Cloudy Weather for P2P

Size: px
Start display at page:

Download "Cloudy Weather for P2P"

Transcription

1 Cloudy Weather for P2P with a Chance of Gossip Alberto Montresor Luca Abeni Best paper award in P2P'11 Presented by: amir@sics.se 1

2 Introduction 2

3 Cloud Computing vs. P2P Similarity: Providing the infinite availability of computing and storage resources. Difference: The cloud provides highly available resources, but at a cost. P2P resources are for free, but their availability is shaky. 3

4 Cloud Computing vs. P2P P2P 1/Cost Availability Cloud 4

5 Related Work Several projects have tried to mix the two to get the advantages of both: high availability and low cost. First approach: adding peers to an existing centralized solution. Off loading the services to peers, if does not affect service availability. Second approach: augmenting P2P systems with cloud angels. Adding elastic computing nodes with the specific task of satisfying requirements beyond the reach of a P2P network. 5

6 Third Approach: The Paper Contribution Cloudcast The target application: content distribution. All functionalities of the content distribution application are supported by a passive storage service such: Topology bootstrap and membership management. Information dissemination. No active elastic computing instances are required. 6

7 The Costs Storage and bandwidth costs. To preserve the durability, the storage consumption cannot be reduced. So, let's focus on the bandwidth cost. How? 7

8 How? Cloudcast is based on two gossip protocols: Topology bootstrap and membership management. Information dissemination. How: keep the number of cloud accesses 1 per gossip cycle, independently of the number of clients. 8

9 Background 9

10 Information Dissemination Epidemic protocols a classical solution Nodes gossip about news in random fashion: Rumor mongering: to quickly push the rumors toward on line nodes. Anti entropy: to make sure that everybody gets all the news (push pull). Epidemic protocols require a list of nodes forming the network. Where do we get it from? Peer sampling. 10

11 Peer Sampling Peer sampling service provides each peer with continuously up to date random samples of the entire population of peers. Such samples fulfil two purposes: Used by the epidemic broadcast service to obtain random peers. Maintain a random topology connecting all peers. Information Dissemination get random peer Peer Sampling 11

12 A Generic Gossip Protocol A generic gossip protocol executed by node p. Active thread do once every δ time units q = getpeer(state) Sp = preparemsg(state, q) send(req, Sp) to q Passive thread do forever receive(t, Sq) from * if (t = REQ) then Sp = preparemsg(state, q) send(rep, Sp) to q state = update(state, Sq) 12

13 Cyclon State at each node: A partial view containing c neighbour descriptors (c = view size). Node descriptor: address + timestamp (age) getpeer() select the oldest descriptor in the view remove it from the view preparemsg(view, q) active thread: returns a subset of t 1 random nodes, plus a fresh local identifier of itself passive thread: returns a subset of t random nodes update(view, Sq) discard entries in Sq that p already knows add Sq, removing entries sent to q 13

14 Cyclon Peer Sampling Protocol (1/7) n2 n9 1 n5 n4 14

15 Cyclon Peer Sampling Protocol (2/7) n9 n5 1 n2 n5 n4 15

16 Cyclon Peer Sampling Protocol (3/7) n9 n5 1 1 shuffle request n2 n5 n4 16

17 Cyclon Peer Sampling Protocol (4/7) n9 1 shuffle response 1 n2 n5 n4 17

18 Cyclon Peer Sampling Protocol (5/7) n9 1 shuffle response 1 n2 n5 n4 18

19 Cyclon Peer Sampling Protocol (6/7) n9 Update State 1 shuffle response 1 Update State n2 n5 n4 19

20 Cyclon Peer Sampling Protocol (7/7) n2 n9 1 1 n5 n4 20

21 Cloudcast 21

22 Cloudcast Architecture The cloud join the group so there will be always one member. 22

23 Storage Clouds vs. Epidemic Protocols Reducing the number of accesses to the cloud is one of the most important requirements in Cloudcast. Cyclon ensures that the in degree of each peer p tends to stay around c (view size). If number of nodes n > c, the cloud in degree is c and if n < c, then cloud in degree is n. Proving that Cloudcast scales down as well. 23

