Probabilistic Broadcast Presented by Keren Censor 1.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

12/09/01 1 SCAMP: lightweight membership service for gossip- based protocols Ayalvadi Ganesh, Anne-Marie Kermarrec & Laurent Massoulié Microsoft Research.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Communication Networks Recitation 3 Bridges & Spanning trees.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
1 CS 194: Distributed Systems Process resilience, Reliable Group Communication Scott Shenker and Ion Stoica Computer Science Division Department of Electrical.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Unstructured P2P Networks Achieving Robustness and Scalability in Data Dissemination Scenarios Michael Mirold Seminar on Advanced Topics in Distributed.
20/10/2006ALPAGE1 Ordered slicing of very large scale overlay networks Mark Jelasity University of Bologna, Italy Anne-Marie Kermarrec INRIA Rennes/IRISA,
Introduction to Wireless Sensor Networks
Playback delay in p2p streaming systems with random packet forwarding Viktoria Fodor and Ilias Chatzidrossos Laboratory for Communication Networks School.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Reliable Group Communication Quanzeng You & Haoliang Wang.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
Unstructured overlays: construction, optimization, applications Anne-Marie Kermarrec Joint work with Laurent Massoulié and Ayalvadi Ganesh.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
CS 582 / CMPE 481 Distributed Systems
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Design and Evaluation of a Wide-Area Event Notification Service Antonio Carzaniga David S. Rosenblum Alexander L. Wolf.
Oct 1999SRDS 991 On Diffusing Updates in a Byzantine Environment Dahlia Malkhi Yishay Mansour Michael K. Reiter.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Application Layer Multicast for Earthquake Early Warning Systems Valentina Bonsi - April 22, 2008.
EEC-681/781 Distributed Computing Systems Lecture 11 Wenbing Zhao Cleveland State University.
Background Notification services in LAN Provides Notification Selection Notification Delivery Done on a centralized server (hence not scalable) Challenge.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
Communication (II) Chapter 4
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
An Efficient Topology-Adaptive Membership Protocol for Large- Scale Cluster-Based Services Jingyu Zhou * §, Lingkun Chu*, Tao Yang* § * Ask Jeeves §University.
Epidemics Michael Ford Simon Krueger 1. IT’S JUST LIKE TELEPHONE! 2.
Publisher Mobility in Distributed Publish/Subscribe Systems Vinod Muthusamy, Milenko Petrovic, Dapeng Gao, Hans-Arno Jacobsen University of Toronto June.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
1 SmartGossip: An Adaptive Broadcast Service for Wireless Sensor Networks Presented By Thomas H. Hand Duke University Adapted from: “ SmartGossip: An Adaptive.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks Authored by Luo, Eugster, and Hubaux Presented by Jin-Hee Cho.
2007/1/15http:// Lightweight Probabilistic Broadcast M2 Tatsuya Shirai M1 Dai Saito.
Scalable Self-Repairing Publish/Subscribe Robbert van Renesse Ken Birman Werner Vogels Cornell University.
Prof. Mort AnvariStrayer University at Arlington, VAAugust Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Peer to Peer Network Design Discovery and Routing algorithms
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
NDDS: The Real-Time Publish Subscribe Middleware Network Data Delivery Service An Efficient Real-Time Application Communications Platform Presented By:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented by Barath Raghavan.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
SmartGossip: A Reliable Broadcast Service for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
CS 425 / ECE 428 Distributed Systems Fall 2017 Indranil Gupta (Indy)
Introduction to Wireless Sensor Networks
湖南大学-信息科学与工程学院-计算机与科学系
Strayer University at Arlington, VA
Foundations for Highly-Available Content-based Publish/Subscribe Overlays Young Yoon, Vinod Muthusamy and Hans-Arno Jacobsen.
Indirect Communication Paradigms (or Messaging Methods)
Replica Placement Model: We consider objects (and don’t worry whether they contain just data or code, or both) Distinguish different processes: A process.
Indirect Communication Paradigms (or Messaging Methods)
CS 425 / ECE 428 Distributed Systems Fall 2018 Indranil Gupta (Indy)
Presentation transcript:

