SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Distributed Hash Tables (DHT)
                Harisankar H
            PhD student, DOS lab,
           Dept. of CSE, IIT Madras
                 11/8/2012

       http://harisankarh.wordpress.com
Motivation
• Bittorrent
  – Given a file id, find the list of nodes currently
    associated with the file
     • File id -> node mapping
     • e.g., get(“sfdsfdsf…”) -> {203.12.123.45,201.128.249.123,…}
• Domain Naming System(DNS)
  – Find IP address of server associated with a domain
    name
     • Domain name -> IP address mapping
     • e.g., get(“google.co.in”) -> {209.234.67.32}
Abstract problem
– Realize a hash table functionality in a
  decentralized manner
   • Interface
      – put(key,value)
      – get(key) -> value
   • Realize using nodes which can join and leave at any
     time


      ....                                  ....




                    [try yourself!]
Simple solutions
• Flooding
   – Put() -> store in any node
      • Cost: O(1)
   – Get() -> send query to all nodes
      • Cost: O(N)
• Full replication
   – Put() -> store in all nodes
      • Cost: O(N)
   – Get() -> check in any one node
      • Cost: O(1)


            [more solutions? try yourself!]
Partitioning in a small setting
• Assign different keys to different nodes
• Need a key to node mapping
  – getnode(key) -> node id
• How to distribute the keys ?
  – assume that every node knows when a node
    join/leave the system
  – Assume key range: 0 to (2k – 1), k-bit key


                 [try yourself!]
Consistent hashing
                           2k – 1   0             40


                                                               Key:51



                                                   70




• Nodes assigned ids in the same space( 0 to 2k – 1)
• Each node is responsible for the key range between
   – Its node id and the id of previous node in the id space
• Responsibilities split accordingly when nodes join and leave
   – Responsibility of each node ≈ K/N
   – <k,v> pairs transferred during node join/leave ≈ K/N
Issues
• In a large internet-scale setting
   – Millions of nodes
   – Low bandwidth
• Costly to inform all the nodes when a node
  joins/leaves the system
   – O(N) messages
• Problem
   – How to realize consistent hashing in a large internet-
     scale setting ?
      • How to implement node join/leave, key put/get ?
      • Assume that you know the IP address of one of the nodes
        which is already part of the system

                      [try yourself!]
Distributed Hash Tables(e.g., Chord)
• Each node(id = n) maintains list of nodes
  responsible for ids: (n + 2i)mod 2k, 0 <= i <= k-1
Key lookup
• Each key lookup query is forwarded to the
  node in the finger table which immediately
  precedes it
Performance
• Key lookup/put
   – O(logN) hops/messages
• Node join/leave
   – O(logN) messages
       • Uses information from neighbours and periodic refreshing
• O(logN) entries in the finger table
                 [proof: try yourself!]
• Scales to large number of nodes in dynamic settings
   – Used in bittorrent
• Different types of DHTs
   – Pastry, Kademlia
Amazon Dynamo
• Key-value store inspired from DHTs
   – Used for Amazon shopping cart
       • Cart id -> added items
• Key features
   – 1 hop key lookup(O(N) neighbours per node)
       • Latency-sensitive application
   – Uses virtual nodes for handling heterogeneity and better load
     dispersion
       • Virtual nodes already proposed in Chord
   – Each data item replicated for availability
       • Versioning using vector clocks
   – Handles several implementation issues
• Cassandra’s architecture inspired from Dynamo
Further research related to DHTs
• Search using DHTs
• Active key-value store
   – Incremental processing
   – Distributed processing
• P2P Computational grid
   – Vishwa: DHT used for coordinator assignment and storing
     task-related data
• Node-capability aware object placement
   – Virat
• P2P file system
   – ENFS
• …
References
1.      Consistent hashing
       1.   Karger, D. etal. (1999). "Web Caching with Consistent
            Hashing". Computer Networks 31 (11): 1203–1213.
2.      Chord
       1.   Ion Stoica etal. “Chord: A Scalable Peer-to-Peer Lookup Protocol for
            Internet Applications”. IEEE/ACM TRANSACTIONS ON NETWORKING,
            VOL. 11, NO. 1, FEBRUARY 2003
3.      Dynamo
       1.   DeCandia etal., “Dynamo: Amazon’s Highly Available Key-value
            Store”, SOSP’07




     Image credits: DHT figures taken from Chord[2] paper

Weitere ähnliche Inhalte

Mehr von Harisankar H (6)

Hariintro exebit 2014
Hariintro exebit 2014Hariintro exebit 2014
Hariintro exebit 2014
 