24 Cloudcast Peer Sampling Cloud is a passive key/value storage, and can not perform computation. Active thread do once every δ time units q = getpeer(state) if (q is cloud) then send(get, VIEW) else Sp = preparemsg(state, q) send(req, Sp) to q Passive thread do forever receive(t, Sq) from * if (t = VIEW) then Sp = emulaterequestmsg() Sq = emulatereplymsg() V = emulateview(sp) send(put, VIEW, V) to q else if (t = REQ) then Sp = preparemsg(state, q) send(rep, Sp) to q State = update(state, Sq) 24

25 Cloudcast Peer Sampling Protocol (1/9) n9 C 1 C 25

26 Cloudcast Peer Sampling Protocol (2/9) n9 C 1 Get(VIEW) C 26

27 Cloudcast Peer Sampling Protocol (3/9) n9 C 1 Reply C 27

28 Cloudcast Peer Sampling Protocol (4/9) n9 C 1 C 28

29 Cloudcast Peer Sampling Protocol (5/9) n9 C 1 Emulate request/reply C 29

30 Cloudcast Peer Sampling Protocol (6/9) request reply n9 C 1 1 Emulate request/reply C 30

31 Cloudcast Peer Sampling Protocol (7/9) n9 C 1 1 Update views C 31

32 Cloudcast Peer Sampling Protocol (8/9) n9 C 1 1 Put(VIEW, V) C 32

33 Cloudcast Peer Sampling Protocol (9/9) n9 C 1 1 C 33

34 Keep or Remove the Cloud Descriptor? n9 C 1 Keep or remove the Cloud descriptor? 1 C 34

35 When to add the Cloud Descriptor? Cloud objects have last modified information. When contacting a cloud: If last modified is too close in time (¼ cycle), too many cloud references do not maintain the cloud reference. If last modified is too far in time (4 cycles), too few cloud reference maintain the cloud reference and create a new one. 35

36 Cloudcast Bootstraping The new node performs a GET operation and retrieve a first view It can be later used to start the normal Cyclon protocol. If the view retrieved from the cloud is smaller than c, this means that n < c, and a cloud descriptor is added. 36

37 Cloudcast Information Dissemination The creator of a new message Write the message in the cloud. Update a message counter in the cloud. Starts a rumor mongering broadcasting on the new message. Rumor mongering (push) Every node sends the hot rumor to a random peer. Stops forwarding the rumor with a given probability (0.2). Anti entropy (push pull) Less frequently, node exchange summaries of the message received so far and download missing ones if needed. 37

38 Experiments 38

39 Simulation based on the Peersim. Experiments 39

40 Simulation based on the Peersim. Experiments Different levels of churn Different levels of message loss 40

41 Conclusion 41

42 Conclusion This paper shows a novel approach that mix the dependability of cloud computing with the low cost of P2P networks. Many open questions: There is obviously an unbalance between peer sampling and message diffusion. Avoiding so many GET/PUT requests. Make the system more adaptive if the groups grows, the cloud is used less and less (just to guarantee durability). 42

43 Question? Acknowledgement Some slides were derived from the slides of Alberto Montresor (University of Trento, Italy) 43

Cloudy Weather for P2P, with a Chance of Gossip

Cloudy Weather for P2P, with a Chance of Gossip Cloudy Weather for P2P, with a Chance of Gossip Alberto Montresor University of Trento, Italy alberto.montresor@unitn.it Luca Abeni University of Trento, Italy luca.abeni@unitn.it Abstract Peer-to-peer

More information

Fast Topology Management in Large Overlay Networks

Fast Topology Management in Large Overlay Networks Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology

More information

Gossip Based Information Dissemination in a Distributed System

Gossip Based Information Dissemination in a Distributed System 5 Gossip Based Information Dissemination in a Distributed System 1 Navaraj Chettri, 2 Dhruba Ningombam 1, 2 Computer Science & Engineering, Sikkim Manipal Institute of Technology Gantok, India Abstract-

