StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Scalable Peer-to-peer Lookup Protocol for Internet Application - Annotated Bibliography Example

Cite this document
Summary
This paper stresses that node location is always the major problem of a peer to peer application. A solution to this problem would be the implementation of Chord. It works by assigning a key to a node thus data location and any data queries become very efficient. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
A Scalable Peer-to-peer Lookup Protocol for Internet Application
Read Text Preview

Extract of sample "A Scalable Peer-to-peer Lookup Protocol for Internet Application"

Node location is always the major problem of a peer to peer application. A solution to this problem would be the implementation of Chord. It works by assigning a key to a node thus data location and any data queries become very efficient. In addition to that, chord is very scalable. INTRODUCTION Peer-to-peer systems basically do not have a centralized location, thus they are characterized by features such as redundant storage, permanence, anonymity, search, authentication and hierarchical naming. Despite this rich set of features, the core operation in most peer-to-peer systems is their effective search capability of data items (Look up protocol is efficient), data item accuracy, performance and simplicity. SYSTEM MODEL Chord addresses the following problems with the model that it has been designed with. Load balance: this is done by assigning keys to each node or data item. This is implemented through its hash function. Decentralization: All nodes are equally important. Scalability: a Chord look up can grow as large as it can, so do the costs associated with it. Availability: Chord automatically shows what tables are new and those that have failed so as to allow or easy key disbursement. Flexible naming: Chord allows for flexible mapping of names to its keys. CHORD APPLICATIONS Cooperative mirroring: this is where organizations can be able to store and use each other’s data. Time-shared storage where an individual may wish to make data available at their request and the server occasionally available. Distributed indexes so as to assist in data search. Large-scale combinatorial search that is searching that involves a variety of keys for data search. References Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H.Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications" Abstract—Content-Addressable Network (CAN) is a distributed infrastructure that aims to make improvise the use of hash tables. INTRODUCTION A hash table is a data structure used to map “keys” into data items. With that, hash table functions are implemented in Content-Addressable Network (CAN). The CAN model has its advantages such as its scalability, fault-tolerant and it completely self-organizes itself. Other variables such as its scalability, robustness and low-latency properties are better demonstrated through simulation. CAN is constructed in 3 steps: 1. First step is for the new node to look for a node existing in the CAN. 2. Secondly, using the CAN routing mechanisms, it must find a node whose zone will be split. 3. Thirdly, the neighbors of the split zone must be noticed so that routing can include the new node. Related Systems Domain Name System: stores key value pairs of the domain name or IP address. When compared to CAN, CAN is more general than the DNS and again CAN resolves name resolution is independent thus the two systems’ designs are different. Publius Publius is a Web publishing system that is highly resistant to censorship while it provides anonymous publishing. CAN design can be implemented in the Publius design so enable it to access a large number of servers. Peer-to-peer file sharing systems: used to share files in the network. Common file sharing systems include, Napster and Gnutella. References S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A Scalable Content-Addressable Network" Abstract— Pastry is a scalable and distributed object locator and routing substrate for wide-area peer-to-peer applications. Its main goal is to perform routing, data storage, data sharing, group communication and naming on larger networks and that is where it strength lies. When its presented with a message and a key, a Pastry node routes the message to the node with the specified nodeId. For referral purposes, each Pastry node keeps concurrent data records with reference to nodeId space, and notifies applications of new node arrivals, node failures and recoveries. Pastry takes into account the network locality; it seeks to minimize the distance a sent or received message travels. Pastry is completely decentralized, scalable, and self-organizing; it automatically adapts to the arrival, departure and failure of nodes with the use of ode ID’s. INTRODUCTION Peer-to-peer Internet applications have been popularized through file sharing applications like Napster, Gnutella and FreeNet. Thus peer- to-peer systems have revolutionized and implemented technical aspects such as decentralized control, self- organization, adaptation and scalability. Peer-to-peer applications are thus distributed systems where the nodes have identical capabilities and all communication between the nodes is symmetric. Related Work File sharig facilities In use include: Gnutella and Freenet. The Napster is a music exchange service that uses the peer-to-peer systems but in essence it’s is not a fully peer to peer facility as it uses a centralized database. Sharing of data files on these systems is quite reliable. In Gnutella, using broadcast messages on a broadcast protocol limits the system’s scalability and thus incurs a high bandwidth usage. Both Gnutella and Freenet are not guaranteed to provide the desired results although Pastry, along with Tapestry, Chord and CAN can be used to find the desired results as they are both second generation peer to peer routing and location schemes. Pastry and Tapestry are slightly different in their network locality capabilities and in their quest to support replication, again Pastry is less complex. The Chord protocol is closely related to both Pastry and Tapestry. References Rowstron and P. Druschel, "Pastry: Scalable, Distributed Object Location and Routing for Large-scale Peer-to-Peer Systems"  Abstract— this is a system that uses a novel XOR-based met- ric topology. The topology has the property that every message exchanged conveys or re- inforces useful contact information. The system exploits this information to send parallel, asynchronous query messages that tolerate node failures without imposing timeout delays on users. INTRODUCTION Kademlia is a peer-to-peer distributed hash table (DHT) that seeks to combine provable consistency and performance, , latency-minimizing routing, and a symmetric, unidirectional topology. Its characteristics are that it seeks to reduce the number of configuration messages nodes that is should send. Kademlia also introduces a parameter, α, that allows people to gain constant bandwidth for asynchronous lowest-latency hop selection and it also delays free fault recovery. Kademlia Protocol The Kademlia protocol consists of four Remote Procedure Callss: ping, store, find node, and find value. The ping RPC requests to find whether a node is online. store instructs a node to store a key value and pair it for later retrieval. Find node takes a 160-bit ID as an argument. The recipient of the RPC returns the IP address, UDP port, Node ID. It also triples for the k nodes it knows about closest to the target ID. These triple values come back from a single k-bucket, or they may come from multiple k-buckets if the closest k-bucket is not full. The RPC recipient must return k items (else when there are fewer than k nodes in all its k-buckets combined then it returns all nodes it is aware of.) Find value finds IP address, UDP port, Node ID. It then triples when it has received a store for the RPC key. It then returns the stored value. Routing Table Kademlia’s routing table structure is simple due to the protocol that has been used to implement it. The routing table is a binary tree whose leaves are k-buckets. Each k-bucket contains nodes with some common prefix of their IDs. The prefix is the k-bucket’s position in the binary tree. Thus, each k-bucket covers some range of the ID space, and together the k-buckets cover the entire 160-bit ID space with no overlap. Nodes in the routing tree are allocated dynamically, as needed.1 References P. Maymounkov and D. Mazi`eres, "Kademlia: A Peer to Peer Information System Based on the XOR Metric" Ben Y. Zhao, John Kubiatowicz, and Anthony Joseph. Tapestry: an infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01- 1141, U.C. Berkeley, April 2001. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Scalable Peer-to-peer Lookup Protocol for Internet Application Annotated Bibliography, n.d.)
A Scalable Peer-to-peer Lookup Protocol for Internet Application Annotated Bibliography. https://studentshare.org/english/1796348-distributed-networks-p2p
(A Scalable Peer-to-Peer Lookup Protocol for Internet Application Annotated Bibliography)
A Scalable Peer-to-Peer Lookup Protocol for Internet Application Annotated Bibliography. https://studentshare.org/english/1796348-distributed-networks-p2p.
“A Scalable Peer-to-Peer Lookup Protocol for Internet Application Annotated Bibliography”. https://studentshare.org/english/1796348-distributed-networks-p2p.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Scalable Peer-to-peer Lookup Protocol for Internet Application

