SlideShare uma empresa Scribd logo
1 de 13
Distributed Hash Tables (DHT)
                Harisankar H
            PhD student, DOS lab,
           Dept. of CSE, IIT Madras
                 11/8/2012

       http://harisankarh.wordpress.com
Motivation
• Bittorrent
  – Given a file id, find the list of nodes currently
    associated with the file
     • File id -> node mapping
     • e.g., get(“sfdsfdsf…”) -> {203.12.123.45,201.128.249.123,…}
• Domain Naming System(DNS)
  – Find IP address of server associated with a domain
    name
     • Domain name -> IP address mapping
     • e.g., get(“google.co.in”) -> {209.234.67.32}
Abstract problem
– Realize a hash table functionality in a
  decentralized manner
   • Interface
      – put(key,value)
      – get(key) -> value
   • Realize using nodes which can join and leave at any
     time


      ....                                  ....




                    [try yourself!]
Simple solutions
• Flooding
   – Put() -> store in any node
      • Cost: O(1)
   – Get() -> send query to all nodes
      • Cost: O(N)
• Full replication
   – Put() -> store in all nodes
      • Cost: O(N)
   – Get() -> check in any one node
      • Cost: O(1)


            [more solutions? try yourself!]
Partitioning in a small setting
• Assign different keys to different nodes
• Need a key to node mapping
  – getnode(key) -> node id
• How to distribute the keys ?
  – assume that every node knows when a node
    join/leave the system
  – Assume key range: 0 to (2k – 1), k-bit key


                 [try yourself!]
Consistent hashing
                           2k – 1   0             40


                                                               Key:51



                                                   70




• Nodes assigned ids in the same space( 0 to 2k – 1)
• Each node is responsible for the key range between
   – Its node id and the id of previous node in the id space
• Responsibilities split accordingly when nodes join and leave
   – Responsibility of each node ≈ K/N
   – <k,v> pairs transferred during node join/leave ≈ K/N
Issues
• In a large internet-scale setting
   – Millions of nodes
   – Low bandwidth
• Costly to inform all the nodes when a node
  joins/leaves the system
   – O(N) messages
• Problem
   – How to realize consistent hashing in a large internet-
     scale setting ?
      • How to implement node join/leave, key put/get ?
      • Assume that you know the IP address of one of the nodes
        which is already part of the system

                      [try yourself!]
Distributed Hash Tables(e.g., Chord)
• Each node(id = n) maintains list of nodes
  responsible for ids: (n + 2i)mod 2k, 0 <= i <= k-1
Key lookup
• Each key lookup query is forwarded to the
  node in the finger table which immediately
  precedes it
Performance
• Key lookup/put
   – O(logN) hops/messages
• Node join/leave
   – O(logN) messages
       • Uses information from neighbours and periodic refreshing
• O(logN) entries in the finger table
                 [proof: try yourself!]
• Scales to large number of nodes in dynamic settings
   – Used in bittorrent
• Different types of DHTs
   – Pastry, Kademlia
Amazon Dynamo
• Key-value store inspired from DHTs
   – Used for Amazon shopping cart
       • Cart id -> added items
• Key features
   – 1 hop key lookup(O(N) neighbours per node)
       • Latency-sensitive application
   – Uses virtual nodes for handling heterogeneity and better load
     dispersion
       • Virtual nodes already proposed in Chord
   – Each data item replicated for availability
       • Versioning using vector clocks
   – Handles several implementation issues
• Cassandra’s architecture inspired from Dynamo
Further research related to DHTs
• Search using DHTs
• Active key-value store
   – Incremental processing
   – Distributed processing
• P2P Computational grid
   – Vishwa: DHT used for coordinator assignment and storing
     task-related data
• Node-capability aware object placement
   – Virat
• P2P file system
   – ENFS
• …
References
1.      Consistent hashing
       1.   Karger, D. etal. (1999). "Web Caching with Consistent
            Hashing". Computer Networks 31 (11): 1203–1213.
2.      Chord
       1.   Ion Stoica etal. “Chord: A Scalable Peer-to-Peer Lookup Protocol for
            Internet Applications”. IEEE/ACM TRANSACTIONS ON NETWORKING,
            VOL. 11, NO. 1, FEBRUARY 2003
3.      Dynamo
       1.   DeCandia etal., “Dynamo: Amazon’s Highly Available Key-value
            Store”, SOSP’07




     Image credits: DHT figures taken from Chord[2] paper

Mais conteúdo relacionado

Mais de Harisankar H

Hariintro exebit 2014
Hariintro exebit 2014Hariintro exebit 2014
Hariintro exebit 2014Harisankar H
 
Large scale graph processing
Large scale graph processingLarge scale graph processing
Large scale graph processingHarisankar H
 
Addressing scalability challenges in peer-to-peer search
Addressing scalability challenges in peer-to-peer searchAddressing scalability challenges in peer-to-peer search
Addressing scalability challenges in peer-to-peer searchHarisankar H
 