More information

Block lectures on Gossip-based protocols

Block lectures on Gossip-based protocols Block lectures on Gossip-based protocols Lecture 1: dissemination, randomness and aggregation Dr. Etienne Rivière University of Neuchâtel Etienne.Riviere@unine.ch Lectures funded by the EU commission as

More information

Last Class: Web Caching. Today: More on Consistency

Last Class: Web Caching. Today: More on Consistency Last Class: Web Caching Use web caching as an illustrative example Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 16, page 1 Today: More on Consistency

More information

Lightweight Gossip-based Distribution Estimation

Lightweight Gossip-based Distribution Estimation Lightweight Gossip-based Distribution Estimation Amir H. Payberah, Hanna Kavalionak, Alberto Montresor, Jim Dowling, Seif Haridi Swedish Institute of Computer Science (SICS) University of Trento, Italy

More information

PeerSim: A Brief Introduction

PeerSim: A Brief Introduction PeerSim: A Brief Introduction Toward simulating gossip protocols Peer To Peer System 2016-2017 Emanuele Carlini - emanuele.carlini@isti.cnr.it Why this lesson? Why this lesson? Why this lesson? Objective:

More information

Gossip and Epidemic Protocols

Gossip and Epidemic Protocols Gossip and Epidemic Protocols Alberto Montresor Abstract A gossip protocol is a distributed communication paradigm inspired by the gossip phenomenon that can be observed in social networks. Initially born

More information

Gossiping in Distributed Systems Foundations

Gossiping in Distributed Systems Foundations Gossiping in Distributed Systems Foundations Maarten van Steen 2 of 41 2 of 41 Introduction Observation: We continue to face hard scalability problems in distributed systems: Systems continue to grow in

More information

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary Gossip Protocols Márk Jelasity Hungarian Academy of Sciences and University of Szeged, Hungary Introduction Gossip-like phenomena are commonplace human gossip epidemics (virus spreading, etc) computer

More information

Consistency and Replication. Why replicate?

Consistency and Replication. Why replicate? Consistency and Replication Today: Consistency models Data-centric consistency models Client-centric consistency models Lecture 15, page 1 Why replicate? Data replication versus compute replication Data

More information

INF5040 (Open Distributed Systems)

INF5040 (Open Distributed Systems) INF5040 (Open Distributed Systems) Lucas Provensi (provensi@ifi.uio.no) Department of Informatics University of Oslo November 12, 2012 An application-level network on top of the Internet (overlay network)

More information

Towards a Decentralized Architecture for Optimization

Towards a Decentralized Architecture for Optimization Towards a Decentralized Architecture for Optimization Marco Biazzini, Mauro Brunato and Alberto Montresor University of Trento Dipartimento di Ingegneria e Scienza dell Informazione via Sommarive 1, 381

More information

Kleinberg s Small-World Networks. Normalization constant have to be calculated:

Kleinberg s Small-World Networks. Normalization constant have to be calculated: Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)

More information

Cloud Computing: "network access to shared pool of configurable computing resources"

Cloud Computing: network access to shared pool of configurable computing resources Large-Scale Networks Gossip-based Protocols Consistency for Large-Scale Data Replication Uwe Roehm / Vincent Gramoli School of Information Technologies The University of Sydney Page 1 Cloud Computing:

More information

Simple, Fast and Deterministic Gossip and Rumor Spreading. Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH

Simple, Fast and Deterministic Gossip and Rumor Spreading. Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH Simple, Fast and Deterministic Gossip and Rumor Spreading Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH Presentation Outline What is gossip? Applications Basic Algorithms Advanced Algorithms

More information

T-Man: Gossip-based Fast Overlay Topology Construction

T-Man: Gossip-based Fast Overlay Topology Construction T-Man: Gossip-based Fast Overlay Topology Construction Márk Jelasity University of Szeged, Hungary jelasity@inf.u-szeged.hu Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it Alberto Montresor

