Cloud Computing: "network access to shared pool of configurable computing resources"

Size: px
Start display at page:

Download "Cloud Computing: "network access to shared pool of configurable computing resources""

Transcription

1 Large-Scale Networks Gossip-based Protocols Consistency for Large-Scale Data Replication Uwe Roehm / Vincent Gramoli School of Information Technologies The University of Sydney Page 1 Cloud Computing: "network access to shared pool of configurable computing resources" Source: Jamie's Cloud Based Web Server on an Amazon EC2 The University of Sydney Page 2

2 Shared-Pool of Computing Resources? Data Centers! The University of Sydney Page 3 And not just one data centre of the Big Three (approx., as of 2012) Links: The University of Sydney Page 4

3 Motivation Core requirements for Cloud Computing platforms Scalability Availability / Fail Safety But CAP Theorem: [Brewer, PODC2000] Consistency Availability Partitioning Tolerance Theorem: You can have at most two of these properties for any shared-data system. The University of Sydney Page 5 Motivation (cont d) Highly scalable, fail safe data management? Scalability: Data Partitioning Fail Safety: Data Replication Standard protocols in databases focus on determinism & consistency Example: 2-Phase Commit Protocol 4n messages blocking => this is neither fail safe, nor scalable How can we do better? Idea: Let s try to see what happens if some information/epidemic spreads with some uncertainty The University of Sydney Page 6

4 Introduction Epidemics Branching process SIR model SIS model Relation between SIS and SIR models Gossip-based protocols Slide deck by Vincent Gramoli The University of Sydney Page 7 Epidemics

5 Epidemics Biology meets sociology In extreme cases, a single disease outbreak can have a significant effect on a whole civilization The spread of diseases is impacted by: Properties of the pathogen carrying it (e.g., contagiousness, infectious period) Network structure within a population (e.g., who knows whom) The University of Sydney Page 9 Epidemics The contact network defines the interactions used by an epidemics There is a node for each person Edge between two persons if they come into contact with each other Travel patterns showed an impact on the spread of fast moving diseases 1. within a city [MPN05] or 2. via worldwide airline network [CBB06] The University of Sydney Page 10

6 Epidemics Ebola 2014 Crisis Air traffic among West African countries and the rest of the world The University of Sydney Page Epidemics There are clear connections between: 1. Epidemic diseases in a population 2. Diffusion of ideas in social networks They both spread from person to person There is however some uncertainty in these models as opposed to the previous model we considered about adopting technologies There is a lack of decision making in the transmission of the disease from one person to another In our new model, we will thus consider the person-to-person interaction as random The University of Sydney Page 12 1

7 Branching Process 1 Branching Process Let s model the spread of contagion in waves, one at each level of a tree The University of Sydney Page 14

8 Branching Process A simple model of contagion 1. First wave: A new person carrying a disease enter the population and transmits it to each person he meets independently with probability p. He meets k people while contagious; this k people are the first wave of epidemics. 2. Second wave: each person in the first wave meets k other people. Each infected person of the first wave passes the disease independently to each of the second-wave independently with probability p. 3. Subsequent waves: each person infected in the current wave passes the disease with probability p to k people she meets The University of Sydney Page 15 Branching Process A simple model of contagion 1. With high probability p the contagion spreads widely 2. With low probability p the contagion is likely to die out quickly The University of Sydney Page 16

9 Branching Process A simple model of contagion There are two possibilities in this branching process model: 1. Contagion dies out: contagion reaches a wave where it infects no one 2. Infinite contagion: continues to infect people in every wave The basic reproduction number R 0 is a simple condition to tell these two possibilities apart R 0 is the expected number of new (secondary) cases of the disease caused by a single (typical) infection In our model, this is R 0 = pk because k persons are infected with proba p Þ the outcome is determined by whether R 0 < 1. The University of Sydney Page 17 Branching Process A simple model of contagion Claim: If R 0 < 1, then with probability 1, the disease dies out after a finite number of waves. If R 0 > 1, then with probability greater than 0 the disease persists by infecting at least one person in each wave. The University of Sydney Page 18

10 SIR Model 1 SIR Model An individual node in the branching process model goes through three potential stages during the course of the epidemic: 1. Susceptible: before the node has caught the disease, it is susceptible to be infected by its neighbors 2. Infectious: once the node has caught the disease, it is infectious and has some probability of infecting each of its susceptible neighbors 3. Removed: after a particular node has experienced the full infectious period, it is removed from consideration, since it no longer poses a threat of future infection. The contact network is represented as a directed graph Edge <v,w> indicates that if v is infected, the disease can spread to w If either has the potential to infect the other, we can represent edges point both ways The University of Sydney Page 20

11 SIR Model Each node loops in a Susceptible (S), Infectious (I), Removed (R) cycle Initially, some nodes are in the I state and all others in the S state Each node v that enters the I state remains infectious for a fixed number of steps t I During each of these t I steps, v has probability p of passing the disease to each of its susceptible neighbors After t I steps, node v is in state R: it is no longer in I or S and can no longer catch or transmit the disease The University of Sydney Page 21 SIR Model Example Example of a SIR epidemic where shaded nodes with dark border are in I, shaded nodes with thin border are in R and the rest are in S. Each node remains in I for a number of steps t I =1 Initially, nodes y and z are infected Step 0: Step 1: The epidemic spreads to some but not all of the remaining nodes The University of Sydney Page 22

