Cycloid: A constant degree P2P network architecture Team: Comfortably Dumb Report 3 Pavan Deshpande ([email protected]) Punit Gadenkanahalli ([email protected]) Sahil Shah ([email protected])

Cycloid (Revisited) Cycloid ■ Combination of pastry and CCC graphs. ■ Like Pastry, Cycloid uses consistent hashing to map keys to nodes ■ Every node is replaced by a cycle of d nodes. ■ The average lookup path is O(d) where n=dx2d

Hypothesis (Revisited) ● "Number of hops for a lookup request in Cycloid is proportional to d, dimension of the network"

● In a network with n nodes, relation between n and dimension d is given by equation n = d × 2d .

● Avg. number of hops, H = A + Cd where A and C are constants

Representation of node in cycloid ● Each node represented in the form ○ (k, ad-1 ad-2 ...... a0) ● k is called cyclic index ● ad-1 ad-2 ...... a0 called as cubical index ● k is integer which ranges from 0 to (d-1) ● ad-1 ad-2 ...... a0 are binary numbers from 0 to 2d - 1

Routing table of a node in cycloid ● Each node (k, ad-1...a0) has 7 entries in it's routing table. ● Cubical neighbour (k-1 , ad-1 ad-2 ... ak' x x x ) ● Cyclic neighbour one with smaller cubical index and one with larger cubical index. ○ MSDB should be < k-1 ● Inside leaf set node ○ same cubical index but differ in cyclic index. ○ one smaller and one larger ● Outside leaf set ○ primary node with preceding and succeeding cubical index

Routing ● Three conditions for routing. ○ Ascending: if nodes k < MSDB it forwards the request outside leaf set ○ Descending: if k = MSDB, forward request to cubical neighbour else if k > MSDB forward the request to cyclic neighbour or inside leaf set, whichever is closer to the target. ○ Traverse Cycle: If target ID is within leaf set the request is forwarded to the closest node in the leaf set.

Routing table <1,001> ● Routing table(dimension=3) ○ ○ ○ ○ ○ ○ ○

Cubical Neighbor= <0,011 > Cyclic Neighbor1= <0,000> Cyclic Neighbor2= <0,000> Inside LeafSet1= <2,001> Inside LeafSet2= <0,001> Outside LeafSet1= <2,010> Outside LeafSet2= <2,000>

● MSDB for <1,001> and <2,011> = 1 ● k== MSDB, so Cubical Neighbor

Routing table <0,011> Routing table(dimension=3) ○ Cubical Neighbor= (2,010 ) ○ Cyclic Neighbor1= (2,100 ) ○ Cyclic Neighbor2= (2,010 ) ○ Inside LeafSet1= (1,011 ) ○ Inside LeafSet2= (2,011 ) ○ Outside LeafSet1= (2,100 ) ○ Outside LeafSet2= (2,010 ) ● MSDB for <0,011> and <2,011> = 0 ● MSDB =0, so Inside leafset ●

Software Design ● Implementation consists of three classes ○ Simulate.java ○ Cycloid.java ○ Node.java

● Node class represents the structure of a node in cycloid and gives the routing table entries of a node. ● Cycloid class implements the routing algorithm of the cycloid. ● Simulate class runs the simulation. It generates the source and destination node for each iteration.

Class Diagram

Testing parameters ● We assume that the cycloid structure is static. ● d - dimension of the cycloid network. ○ a range of dimension is passed. ● n - number of iterations to be performed for each dimension ● seed for random generator ● n number of iterations are performed for each dimension in the range with different source node and destination node and average hop counts for that dimension is calculated

Progress ● Implemented the structure of Cycloid network. ● Implemented the routing algorithm of the cycloid. ● Currently testing the correctness of hypothesis for the range of dimensions

Results so far (so good?) ● The results so far obtained shows that average no of hop counts per lookup is in the order of the dimension.

Demo

Research Paper 1 Haiying Shen; Cheng-Zhong Xu; Guihai Chen, "Cycloid: a constant-degree and lookup-efficient P2P overlay network,". Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International , vol., no., pp. 26,, 26-30 April 2004 doi: 10.1109/IPDPS.2004.1302935

URL: http://ieeexplore.ieee.org.ezproxy.rit.edu/stamp/stamp.jsp? tp=&arnumber=1302935&isnumber=28950

Research Paper 2 Zhang Jianzhe, "Advanced routing algorithm based on Cycloid model for P2P network," .Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on , vol., no., pp.167,171, 27-29 May 2011 doi: 10.1109/ICCSN.2011.6013568 URL: http://ieeexplore.ieee.org.ezproxy.rit.edu/stamp/stamp.jsp? tp=&arnumber=6013568&isnumber=6013532

Research Paper 3 Xing Li; Jiguo Yu, "A Novel P2P Overlay Network Based on Cycloid and Folded Hypercube,". Grid and Cooperative Computing, 2008. GCC '08. Seventh International Conference on , vol., no., pp.374,379, 24-26 Oct. 2008 doi: 10.1109/GCC.2008.33 URL: http://ieeexplore.ieee.org.ezproxy.rit.edu/stamp/stamp.jsp? tp=&arnumber=4662889&isnumber=4662826

Thank you

Cycloid: A constant degree P2P network architecture Team ... - RIT CS

Cycloid: A constant degree P2P network architecture. Team: Comfortably Dumb. Report 3 ... d . ○ Avg. number of hops, H = A + Cd where A and C are constants ...