More information

Constructing Overlay Networks through Gossip

Constructing Overlay Networks through Gossip Constructing Overlay Networks through Gossip Márk Jelasity Università di Bologna Project funded by the Future and Emerging Technologies arm of the IST Programme The Four Main Theses 1: Topology (network

More information

T-Man: Gossip-based Fast Overlay Topology Construction

T-Man: Gossip-based Fast Overlay Topology Construction T-Man: Gossip-based Fast Overlay Topology Construction Márk Jelasity University of Szeged, Hungary jelasity@inf.u-szeged.hu Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it Alberto Montresor

More information

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy are possible. In push mode, P pushes its database to

More information

A P2P REcommender system based on Gossip Overlays (PREGO)

A P2P REcommender system based on Gossip Overlays (PREGO) 10 th IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY Bradford,UK, 29 June - 1 July, 2010 Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini ISTI,CNR, Pisa,Italy Laura Ricci University

More information

Gozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal

Gozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal Gozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal Amir H. Payberah Jim Dowling Seif Haridi {amir,jdowling,seif}@sics.se 1 Introduction 2 Gossip based Peer Sampling Service Gossip

More information

Computing Parable. The Archery Teacher. Courtesy: S. Keshav, U. Waterloo. Computer Science. Lecture 16, page 1

Computing Parable. The Archery Teacher. Courtesy: S. Keshav, U. Waterloo. Computer Science. Lecture 16, page 1 Computing Parable The Archery Teacher Courtesy: S. Keshav, U. Waterloo Lecture 16, page 1 Consistency and Replication Today: Consistency models Data-centric consistency models Client-centric consistency

More information

T-Man: Gossip-based Fast Overlay Topology Construction

T-Man: Gossip-based Fast Overlay Topology Construction T-Man: Gossip-based Fast Overlay Topology Construction Márk Jelasity Research Group on AI, University of Szeged and HAS, PO Box 652, H-6701 Szeged, Hungary Alberto Montresor University of Trento, Italy

More information

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a

Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy are possible. In push mode, P pushes its database to

More information

Replica Placement. Replica Placement

Replica Placement. Replica Placement Replica Placement Model: We consider objects (and don t worry whether they contain just data or code, or both) Distinguish different processes: A process is capable of hosting a replica of an object or

More information

Simulating overlay networks with PeerSim. Acknowledgements. Outline. Introduction: P2P Systems

Simulating overlay networks with PeerSim. Acknowledgements. Outline. Introduction: P2P Systems Simulating overlay networks with PeerSim Moreno Marzolla Dipartimento di Informatica Scienza e Ingegneria Università di Bologna http://www.moreno.marzolla.name/ Acknowledgements These slides are based

More information

CS 425 / ECE 428 Distributed Systems Fall 2015

CS 425 / ECE 428 Distributed Systems Fall 2015 CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Sep 24, 2015 Lecture 10: Gossiping All slides IG Multicast Fault-tolerance and Scalability Needs: 1. Reliability (Atomicity) 100% receipt

More information

Gossip-based Networking for Internet-Scale Distributed Systems

Gossip-based Networking for Internet-Scale Distributed Systems Gossip-based Networking for Internet-Scale Distributed Systems Etienne Rivière 1 and Spyros Voulgaris 2 1 Computer Science Department, Université de Neuchâtel, Switzerland. 2 Vrije Universiteit Amsterdam,

More information

Networking Seminar Stanford University. Madan Jampani 3/12/2015

Networking Seminar Stanford University. Madan Jampani 3/12/2015 Networking Seminar Stanford University Madan Jampani 3/12/2015 Can SDN control plane scale without sacrificing abstractions and performance? Control Plane Data Plane Simple yet powerful abstraction Global

More information

Eventual Consistency. Eventual Consistency

Eventual Consistency. Eventual Consistency Eventual Consistency Many systems: one or few processes perform updates How frequently should these updates be made available to other read-only processes? Examples: DNS: single naming authority per domain

