SlideShare una empresa de Scribd logo
1 de 17
Amit Singh Dahal
g5638545
Content Addressable
Network(CAN)
Structured P2P Network
Outline
 Introduction
 Overview
 Construction
 Routing
 Maintenance
 Evaluation
 Future Improvements
Introduction
 one of the original four distributed hash table
proposals, introduced concurrently with
Chords, Pastry, and Tapestry.
 developed at UC Berkeley
 CANs overlay routing easy to understand
 scalable indexing system for large-scale
decentralized storage applications
 has a good performance
Overview
 distributed, decentralized P2P infrastructure
system that maps keys onto values
 keys hashed into d dimensional Cartesian space
 Interface:
 insert(key, value)
 retrieve(key)
 associate to each node and item a unique
coordinate in an d-dimensional Cartesian space
Overview
 entire space is partitioned amongst all the nodes
 every node “owns” a zone in the overall space
 can store data at “points” in the space
 can route from one “point” to another
 point  node that owns the enclosing zone
Overview
y
x
State of the system at time t
Node
Resource
Zone
Fig:2 dimensional space with a key mapped to a point (x,y)
Construction
Bootstrap
node
new node
Construction
I
Bootstrap
node
new node 1) Discover some node “I” already in CAN
Construction
2) Pick random point in space
I
(x,y)
new node
Construction
(x,y)
3) I routes to (x,y), discovers node J
I
J
new node
Construction
newJ
4) split J’s zone in half… new owns one half
Routing
 data stored in the CAN is addressed by name
(i.e. key), not location (i.e. IP address)
 have some routing mechanism
 A node only maintains state for its immediate
neighboring nodes
Routing
y
Node
M(x,y)
N(x,y)
 d-dimensional
space with n zones
where d=2 and n=8
2 zones are
neighbor if d-1 dim
overlap
Algorithm:
Choose the neighbor
nearest to the
destination
M(x,y) Query/
Resource
key
Maintenance
 Use zone takeover in case of failure or leaving of
a node
 Send your neighbor table update to neighbors to
inform that you are alive at discrete time interval t
 If your neighbor does not send alive in time
t, takeover its zone
 Zone reassignment is needed
Evaluation
 Scalability
-For a uniformly partitioned space with n
nodes and d dimensions:
* per node, number of neighbors is 2d
*average routing path is (d*n1/d)/3
hops (due to Manhattan distance
routing, expected hops in each
dimension is dimension length * 1/3)
*Can scale the network without
increasing per node state
 Robustness
-no single point of failure
Future Improvements
 Multi-dimension
-increase in dimension reduces path length
 Caching and replication techniques for better
performance
 Overloading the zone
-increases availability, reduces path
length, reduces per hop latency
 Uniform partitioning
-compare the volume of the zone with its
neighbors
-partition the zone having largest volume
THANK
YOU!!! 

Más contenido relacionado

La actualidad más candente

Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
Sri Prasanna
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 

La actualidad más candente (20)

Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Tapestry
TapestryTapestry
Tapestry
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Data link layer
Data link layer Data link layer
Data link layer
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Sun NFS , Case study
Sun NFS , Case study Sun NFS , Case study
Sun NFS , Case study
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Chord Algorithm
Chord AlgorithmChord Algorithm
Chord Algorithm
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Dsdv
DsdvDsdv
Dsdv
 

Destacado

Chord presentation
Chord presentationChord presentation
Chord presentation
GertThijs
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
Kalman Graffi
 
Formalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable NetworkFormalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable Network
Faculty of Computer Science
 
Introduction to DHT with Chord
Introduction to DHT with ChordIntroduction to DHT with Chord
Introduction to DHT with Chord
Hiroya Nagao
 

Destacado (10)

Chord Node Join
Chord Node JoinChord Node Join
Chord Node Join
 
Chord presentation
Chord presentationChord presentation
Chord presentation
 
Distributed Hash Table and Consistent Hashing
Distributed Hash Table and Consistent HashingDistributed Hash Table and Consistent Hashing
Distributed Hash Table and Consistent Hashing
 
Chord Presentation at Papers We Love SF, August 2016
Chord Presentation at Papers We Love SF, August 2016Chord Presentation at Papers We Love SF, August 2016
Chord Presentation at Papers We Love SF, August 2016
 
QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006QuaP2P P2P Tutorial 2006
QuaP2P P2P Tutorial 2006
 
Protocolo Can
Protocolo CanProtocolo Can
Protocolo Can
 
Formalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable NetworkFormalizing Peer-to-Peer Systems based on Content Addressable Network
Formalizing Peer-to-Peer Systems based on Content Addressable Network
 