Probabilistic Broadcast Presented by Keren Censor 1

Traditional client-server model  Central point of failure  Performance bottleneck  Heavy load on servers 2

Peer-to-Peer (P2P)  Central point of failure  Performance bottleneck  Heavy load on servers 3

Information Dissemination  Deterministic solutions Flooding – send a message to every neighbor  #Messages = O(#edges)  Time = diameter Deterministic routing – send according to a spanning tree  Non-resilient to failures  Time = O(#nodes) 4

Requirements  Reliable broadcast Reach all nodes Resilient to failures Considering: Dynamic network topology Crashes Disconnections Packet losses 5

Random information spreading  Trade reliability with scalability Algorithm may be less reliable, but should scale well with system size  Basic gossip algorithm Forward information to a randomly chosen subset of your neighbors. Design parameters:  Buffer capacity B  Fan-out F  Number of times a message is forwarded T 6

Previous algorithms  First developed for consistency management of replicated database [Demers et al. 1987]  Reliability in Bimodal Multicast [Birman et al. 1999] : The set of nodes that a message reaches is Almost all of the nodes, with high probability Almost none of the nodes, with small probability Other subsets, with vanishingly small probability 7

Design constraints  Membership Knowledge of the participants  Network awareness Knowledge of real network topology  Buffer management Memory usage  Message filtering According to different interests 8

Design constraints  Membership Knowledge of the participants in the system Previous algorithms assume this knowledge Problems:  Storage increases linearly with system size n  Maintenance imposes extra load 9

Design constraints  Membership Solution: integrate membership with gossip and maintain partial view  Uniformity: how to gossip to members chosen uniformly at random from the entire system  Adaptivity: some parameter must grow with system size, how do we estimate the system size?  Bootstraping: how is the system initialized? 10

Design constraints  Network awareness Knowledge of real network topology  Problem: a message sent by p to a nearby q may be routed through a remote w pwq 11

 Network awareness Solution: organize processes in a hierarchy that reflects the network topology  Distributed?  Fault tolerant?  Scalable? Design constraints 12

Related approaches  Directional gossip [Lin and Marzullo, 1999] : a weight is given for each neighbor, according to its connectivity. A higher probability is given for neighbors with less weight in each round grows with each round 13

Design constraints  Buffer management Memory usage Problem: limited buffers. When buffer is full:  Drop new messages?  Drop old messages? In Bimodal Multicast: a message is gossiped by a node for a limited number of rounds, and then it is erased 14

Design constraints  Buffer management Solutions:  Age-based priorities  Application semantics Elaboration later 15

 Message filtering According to different interests Problem: redundancy if there are topics of interest  How does a process know the interest of its neighbors?  Assume magically that this info is available, does p decide not to send to q a message it is not interested in? Solution: hierarchy of processes Design constraints pwq What if w is interested? 16

LPBCAST  Lightweight Probabilistic Broadcast [Eugster, Guerraoui, Handurukande, Kouznetsov, and Kermarrec, 2003]  Main contribution: Scalable memory consumption for  Membership management  Message buffering 17

Model  Set of processes П = {p 1, p 2, …}  Synchronous rounds  Complete logical network  LPBCAST has partial views Application LPBCAST 18

Buffers  Event notifications – events  Event notifications identifiers – eventIds  Unsubscriptions – unSubs  Subscriptions – subs and view  Each buffer L has a maximum size |L| max  Truncation of L: removing random elements so that |L|≤|L| max view eventIds unSubs subs events 19

Receiving event from application  Upon LPCAST(e) Add e to events e events Application LPBCAST e 20

Gossiping  Periodically (gossip period T ms) generate a message and send to F (fanout) members chosen randomly from view view F random elements Gossip message eventIds unSubs subs events = Ø ∪{pi}∪{pi} 21

Gossip reception  Unsubscriptions: Remove from view and subs Add to unSubs and truncate viewunSubssubs pipi pipi pipi pjpj pjpj pjpj unSubs random elements 22

