Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.

Slides:



Advertisements
Similar presentations
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
Advertisements

1 Vorlesung Informatik 2 Algorithmen und Datenstrukturen (Parallel Algorithms) Robin Pomplun.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
1 Perfect Simulation and Stationarity of a Class of Mobility Models Jean-Yves Le Boudec (EPFL) & Milan Vojnovic (Microsoft Research Cambridge) IEEE Infocom.
Milan Vojnović Microsoft Research Cambridge Collaborators: E. Perron and D. Vasudevan 1 Consensus – with Limited Processing and Signalling.
Subspace Embeddings for the L1 norm with Applications Christian Sohler David Woodruff TU Dortmund IBM Almaden.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
STATISTICS HYPOTHESES TEST (II) One-sample tests on the mean and variance Professor Ke-Sheng Cheng Department of Bioenvironmental Systems Engineering National.
Detection of Hydrological Changes – Nonparametric Approaches
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
1 Hyades Command Routing Message flow and data translation.
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
Scalable Routing In Delay Tolerant Networks
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
Measurement and Analysis of Online Social Networks 1 A. Mislove, M. Marcon, K Gummadi, P. Druschel, B. Bhattacharjee Presentation by Shahan Khatchadourian.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Discrete time Markov Chain
Randomized Algorithms Randomized Algorithms CS648 1.
David Luebke 1 6/7/2014 ITCS 6114 Skip Lists Hashing.
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
Hash Tables.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
2 |SharePoint Saturday New York City
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
15. Oktober Oktober Oktober 2012.
Introduction to Machine Learning Fall 2013 Perceptron (6) Prof. Koby Crammer Department of Electrical Engineering Technion 1.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
1 Using Bayesian Network for combining classifiers Leonardo Nogueira Matos Departamento de Computação Universidade Federal de Sergipe.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Essential Cell Biology
Multiple Regression and Model Building
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Distributed Computing 9. Sorting - a lower bound on bit complexity Shmuel Zaks ©
The Small World Phenomenon: An Algorithmic Perspective Speaker: Bradford Greening, Jr. Rutgers University – Camden.
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
1 Undirected Graphical Models Graphical Models – Carlos Guestrin Carnegie Mellon University October 29 th, 2008 Readings: K&F: 4.1, 4.2, 4.3, 4.4,
Dynamic Computations in Ever-Changing Networks Idit Keidar Technion, Israel 1Idit Keidar, TADDS Sep 2011.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Presentation transcript:

Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion

The Setting Many nodes – n ▫ 10,000s, 100,000s, 1,000,000s, … Come and go ▫ Churn Fully connected network ▫ Like the Internet Every joining node knows some others ▫ (Initial) Connectivity 2

Membership: Each node needs to know some live nodes Each node has a view ▫ Set of node ids ▫ Supplied to the application ▫ Constantly refreshed Typical size – log n 3

Applications ▫ Gossip-based algorithm ▫ Unstructured overlay networks ▫ Gathering statistics Work best with random node sample ▫ Gossip algorithms converge fast ▫ Overlay networks are robust, good expanders ▫ Statistics are accurate 4

Modeling Membership Views Modeled as a directed graph uv w vyw… y 5

Modeling Protocols: Graph Transformations View is used for maintenance Example: push protocol ……w… ……z… uv w v…w… w z 6

Desirable Properties? Randomness ▫ View should include random samples Holy grail for samples: IID ▫ Each sample uniformly distributed ▫ Each sample independent of other samples  Avoid spatial dependencies among view entries  Avoid correlations between nodes ▫ Good load balance among nodes 7

What About Churn? Views should constantly evolve ▫ Remove failed nodes, add joining ones Views should evolve to IID from any state Minimize temporal dependencies ▫ Dependence on the past should decay quickly ▫ Useful for application requiring fresh samples 8

Global Markov Chain A global state – all n views in the system A protocol action – transition between global states Global Markov Chain G uv uv 9

Defining Properties Formally Small views ▫ Bounded dout(u) Load balance ▫ Low variance of din(u) From any starting state, eventually (In the stationary distribution of MC on G) ▫ Uniformity  Pr(v  u.view) = Pr(w  u.view) ▫ Spatial independence  Pr(v  u. view| y  w. view) = Pr(v  u. view) ▫ Perfect uniformity + spatial independence  load balance 10

Temporal Independence Time to obtain views independent of the past From an expected state ▫ Refresh rate in the steady state Would have been much longer had we considered starting from arbitrary state ▫ O(n 14 ) [Cooper09] 11