ChordアルゴリズムによるDHT入門
ChordアルゴリズムによるDHT入門ChordアルゴリズムによるDHT入門
ChordアルゴリズムによるDHT入門
 
Introduction to DHT with Chord
Introduction to DHT with ChordIntroduction to DHT with Chord
Introduction to DHT with Chord
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 

Similar a Content addressable network(can)

Intro 2 Computer Networks
Intro 2 Computer NetworksIntro 2 Computer Networks
Intro 2 Computer Networks
rakeshgoswami
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
mrcopyxerox
 

Similar a Content addressable network(can) (20)

Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
T24144148
T24144148T24144148
T24144148
 
UNET: Massive Scale DNN on Spark
UNET: Massive Scale DNN on SparkUNET: Massive Scale DNN on Spark
UNET: Massive Scale DNN on Spark
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Game based TDMA MAC protocol for vehicular network
Game based TDMA MAC protocol for vehicular networkGame based TDMA MAC protocol for vehicular network
Game based TDMA MAC protocol for vehicular network
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Intro 2 Computer Networks
Intro 2 Computer NetworksIntro 2 Computer Networks
Intro 2 Computer Networks
 
Lecture 06 - Chapter 4 - Communications in Networks
Lecture 06 - Chapter 4 - Communications in NetworksLecture 06 - Chapter 4 - Communications in Networks
Lecture 06 - Chapter 4 - Communications in Networks
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
A framework of distributed indexing and data
A framework of distributed indexing and dataA framework of distributed indexing and data
A framework of distributed indexing and data
 
Parallel Implementation of K Means Clustering on CUDA
Parallel Implementation of K Means Clustering on CUDAParallel Implementation of K Means Clustering on CUDA
Parallel Implementation of K Means Clustering on CUDA
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
785101092study material xii_ip
785101092study material xii_ip785101092study material xii_ip
785101092study material xii_ip
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Content addressable network(can)

  • 1. Amit Singh Dahal g5638545 Content Addressable Network(CAN) Structured P2P Network
  • 2. Outline  Introduction  Overview  Construction  Routing  Maintenance  Evaluation  Future Improvements
  • 3. Introduction  one of the original four distributed hash table proposals, introduced concurrently with Chords, Pastry, and Tapestry.  developed at UC Berkeley  CANs overlay routing easy to understand  scalable indexing system for large-scale decentralized storage applications  has a good performance
  • 4. Overview  distributed, decentralized P2P infrastructure system that maps keys onto values  keys hashed into d dimensional Cartesian space  Interface:  insert(key, value)  retrieve(key)  associate to each node and item a unique coordinate in an d-dimensional Cartesian space
  • 5. Overview  entire space is partitioned amongst all the nodes  every node “owns” a zone in the overall space  can store data at “points” in the space  can route from one “point” to another  point  node that owns the enclosing zone
  • 6. Overview y x State of the system at time t Node Resource Zone Fig:2 dimensional space with a key mapped to a point (x,y)
  • 8. Construction I Bootstrap node new node 1) Discover some node “I” already in CAN
  • 9. Construction 2) Pick random point in space I (x,y) new node
  • 10. Construction (x,y) 3) I routes to (x,y), discovers node J I J new node
  • 11. Construction newJ 4) split J’s zone in half… new owns one half
  • 12. Routing  data stored in the CAN is addressed by name (i.e. key), not location (i.e. IP address)  have some routing mechanism  A node only maintains state for its immediate neighboring nodes
  • 13. Routing y Node M(x,y) N(x,y)  d-dimensional space with n zones where d=2 and n=8 2 zones are neighbor if d-1 dim overlap Algorithm: Choose the neighbor nearest to the destination M(x,y) Query/ Resource key
  • 14. Maintenance  Use zone takeover in case of failure or leaving of a node  Send your neighbor table update to neighbors to inform that you are alive at discrete time interval t  If your neighbor does not send alive in time t, takeover its zone  Zone reassignment is needed
  • 15. Evaluation  Scalability -For a uniformly partitioned space with n nodes and d dimensions: * per node, number of neighbors is 2d *average routing path is (d*n1/d)/3 hops (due to Manhattan distance routing, expected hops in each dimension is dimension length * 1/3) *Can scale the network without increasing per node state  Robustness -no single point of failure
  • 16. Future Improvements  Multi-dimension -increase in dimension reduces path length  Caching and replication techniques for better performance  Overloading the zone -increases availability, reduces path length, reduces per hop latency  Uniform partitioning -compare the volume of the zone with its neighbors -partition the zone having largest volume