Gossip reception  Subscriptions: Add to view and subs Truncate view into subs Truncate subs viewsubs pipi pipi pjpj pjpj view subs random elements 23

Gossip reception  Events: Deliver new event notifications to application Add to eventIds and events, and truncate If received id not in eventIds then add to retrieveBuf e eventIdsevents Application LPBCAST ee.id retrieveBuf id Keeps ids of all delivered events 24

Retrieving events  If > k rounds passed since an eventId was inserted into retrieveBuf, and the matching event was not yet received: Ask for the event from the process q from whom eventId was received. If no reply for r rounds: Ask for the event from a random neighbor. Ask for the event from the source of the event. 25

Subscriptions and unsubscriptions  Subscribe: p i subscribes by some known p j, which gossips this subscription. Gossip messages will start reaching p i, otherwise it subscribes again  Unsubscribe: have timestamps after which unsubscriptions become obsolete  Subscriptions are gossiped continuously to insure uniformly distributed views: a failed process will be removed from all views with high probability 26

Analysis – Assumptions  n processes, П is constant  Latency is smaller than gossip period T  Failures are stochastically independent: Probability of a message lost ≤ ε Number of crashes ≤ f   Event notification identifiers are unique 27

Analysis – Distribution of views  Assume each p has an independent uniformly distributed random view of size l In round r: In round r+1: For l << |subs| max F, this is estimated by l/(n-1) p in viewp not removed p not in view p enters view 28

Analysis – Event propagation  pr = Pr[p receives certain gossip message] ≥  s r,e = #processes that received event e by round r  Markov chain: p ij = Pr[s r+1 =j | s r =i] = p in viewp is chosenmessage not lost p doesn ’ t crash Doesn ’ t depend on l q=1-pr 29

Analysis – Event propagation  Markov chain: p ij = Pr[s r+1 =j | s r =i] =  Distribution of s r : q=1-pr 30

Analysis – Gossip rounds  #rounds decreases as the fanout F increases  Claim: #rounds increases logarithmically with system size n Compare: diameter of a random graph is O(logn)  View size l does not influence #rounds But we needed to assume l << |subs| max F, so the subs buffer pays the price? 31

Analysis – Partitioning Pr[partition of size i]= For constant n: decreases as l increases For constant l: decreases as n increases In one set: i views include only the other i-1, In the other set: n-i views include only the other n-i-1 32

Analysis – Partitioning Pr[no partition up to round r]= Decreases very slowly with r Design: can choose l as a function of some required probability of not partitioning In practice, add a hierarchy – a set of processes that are always known to everyone 33

Age-based message purging  Replaces the randomly truncating of the events buffer Each event e has an age parameter  Initialized to 0 by the application  Incremented by every gossiping processes While |events|>|events| max  Remove smallest id events from the same source  Remove oldest events, according to their age 34

Age-based message purging  Evaluation: Delivery ratio: ratio between number of messages delivered and number of messages sent per round. Redundancy: fraction of same messages received by a certain process in a given round Throughput: as a function of stability – delivered by 90% of the processes Fault tolerance: delivery ratio in the presence of faults 35

Frequency-based membership purging  With random truncating, a new member has the same probability of being removed as a well known member Each element in subs has a frequency parameter  Incremented each time it is received Truncating: avg = average frequency in list 1. Choose random element from list 2. If its frequency > k·avg, then remove this element 3. Otherwise, increment its frequency and goto 1 36

Frequency-based membership purging  Evaluation: Propagation delay: number of informed processes as a function of the round number Membership management: number of times membership information about a process is seen by others. Measured on processes removed from the subs buffer 37

References  Epidemic Algorithms for Replicated Database Maintenance [Demers et al. 1987]  Bimodal Multicast [Birman et al. 1999]  Directional Gossip: Gossip in a Wide Area Network [Lin and Marzullo 1999]  Lightweight Probabilistic Broadcast [Eugster et al. 2003] 38

Thank you :) 39