More information

Cassandra - A Decentralized Structured Storage System. Avinash Lakshman and Prashant Malik Facebook

Cassandra - A Decentralized Structured Storage System. Avinash Lakshman and Prashant Malik Facebook Cassandra - A Decentralized Structured Storage System Avinash Lakshman and Prashant Malik Facebook Agenda Outline Data Model System Architecture Implementation Experiments Outline Extension of Bigtable

More information

Shuffling with a Croupier: Nat Aware Peer Sampling

Shuffling with a Croupier: Nat Aware Peer Sampling Shuffling with a Croupier: Nat Aware Peer Sampling Jim Dowling Amir H. Payberah {jdowling,amir}@sics.se 1 Introduction 2 Gossip based Protocols Gossip based protocols have been widely used in large scale

More information

Consistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary

Consistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Consistency and Replication Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Reasons for Replication Reliability/Availability : Mask failures Mask corrupted data Performance: Scalability

More information

DIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1

DIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1 DIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1 Jin Sun and Byung K. Choi Departments of Computer Science Michigan Technological University, Houghton, MI, USA 49931 {jinsun, bkchoi}@mtu.edu

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks

More information

Distributed Systems: Consistency and Replication

Distributed Systems: Consistency and Replication Distributed Systems: Consistency and Replication Alessandro Sivieri Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico, Italy alessandro.sivieri@polimi.it http://corsi.dei.polimi.it/distsys

More information

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary

Gossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary Gossip Protocols Márk Jelasity Hungarian Academy of Sciences and University of Szeged, Hungary Introduction Gossip-like phenomena are commonplace human gossip epidemics (virus spreading, etc) computer

More information

SSSim: a Simple and Scalable Simulator for P2P Streaming Systems

SSSim: a Simple and Scalable Simulator for P2P Streaming Systems SSSim: a Simple and Scalable Simulator for P2P Streaming Systems Luca Abeni, Csaba Kiraly, Renato Lo Cigno DISI University of Trento, Italy {Luca.Abeni;Csaba.Kiraly;Renato.LoCigno}@unitn.it Abstract This

More information

GLive: The Gradient overlay as a market maker for mesh based P2P live streaming

GLive: The Gradient overlay as a market maker for mesh based P2P live streaming GLive: The Gradient overlay as a market maker for mesh based P2P live streaming Amir H. Payberah Jim Dowling Seif Haridi {amir, jdowling, seif}@sics.se 1 Introduction 2 Media Streaming Media streaming

More information

A POTPOURRI OF DISTRIBUTED COMPUTING RESEARCHES. Patrizio Dazzi. lunedì 25 giugno 12

A POTPOURRI OF DISTRIBUTED COMPUTING RESEARCHES. Patrizio Dazzi. lunedì 25 giugno 12 A POTPOURRI OF DISTRIBUTED COMPUTING RESEARCHES Patrizio Dazzi WHAT DOES DISTRIBUTED MEANS? comes from the latin verb distribuere: dis apart tribuere assign WHAT DOES DISTRIBUTED MEANS? comes from the

More information

CSE 486/586 Distributed Systems

CSE 486/586 Distributed Systems CSE 486/586 Distributed Systems Mutual Exclusion Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Recap: Consensus On a synchronous system There s an algorithm that works. On

More information

G Bayou: A Weakly Connected Replicated Storage System. Robert Grimm New York University

G Bayou: A Weakly Connected Replicated Storage System. Robert Grimm New York University G22.3250-001 Bayou: A Weakly Connected Replicated Storage System Robert Grimm New York University Altogether Now: The Three Questions! What is the problem?! What is new or different?! What are the contributions

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

On Improving the Performance of Cache Invalidation in Mobile Environments

On Improving the Performance of Cache Invalidation in Mobile Environments Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO

More information

Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks

Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh, Senior Member IEEE Department of Electrical Engineering, IIT, Kanpur {rgupta, abhicm,

