Selected Papers from MobiSys 2007 Earl Oliver. Papers Improving Mobile Database Access Over Wide-Area Networks Without Degrading Consistency COMBINE:

Slides:



Advertisements
Similar presentations
Cool-Tether: Energy Efficient On-the-fly WiFi Hot-spots using Mobile Smartphones 1 Vishnu Navda (MSR India) Ashish Sharma (MSR India Intern/UCSB) Ram Ramjee.
Advertisements

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Innosoft international inc. Ó 1999 Innosoft International, Inc. Using LDAPv3 for Directory-Enabled Applications & Networking Greg Lavender Director of.
3G v.s WIFI Radio Energy with YouTube downloads. Energy in Mobile Phone Data Transfers In 3G, there are three states –Idle –DCH (Dedicated Channel), do.
Augmenting Mobile 3G Using WiFi Sam Baek Ran Li Modified from University of Massachusetts Microsoft Research.
COMBINE:Leveraging the power of wireless peers through Collaborative downloading Ganesh A. et. al.
Bitcoin Double Spending Attack Karame, Androulaki & Capkun Presented by Subhro Kar CSCE 715, Fall 2013.
CStream: Neighborhood Bandwidth Aggregation For Better Video Streaming Thangam Vedagiri Seenivasan Advisor: Mark Claypool Reader: Robert Kinicki 1 M.S.
S. Barua – CPSC 440 CHAPTER 8 INTERFACING PROCESSORS AND PERIPHERALS Topics to be covered  How to.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
ECEN 619 “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Lecture notes and Paper.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Introduction to client/server architecture
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Computer Networks IGCSE ICT Section 4.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Distributed Databases
NETWORKING HARDWARE.
A Low-Bandwidth Network File System A. Muthitacharoen, MIT B. Chen, MIT D. Mazieres, NYU.
Chapter 10: Authentication Guide to Computer Network Security.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Basic Data Communication
A measurement study of vehicular internet access using in situ Wi-Fi networks Vladimir Bychkovsky, Bret Hull, Allen Miu, Hari Balakrishnan, and Samuel.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
NEW PERSPECTIVES IN AMR TECHNOLOGY IMPLEMENTATION FOR CONSUMER LOAD MANAGEMENT M.I.C. STEPHENSON Cambridge University- UK Barcelona May CAM_Stephenson_A1.
SwitchR: Reducing System Power Consumption in a Multi-Client Multi-Radio Environment Yuvraj Agarwal (University of California, San Diego) Trevor Pering,
Doc.: IEEE /205 Submission Pat Kinney, Intermec Technologies Intermec’s PicoLink  WPAN MAC Overview.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Adaptive File Transfers for Diverse Environments Himabindu Pucha, Purdue University David G. Andersen, Carnegie Mellon University Michael Kaminsky, Intel.
Computer Networks. What are Networks? A computer network is a group of connected computers. Networks allow:  the sharing of information, such as files.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
DBAS: A Deployable Bandwidth Aggregation System Karim Habak†, Moustafa Youssef†, and Khaled A. Harras‡ †Egypt-Japan University of Sc. and Tech. (E-JUST)
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
A Low-bandwidth Network File System Athicha Muthitacharoen et al. Presented by Matt Miller September 12, 2002.
File Structures. 2 Chapter - Objectives Disk Storage Devices Files of Records Operations on Files Unordered Files Ordered Files Hashed Files Dynamic and.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
COMBINE:Leveraging the power of wireless peers through Collaborative downloading Mobisys '07.
CS 540 Database Management Systems
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Networking Components
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Doc.: IEEE /205r1 Submission Pat Kinney, Intermec Technologies Intermec’s PicoLink  WPAN MAC Overview.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
ICT Unit 4: Network and the effects of using them
Intention – Understanding the features of the following networks
Polymorph Technologies Pte Ltd “ The Leader in Information Technology”
Introduction Wireless devices offering IP connectivity
The Client-Server Model
COMBINE:Leveraging the power of wireless peers through Collaborative downloading Mobisys '07.
Network Components Network Interface Card (NIC) Hub and Switches
Routing and Switching Essentials v6.0
Networks and Connecting to the Internet
Web Caching? Web Caching:.
Introduction to client/server architecture
Chapter 2: Scaling VLANs
Group 2: Qiuxi Zhu, Buchao Yu, Guoxi Wang
Providing Secure Storage on the Internet
An Introduction to Computer Networking
Chapter 2: Scaling VLANs
Presentation transcript:

Selected Papers from MobiSys 2007 Earl Oliver

Papers Improving Mobile Database Access Over Wide-Area Networks Without Degrading Consistency COMBINE: Leveraging the Power of Wireless Peers through Collaborative Downloading

Improving Mobile Database Access Over Wide-Area Networks Without Degrading Consistency Niraj Tolia, M. Satyanarayanan, and Adam Wolbach (Carnegie Mellon University)

Problem Use of mobile database applications growing (CRM, Sales, Insurance, etc.) Providing performance and consistency is hard –Limited bandwidth –Previous performance solutions: Weaken consistency Per-application consistency model

Existing approach SELECT query Query Query Exec. Result Time

Cedar overview New approach to mobile database access –Avoids compromising consistency Exploits disk storage and processing power to reduce network I/O Assumes weak WWAN connectivity Central master DB with mobile (lazily updated) replicas Implemented as JDBC stub Cedar Proxy DB Replica Application JDBC DriverCedar JDBC Driver

High-level overview SELECT query UPDATE queries do directly to the server Query Query Exec. Query + Recipe Result Query Exec. + Result Comparison ∆(Result)Result Time

Attributes of Cedar During periods of strong connectivity, Cedar directly queries master DB and synchronizes replica. DB schema transparent –So detecting differences in data is hard (explained later) Result deltas not applied to client replica IDNameAddressZip 1John Doe412 2Mary Major821 SELECT name,address,zip FROM users SELECT name,zip FROM users John Doe Mary Major John Doe412 Avenue15213 Mary Major821 Lane15232

Commonality detection Exploit structure in results (tables) NameAddressZip John Doe412 Mary Major821 John Stiles701 Hash 1 Hash 2 Hash 3 Recipe SELECT name, address, zip, FROM USERS

Recipes Recipes can be large, especially for results with small rows –Each hash is 20 bytes for SHA-1, 32 bytes for SHA-256 How can this ensure correctness? –Only compares results from same query: reduced key space –Therefore, a reduced probability of hash collisions –With 4 bytes and 10,000 hash values, Pr{collision} = 2.3 x –However, much lower than SHA-1, where Pr{collision} = –A hash over the entire result provides an end-to-end check 0x 2fd4e1c6 0x de9f2c7f 0x da39a3ee 7a2d28fc ed849ee1 bb76e739 1b93eb12 d25e1b3a fad3e85a 0bd17d9b 100db4b3 5e6b4b0d 3255bfef afd80709 Solution: Only use 4 bytes as the row identifier

Rabin Fingerprinting vs. Structure Could Rabin fingerprinting be used? –Extensive use in storage systems –Chunks data using a stochastic process –Works well for in-place updates, deletes, insertions –Does not work well for query results Reordering of data (ORDER BY) Also hard to pick average chunk size `

Comparison to Rabin Fingerprinting Exploit structure is better than Rabin fingerprinting ```` Rabin Structure Based

Putting it all together Query Tentative Result 0x2fd4e1c6 0xda39a3ee 0x2fd4e1c6 0x8c3aea3b  0x2fd4e1c6 Authoritative Result Query 0x31b3887a30f020… ?

Evaluation/Results Cedar evaluated using MobileSales benchmark –Based on TCP-App –Using EVDO with various data rates Cedar improves average throughput of read-write workloads by 39% - 224% Reduces average response time by 28% to 79%

COMBINE: Leveraging the Power of Wireless Peers through Collaborative Downloading Ganesh Ananthanarayanan, Venkat Padmanabhan, Lenin Ravidranath, Chandu Thekkath (Microsoft Research India)

Problem Multi-homed mobile devices (laptops and phones) are increasingly common How do we bridge the gap between the range- speed dichotomy of these networks? SpeedCoverage WLAN (Wi-Fi, Bluetooth)1 – 54 MbpsWi-Fi Hotspots WWAN (3G, GPRS)50 – 200 kbpsCellular Network