493KB Sizes 1 Downloads 212 Views

Recommend Documents

TreeP: A Tree Based P2P Network Architecture
This network architecture is called TreeP (Tree based P2P network architecture) and is based on a ..... Each peer maintains its routing table by exchanging data through its active connections. ..... Middleware Fabric for Grid-based Remote Visualizati

A Java Based Architecture of P2P-Grid Middleware
ticated resource management and data transfer components. P2P systems on the other ... DGET and P2P Systems: The second class of system we can compare ...

A Multilayer Topic-Group based P2P Network
managed distribution is more efficient and reliable than the mass and .... operator) the summaries in the Local Peers or ones in the low layer of Delegate Peers.

A Scalable and Robust Structured P2P Network Based ...
placement of data, and thus exhibit several unique properties that unstructured P2P ... D. Guo and Y. Liu are with the Department of Computer Science and. Engineering, Hong ...... and is sometimes less than d but becomes d after a recovery period in

CS-7301 Advanced Computer Architecture Presentation Topics.pdf ...
CS-7301 Advanced Computer Architecture Presentation Topics.pdf. CS-7301 Advanced Computer Architecture Presentation Topics.pdf. Open. Extract.

CS-7301 Advanced Computer Architecture Presentation Topics.pdf ...
Page 1 of 1. CS-7301 Advanced Computer Architecture Presentation Topics.pdf. CS-7301 Advanced Computer Architecture Presentation Topics.pdf. Open.

a Robust Wireless Facilities Network for Data Centers - CS@Dartmouth
on top of the racks (as stations), forming LoS links between the. APs and ...... [22] HILBERT, D. Ueber die stetige Abbildung einer Line auf ein. Flächenstück.

Digital Evidence Bag Selection for P2P network investigation.pdf ...
Due to the high churn rates typical of most P2P networks, the time. Page 1 of 8 .... Displaying Digital Evidence Bag Selection for P2P network investigation.pdf.

A micro-cellular network architecture for transmission of ...
Mar 11, 2009 - Abstract- Consider an area, such as a shopping mall, which is covered by a network of micro-cells. Assume a user entering this area to have a packet that he wishes to transmit during hidher residence time in the area. The user spends a

GROW-Net–A New Hybrid Optical Wireless Access Network Architecture
1. INTRODUCTION. Over the past several years Internet traffic has been ... Internet traffic has strained the existing ... PONs can reach the home (Fiber-to-the-Home, FTTH) or the curb ... the mesh network deals with 2 types of links: 1. AP-User.

A Data-Oriented (and Beyond) Network Architecture
1 Introduction. The DNS name resolution system is a fundamental part of today's ... The first Internet applications, such as file transfer and remote login, focused ...... define a simple and scalable interdomain multicast protocol. We now show ...

An Architecture for Anonymous Mobile Coupons in a Large Network
Nov 15, 2016 - services and entertainment [2]. .... credit/debit card payment (see also the next section). Note ... (ii) Executes online and hence must have.

A Programmer–Interpreter Neural Network Architecture ...
May 18, 2015 - A Programmer–Interpreter Neural Network Architecture for Prefrontal Cognitive Control. Francesco Donnarumma. ∗. Institute of Cognitive ...

Cheap 360 degree fisheye full angle view 1.3MP 960P WIFI P2P ...
Cheap 360 degree fisheye full angle view 1.3MP 960P ... Bulb Camera Wireless Home Security WIFI Camera.pdf. Cheap 360 degree fisheye full angle view ...

GROW-Net–A New Hybrid Optical Wireless Access Network Architecture
standards, including Ethernet PON (EPON), Broadband. PON (BPON) and Gigabit PON (GPON) are Time. Division Multiplexing based, using one downstream ...

An Architecture for Anonymous Mobile Coupons in a Large Network
Nov 15, 2016 - Journal of Computer Networks and Communications. Volume 2016 ..... maximum load for the 5 hours, the centralized service would need to be ...

Effects of degree-frequency correlations on network ...
Jan 28, 2013 - recent years researchers have started to explore the effect of correlations .... 2: (Colour on-line) Illustration of phase-locking for sub- linear, linear, and .... and k0 =50 (all SF networks we use in this letter were generated using

PGDCA-II-SEM PAPER-CS-2.4 COMPUTER NETWORK AND ...
PGDCA-II-SEM PAPER-CS-2.4 COMPUTER NETWORK AND INTERNET .pdf. PGDCA-II-SEM PAPER-CS-2.4 COMPUTER NETWORK AND INTERNET .pdf.

P2P Whitepaper
Dec 6, 2000 - of the role of automated software agents in a peering infrastructure. ... phone a service technician can be alerted to a service call, obtain driving ...

JXTA_ Java P2P Programming
After you have selected OK, configuration files and directories will be written to disk and the platform will boot. Before the platform fully boots, you will be presented with a security login dialog that requests the name and password you chose in t

3g mobile network architecture pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 3g mobile ...

Effects of degree-frequency correlations on network ...
Jan 28, 2013 - ... of Physics and Astronomy, Northwestern University - Evanston, IL 60208, USA ... gain insight into the mechanism behind synchronization,.

what is network architecture pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. what is network architecture pdf. what is network architecture pdf.

telecommunication network architecture pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.