SlideShare une entreprise Scribd logo
1  sur  46
CHORD – peer to peer lookup
protocol
V.Sutha Jebakumari, AP/CSE
KCET
Outline
• Client Server Architecture
•Peer to Peer Architecture
•General definition of a DHT system
•Chord
Client Server Architecture
server index table data
client a client b client c client d
query
data transferring
History: client-server model
P2P Architecture
server
index table
data client a
client b
client c
client ddata
data
data
query
data transferring
History: peer-to-peer model (Napster)
query
data transferring
index table
data client a
client b
client c
client d
index table
data
index table
data
index table
data
History: peer-to-peer model (DHT systems)
Client Server Vs Peer to Peer
Overlay Network
Overlay Network
Types of overlay network
Structure peer to peer overlays
Unstructured peer to peer
overlays
Unstructured peer to peer
overlays
Unstructured P2P Network
Models
DHT
DHT
DHT
DHT
Chord
Example
Chord
IteItems: 7 ,1
Chord protocol
• The Chord protocol supports just one
operation: given a key, it maps the key onto
a node.
• Depending on the application using Chord,
that node might be responsible for storing a
value associated with the key.
• Chord uses a variant of consistent hashing
to assign keys to Chord nodes.
Chord protocol
• Each Chord node needs “routing” information
about only a few other nodes.
• Because the routing table is distributed, a node
resolves the hash function by communicating
with a few other nodes.
• Chord maintains its routing information as nodes
join and leave the system.
How to look up a key quickly ?
• We need finger table
How to look up a key quickly ?(cont.)
finger table for node 1
• The finger table of node 1
How to look up a key quickly ?(cont.)
Node 3: Am I predecessor(1) ?
Predecessor(1)  successor(1)
Node 3: Try entry 3, and find node
0
Node 3: Send lookup to node 0
Node 0: Am I predecessor(1) ?
Node 0: successor(1) is node 1
return to node 3 (RPC)
Value
of key 1
?
Node joins
Two challenges
 Each node’s finger table is correctly filled
 Each key k is stored at node successor(k)
Three operations
 Initialize the predecessor and fingers of the new node n
 Update the fingers and predecessors of existing nodes
 Copy to n all keys for which node n has became their
successor
Initialize the predecessor and fingers
of node n
• Idea: Ask an existing node for information needed
Join
in
Update the fingers and predecessors of
existing nodes
• Observation: when node n joins the network, n will become
the ith finger of a node p when the following two conditions
meet:
 P proceeds n by at least 2i-1
 The ith finger of node p succeeds n
Solution: Try to find predecessor(n- 2i-1) for all 1<=i<=m; and
check whether n is their ith finger, and whether n is their
predecessor’s ith finger.
Update the fingers and predecessors
of existing nodes (cont.)
Predecessor(6-21-1) =3, update
6
Predecessor(3) =1, no update
Predecessor(6-22-1) =3, update
6
Predecessor(6-23-1) =1, update
6
Predecessor(1) =0, update
Predecessor(3) =1, no update
6
Predecessor(0) =3, no update
Join
in
Copy to n all keys for which node n has
became their successor
• Idea: Node n can become the successor only for keys
stored by the node immediately following n
Join
in
THANK YOU

Contenu connexe

Tendances

Tendances (20)

Research on RSA
Research on RSAResearch on RSA
Research on RSA
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
 
Ch11
Ch11Ch11
Ch11
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Ch09
Ch09Ch09
Ch09
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Cryptography
CryptographyCryptography
Cryptography
 
Chord DHT
Chord DHTChord DHT
Chord DHT
 
Ch07
Ch07Ch07
Ch07
 
SHA-1 backdooring & exploitation
SHA-1 backdooring & exploitationSHA-1 backdooring & exploitation
SHA-1 backdooring & exploitation
 
Class3
Class3Class3
Class3
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
A Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in CryptographyA Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in Cryptography
 
Chord Algorithm
Chord AlgorithmChord Algorithm
Chord Algorithm
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Ch05
Ch05Ch05
Ch05
 

Similaire à Chord

[論文紹介]A syntactic neural model for general purpose code generation
[論文紹介]A syntactic neural model for general purpose code generation [論文紹介]A syntactic neural model for general purpose code generation
[論文紹介]A syntactic neural model for general purpose code generation
OgataTomoya
 
Chord 120427053647-phpapp01 (1)
Chord 120427053647-phpapp01 (1)Chord 120427053647-phpapp01 (1)
Chord 120427053647-phpapp01 (1)
Hadeel Ibrahim
 
Intro 2 Computer Networks
Intro 2 Computer NetworksIntro 2 Computer Networks
Intro 2 Computer Networks
rakeshgoswami
 

Similaire à Chord (20)

An overview of Peer-to-Peer technology new
An overview of Peer-to-Peer technology newAn overview of Peer-to-Peer technology new
An overview of Peer-to-Peer technology new
 
5.1.3. Chord.pptx
5.1.3. Chord.pptx5.1.3. Chord.pptx
5.1.3. Chord.pptx
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
[論文紹介]A syntactic neural model for general purpose code generation
[論文紹介]A syntactic neural model for general purpose code generation [論文紹介]A syntactic neural model for general purpose code generation
[論文紹介]A syntactic neural model for general purpose code generation
 