More information

BUFFER management is a significant component

BUFFER management is a significant component 1 Stepwise Fair-Share Buffering for Gossip-Based Peer-to-Peer Data Dissemination Oznur Ozkasap, Mine Caglar, Emrah Cem, Emrah Ahi, and Emre Iskender Abstract We consider buffer management in support of

More information

Distributed Algorithms Models

Distributed Algorithms Models Distributed Algorithms Models Alberto Montresor University of Trento, Italy 2016/04/26 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Contents 1 Taxonomy

More information

Peer-to-Peer Signalling. Agenda

Peer-to-Peer Signalling. Agenda Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications

More information

DISTRIBUTED REPUTATION-BASED MECHANISMS FOR TRUST PROPAGATION IN LARGE GROUPS DIONYSIOS KONSTANTINOS KOSTOULAS

DISTRIBUTED REPUTATION-BASED MECHANISMS FOR TRUST PROPAGATION IN LARGE GROUPS DIONYSIOS KONSTANTINOS KOSTOULAS c Copyright by Dionysios Konstantinos Kostoulas, 2005 DISTRIBUTED REPUTATION-BASED MECHANISMS FOR TRUST PROPAGATION IN LARGE GROUPS BY DIONYSIOS KONSTANTINOS KOSTOULAS B.S., University of Patras, 2002

More information

CS 333 Introduction to Operating Systems. Class 14 Page Replacement. Jonathan Walpole Computer Science Portland State University

CS 333 Introduction to Operating Systems. Class 14 Page Replacement. Jonathan Walpole Computer Science Portland State University CS 333 Introduction to Operating Systems Class 14 Page Replacement Jonathan Walpole Computer Science Portland State University Page replacement Assume a normal page table (e.g., BLITZ) User-program is

More information

An Analytical Model of Information Dissemination for a Gossip-based Protocol

An Analytical Model of Information Dissemination for a Gossip-based Protocol An Analytical Model of Information Dissemination for a Gossip-based Protocol Rena Bakhshi, Daniela Gavidia, Wan Fokkink, and Maarten van Steen Department of Computer Science, Vrije Universiteit Amsterdam,

More information

Module 7 - Replication

Module 7 - Replication Module 7 - Replication Replication Why replicate? Reliability Avoid single points of failure Performance Scalability in numbers and geographic area Why not replicate? Replication transparency Consistency

More information

Gossip Peer Sampling in Real World

Gossip Peer Sampling in Real World Gossip Peer Sampling in Real World Amir H. Payberah (amir@sics.se) 1/55 Gossip Peer Sampling 2/55 Peer Sampling Service The peer sampling service provides each node with a list of nodes in the system.

More information

Gossip-Based Dissemination of Time

Gossip-Based Dissemination of Time Warsaw University Faculty of Mathematics, Informatics and Mechanics Vrije Universiteit Amsterdam Faculty of Sciences Konrad Iwanicki Student id. no.: 189391 (WU), 1493817 (VU) Gossip-Based Dissemination

More information

UseNet and Gossip Protocol

UseNet and Gossip Protocol CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network

More information

Intuitive distributed algorithms. with F#

Intuitive distributed algorithms. with F# Intuitive distributed algorithms with F# Natallia Dzenisenka Alena Hall @nata_dzen @lenadroid A tour of a variety of intuitivedistributed algorithms used in practical distributed systems. and how to prototype

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 3/6/2012 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 In many data mining

More information

CS505: Distributed Systems

CS505: Distributed Systems Cristina Nita-Rotaru CS505: Distributed Systems Protocols. Slides prepared based on material by Prof. Ken Birman at Cornell University, available at http://www.cs.cornell.edu/ken/book/ Required reading

More information

Available online at ScienceDirect. Procedia Computer Science 78 (2016 )

Available online at  ScienceDirect. Procedia Computer Science 78 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 (2016 ) 595 602 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur,

More information

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04 Overview of Sensor Network Routing Protocols WeeSan Lee weesan@cs.ucr.edu 11/1/04 Outline Background Data-centric Protocols Flooding & Gossiping SPIN Directed Diffusion Rumor Routing Hierarchical Protocols