12 SIR Model Example (cont d) Example of a SIR epidemic where shaded nodes with dark border are in I, shaded nodes with thin border are in R and the rest are in S. Step 2: Step 3: The University of Sydney Page 23 SIR Model We can derive a more realistic model Some nodes are more likely to catch the disease This can be represented by a different probability p v,w depending on each edge <v,w> Each node may stay in the I state a random period This can be modeled by a probability of leaving the state I with probability q in each step spent in this state We could have disease with highly contagious incubation periods followed by a less contagious periods where symptoms appear This can be modeled with substate of state I (early, middle and later periods of I) The University of Sydney Page 24

13 SIS Model SIS Model We have considered a model where nodes get infected at most once However, a simple variation of this model allows us to reason about epidemics where nodes can be re-infected To this end, we have nodes that alternate between Susceptible (S) and Infectious (I) states, these models are SIS models. The University of Sydney Page 26

14 SIS Model Let us describe the SIS model as follows 1. Initially, some nodes are in the I state and all others are in the S state 2. Each node v that enters the I state remains infectious for a fixed number of steps t I 3. During each of these t I steps, v has a probability p of passing the disease to each of its susceptible neighbors 4. After the t I steps, node v is no longer infectious, and it returns to the S state The University of Sydney Page 27 SIS Model Example of an execution in the SIS model In each step, the nodes in the Infectious (I) state are shaded In the SIS model, nodes can be infected, recover and then be infected again The University of Sydney Page 28

15 Relationship between the SIS and the SIR Models SIS Model vs. SIR Model Differences of SIS and SIR models: In the SIR model, the epidemic spreads on a finite graph Burns through a bounded supply of nodes, since nodes can never be re-infected Comes to an end after a finite number of steps In the SIS model, the epidemic may die if all nodes are free from the disease In a finite graph, there will eventually (with probability 1) come a point in time where all contagion attempts simultaneously fail for t I steps in a row, and at this point the epidemics will be over A key question in the SIS model, is to know how long the epidemics will last and how many individuals will be affected at different points in time The University of Sydney Page 30

16 SIS model vs. SIR model For contact networks where the structure is mathematically tractable, some work investigated the time it takes for an epidemic in the SIS model to die out [Berger et al. SODA 05, Liggett Stochastic Interacting Sys. 99] For a particular value of the contagion probability p, a SIS epidemic on the network will undergo a rapid shift: from one that dies out quickly to one that persists for a very long time This type of analysis is quite complex and involves a probability p that depends on the network structure The University of Sydney Page 31 SIS model vs. SIR model We can represent some of the basic variants of the SIS model as special cases of the SIR model This shows the flexibility of epidemic models Consider the SIS model in which t I = 1 where each node is infectious during one step If we think about each node v as a different node in each time step, then we represent the model where nodes are never re-infected We create a separate copy of each node for each time step t = 1, 2 The University of Sydney Page 32

17 SIS model vs. SIR model We create a time-expanded contact network where For each edge <v,w> in the original contact network, we create edges in the time-expanded contact network from the copy of v at time t to the copy of w at time t+1 This encode the idea that w can catch the disease at time t+1 if v is infectious at time t The University of Sydney Page 33 SIS model vs. SIR model Applying the time-expanded contact network to this contact network: Leads to the following time-expanded contact network: The University of Sydney Page 34

18 SIS model vs. SIR model The idea is that the same SIS disease dynamics that previously circulated around the original contact network can now flow forward in time through the time-expanded contact network, with copies of nodes that are in the I state at time t producing new infections in copies of nodes at time t+1 But on this time-expanded graph we have a SIR process, since any copy of a node can be treated as removed (R) once its one time step of infection is over With this view of the process we have the same distribution of outcomes as the original SIS model The University of Sydney Page 35 SIS model vs. SIR model Hence the course of the SIS epidemic seen before: Can be represented as the following course of the SIR epidemic: The University of Sydney Page 36

19 Gossip-based Protocols Gossip-based Protocols: 1. Information Dissemination Also called epidemic protocols [DGH87]: "Epidemic Algorithms for Replicated Database Maintenance" History: Based on the theory of epidemics, studying the spreading of infectious diseases Opposite goal: trying to spread (information) as fast as possible Terminology: An infected node holds data that is willing to spread to others A susceptible node is a node that has not yet seen this data A removed node is no willing/able to spread its data An update is a version of a data (data can be updated and timestamped) Advantages: Propagates in O(log n) where n is the number of peers if peers are picked u.a.r. Tolerates peer failures and message losses The University of Sydney Page 38

20 Gossip-based Protocols: Anti-Entropy Anti-Entropy: p i picks p j at random, and exchanges updates with p j Three approaches of exchanging updates: 1. p i only pushes its own updates to p j 2. p i only pulls in new updates from p j 3. p i and p j send updates to each other (i.e., push-pull approach) Remarks: Push-based approaches are bad at spreading rapidly updates With pull-based, a susceptible will likely get the update from many infected nodes Even more efficient is the combination of the two: push-pull. The University of Sydney Page 39 Gossip-based Protocols: Rumour Mongering Rumor Mongering: send only important messages or abstain More specifically: 1. If node p i has just been updated for data item x, it contacts an arbitrary other node p j and tries to push the update to p j 2. If p j was already updated by another node, then p i may become removed with some probability 1/k Efficient at spreading news/updates Some nodes may not receive the news/updates and remain susceptible In large scale network, the fraction s of nodes that remain susceptible is: s = e -(k+1)(1-s) Typically, if k=4, ln(s) = -4.97, s < The University of Sydney Page 40