My Passion for Dancing

The admission essay "My Passion for Dancing " states that my passion for dancing has been the most meaningful activity for me.... I have been involved in dancing for as long as I can recall.... My family and my instructors have been a major support component in my career.... hellip; I need to have time management, be disciplined, be responsible, be dedicated, and reach out to others with my performance....
1 Pages (250 words) Admission/Application Essay

Effective and Motivating Communication

The resolution of conflict is important not only for smooth operation of a project but also to improve and improvise work performance.... In… When I had interned interned at GE Capital in their Retail Consumer Finance group doing Risk Management, I found that effective and motivating Though conflicts are part and parcel of life, workplace conflicts, if left unresolved for long, tend to adversely impact productivity....
1 Pages (250 words) Admission/Application Essay

Why Do I Hope to Be a Successful Penn University's Student

The author of the essay “Why Do I Hope to Be a Successful Penn University's Student?... rdquo; presents himself as a person who has got experience in the business trends, the stock exchange market, as a member of the Greenpeace movement, and believes he'll succeed in the study in the University....
1 Pages (250 words) Admission/Application Essay

Financing Foreign Trade (slp)

FINANCING FOREIGN TRADE We are in an era of globalization, and the world has become increasingly interconnected due to immense technological advancements.... This development has… Countries have become interdependent; India imports mainly aircrafts and other machinery, precious stones that is diamond and gold, fertilizers and soybeans FINANCING FOREIGN TRADE We are in an era of globalization, and the world has become increasingly interconnected due to immense technological advancements....
1 Pages (250 words) Admission/Application Essay

What makes up your identity and why Quiz4

Identity is a person's view of who they are, how they relate to other people, how one takes general life occurrences and how such occurrences affect them.... It may also be how other people describe someone; based on race, tribe, religion, and cultural practices that define… There are various factors that affect ones identity including; interests and hobbies, ones physical location (country/city/town/village), media, family, friends and peers, gender and many others....
2 Pages (500 words) Admission/Application Essay

Peer Review for Essay 3

?? 1) “There is nothing personal through internet.... Does this mean instead “there is nothing private through the internet”?... ircle this sentence:1) “There is nothing personal through internet.... Does this mean instead “there is nothing private through the internet”?... For instance, in paragraph 3, the student claims that technology is bad for privacy, yet student only reacts in paragraph 4, but only after discussing the positive effect of social media and internet on fast updates of news....
2 Pages (500 words) Admission/Application Essay

Annotated Bibliography

This can help in formulating an idea of how stress impacts college students which is consistent with their assessment of the… The book is also a credible academic resource which can be trusted with the information it provides.... The book addresses the degree of stress experienced during childhood and adulthood and how this can be coped through various methods. The book starts with the development Then it goes on to explain the factors that contribute towards stress such as nutrition, diet, physical activity, substance usage, and so on....
4 Pages (1000 words) Admission/Application Essay

Education as the key to success in life

I worked for year and half as a marketing The paper "Education as the Key to Success in Life" is an amazing example of an admission/application essay on education.... My parents taught me that education was the key to success in life.... As a high school student I worked very hard in my studies to achieve a GPA of 3....
2 Pages (500 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us