Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.

Slides:



Advertisements
Similar presentations
Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
Advertisements

One Hop Lookups for Peer-to-Peer Overlays Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues Laboratory for Computer Science, MIT.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles Jay A. Patel 1, Indranil Gupta 1, and Noshir Contractor 2.
April Brahms Byzantine-Resilient Random Membership Sampling Bortnikov, Gurevich, Keidar, Kliot, and Shraer.
20/10/2006ALPAGE1 Ordered slicing of very large scale overlay networks Mark Jelasity University of Bologna, Italy Anne-Marie Kermarrec INRIA Rennes/IRISA,
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
The Connectivity and Fault-Tolerance of the Internet Topology
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Fabian Kuhn, Microsoft Research, Silicon Valley
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Rumour Spreading in Social Networks Alessandro Panconesi Dipartimento di Informatica Joint work with Flavio Chierichetti and Silvio Lattanzi.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Unstructured overlays: construction, optimization, applications Anne-Marie Kermarrec Joint work with Laurent Massoulié and Ayalvadi Ganesh.
Dynamic Computations in Ever-Changing Networks Idit Keidar Technion, Israel 1Idit Keidar, TADDS Sep 2011.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
Faculty of Electrical Engineering, Technion FuDiCo II G. Badishi & I. Keidar Towards Survivability of Application-Level Multicast Gal Badishi, Idit Keidar,
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
Faculty of Electrical Engineering, Technion May 2004 Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
April Brahms Byzantine-Resilient Random Membership Sampling Bortnikov, Gurevich, Keidar, Kliot, and Shraer.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Faculty of Electrical Engineering, Technion DSN 2004 Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 5: Synchronous Uniform.
Distributed Slicing in Dynamic Systems A. Fernández, V. Gramoli, E. Jiménez, A-M. Kermarrec, M. Raynal.
Bootstrapping in regular graphs
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Faculty of Electrical Engineering, Technion DSN 2004 Gal Badishi Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Wide-area cooperative storage with CFS
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
Decomposing Networks and Polya Urns with the Power of Choice Joint work with Christos Amanatidis, Richard Karp, Christos Papadimitriou, Martha Sideri Presented.
Communication (II) Chapter 4
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Paris Metro Pricing for QoS in Wireless Networks An SAIC Company Ravi Jain, Tracy Mullen and Rob Hausman April 19, 2001
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
Association Rule Mining in Peer-to-Peer Systems Ran Wolff Assaf Shcuster Department of Computer Science Technion I.I.T. Haifa 32000,Isreal.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Prof. Mort AnvariStrayer University at Arlington, VAAugust Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Artur Czumaj DIMAP DIMAP (Centre for Discrete Maths and it Applications) Computer Science & Department of Computer Science University of Warwick Testing.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Date: 2005/4/25 Advisor: Sy-Yen Kuo Speaker: Szu-Chi Wang.
Anonymous communication over social networks Shishir Nagaraja and Ross Anderson Security Group Computer Laboratory.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL Network Science Workshop Hong Kong July
Data Center Network Architectures
Scalable Load-Distance Balancing
A paper on Join Synopses for Approximate Query Answering
DHT Routing Geometries and Chord
Student: Fang Hui Supervisor: Teo Yong Meng
Strayer University at Arlington, VA
Introduction Wireless Ad-Hoc Network
Byzantine-Resilient Random Membership Sampling
Abstraction.
Presentation transcript:

Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion

The Setting Many nodes – n ▫ 10,000s, 100,000s, 1,000,000s, … Come and go ▫ Churn Fully connected network ▫ Like the Internet Every joining node knows some others ▫ (Initial) Connectivity

Membership: Each Node Needs To Know Some Live Nodes Applications ▫ Gossip partners ▫ Unstructured overlay networks ▫ Gathering statistics Work best with random node samples ▫ Gossip algorithms converge fast ▫ Overlay networks are robust, good expanders ▫ Statistics are accurate

Membership Protocols Each node has a view ▫ Set of node ids ▫ Supplied to the application ▫ Used by membership protocol for maintenance ▫ Modeled as a directed graph uv w vyw… y

Desirable Properties Randomness… Holy grail for samples: IID ▫ Each sample uniformly distributed ▫ Each sample independent of other samples  Avoid spatial dependencies among view entries  Avoid correlations between nodes ▫ Good load balance among nodes

What About Churn? Desirable Properties Cont’d Views should constantly evolve ▫ Remove failed nodes, add joining ones Views should evolve to IID from any state Minimize temporal dependencies ▫ Dependence on the past should decay quickly ▫ Useful for application requiring fresh samples

Do Existing Protocols Measure Up?

