Masking Failures Using Anti Entropy and Redundant Independent Paths Rebecca Braynard and Amin Vahdat Internet Systems and Storage Group Duke University.

Slides:



Advertisements
Similar presentations
Computer Networking A Top-Down Approach Chapter 4.7.
Advertisements

1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
CSE University of Washington Multipath Routing Protocols in AdHoc Networks.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
An Evaluation of Scalable Application-level Multicast Using Peer-to-peer Overlays Miguel Castro, Michael B. Jones, Anne-Marie Kermarrec, Antony Rowstron,
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
COMPUTER NETWORKS.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
ROUTING BASICS. Why are Routers Necessary? One of the key components of the technical infrastructure of the network One of the key components of the technical.
1 Plaxton Routing. 2 Introduction Plaxton routing is a scalable mechanism for accessing nearby copies of objects. Plaxton mesh is a data structure that.
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Wireless Ad-Hoc Networks
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
The Way Networks Work Computer Networks Kwangwoon University.
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
OSPF Topology-Transparent Zone Huaimo Chen, Renwei Li (Huawei) Gregory Cauchie (France Telecom) Ning So (Verizon)
1 More on Plaxton routing There are n nodes, and log B n digits in the id, where B = 2 b The neighbor table of each node consists of - primary neighbors.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Content Addressable Networks CAN is a distributed infrastructure, that provides hash table-like functionality on Internet-like scales. Keys hashed into.
Routing and Routing Protocols
Utility Computing Amin Vahdat Internet Systems and Storage Group
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Peer to Peer Network Design Discovery and Routing algorithms
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Ch 22. Routing Direct and Indirect Delivery.
TOPICS INTRODUCTION CLASSIFICATION CHARACTERISTICS APPLICATION RELATED WORK PROBLEM STATEMENT OBJECTIVES PHASES.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Distance Vector and Link State Routing Pragyaditya Das.
Configuration for routing example
Chapter 3: Packet Switching (overview)
The network layer: routing
ROUTING.
Instructor Materials Chapter 5: Dynamic Routing
Introduction to Wireless Sensor Networks
Routing Protocols and Concepts
Link-State Routing Protocols
Internet Networking recitation #4
CS 457 – Lecture 12 Routing Spring 2012.
Introduction to Internet Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
ECE 544 Protocol Design Project 2016
Link-State Routing Protocols
Review of TCP/IP Internetworking
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
RFC 1058 & RFC 2453 Routing Information Protocol
COS 561: Advanced Computer Networks
Link-State Routing Protocols
IP Multicast COSC /5/2019.
OSPF Protocol.
Presentation transcript:

Masking Failures Using Anti Entropy and Redundant Independent Paths Rebecca Braynard and Amin Vahdat Internet Systems and Storage Group Duke University

Building Reliable Overlays n Hide failures in the network from applications using the overlay Scalable, reliable publish subscribe systems n Goal: Input: overlay with neighbor connection information and reliability target Probe neighbors for reliability information Construct end-to-end paths that match the target level of reliability n Benefit: Proactively handle failures Avoid convergence time after network failures through redundancy Rebecca Braynard

Restricted Flooding n All nodes in the overlay receive the data n Messages do not travel along every link in the overlay n Prevent nodes from receiving multiple copies Idea is similar to Anti Entropy: used to maintain consistency between replicas in distributed computing SourceDestination Rebecca Braynard

First Step: Maximum Reliability Tree Source Dest_2 Dest_1 Rebecca Braynard Highest reliability paths for source to destinations Link Reliability (assume independence)

Second Step: Multiple Disjoint Routes Source Dest_2 Dest_1 Rebecca Braynard Tune connectivity to application specifications Basic Flood: 14Restricted Flooding:

Questions? n Webpage: n Rebecca Braynard: Amin Vahdat: Rebecca Braynard

Research Problems n Disjoint paths may not be available Rebecca Braynard n Nodes only have local network state information to make decisions Only probe direct neighbors in the overlay n Loss correlations between overlay links A B D C Overlay link Physical link Overlay node Internet router

Differences: RON n RON: O(N 2 ) probing to obtain network state information Each node probes every other node in the overlay Global network state to make routing decisions Limits scalability Rebecca Braynard RONBase Overlay Multiple Routes with AE

Differences: Mesh-Based Content Routing n MBCR: intermediate nodes receive messages multiple times Single receiver We address the problem of finding disjoint routes Rebecca Braynard Restricted Flooding to reduce network resource consumption Intermediate nodes receive the same message multiple times

Link Loss Correlation n Loss rates correlation between links share a link in the underlying topology Rebecca Braynard