Solution Pool WWAN bandwidths Using the WLAN to coordinate between mobile devices How? WiFi

Internet GPRS HTTP Server COMBINE Approach Initiator

Internet GPRS HTTP Server Search for collaborators Wi-Fi or Bluetooth COMBINE Approach Initiator

Internet GPRS Wi-Fi HTTP Server Connect to collaborators over Wi-Fi Wi-Fi Initiator Collaborator Collaborator COMBINE Approach

Internet GPRS Wi-Fi HTTP Server Dynamically distribute the work Wi-Fi Collaborator Collaborator Initiator COMBINE Approach

Existing Work Collaboration via WLAN to increase the coverage of the WWAN – UCAN Bandwidth Aggregation across WWAN links: –Attached to same device – Horde, MAR, pTCP –Across multiple devices – PRISM-IMUX, MOPED, Handheld Routers

What’s new in COMBINE? 1.Incentives –Promise of higher throughput may not be enough –Energy is a critical resource 2.Accounting –Ephemeral association – Tit-for-tat does not work 3.Node Discovery –Collaboration happens at unpredictable times –Idle power consumption is high 4.Work Distribution –Centralized proxies hurt deployability (PRISM-IMUX)

1. Incentives

Participation costs: Monetary Cost –Service provider fee –Size of data transfer Energy Cost –Battery energy depletion “Dynamic Market” for selling and buying unused bandwidth Unify the monetary and energy costs Cost (TC) = (Service Provider fee)/(Battery Remaining)

Estimating Battery Depletion Battery remaining likely to change during long transfers Energy models for network interfaces exist… –Require special hardware (compromise deployability) –Battery characteristics could change over time Battery Depletion = (time_elapsed * BD t ) + (bytes WLAN * BD d_WLAN ) + (bytes WWAN * BD d_WWAN )

2. Accounting

How does money change hands? Central authority issues key-pair (key pub, key priv ) to users Initiator signs IOU’s to the collaborator IOU = {key pub, amount, nonce, seq, exp} sign(key_priv) –key pub and key priv identify the initiator (payer) –exp is expiration time –nonce and seq maintain authenticity of IOU

Internet GPRS HTTP Server Issue IOU, redeem with central authority Central Authority IO U Collaborators are credited their price! Collaborator Collaborator Initiator

Central Authority Collaborators need not be online with accounting authority (unlike electronic funds transfers) –Redemption can be periodic and offline Validity and freshness of IOU verified (unlike digital cash schemes)

3. Node Discovery

Hello, anybody out there? Idle power consumption of Wi-Fi cards is high –Battery life reduces by a third Nodes cannot keep their Wi-Fi NICs on in anticipation of neighbours

Energy-efficient discovery Waiting Mode –Periodic beaconing of I-am-Alive (Price, Supported bandwidth) –Similar to Power Saving Mode Multiple radios –Bluetooth for node discovery (future work) Keeping Bluetooth interface on is inexpensive –Wi-Fi cards are switched on only for data transfer

4. Work Distribution

Protocol Design Striping –Application-level: HTTP byte-range requests Initiator willing to pay C units for a file of size F bytes Dynamic environment –Collaborator’s link characteristics vary –Collaborator’s advertised price might exceed the threshold (C/F) –Personal activity to be given higher priority

Conservative Approach Group Selection –Threshold-Price = (C/F) –Initiator accumulates I-am-Alive messages (bids) –Selects nodes with price ≤ Threshold-Price Work Distribution –Work-queue with equal-sized work items –Collaborators service work-queue by picking up one work-item at a time faster nodes automatically service more work items –Chunk size needs to be optimum (experiments found 200 KB chunks for HTTP)

Analysis (brief) Group formation takes less than 8 seconds Near-linear speed-up for both laptops and PPCs – download an 8 MB file across the Internet

Collaborative downloading –Software-only solution for bandwidth boost Practical cost and accounting scheme Easy-to-deploy striping mechanism Energy cognizance COMBINE Summary

Questions?