21 Gossip-based Protocols: Mixing with Anti-Entropy Rumor mongering spreads updates fast with low traffic however, non-zero probability of nodes remaining susceptible after the apidemic Antri-entropy can be run (infrequently) in the background to ensure all nodes eventually get the update with probability 1 since a single rumor is already known by most nodes, dies out quickly The University of Sydney Page 41 Gossip-based Protocols Principle General principle Each peer executes periodically: 1. p = selectrandompeer(); 2. peerstate = p.getstate(); 3. mystate = me.getstate(); 4. newstate = merge(mystate, peerstate); 5. p.putstate(newstate); 6. me.putstate(newstate); The University of Sydney Page 42

22 Gossip-based Protocols: 2. Overlay Networks Example: self-stabilizing protocols [JMB09] T-Man: gossip protocol that can build overlay networks from scratch: "what are my preferred neighbours?" Eventually nodes organize themselves into a torus overlay The University of Sydney Page 43 Gossip-based Protocols: 3. Membership Management Multi-layer Gossip [JVG07] Peers gossip to construct a communication overlay resistant to crashes They maintain a small view of neighbors to communicate with They update this view periodically with the one from their neighbors Peers may use this overlay to disseminate information by gossiping They can use this view to push and/or pull updates They may piggyback the view information into these messages The University of Sydney Page 44

23 Other Gossip-Based Protocol Usages Gossip-based Computation of Aggregate Information [KDG2003] Gossip-based failure detection and membership protocol [Gupta et al, ACM PoDC2001] used eg. Amazon Dynamo [DeCandia SOSP2007] and also Apache Cassandra to build the DHT The University of Sydney Page 45 References [MPN05] Meyers, Pourbohloul, Newman, Skowronski, Brunham. Network Theory and SARS: Predicting outbreak diversity. J. Theoretical Biology. 232:71-81, [CBB06] Colizza, Barrat, Barthelemy, Vespignani. The role of Airline transportation network in the prediction and predictability of global epidemics. Proc. Natl. Acad. Sci, USA. 103(7): , [DGH87] Demers, Greene, Hauser, Irish, Larson, Shenker, Sturgis, Swinehart, Terry. Epidemic algorithms for replicated database maintenance. PODC [JMB09] Jelasity, Montresor, Babaoglu. T-Man: Gossip-based fast overlay topology construction. J. Computer Networks, 53(13): , [JVG07] Mark Jelasity, Spyros Voulgaris, Rachid Guerraoui, Anne-Marie Kermarrec, Martin van Steen. Gossip-based peer sampling. ACM TOCS [KDG03] D. Kempe, A. Dobra and Johannes Gehrke. Gossip-based computation of aggregate information. In: 44 th IEEE Symposium on Foundations of Computer Science, The University of Sydney Page 46

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary Gossip Protocols Márk Jelasity Hungarian Academy of Sciences and University of Szeged, Hungary Introduction Gossip-like phenomena are commonplace human gossip epidemics (virus spreading, etc) computer

More information

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy are possible. In push mode, P pushes its database to

More information

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy are possible. In push mode, P pushes its database to

More information

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary Gossip Protocols Márk Jelasity Hungarian Academy of Sciences and University of Szeged, Hungary Introduction Gossip-like phenomena are commonplace human gossip epidemics (virus spreading, etc) computer

More information

Computing Parable. The Archery Teacher. Courtesy: S. Keshav, U. Waterloo. Computer Science. Lecture 16, page 1

Computing Parable. The Archery Teacher. Courtesy: S. Keshav, U. Waterloo. Computer Science. Lecture 16, page 1 Computing Parable The Archery Teacher Courtesy: S. Keshav, U. Waterloo Lecture 16, page 1 Consistency and Replication Today: Consistency models Data-centric consistency models Client-centric consistency

More information

Gossiping in Distributed Systems Foundations

Gossiping in Distributed Systems Foundations Gossiping in Distributed Systems Foundations Maarten van Steen 2 of 41 2 of 41 Introduction Observation: We continue to face hard scalability problems in distributed systems: Systems continue to grow in

More information

Last Class: Web Caching. Today: More on Consistency

Last Class: Web Caching. Today: More on Consistency Last Class: Web Caching Use web caching as an illustrative example Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 16, page 1 Today: More on Consistency

More information

Block lectures on Gossip-based protocols

Block lectures on Gossip-based protocols Block lectures on Gossip-based protocols Lecture 1: dissemination, randomness and aggregation Dr. Etienne Rivière University of Neuchâtel Etienne.Riviere@unine.ch Lectures funded by the EU commission as

More information

CS 425 / ECE 428 Distributed Systems Fall 2015

CS 425 / ECE 428 Distributed Systems Fall 2015 CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Sep 24, 2015 Lecture 10: Gossiping All slides IG Multicast Fault-tolerance and Scalability Needs: 1. Reliability (Atomicity) 100% receipt

More information

Consistency and Replication. Why replicate?

Consistency and Replication. Why replicate? Consistency and Replication Today: Consistency models Data-centric consistency models Client-centric consistency models Lecture 15, page 1 Why replicate? Data replication versus compute replication Data

More information

A Middleware for Gossip Protocols

A Middleware for Gossip Protocols A Middleware for Gossip Protocols Michael Chow Cornell University mcc59@cornell.edu Robbert van Renesse Cornell University rvr@cs.cornell.edu Gossip protocols are known to be highly robust in scenarios

More information

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach Zhuozhao Li and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA Kang Chen

More information

Eventual Consistency. Eventual Consistency

Eventual Consistency. Eventual Consistency Eventual Consistency Many systems: one or few processes perform updates How frequently should these updates be made available to other read-only processes? Examples: DNS: single naming authority per domain

