jagomart
digital resources
picture1_Lecture Ppt 81070 | L9 Dht Chord


 168x       Filetype PPTX       File size 0.59 MB       Source: www.cs.princeton.edu


File: Lecture Ppt 81070 | L9 Dht Chord
distributed application architecture this lecture client r peer o f client sk nobody mov a ask for page p peer client provide page peer rov i server de client luca ...

icon picture PPTX Filetype Power Point PPTX | Posted on 08 Sep 2022 | 3 years ago
Partial capture of text on file.
   Distributed Application Architecture
                                              This lecture
                        client                                r   Peer
                                                              o
                                                              f
                                    client                  sk   Nobody.mov
                                                           A
              Ask for page
                                                            P                   Peer
      Client  Provide page                           Peer    rov
                                                               i
                          Server                               de
                                      client         Luca.mov
                       www.princeton.edu
                                                                   Peer
                 Client-Server                                 Peer-to-Peer
                                                                                      2
  Today
    1. Peer-to-Peer Systems
      – What, why, and the core challenge
    2. Distributed Hash Tables (DHT)
    3. The Chord Lookup Service
    4. Concluding thoughts on DHTs, P2P
                                                                     3
   What is a Peer-to-Peer (P2P) system?
                                             Node
                              Node                  Node
                                       Internet
                              Node                  Node
               •  A distributed system architecture:
                  –No centralized control
                  –Nodes are roughly symmetric in function
               •  Large number of unreliable nodes
                                                                                   4
   P2P adoption
     Successful adoption in some niche areas
     1. Client-to-client (legal, illegal) file sharing
        1.  Napster (1990s), Gnutella, BitTorrent, etc.
     2. Digital currency: no natural single owner (Bitcoin)
     3. Voice/video telephony: user to user anyway (Skype in old days)
        – Issues: Privacy and control
                                                                                         5
   Why might P2P be a win?
     • High capacity for services through parallelism and scalability:
        – More disks, network connections, CPUs, etc. as peers join
        – Data are divided and duplicated, accessible from multiple peers concurrently
     • Absence of a centralized server may mean:
        – Less chance of service overload as load increases
        – Easier deployment
        – A single failure won’t wreck the whole system (no single point of failure)
        – System as a whole is harder to attack
                                                                                       6
The words contained in this file might help you see if this file matches what you are looking for:

...Distributed application architecture this lecture client r peer o f sk nobody mov a ask for page p provide rov i server de luca www princeton edu to today systems what why and the core challenge hash tables dht chord lookup service concluding thoughts on dhts pp is system node internet no centralized control nodes are roughly symmetric in function large number of unreliable adoption successful some niche areas legal illegal file sharing napster s gnutella bittorrent etc digital currency natural single owner bitcoin voice video telephony user anyway skype old days issues privacy might be win high capacity services through parallelism scalability more disks network connections cpus as peers join data divided duplicated accessible from multiple concurrently absence may mean less chance overload load increases easier deployment failure won t wreck whole point harder attack...

no reviews yet
Please Login to review.