Xia Zhou*, Stratis Ioannidis ♯, and Laurent Massoulié + * University of California, Santa Barbara ♯ Technicolor Research Lab, Palo Alto + Technicolor Research.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Advanced Piloting Cruise Plot.
Pricing for Utility-driven Resource Management and Allocation in Clusters Chee Shin Yeo and Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS)
Part 3 Probabilistic Decision Models
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
An Alliance based Peering Scheme for P2P Live Media Streaming Darshan Purandare Ratan Guha University of Central Florida August 31, P2P-TV, Kyoto.
Scalable Routing In Delay Tolerant Networks
Summary of Convergence Tests for Series and Solved Problems
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
ZMQS ZMQS
VARUN GUPTA Carnegie Mellon University 1 Partly based on joint work with: Anshul Gandhi Mor Harchol-Balter Mike Kozuch (CMU) (CMU) (Intel Research)
Evaluating Window Joins over Unbounded Streams Author: Jaewoo Kang, Jeffrey F. Naughton, Stratis D. Viglas University of Wisconsin-Madison CS Dept. Presenter:
Richmond House, Liverpool (1) 26 th January 2004.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Particle Swarm Optimization (PSO)
1 Column Generation. 2 Outline trim loss problem different formulations column generation the trim loss problem master problem and subproblem in column.
Randomized Algorithms Randomized Algorithms CS648 1.
ABC Technology Project
1 Designing Hash Tables Sections 5.3, 5.4, Designing a hash table 1.Hash function: establishing a key with an indexed location in a hash table.
Hash Tables.
Online Algorithm Huaping Wang Apr.21
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
Capacity Planning For Products and Services
1 COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. On the Capacity of Wireless CSMA/CA Multihop Networks Rafael Laufer and Leonard Kleinrock Bell.
VOORBLAD.
1 4 Square Questions B A D C Look carefully to the diagram Now I will ask you 4 questions about this square. Are you ready?
Squares and Square Root WALK. Solve each problem REVIEW:
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
© 2012 National Heart Foundation of Australia. Slide 2.
The x- and y-Intercepts
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Chapter 5 Test Review Sections 5-1 through 5-4.
SIMOCODE-DP Software.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Week 1.
1. 2 No lecture on Wed February 8th Thursday 9 th Feb Friday 27 th Jan Friday 10 th Feb Thursday 14: :00 Friday 16:00 – 19:00 HS N.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Dantzig-Wolfe Decomposition
1 Unit 1 Kinematics Chapter 1 Day
PSSA Preparation.
TASK: Skill Development A proportional relationship is a set of equivalent ratios. Equivalent ratios have equal values using different numbers. Creating.
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
How Cells Obtain Energy from Food
Peter Key, Laurent Massoulie, Don Towsley Infocom 07 presented by Park HoSung 1 Path selection and multipath congestion control.
Presentation transcript:

Xia Zhou*, Stratis Ioannidis ♯, and Laurent Massoulié + * University of California, Santa Barbara ♯ Technicolor Research Lab, Palo Alto + Technicolor Research Lab, Paris

Swarm: set of users interested in the same file 1 Seed

[Hajek and Zhu 10] Unstable when λ > s! Missing-piece syndrome: Each peer waiting for only one piece 2 Seed λ peers per sec s chunks per sec Online P2P Networks

3 Cached content is shared in a P2P fashion (eg. bluetooth) Opportunistic communication May not encounter the content they are interested in Mobile P2P Networks ?

4 Key idea: Exchange chunks across swarms upon bandwidth under-utilization Question 1: How does such inter-swarm exchange affect stability? Question 2: How should items be exchanged among swarms?

A versatile model for universal swarms Universal swarms achieve better stability compared to autonomous swarms Only one swarm can become unstable! Optimal replication ratios that minimize the time for peers to retrieve interested content 5

Motivation A model for universal swarms Main results Stability of universal swarms Content exchange designs in universal swarms Conclusion and future works 6

Peer requests one chunk i K Peers requesting the same chunk form a peer swarm 7 ? ??

Peer has cache size of C Peer may use cache to store chunks it is not interested in 8 Cache ? Request C Stored chunks f K

Peers arrive with full caches Peers requesting i and caching f arrive according to a Poisson process with rate λ i, f 9 Time ??? CacheRequest C ?

Online P2P: random sampling Mobile P2P: contact when within transmission range 10 Time ? × ?? ×

One peer contacts other peers according to a Poisson process with rate N(t): number of peers in the system at time t 11 N(t)N(t) Contact rate 0 ≤ β < 1 Constant-bandwidth N(t)N(t) Contact rate μ β = 1 N(t)N(t) Contact rate 1 < β ≤ 2 Contact-constrained Interference- constrained

If encountering requested chunk: Grab-and-Go Otherwise: Static-cache policy: no change on cached chunks Alternatives: updating cached contents Requested chunk and cached chunks define a peer class N(t): system state at time t (# of peers in each peer class) 12 ??? Conversion probabilityA, A’  B, B’

Motivation Model for universal swarms Main results Stability of universal swarms Content exchange designs in universal swarms Conclusion and future works 13

The evolution of the universal swarm system can be approximated arbitrarily well by the solution of a system of ODEs that depend on the conversion probabilities 14 For all β For all content exchange policies

Question 1: How does inter-swarm exchange affect the system stability? 15

16 Let > 0 be the arrival rate of peers requesting i and storing j. 16 Theorem: The system is stable under the static cache policy if and only if: Independent of β and cache size C The system is stable even if arrivals of peers requesting i exceed arrivals of peers storing i!

17 At most one swarm can blow up! ???

Motivation Model for universal swarms Main results Stability of universal swarms Content exchange designs in universal swarms Conclusion and future works 18

Question 2: How should chunks be exchanged across swarms? 19

20 -- the number of peers requesting chunk i (demand) -- the number of peers storing chunk i (supply) Theorem: Under the grab-and-go principle, the average sojourn time of a peer in the system is minimized when where. The optimal supply is C times the demand!

Centralized tracker maintains valuation v i for each chunk i Positive v i : chunk i needs more replicas Negative v i : chunk i needs fewer replicas Replace the chunks with negative valuation with that with positive valuations … … ??

-- the number of peers requesting chunk i in the optimal state -- the number of peers storing chunk i in the optimal state 22 Optimal: Valuation:  No need to know arrival rates and contact rates, but only the cache size C  Need to track the demand and supply dynamically

Evaluations based on fluid trajectories in MATLAB Numerically solving ODEs 23 Valuation-guided content exchange improves the system stability

Universal swarms achieve better stability even with the simplest replication strategy At most one swarm can blow up! Optimal supply linearly proportional to the demand BARON extends the stability region using valuations Better understanding of the dynamics under more sophisticated content exchange mechanisms Peer incentives Removing the assumption of one-chunk request 24

27 Let > 0 be the arrival rate of peers requesting i and storing j. Theorem: There exists at most one item i for which Moreover, for β in [0,1], the number of peers requesting item i grows to infinity, while the number of peers requesting other items remains bounded. At most one swarm can blow up!