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks

More information

CSE 486/586 Distributed Systems

CSE 486/586 Distributed Systems CSE 486/586 Distributed Systems Gossiping Slides by Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Revisiting Multicast Node with a piece of information to be communicated

More information

Module 7 - Replication

Module 7 - Replication Module 7 - Replication Replication Why replicate? Reliability Avoid single points of failure Performance Scalability in numbers and geographic area Why not replicate? Replication transparency Consistency

More information

Cloudy Weather for P2P

Cloudy Weather for P2P Cloudy Weather for P2P with a Chance of Gossip Alberto Montresor Luca Abeni Best paper award in P2P'11 Presented by: amir@sics.se 1 Introduction 2 Cloud Computing vs. P2P Similarity: Providing the infinite

More information

Fast Topology Management in Large Overlay Networks

Fast Topology Management in Large Overlay Networks Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology

More information

Consistency and Replication (part b)

Consistency and Replication (part b) Consistency and Replication (part b) EECS 591 Farnam Jahanian University of Michigan Tanenbaum Chapter 6.1-6.5 Eventual Consistency A very weak consistency model characterized by the lack of simultaneous

More information

A Generic Theoretical Framework for Modeling Gossip-Based Algorithms

A Generic Theoretical Framework for Modeling Gossip-Based Algorithms A Generic Theoretical Framework for Modeling Gossip-Based Algorithms Yaacov Fernandess School of Computer Science and Engineering The Hebrew University of Jerusalem 91904 Jerusalem, Israel fery@cs.huji.ac.il

More information

X X C 1. Recap. CSE 486/586 Distributed Systems Gossiping. Eager vs. Lazy Replication. Recall: Passive Replication. Fault-Tolerance and Scalability

X X C 1. Recap. CSE 486/586 Distributed Systems Gossiping. Eager vs. Lazy Replication. Recall: Passive Replication. Fault-Tolerance and Scalability Recap Distributed Systems Gossiping Steve Ko Computer Sciences and Engineering University at Buffalo Consistency models Linearizability Sequential consistency Causal consistency Eventual consistency Depending

More information

Towards a Decentralized Architecture for Optimization

Towards a Decentralized Architecture for Optimization Towards a Decentralized Architecture for Optimization Marco Biazzini, Mauro Brunato and Alberto Montresor University of Trento Dipartimento di Ingegneria e Scienza dell Informazione via Sommarive 1, 381

More information

Epidemic-style Communication Primitives Exploiting Network Topology Information

Epidemic-style Communication Primitives Exploiting Network Topology Information Epidemic-style Communication Primitives Exploiting Network Topology Information Mirco Musolesi and Cecilia Mascolo Department of Computer Science, University College London Gower Street, London, WC1E 6BT,

More information

Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks

Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh, Senior Member IEEE Department of Electrical Engineering, IIT, Kanpur {rgupta, abhicm,

More information

MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor

MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor MUTE: A Peer-to-Peer Web-based Real-time Collaborative Editor Matthieu Nicolas, Victorien Elvinger, Gérald Oster, Claudia-Lavinia Ignat, François Charoy To cite this version: Matthieu Nicolas, Victorien

More information

DS-Means: Distributed Data Stream Clustering

DS-Means: Distributed Data Stream Clustering DS-Means: Distributed Data Stream Clustering Alessio Guerrieri and Alberto Montresor University of Trento, Italy Abstract. This paper proposes DS-means, a novel algorithm for clustering distributed data

More information

The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations

The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations Márk Jelasity 1, Rachid Guerraoui 2, Anne-Marie Kermarrec 3, and Maarten van Steen 4 1 University of Bologna,

More information

Epidemic spreading on networks

Epidemic spreading on networks Epidemic spreading on networks Due date: Sunday October 25th, 2015, at 23:59. Always show all the steps which you made to arrive at your solution. Make sure you answer all parts of each question. Always

More information

Dynamo: Amazon s Highly Available Key-value Store. ID2210-VT13 Slides by Tallat M. Shafaat

Dynamo: Amazon s Highly Available Key-value Store. ID2210-VT13 Slides by Tallat M. Shafaat Dynamo: Amazon s Highly Available Key-value Store ID2210-VT13 Slides by Tallat M. Shafaat Dynamo An infrastructure to host services Reliability and fault-tolerance at massive scale Availability providing

More information

Communication. Distributed Systems IT332

Communication. Distributed Systems IT332 Communication Distributed Systems IT332 2 Outline Fundamentals Layered network communication protocols Types of communication Remote Procedure Call Message Oriented Communication Multicast Communication

More information

Kleinberg s Small-World Networks. Normalization constant have to be calculated:

Kleinberg s Small-World Networks. Normalization constant have to be calculated: Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)

More information

Gossip and Epidemic Protocols

Gossip and Epidemic Protocols Gossip and Epidemic Protocols Alberto Montresor Abstract A gossip protocol is a distributed communication paradigm inspired by the gossip phenomenon that can be observed in social networks. Initially born

More information

Report to Brewer s original presentation of his CAP Theorem at the Symposium on Principles of Distributed Computing (PODC) 2000

Report to Brewer s original presentation of his CAP Theorem at the Symposium on Principles of Distributed Computing (PODC) 2000 Brewer s CAP Theorem Report to Brewer s original presentation of his CAP Theorem at the Symposium on Principles of Distributed Computing (PODC) 2000 Written by Table of Contents Introduction... 2 The CAP-Theorem...

