness
andLegal
IssuesBusiness
ModelsIntellectual
Property
RightsDistributed
DataStructures
Distributed
Hash
TablesScalable
DistributedData
StructuresP2P
IssuesNetwork
Architectureand
DesignNetwork
TopologyRoutingOverlay
Networks17Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionP2P
Issues18Why
P
2
PGeneric
ModelProblems
1
s
t
Generatio2
n
d
GenerationConclusionWhat
topologies
can
be
used
for
P2P
systems?How
to
determine
the
dime
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 福建師范大學(xué)協(xié)和學(xué)院《外貿(mào)英語函電》2022-2023學(xué)年第一學(xué)期期末試卷
- 2024年二建管理預(yù)測(cè)B卷講義(可打印版)
- 福建師范大學(xué)《數(shù)學(xué)建模及其準(zhǔn)備》2022-2023學(xué)年第一學(xué)期期末試卷
- 福建師范大學(xué)《教育學(xué)含教師職業(yè)道德》2022-2023學(xué)年第一學(xué)期期末試卷
- 2024屆新疆鞏留縣高級(jí)中學(xué)高三下學(xué)期第一次考試數(shù)學(xué)試題
- 2024屆上海市師大附中高三(上)期末教學(xué)統(tǒng)一檢測(cè)試題數(shù)學(xué)試題試卷
- 2024年蕪湖公交車從業(yè)資格證考試題庫
- 2024年山西客運(yùn)從業(yè)資格證都考什么
- 2024年德陽客運(yùn)從業(yè)資格證考試模擬
- 2024年烏魯木齊道路客運(yùn)從業(yè)資格證模擬考試題及答案
- 我的母親作者老舍課件(專業(yè)版)
- 心內(nèi)科一例高血壓、腦梗死、冠心病藥歷
- 關(guān)于《解讀中國經(jīng)濟(jì)》讀書筆記
- 揚(yáng)塵治理專項(xiàng)費(fèi)用計(jì)劃
- 資產(chǎn)負(fù)債表(財(cái)企01表)
- 最新VTE指南解讀(靜脈血栓栓塞癥的臨床護(hù)理指南解讀)
- 幼兒園繪本故事:《再見電視機(jī)》 課件
- 北京協(xié)和醫(yī)院規(guī)章制度匯編
- 2023中考語文文言文對(duì)比閱讀 16 湖心亭看雪(學(xué)生版+解析版)
- 小學(xué)主題班會(huì)課件《食品安全教育》(共41張PPT)通用版
- DB52∕T 1450-2019 河道管理范圍劃界技術(shù)規(guī)程
評(píng)論
0/150
提交評(píng)論