Routing Protocols of Distributed Hash Table Based Peer to Peer Networks
Routing Protocols of Distributed Hash Table Based Peer to Peer NetworksRouting Protocols of Distributed Hash Table Based Peer to Peer Networks
Routing Protocols of Distributed Hash Table Based Peer to Peer Networks
 
Kademlia introduction
Kademlia introductionKademlia introduction
Kademlia introduction
 
Data Communication & Computer Networks
Data Communication & Computer NetworksData Communication & Computer Networks
Data Communication & Computer Networks
 
Tapestry
TapestryTapestry
Tapestry
 
Chord 120427053647-phpapp01 (1)
Chord 120427053647-phpapp01 (1)Chord 120427053647-phpapp01 (1)
Chord 120427053647-phpapp01 (1)
 
Paul presentation P2P Chord v1
Paul presentation P2P Chord v1Paul presentation P2P Chord v1
Paul presentation P2P Chord v1
 
2018a 1324654jhjkhkhkkjhk
2018a 1324654jhjkhkhkkjhk2018a 1324654jhjkhkhkkjhk
2018a 1324654jhjkhkhkkjhk
 
Week4 lec1-bscs1
Week4 lec1-bscs1Week4 lec1-bscs1
Week4 lec1-bscs1
 
lecture-2-tcp-ip.ppt
lecture-2-tcp-ip.pptlecture-2-tcp-ip.ppt
lecture-2-tcp-ip.ppt
 
Peer to peer Paradigms
Peer to peer ParadigmsPeer to peer Paradigms
Peer to peer Paradigms
 
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptxRHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
 
Network layer
Network layerNetwork layer
Network layer
 
Chord Presentation at Papers We Love SF, August 2016
Chord Presentation at Papers We Love SF, August 2016Chord Presentation at Papers We Love SF, August 2016
Chord Presentation at Papers We Love SF, August 2016
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Intro 2 Computer Networks
Intro 2 Computer NetworksIntro 2 Computer Networks
Intro 2 Computer Networks
 
Proof of Computing Work Protocol by Pandora Boxchain
Proof of Computing Work Protocol by Pandora BoxchainProof of Computing Work Protocol by Pandora Boxchain
Proof of Computing Work Protocol by Pandora Boxchain
 

Dernier

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Dernier (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

Chord

  • 1. CHORD – peer to peer lookup protocol V.Sutha Jebakumari, AP/CSE KCET
  • 2. Outline • Client Server Architecture •Peer to Peer Architecture •General definition of a DHT system •Chord
  • 4. server index table data client a client b client c client d query data transferring History: client-server model
  • 6. server index table data client a client b client c client ddata data data query data transferring History: peer-to-peer model (Napster)
  • 7. query data transferring index table data client a client b client c client d index table data index table data index table data History: peer-to-peer model (DHT systems)
  • 8. Client Server Vs Peer to Peer
  • 11. Types of overlay network
  • 12. Structure peer to peer overlays
  • 13. Unstructured peer to peer overlays
  • 14. Unstructured peer to peer overlays
  • 16. DHT
  • 17. DHT
  • 18. DHT
  • 19. DHT
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29. Chord
  • 30.
  • 31.
  • 33.
  • 34. Chord protocol • The Chord protocol supports just one operation: given a key, it maps the key onto a node. • Depending on the application using Chord, that node might be responsible for storing a value associated with the key. • Chord uses a variant of consistent hashing to assign keys to Chord nodes.
  • 35. Chord protocol • Each Chord node needs “routing” information about only a few other nodes. • Because the routing table is distributed, a node resolves the hash function by communicating with a few other nodes. • Chord maintains its routing information as nodes join and leave the system.
  • 36. How to look up a key quickly ? • We need finger table
  • 37. How to look up a key quickly ?(cont.) finger table for node 1
  • 38. • The finger table of node 1
  • 39.
  • 40. How to look up a key quickly ?(cont.) Node 3: Am I predecessor(1) ? Predecessor(1)  successor(1) Node 3: Try entry 3, and find node 0 Node 3: Send lookup to node 0 Node 0: Am I predecessor(1) ? Node 0: successor(1) is node 1 return to node 3 (RPC) Value of key 1 ?
  • 41. Node joins Two challenges  Each node’s finger table is correctly filled  Each key k is stored at node successor(k) Three operations  Initialize the predecessor and fingers of the new node n  Update the fingers and predecessors of existing nodes  Copy to n all keys for which node n has became their successor
  • 42. Initialize the predecessor and fingers of node n • Idea: Ask an existing node for information needed Join in
  • 43. Update the fingers and predecessors of existing nodes • Observation: when node n joins the network, n will become the ith finger of a node p when the following two conditions meet:  P proceeds n by at least 2i-1  The ith finger of node p succeeds n Solution: Try to find predecessor(n- 2i-1) for all 1<=i<=m; and check whether n is their ith finger, and whether n is their predecessor’s ith finger.
  • 44. Update the fingers and predecessors of existing nodes (cont.) Predecessor(6-21-1) =3, update 6 Predecessor(3) =1, no update Predecessor(6-22-1) =3, update 6 Predecessor(6-23-1) =1, update 6 Predecessor(1) =0, update Predecessor(3) =1, no update 6 Predecessor(0) =3, no update Join in
  • 45. Copy to n all keys for which node n has became their successor • Idea: Node n can become the successor only for keys stored by the node immediately following n Join in