Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

Data and Computer Communications
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Scalable Content-Addressable Network Lintao Liu
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Load Rebalancing for Distributed File Systems in Clouds Hung-Chang Hsiao, Member, IEEE Computer Society, Hsueh-Yi Chung, Haiying Shen, Member, IEEE, and.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
Ant Colonies As Logistic Processes Optimizers
Ants-based Routing Marc Heissenbüttel University of Berne
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
TUDelft Knowledge Based Systems Group Zuidplantsoen BZ Delft, The Netherlands Roland van der Put Léon Rothkrantz Routing in packet switched networks.
“Multi-Agent Systems for Distributed Data Fusion in Peer-to-Peer Environment” Smirnova Vira ”Cheese Factory”/
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Distributed Asynchronous Bellman-Ford Algorithm
Network Aware Resource Allocation in Distributed Clouds.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Cracow Grid Workshop, October 27 – 29, 2003 Institute of Computer Science AGH Design of Distributed Grid Workflow Composition System Marian Bubak, Tomasz.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
1 ACTIVE FAULT TOLERANT SYSTEM for OPEN DISTRIBUTED COMPUTING (Autonomic and Trusted Computing 2006) Giray Kömürcü.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Peer to Peer Network Design Discovery and Routing algorithms
Self-stabilizing energy-efficient multicast for MANETs.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
TRUST Self-Organizing Systems Emin G ü n Sirer, Cornell University.
Distance Vector Routing
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation Presented by Dr. Ying Lu.
William Stallings Data and Computer Communications
Introduction to Load Balancing:
Network Load Balancing Functionality
Network Load Balancing
Routing.
AGENT OS.
Data and Computer Communications
Deterministic and Semantically Organized Network Topology
Routing.
Using Service Function Chaining for In-Network Computation
Presentation transcript:

Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks Internet Systems and Storage Laboratory HP Laboratories Palo Alto HPL September 17th, 2002

15/11/20042 Intruduction Grid Computing  Dynamic Grid Computing  Open Grid Service Architecture (OGSA) Suitable placement of services or applications Self-organization and Fault-tolerance

15/11/20043 Management of Dynamic Distributed Systems(1/4) Problem Domain  Balancing Demand and Supply  Centralized versus Distributed management  Dynamic Distributed Systems  Self-organization, Fault-tolerance and Adaptation  Paradigms for Mobile Computing and ubiquitous computing  Basic Assumptions

15/11/20044 Management of Dynamic Distributed Systems(2/4) Responsiveness and Solution Quality

15/11/20045 Management of Dynamic Distributed Systems(3/4) Control Objectives and the Partial Objective Function (POF) (1/2)  General control objectives 1. Balancing the server load such that the utilization of each server is in a desired range. 2. Placing services in such a way that communication demand among them does not exceed the capacity of the links between the hosting server environments. 3. Minimizing the overall network traffic aiming to place services with high traffic close to each other on nearby servers (nearby in the sense of a low number of communication hops across nodes).

15/11/20046 Management of Dynamic Distributed Systems(4/4) Control Objectives and the Partial Objective Function (POF) (1/2)

15/11/20047 Ant-Based Control Algorithm(1/4) Classical Ant Colony Optimization 1. The ant must “remember” the whole path it has taken; this information might become very large. 2. The ant must visit all objects on its tour. In a large and dynamic system, this is a serious drawback. 3. Finally, each solution (path) must be evaluated against others. This requires central knowledge. Ants, Service Managers and Server Managers  Three Entities A service manager Ms of a service S An ant representing s a server manager which executes the ant code, and maintains and updates the pheromone table of its server.

15/11/20048 Ant-Based Control Algorithm(2/4) Functionality of the System Components  Service Managers Watch the performance of its service Evaluate current assignment POF Spawns Ants  Ants Created by a service manager Travel from one server manager to the next  Server Managers Environment where ants are executed Lets Ants update pheromone table Maintains pheromone table Sends periodically the pheromone table to its neighbors

15/11/20049 Ant-Based Control Algorithm(3/4) Placement Scores and the pheromone table Choosing Next Server Initial placement of the Ants

15/11/ Ant-Based Control Algorithm(4/4) Conclusions for Self-Organization and Fault Tolerance  Servers and resources added to the network do not need to inform any central instance of their existence  If the majority of the servers in the system are unavailable or unreachable will not be prevented to work correctly in the remaining part of the system  The service manager is a single point of failure; if it disappear the service or a group of them might not recover without human intervention

15/11/ BLE-Based Control Algorithms (1/2) Decision Cycle in a cluster 1. Each server broadcasts the list of services it hosts with all new arrived services and simultaneously updates its list of all services in the cluster 2. Each server evaluates its own suitability to host each service and sorts the list according to the computed score. The evaluation is done by using the POF, In addition, a service already deployed on a server highly increases the score. 3. Each server broadcasts a list, ordered by scores, of those services the server can host simultaneously without exceeding its capacity. 4. When a server receives a score list from a peer, it compares this score with its own score for a service. As a consequence, each server knows whether it is the most eligible one for hosting a particular service. 5. The changes in the service placement are executed. Notice that each server knows already whether it has to install new or remove current services. In addition, the cluster head compares the initial list of services with those, which will be hosted at the end of this decision cycle. The remaining services are passed on to the next hierarchy level as explained below.

15/11/ BLE-Based Control Algorithms (2/2) Gossiping Algorithms Scalability by a cluster hierarchy Conclusion: Self-Organization and Fault-Tolerance  Advantages Simple Automatic Recovery of Services The cluster size parameterizes the algorithm’s responsiveness  Disadvantages The cluster head can become overloaded or even a single point of failure The hierarchy of the clusters must be created externally

15/11/ Agents in Overlay Networks(1/2) Service Groups and Agents  Service Group Clusters of Independent entities which do not rely on services outside the cluster  Group Agents Each group agent has the task to walk around in the resource network and evaluate the current server and its neighborhood in regard to placement of the services in the service group; however, one agent stays on one of the servers which host members of the service group, and evaluates only the current placement. A further assignment of a group agent is to provide the fault-tolerance to the optimization infrastructure P2P-Based Overlay Networks  Servers are connected in a P2P-manner to achieve fault- tolerance and self-organizing properties  We are mostly interested in server processing capacity, server storage capacity and the density values of these attributes.

15/11/ Agents in Overlay Networks(2/2) Lessons Learned for Self-Organization and Fault-Tolerance  Advantages Opposed to the ACO-approach, the above algorithms provides full fault-tolerance Another positive aspect is exploiting the self- organization properties of the underlying P2P-network  Disadvantages Each agent is a complex entity, which might bind more resources than e.g. in case of the Ant Colony Optimization-based algorithm

15/11/ Two Simple Algorithms Random / Round Robin (R3) Load Distribution Algorithm  Pushes load from an overloaded server to a randomly or in a round robin fashion chosen neighbor that may absorb that load if it has the capacity, or pushes the load further on to another server chosen in the same fashion.  Advantages Its simplicity and statelessness  Disadvantages Unpredictability and insufficient (random) convergence on the chance for thrashing Simple Greedy Algorithm  A simple greedy algorithm just pushes load on to the least loaded neighbor  Greedy algorithms make use of locally available information  The algorithms R3 and Greedy make good use of locality by placing load on the closest server they can find. Over a longer period, both algorithms achieve good load balancing. However, fast responsiveness is not guaranteed.

15/11/ Conclusions