More information

An Analytical Model of Information Dissemination for a Gossip-based Protocol

An Analytical Model of Information Dissemination for a Gossip-based Protocol An Analytical Model of Information Dissemination for a Gossip-based Protocol Rena Bakhshi, Daniela Gavidia, Wan Fokkink, and Maarten van Steen Department of Computer Science, Vrije Universiteit Amsterdam,

More information

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Multicast Presented by Hakim Weatherspoon Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010 Midterm report abstract, introduction, background, related work, and design section. These sections should

More information

A STUDY OF GOSSIP ALGORITHMS FOR INTERNET-SCALE CARDINALITY ESTIMATION OF DISTRIBUTED XML DATA

A STUDY OF GOSSIP ALGORITHMS FOR INTERNET-SCALE CARDINALITY ESTIMATION OF DISTRIBUTED XML DATA MS Thesis Defense of Vasil Slavov 1 A STUDY OF GOSSIP ALGORITHMS FOR INTERNET-SCALE CARDINALITY ESTIMATION OF DISTRIBUTED XML DATA Vasil G. Slavov Computer Science & Electrical Engineering University of

More information

Robust Aggregation Protocols for Large-Scale Overlay Networks

Robust Aggregation Protocols for Large-Scale Overlay Networks Robust Aggregation Protocols for Large-Scale Overlay Networks Alberto Montresor Dept. of Computer Science University of Bologna, Italy montreso@cs.unibo.it Márk Jelasity Dept. of Computer Science University

More information

Dynamo. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Motivation System Architecture Evaluation

Dynamo. Smruti R. Sarangi. Department of Computer Science Indian Institute of Technology New Delhi, India. Motivation System Architecture Evaluation Dynamo Smruti R. Sarangi Department of Computer Science Indian Institute of Technology New Delhi, India Smruti R. Sarangi Leader Election 1/20 Outline Motivation 1 Motivation 2 3 Smruti R. Sarangi Leader

More information

A Robust and Scalable Peer-to-Peer Gossiping Protocol

A Robust and Scalable Peer-to-Peer Gossiping Protocol A Robust and Scalable Peer-to-Peer Gossiping Protocol Spyros Voulgaris 1, Márk Jelasity 2, and Maarten van Steen 1 1 Department Computer Science, Faculty of Sciences, Vrije Universiteit Amsterdam, The

More information

Modeling of Complex Social. MATH 800 Fall 2011

Modeling of Complex Social. MATH 800 Fall 2011 Modeling of Complex Social Systems MATH 800 Fall 2011 Complex SocialSystems A systemis a set of elements and relationships A complex system is a system whose behavior cannot be easily or intuitively predicted

More information

T-Man: Gossip-Based Overlay Topology Management

T-Man: Gossip-Based Overlay Topology Management T-Man: Gossip-Based Overlay Topology Management Márk Jelasity and Ozalp Babaoglu University of Bologna, Dipartimento di Scienze dell Informazione, Mura Anteo Zamboni 7, 4026 Bologna, Italy {jelasity, babaoglu}@cs.unibo.it

More information

An Approach to Massively Distributed Aggregate Computing on Peer-to-Peer Networks

An Approach to Massively Distributed Aggregate Computing on Peer-to-Peer Networks An Approach to Massively Distributed Aggregate Computing on Peer-to-Peer Networks Márk Jelasity University of Bologna, Italy, and RGAI, University of Szeged, Hungary jelasity@cs.vu.nl Wojtek Kowalczyk

More information

T-Man: Gossip-based Overlay Topology Management

T-Man: Gossip-based Overlay Topology Management T-Man: Gossip-based Overlay Topology Management Márk Jelasity and Ozalp Babaoglu University of Bologna, Dipartimento di Scienze dell Informazione Mura Anteo Zamboni 7, 4026 Bologna, Italy jelasity,babaoglu@cs.unibo.it

More information

Symmetric Push-Sum Protocol for Decentralised Aggregation

Symmetric Push-Sum Protocol for Decentralised Aggregation Symmetric Push-Sum Protocol for Decentralised Aggregation Francesco Blasa, Simone Cafiero, Giancarlo Fortino, Department of Electronics, Informatics and Systems University of Calabria, 87036 Rende (CS),

More information

Randomized Rumor Spreading in Social Networks

Randomized Rumor Spreading in Social Networks Randomized Rumor Spreading in Social Networks Benjamin Doerr (MPI Informatics / Saarland U) Summary: We study how fast rumors spread in social networks. For the preferential attachment network model and

More information

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II ECS 289 / MAE 298, Lecture 15 Mar 2, 2011 Diffusion, Cascades and Influence, Part II Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic

More information

Cassandra - A Decentralized Structured Storage System. Avinash Lakshman and Prashant Malik Facebook

Cassandra - A Decentralized Structured Storage System. Avinash Lakshman and Prashant Malik Facebook Cassandra - A Decentralized Structured Storage System Avinash Lakshman and Prashant Malik Facebook Agenda Outline Data Model System Architecture Implementation Experiments Outline Extension of Bigtable

More information

Intuitive distributed algorithms. with F#

Intuitive distributed algorithms. with F# Intuitive distributed algorithms with F# Natallia Dzenisenka Alena Hall @nata_dzen @lenadroid A tour of a variety of intuitivedistributed algorithms used in practical distributed systems. and how to prototype

More information

The peer-to-peer (P2P) computing model

The peer-to-peer (P2P) computing model RESEARCH FEATURE Epidemic Information Dissemination in Distributed Systems Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating

More information

CS505: Distributed Systems

CS505: Distributed Systems Cristina Nita-Rotaru CS505: Distributed Systems Protocols. Slides prepared based on material by Prof. Ken Birman at Cornell University, available at http://www.cs.cornell.edu/ken/book/ Required reading