Google Spanner : our understanding of concepts and implications
Google Spanner : our understanding of concepts and implicationsGoogle Spanner : our understanding of concepts and implications
Google Spanner : our understanding of concepts and implicationsHarisankar H
 
Learn Australia through multimedia
Learn Australia through multimediaLearn Australia through multimedia
Learn Australia through multimediaHarisankar H
 

Mais de Harisankar H (6)

Hariintro exebit 2014
Hariintro exebit 2014Hariintro exebit 2014
Hariintro exebit 2014
 
Large scale graph processing
Large scale graph processingLarge scale graph processing
Large scale graph processing
 
Addressing scalability challenges in peer-to-peer search
Addressing scalability challenges in peer-to-peer searchAddressing scalability challenges in peer-to-peer search
Addressing scalability challenges in peer-to-peer search
 
MapReduce basics
MapReduce basicsMapReduce basics
MapReduce basics
 
Google Spanner : our understanding of concepts and implications
Google Spanner : our understanding of concepts and implicationsGoogle Spanner : our understanding of concepts and implications
Google Spanner : our understanding of concepts and implications
 
Learn Australia through multimedia
Learn Australia through multimediaLearn Australia through multimedia
Learn Australia through multimedia
 

Último

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Slides used in course lecture on distributed hash tables

  • 1. Distributed Hash Tables (DHT) Harisankar H PhD student, DOS lab, Dept. of CSE, IIT Madras 11/8/2012 http://harisankarh.wordpress.com
  • 2. Motivation • Bittorrent – Given a file id, find the list of nodes currently associated with the file • File id -> node mapping • e.g., get(“sfdsfdsf…”) -> {203.12.123.45,201.128.249.123,…} • Domain Naming System(DNS) – Find IP address of server associated with a domain name • Domain name -> IP address mapping • e.g., get(“google.co.in”) -> {209.234.67.32}
  • 3. Abstract problem – Realize a hash table functionality in a decentralized manner • Interface – put(key,value) – get(key) -> value • Realize using nodes which can join and leave at any time .... .... [try yourself!]
  • 4. Simple solutions • Flooding – Put() -> store in any node • Cost: O(1) – Get() -> send query to all nodes • Cost: O(N) • Full replication – Put() -> store in all nodes • Cost: O(N) – Get() -> check in any one node • Cost: O(1) [more solutions? try yourself!]
  • 5. Partitioning in a small setting • Assign different keys to different nodes • Need a key to node mapping – getnode(key) -> node id • How to distribute the keys ? – assume that every node knows when a node join/leave the system – Assume key range: 0 to (2k – 1), k-bit key [try yourself!]
  • 6. Consistent hashing 2k – 1 0 40 Key:51 70 • Nodes assigned ids in the same space( 0 to 2k – 1) • Each node is responsible for the key range between – Its node id and the id of previous node in the id space • Responsibilities split accordingly when nodes join and leave – Responsibility of each node ≈ K/N – <k,v> pairs transferred during node join/leave ≈ K/N
  • 7. Issues • In a large internet-scale setting – Millions of nodes – Low bandwidth • Costly to inform all the nodes when a node joins/leaves the system – O(N) messages • Problem – How to realize consistent hashing in a large internet- scale setting ? • How to implement node join/leave, key put/get ? • Assume that you know the IP address of one of the nodes which is already part of the system [try yourself!]
  • 8. Distributed Hash Tables(e.g., Chord) • Each node(id = n) maintains list of nodes responsible for ids: (n + 2i)mod 2k, 0 <= i <= k-1
  • 9. Key lookup • Each key lookup query is forwarded to the node in the finger table which immediately precedes it
  • 10. Performance • Key lookup/put – O(logN) hops/messages • Node join/leave – O(logN) messages • Uses information from neighbours and periodic refreshing • O(logN) entries in the finger table [proof: try yourself!] • Scales to large number of nodes in dynamic settings – Used in bittorrent • Different types of DHTs – Pastry, Kademlia
  • 11. Amazon Dynamo • Key-value store inspired from DHTs – Used for Amazon shopping cart • Cart id -> added items • Key features – 1 hop key lookup(O(N) neighbours per node) • Latency-sensitive application – Uses virtual nodes for handling heterogeneity and better load dispersion • Virtual nodes already proposed in Chord – Each data item replicated for availability • Versioning using vector clocks – Handles several implementation issues • Cassandra’s architecture inspired from Dynamo
  • 12. Further research related to DHTs • Search using DHTs • Active key-value store – Incremental processing – Distributed processing • P2P Computational grid – Vishwa: DHT used for coordinator assignment and storing task-related data • Node-capability aware object placement – Virat • P2P file system – ENFS • …
  • 13. References 1. Consistent hashing 1. Karger, D. etal. (1999). "Web Caching with Consistent Hashing". Computer Networks 31 (11): 1203–1213. 2. Chord 1. Ion Stoica etal. “Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications”. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 3. Dynamo 1. DeCandia etal., “Dynamo: Amazon’s Highly Available Key-value Store”, SOSP’07 Image credits: DHT figures taken from Chord[2] paper