Large scale graph processing
Large scale graph processingLarge scale graph processing
Large scale graph processing
 
Addressing scalability challenges in peer-to-peer search
Addressing scalability challenges in peer-to-peer searchAddressing scalability challenges in peer-to-peer search
Addressing scalability challenges in peer-to-peer search
 
MapReduce basics
MapReduce basicsMapReduce basics
MapReduce basics
 
Google Spanner : our understanding of concepts and implications
Google Spanner : our understanding of concepts and implicationsGoogle Spanner : our understanding of concepts and implications
Google Spanner : our understanding of concepts and implications
 
Learn Australia through multimedia
Learn Australia through multimediaLearn Australia through multimedia
Learn Australia through multimedia
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Slides used in course lecture on distributed hash tables

  • 1. Distributed Hash Tables (DHT) Harisankar H PhD student, DOS lab, Dept. of CSE, IIT Madras 11/8/2012 http://harisankarh.wordpress.com
  • 2. Motivation • Bittorrent – Given a file id, find the list of nodes currently associated with the file • File id -> node mapping • e.g., get(“sfdsfdsf…”) -> {203.12.123.45,201.128.249.123,…} • Domain Naming System(DNS) – Find IP address of server associated with a domain name • Domain name -> IP address mapping • e.g., get(“google.co.in”) -> {209.234.67.32}
  • 3. Abstract problem – Realize a hash table functionality in a decentralized manner • Interface – put(key,value) – get(key) -> value • Realize using nodes which can join and leave at any time .... .... [try yourself!]
  • 4. Simple solutions • Flooding – Put() -> store in any node • Cost: O(1) – Get() -> send query to all nodes • Cost: O(N) • Full replication – Put() -> store in all nodes • Cost: O(N) – Get() -> check in any one node • Cost: O(1) [more solutions? try yourself!]
  • 5. Partitioning in a small setting • Assign different keys to different nodes • Need a key to node mapping – getnode(key) -> node id • How to distribute the keys ? – assume that every node knows when a node join/leave the system – Assume key range: 0 to (2k – 1), k-bit key [try yourself!]
  • 6. Consistent hashing 2k – 1 0 40 Key:51 70 • Nodes assigned ids in the same space( 0 to 2k – 1) • Each node is responsible for the key range between – Its node id and the id of previous node in the id space • Responsibilities split accordingly when nodes join and leave – Responsibility of each node ≈ K/N – <k,v> pairs transferred during node join/leave ≈ K/N
  • 7. Issues • In a large internet-scale setting – Millions of nodes – Low bandwidth • Costly to inform all the nodes when a node joins/leaves the system – O(N) messages • Problem – How to realize consistent hashing in a large internet- scale setting ? • How to implement node join/leave, key put/get ? • Assume that you know the IP address of one of the nodes which is already part of the system [try yourself!]
  • 8. Distributed Hash Tables(e.g., Chord) • Each node(id = n) maintains list of nodes responsible for ids: (n + 2i)mod 2k, 0 <= i <= k-1
  • 9. Key lookup • Each key lookup query is forwarded to the node in the finger table which immediately precedes it
  • 10. Performance • Key lookup/put – O(logN) hops/messages • Node join/leave – O(logN) messages • Uses information from neighbours and periodic refreshing • O(logN) entries in the finger table [proof: try yourself!] • Scales to large number of nodes in dynamic settings – Used in bittorrent • Different types of DHTs – Pastry, Kademlia
  • 11. Amazon Dynamo • Key-value store inspired from DHTs – Used for Amazon shopping cart • Cart id -> added items • Key features – 1 hop key lookup(O(N) neighbours per node) • Latency-sensitive application – Uses virtual nodes for handling heterogeneity and better load dispersion • Virtual nodes already proposed in Chord – Each data item replicated for availability • Versioning using vector clocks – Handles several implementation issues • Cassandra’s architecture inspired from Dynamo
  • 12. Further research related to DHTs • Search using DHTs • Active key-value store – Incremental processing – Distributed processing • P2P Computational grid – Vishwa: DHT used for coordinator assignment and storing task-related data • Node-capability aware object placement – Virat • P2P file system – ENFS • …
  • 13. References 1. Consistent hashing 1. Karger, D. etal. (1999). "Web Caching with Consistent Hashing". Computer Networks 31 (11): 1203–1213. 2. Chord 1. Ion Stoica etal. “Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications”. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 3. Dynamo 1. DeCandia etal., “Dynamo: Amazon’s Highly Available Key-value Store”, SOSP’07 Image credits: DHT figures taken from Chord[2] paper