More information

Gossiping in Distributed Systems

Gossiping in Distributed Systems Gossiping in Distributed Systems Anne-Marie Kermarrec INRIA, Rennes, France Anne-Marie.Kermarrec@irisa.fr Maarten van Steen Vrije Universiteit Amsterdam, Netherlands steen@cs.vu.nl ABSTRACT Gossip-based

More information

Gossip Based Information Dissemination in a Distributed System

Gossip Based Information Dissemination in a Distributed System 5 Gossip Based Information Dissemination in a Distributed System 1 Navaraj Chettri, 2 Dhruba Ningombam 1, 2 Computer Science & Engineering, Sikkim Manipal Institute of Technology Gantok, India Abstract-

More information

AGENT-BASED MODELING BOOTCAMP FOR HEALTH RESEARCHERS AUGUST 2012 A SIMPLE NETWORK-BASED INFECTION SPREAD AGENT-BASED MODEL

AGENT-BASED MODELING BOOTCAMP FOR HEALTH RESEARCHERS AUGUST 2012 A SIMPLE NETWORK-BASED INFECTION SPREAD AGENT-BASED MODEL Rating: Basic Prerequisites: Building a Minimalist Network-Based Model Framework Estimated Time Required: 1 hour This exercise rehearses basic steps that can be used to create a model of infection spread..

More information

Mean-Field Analysis for the Evaluation of Gossip Protocols

Mean-Field Analysis for the Evaluation of Gossip Protocols Mean-Field Analysis for the Evaluation of Gossip Protocols Rena Bakhshi 1 Lucia Cloth 2 Wan Fokkink 1 Boudewijn R. Haverkort 2 1 Department of Computer Science Vrije Universiteit Amsterdam Amsterdam, Netherlands

More information

Self- Properties through Gossiping

Self- Properties through Gossiping Self- Properties through Gossiping By Ozalp Babaoglu 1 and Márk Jelasity 2 1 University of Bologna, Mura Anteo Zamboni 7, I-40126 Bologna, Italy 2 University of Szeged and HAS, P.O. Box 652, H-6701 Szeged,

More information

Graph Exploitation Testbed

Graph Exploitation Testbed Graph Exploitation Testbed Peter Jones and Eric Robinson Graph Exploitation Symposium April 18, 2012 This work was sponsored by the Office of Naval Research under Air Force Contract FA8721-05-C-0002. Opinions,

More information

Ant-Inspired Dynamic Task Allocation via Gossiping

Ant-Inspired Dynamic Task Allocation via Gossiping Ant-Inspired Dynamic Task Allocation via Gossiping Hsin-Hao Su MIT Lili Su UIUC Anna Dornhaus University of Arizona Nancy Lynch MIT May 7, 2017 Abstract We study the distributed task allocation problem

More information

SCALABLE CONSISTENCY AND TRANSACTION MODELS

SCALABLE CONSISTENCY AND TRANSACTION MODELS Data Management in the Cloud SCALABLE CONSISTENCY AND TRANSACTION MODELS 69 Brewer s Conjecture Three properties that are desirable and expected from realworld shared-data systems C: data consistency A:

More information

Being Prepared In A Sparse World: The Case of KNN Graph Construction. Antoine Boutet DRIM LIRIS, Lyon

Being Prepared In A Sparse World: The Case of KNN Graph Construction. Antoine Boutet DRIM LIRIS, Lyon Being Prepared In A Sparse World: The Case of KNN Graph Construction Antoine Boutet DRIM LIRIS, Lyon Co-authors Joint work with François Taiani Nupur Mittal Anne-Marie Kermarrec Published at ICDE 2016

More information

Scheduling of Multi-Stream Gossip Systems

Scheduling of Multi-Stream Gossip Systems Scheduling of Multi-Stream Gossip Systems Nathanael Thompson, Ercan Ucan and Indranil Gupta Dept. of Computer Science, University of Illinois at Urbana-Champaign Email: {nathomps,eucan2,indy}@cs.uiuc.edu

More information

Simple, Fast and Deterministic Gossip and Rumor Spreading. Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH

Simple, Fast and Deterministic Gossip and Rumor Spreading. Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH Simple, Fast and Deterministic Gossip and Rumor Spreading Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH Presentation Outline What is gossip? Applications Basic Algorithms Advanced Algorithms

More information

Peer-to-peer Sender Authentication for . Vivek Pathak and Liviu Iftode Rutgers University

Peer-to-peer Sender Authentication for  . Vivek Pathak and Liviu Iftode Rutgers University Peer-to-peer Sender Authentication for Email Vivek Pathak and Liviu Iftode Rutgers University Email Trustworthiness Sender can be spoofed Need for Sender Authentication Importance depends on sender Update

More information

Probabilistic Analysis of Message Forwarding

Probabilistic Analysis of Message Forwarding Probabilistic Analysis of Message Forwarding Louise E. Moser and P. M. Melliar-Smith Department of Electrical and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93106 USA

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

Middleware-Konzepte. Multicast. Dr. Gero Mühl

Middleware-Konzepte. Multicast. Dr. Gero Mühl Middleware-Konzepte Multicast Dr. Gero Mühl Kommunikations- und Betriebssysteme Fakultät für Elektrotechnik und Informatik Technische Universität Berlin Agenda > Introduction > IPv4 Multicast > Reliability

More information

On Collaborative Content Distribution using Multi-Message Gossip

On Collaborative Content Distribution using Multi-Message Gossip On Collaborative Content Distribution using Multi-Message Gossip Coby Fernandess Dahlia Malkhi Abstract We study epidemic schemes in the context of collaborative data delivery. In this context, multiple

More information

Replication & Consistency Part II. CS403/534 Distributed Systems Erkay Savas Sabanci University