……w… Existing Work: Practical Protocols Studied only empirically ▫ Good load balance [Lpbcast, Jelasity et al 07] ▫ Fast decay of temporal dependencies [Jelasity et al 07] ▫ Induces spatial dependence  ……z… uv w v…w… w z Example: Push protocol

v…z… Existing Work: Analysis Analyzed theoretically [Allavena et al 05, Mahlmann et al 06] ▫ Uniformity, load balance, spatial independence ▫ Unrealistic assumptions   Atomic actions with bi-directional communication  No message loss ▫ No bounds on decay of temporal dependencies  ……z… ……w… uv w v…w… w z Shuffle protocol z

Our Contribution: Bridge This Gap Formally specify desirable properties outlined above A practical protocol ▫ Tolerates message loss, churn, failures ▫ No complex bookkeeping for atomic actions Formally prove the desirable properties ▫ Including under message loss

…… Send & Forget Membership The best of push and shuffle Some view entries may be empty uv w v…w… uw uw

S&F: Message Loss Message loss ▫ Or no empty entries in v’s view uv w u v w

S&F: Compensating for Loss Edges (view entries) disappear due to loss Need to prevent views from emptying out Keep the sent ids when too little ids in view uv w u v w

S&F: Advantages over Other Protocols No bi-directional communication ▫ No complex bookkeeping ▫ Tolerates message loss Simple ▫ Amenable to formal analysis Easy to implement

Proving all desirable properties ▫ Analytical: degrees distribution w/out loss  Used in setting duplication threshold ▫ Markov 1: degree distribution with loss ▫ Markov 2: Markov Chain of reachable global states  IID samples, Temporal Independence Hold even under (reasonable) message loss! Key Contribution: Analysis

Analytic Degree Distribution Similar (better) to that of a random graph Validated by a more accurate Markov model

Proving all desirable properties ▫ Analytical: degrees distribution w/out loss  Used in setting duplication threshold ▫ Markov 1: degree distribution with loss ▫ Markov 2: Markov Chain of reachable global states  IID samples, Temporal Independence Hold even under (reasonable) message loss! Key Contribution: Analysis

… Node Degree Markov Chain Numerically compute the stationary distribution Transitions without loss Transitions due to loss State corresponding to isolated node outdegree indegree … … … … … … …

Results Outdegree is bounded by the protocol Decreases with increasing loss Indegree is not bounded Low variance even under loss Typical overload at most 2x

Proving all desirable properties ▫ Analytical: degrees distribution w/out loss  Used in setting duplication threshold ▫ Markov 1: degree distribution with loss ▫ Markov 2: Markov Chain of reachable global states  IID samples, Temporal Independence Hold even under (reasonable) message loss! Key Contribution: Analysis

Decay of Spatial Dependencies For uniform loss < 15%, dependencies decay faster than they are created 1 – 2  loss rate fraction of view entries are independent ▫ E.g., for loss rate of 3%  more than 90% of entries are independent uv w u v w u does not delete the sent ids …

Temporal Independence Dependence on past views decays within O(log n  view size) time Use “expected conductance” Ids travel fast enough ▫ Reach random nodes in O(log n) hops ▫ Due to “sufficiently many” independent ids in views - previous slide

Conclusions Formalized the desired properties of a membership protocol Send & Forget protocol ▫ Simple for both implementation and analysis Analysis under message loss ▫ Load balance ▫ Uniformity ▫ Spatial Independence ▫ Temporal Independence

Thank You