Existing Work: Practical Protocols Tolerates asynchrony, message loss Studied only empirically  ▫ Good load balance [Lpbcast, Jelasity et al 07] ▫ Fast decay of temporal dependencies [Jelasity et al 07] ▫ Induce spatial dependence  Push protocol u v w u v w w zz 12

v…z… Existing Work: Analysis Analyzed theoretically [Allavena et al 05, Mahlmann et al 06] ▫ Uniformity, load balance, spatial independence ▫ Weak bounds (worst case) on temporal independence  Unrealistic assumptions – hard to implement  ▫ Atomic actions with bi-directional communication ▫ No message loss ……z………w… uv w v…w… w z Shuffle protocol z * 13

Our Contribution : Bridge This Gap A practical protocol ▫ Tolerates message loss, churn, failures ▫ No complex bookkeeping for atomic actions Formally prove the desirable properties ▫ Including under message loss 14

…… Send & Forget Membership The best of push and shuffle Some view entries may be empty uv w v…w… uw uw 15

S&F: Message Loss Message loss ▫ Or no empty entries in v’s view uv w u v w 16

S&F: Compensating for Loss Edges (view entries) disappear due to loss Need to prevent views from emptying out Keep the sent ids when too little ids in view ▫ Push-like when views are too small uv w u v w 17

S&F: Advantages over Other Protocols No bi-directional communication ▫ No complex bookkeeping ▫ Tolerates message loss Simple ▫ Without unrealistic assumptions ▫ Amenable to formal analysis Easy to implement 18

Degree distribution ▫ Closed-form approximation without loss ▫ Degree Markov Chain with loss Stationary distribution of MC on the global graph G ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence Hold even under (reasonable) message loss! Key Contribution: Analysis 19

Degree Distribution without loss In all reachable graphs: ▫ dout(u) + 2din(u) = const ▫ Better than in a random graph – indegree bounded Uniform stationary distribution on reachable states in G Combinatorial approximation of degree distribution ▫ The fraction of reachable graphs with specified node degree ▫ Ignoring dependencies among nodes 20

Degree Distribution without Loss: Results Similar (better) to that of a random graph Validated by a more accurate Markov model 21

Setting Degree Thresholds to Compensate for Loss Note: dout(u) + 2din(u) = const invariant no longer holds – indegree not bounded 22

Key Contribution: Analysis 23 Degree distribution ▫ Closed-form approximation without loss ▫ Degree Markov Chain with loss Stationary distribution of MC on the global graph G ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence

… Degree Markov Chain Given loss rate, degree thresholds, and degree distributions Iteratively compute the stationary distribution Transitions without loss Transitions due to loss State corresponding to isolated node outdegree indegree … … … … … … … 24

Results Outdegree is bounded by the protocol Decreases with increasing loss Indegree is not bounded by the protocol Still, its variance is low, even under loss Typical overload at most 2x 25

Degree distribution ▫ Closed-form approximation without loss ▫ Degree Markov Chain with loss Stationary distribution of MC on the global graph G ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence Key Contribution: Analysis 26

Uniformity Simple! Nodes are identical Graphs where u  v isomorphic to graphs where u  w Same probability in stationary distribution 27

Degree distribution ▫ Closed-form approximation without loss ▫ Degree Markov Chain with loss Stationary distribution of MC on the global graph G ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence Key Contribution: Analysis 28

Decay of Spatial Dependencies Assume initially > 2/3 independent  good expander For uniform loss < 15%, dependencies decay faster than they are created uv w u v w u does not delete the sent ids … … uw 29

Decay of Spatial Dependencies: Results 1 – 2  loss rate fraction of view entries are independent ▫ E.g., for loss rate of 3%  more than 90% of entries are independent 30

Degree distribution ▫ Closed-form approximation without loss ▫ Degree Markov Chain with loss Stationary distribution of MC on the global graph G ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence Key Contribution: Analysis 31

Temporal Independence Start from expected state ▫ Uniform and spatially independent views High “expected conductance” of G Short mixing time ▫ While staying in the “good” component 32

Temporal Independence: Results Ids travel fast enough ▫ Reach random nodes in O(log n) hops ▫ Due to “sufficiently many” independent ids in views Dependence on past views decays within O(log n  view size) time 33

Conclusions Formalized the desired properties of a membership protocol Send & Forget protocol ▫ Simple for both implementation and analysis Analysis under message loss ▫ Load balance ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence 34

Thank You