Replication & Consistency Part II. CS403/534 Distributed Systems Erkay Savas Sabanci University Replication & Consistency Part II CS403/534 Distributed Systems Erkay Savas Sabanci University 1 Overview Implementation issues Replica Placement Update Propagation Epidemic Protocols Casually Consistent

More information

Heterogeneous Gossip. Davide Frey Rachid Guerraoui Anne-Marie Kermarrec Boris Koldehofe Maxime Monod Martin Mogensen Vivien Quéma

Heterogeneous Gossip. Davide Frey Rachid Guerraoui Anne-Marie Kermarrec Boris Koldehofe Maxime Monod Martin Mogensen Vivien Quéma Heterogeneous Gossip Davide Frey Rachid Guerraoui Anne-Marie Kermarrec Boris Koldehofe Maxime Monod Martin Mogensen Vivien Quéma Outline Context Live Streaming Gossip Limitations Heterogeneous Gossip Protocol

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu Setting from the last class: AB-A : gets a AB-B : gets b AB-AB : gets max(a, b) Also: Cost

More information

Replica Placement. Replica Placement

Replica Placement. Replica Placement Replica Placement Model: We consider objects (and don t worry whether they contain just data or code, or both) Distinguish different processes: A process is capable of hosting a replica of an object or

More information

Parallelism. Master 1 International. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique

Parallelism. Master 1 International. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique Parallelism Master 1 International Andrea G. B. Tettamanzi Université de Nice Sophia Antipolis Département Informatique andrea.tettamanzi@unice.fr Andrea G. B. Tettamanzi, 2014 1 Lecture 2 Communication

More information

Important Lessons. Today's Lecture. Two Views of Distributed Systems

Important Lessons. Today's Lecture. Two Views of Distributed Systems Important Lessons Replication good for performance/ reliability Key challenge keeping replicas up-to-date Wide range of consistency models Will see more next lecture Range of correctness properties L-10

More information

File Di usion in a Dynamic Peer-to-peer Network

File Di usion in a Dynamic Peer-to-peer Network MSND 2012 - April 16th 2012 Université Pierre et Marie Curie - LIP6 CNRS Context Di usion in epidemiology: virus spreading SI (Susceptible / Infected) model, SIR, SIS,... Application to other areas: information

More information

Models and Algorithms for Network Immunization

Models and Algorithms for Network Immunization Models and Algorithms for Network Immunization George Giakkoupis University of Toronto Aristides Gionis, Evimaria Terzi and Panayiotis Tsaparas University of Helsinki Abstract Recently, there has been

More information

Gossiping meets Cloud Computing

Gossiping meets Cloud Computing Outline Gossiping meets Cloud Computing Ozalp Babaoglu Department of Computer Science University of Bologna I will address the following in the context of cloud computing: Achieving full decentralization

More information

CSE 544 Principles of Database Management Systems. Magdalena Balazinska Winter 2015 Lecture 14 NoSQL

CSE 544 Principles of Database Management Systems. Magdalena Balazinska Winter 2015 Lecture 14 NoSQL CSE 544 Principles of Database Management Systems Magdalena Balazinska Winter 2015 Lecture 14 NoSQL References Scalable SQL and NoSQL Data Stores, Rick Cattell, SIGMOD Record, December 2010 (Vol. 39, No.

More information

The coupling effect on VRTP of SIR epidemics in Scale- Free Networks

The coupling effect on VRTP of SIR epidemics in Scale- Free Networks The coupling effect on VRTP of SIR epidemics in Scale- Free Networks Kiseong Kim iames@kaist.ac.kr Sangyeon Lee lsy5518@kaist.ac.kr Kwang-Hyung Lee* khlee@kaist.ac.kr Doheon Lee* dhlee@kaist.ac.kr ABSTRACT

More information

Guide- Using GLEAMviz

Guide- Using GLEAMviz Guide- Using GLEAMviz Introduction At first glance, the GLEAMviz program may seem a bit daunting for the first-time user. This guide is meant to help you through the process of installation and set-up

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 7, JULY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 7, JULY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 7, JULY 2008 2997 Fast Distributed Algorithms for Computing Separable Functions Damon Mosk-Aoyama and Devavrat Shah, Member, IEEE Abstract The problem

More information

Architekturen für die Cloud

Architekturen für die Cloud Architekturen für die Cloud Eberhard Wolff Architecture & Technology Manager adesso AG 08.06.11 What is Cloud? National Institute for Standards and Technology (NIST) Definition On-demand self-service >

More information

Eventual Consistency 1

Eventual Consistency 1 Eventual Consistency 1 Readings Werner Vogels ACM Queue paper http://queue.acm.org/detail.cfm?id=1466448 Dynamo paper http://www.allthingsdistributed.com/files/ amazon-dynamo-sosp2007.pdf Apache Cassandra

More information

CMU SCS CMU SCS Who: What: When: Where: Why: CMU SCS

CMU SCS CMU SCS Who: What: When: Where: Why: CMU SCS Carnegie Mellon Univ. Dept. of Computer Science 15-415/615 - DB s C. Faloutsos A. Pavlo Lecture#23: Distributed Database Systems (R&G ch. 22) Administrivia Final Exam Who: You What: R&G Chapters 15-22

More information

Simulating the Diffusion of Information: An Agent-based Modeling Approach

Simulating the Diffusion of Information: An Agent-based Modeling Approach Simulating the Diffusion of Information: An Agent-based Modeling Approach Cindy Hui, Mark Goldberg, Malik Magdon-Ismail, William A. Wallace Rensselaer Polytechnic Institute, Troy, NY, USA ABSTRACT Diffusion

More information

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang 1 The Coral Project: Defending against Large-scale Attacks on the Internet Chenxi Wang chenxi@cmu.edu http://www.ece.cmu.edu/coral.html The Motivation 2 Computer viruses and worms are a prevalent threat

More information

Distributed Data Management Replication

Distributed Data Management Replication Felix Naumann F-2.03/F-2.04, Campus II Hasso Plattner Institut Distributing Data Motivation Scalability (Elasticity) If data volume, processing, or access exhausts one machine, you might want to spread

More information

Self- properties through gossiping

Self- properties through gossiping 366, 3747 3757 doi:10.1098/rsta.2008.0122 Published online 31 July 2008 Self- properties through gossiping BY OZALP BABAOGLU 1, * AND MÁRK JELASITY 2 1 University of Bologna, Mura Anteo Zamboni 7, 40126

More information

A P2P REcommender system based on Gossip Overlays (PREGO)

A P2P REcommender system based on Gossip Overlays (PREGO) 10 th IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY Bradford,UK, 29 June - 1 July, 2010 Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini ISTI,CNR, Pisa,Italy Laura Ricci University

More information

Complex Networks: Ubiquity, Importance and Implications. Alessandro Vespignani

Complex Networks: Ubiquity, Importance and Implications. Alessandro Vespignani Contribution : 2005 NAE Frontiers of Engineering Complex Networks: Ubiquity, Importance and Implications Alessandro Vespignani School of Informatics and Department of Physics, Indiana University, USA 1

More information

arxiv: v2 [physics.soc-ph] 24 Dec 2018

arxiv: v2 [physics.soc-ph] 24 Dec 2018 Impact of origin-destination information in epidemic spreading Sergio Gómez,*, Alberto Fernández 2, Sandro Meloni 3,4, and Alex Arenas arxiv:804.0258v2 [physics.soc-ph] 24 Dec 208 Dept. Enginyeria Informàtica

More information

CAP Theorem, BASE & DynamoDB

CAP Theorem, BASE & DynamoDB Indian Institute of Science Bangalore, India भ रत य व ज ञ न स स थ न ब गल र, भ रत DS256:Jan18 (3:1) Department of Computational and Data Sciences CAP Theorem, BASE & DynamoDB Yogesh Simmhan Yogesh Simmhan

More information

Erasure Coding in Object Stores: Challenges and Opportunities

Erasure Coding in Object Stores: Challenges and Opportunities Erasure Coding in Object Stores: Challenges and Opportunities Lewis Tseng Boston College July 2018, PODC Acknowledgements Nancy Lynch Muriel Medard Kishori Konwar Prakash Narayana Moorthy Viveck R. Cadambe

More information

Code-Partitioning Gossip

Code-Partitioning Gossip Code-Partitioning Gossip Lonnie Princehouse Dept. of Computer Science Cornell University lonnie@cs.cornell.edu Ken Birman Dept. of Computer Science Cornell University ken@cs.cornell.edu ABSTRACT Code-Partitioning

More information

Example 3: Viral Marketing and the vaccination policy problem

Example 3: Viral Marketing and the vaccination policy problem Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 2: Jan 19, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 3: Viral Marketing and the vaccination policy problem Diffusion

More information

FAQs Snapshots and locks Vector Clock

FAQs Snapshots and locks Vector Clock //08 CS5 Introduction to Big - FALL 08 W.B.0.0 CS5 Introduction to Big //08 CS5 Introduction to Big - FALL 08 W.B. FAQs Snapshots and locks Vector Clock PART. LARGE SCALE DATA STORAGE SYSTEMS NO SQL DATA

More information

A Super-Peer Selection Strategy for Peer-to-Peer Systems

A Super-Peer Selection Strategy for Peer-to-Peer Systems , pp.25-29 http://dx.doi.org/10.14257/astl.2016.125.05 A Super-Peer Selection Strategy for Peer-to-Peer Systems Won-Ho Chung 1 1 Department of Digital Media, Duksung Womens University whchung@duksung.ac.kr

More information

Available online at ScienceDirect. Procedia Computer Science 78 (2016 )

Available online at  ScienceDirect. Procedia Computer Science 78 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 (2016 ) 595 602 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur,

More information

The push&pull protocol for rumour spreading

The push&pull protocol for rumour spreading The push&pull protocol for rumour spreading Abbas Mehrabian Simons Institute for Theory of Computing, UC Berkeley University of Waterloo 10 February 2017 Co-authors Huseyin Acan Omer Angel Petra Berenbrink

More information

Final Exam Logistics. CS 133: Databases. Goals for Today. Some References Used. Final exam take-home. Same resources as midterm

Final Exam Logistics. CS 133: Databases. Goals for Today. Some References Used. Final exam take-home. Same resources as midterm Final Exam Logistics CS 133: Databases Fall 2018 Lec 25 12/06 NoSQL Final exam take-home Available: Friday December 14 th, 4:00pm in Olin Due: Monday December 17 th, 5:15pm Same resources as midterm Except

More information

Theory and Applications of Complex Networks

Theory and Applications of Complex Networks Theory and Applications of Complex Networks 1 Theory and Applications of Complex Networks Class One College of the Atlantic David P. Feldman 12 September 2008 http://hornacek.coa.edu/dave/ 1. What is a

More information

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm

How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, :00 pm 1 Introduction How Infections Spread on Networks CS 523: Complex Adaptive Systems Assignment 4: Due Dec. 2, 2015 5:00 pm In this assignment you will investigate the spread of disease on networks. In class

More information