More information

Consistency and Replication (part b)

Consistency and Replication (part b) Consistency and Replication (part b) EECS 591 Farnam Jahanian University of Michigan Tanenbaum Chapter 6.1-6.5 Eventual Consistency A very weak consistency model characterized by the lack of simultaneous

More information

CS Amazon Dynamo

CS Amazon Dynamo CS 5450 Amazon Dynamo Amazon s Architecture Dynamo The platform for Amazon's e-commerce services: shopping chart, best seller list, produce catalog, promotional items etc. A highly available, distributed

More information

Self-Adapting Epidemic Broadcast Algorithms

Self-Adapting Epidemic Broadcast Algorithms Self-Adapting Epidemic Broadcast Algorithms L. Rodrigues U. Lisboa ler@di.fc.ul.pt J. Pereira U. Minho jop@di.uminho.pt July 19, 2004 Abstract Epidemic broadcast algorithms have a number of characteristics,

More information

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK

More information

Delft University of Technology Parallel and Distributed Systems Report Series. Dispersy Bundle Synchronization

Delft University of Technology Parallel and Distributed Systems Report Series. Dispersy Bundle Synchronization Delft University of Technology Parallel and Distributed Systems Report Series Dispersy Bundle Synchronization Niels Zeilemaker, Boudewijn Schoon, Johan Pouwelse niels@zeilmaker.nl Completed January 2013.

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent

More information

MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India

MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India (ravindrathore@gmail.com) Abstract - We have implicitly assumed that the client-side software of a web-based

More information

PeerSim Stefano Ferretti Dept. Computer Science & Engineering University of Bologna

PeerSim Stefano Ferretti Dept. Computer Science & Engineering University of Bologna PeerSim Stefano Ferretti Dept. Computer Science & Engineering University of Bologna Email: s.ferretti@unibo.it 1 Slide credits: dr. Moreno Marzolla Copyright 2015, Stefano Ferretti, Università di Bologna,

More information

Background. Distributed Key/Value stores provide a simple put/get interface. Great properties: scalability, availability, reliability

Background. Distributed Key/Value stores provide a simple put/get interface. Great properties: scalability, availability, reliability Background Distributed Key/Value stores provide a simple put/get interface Great properties: scalability, availability, reliability Increasingly popular both within data centers Cassandra Dynamo Voldemort

More information

Gossip-based Protocols for Large-scale Distributed Systems

Gossip-based Protocols for Large-scale Distributed Systems Gossip-based Protocols for Large-scale Distributed Systems DSc Dissertation Márk Jelasity Szeged, 2013 ii Contents Preface 1 1 Gossip Protocol Basics 3 1.1 Gossip and Epidemics............................

More information

Probabilistic Estimation of Network Size and Diameter

Probabilistic Estimation of Network Size and Diameter Probabilistic Estimation of Network Size and Diameter Jorge C. S. Cardoso E.Artes / CITAR Universidade Católica Portuguesa (UCP) Porto, Portugal Email: jorgecardoso@ieee.org Carlos Baquero and Paulo Sérgio

More information

Pulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams

Pulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams Noname manuscript No. (will be inserted by the editor) Pulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams Pascal Felber Anne-Marie Kermarrec Lorenzo Leonini Etienne

More information

Important Lessons. Today's Lecture. Two Views of Distributed Systems

Important Lessons. Today's Lecture. Two Views of Distributed Systems Important Lessons Replication good for performance/ reliability Key challenge keeping replicas up-to-date Wide range of consistency models Will see more next lecture Range of correctness properties L-10

More information

Peer-to-peer Sender Authentication for . Vivek Pathak and Liviu Iftode Rutgers University

Peer-to-peer Sender Authentication for  . Vivek Pathak and Liviu Iftode Rutgers University Peer-to-peer Sender Authentication for Email Vivek Pathak and Liviu Iftode Rutgers University Email Trustworthiness Sender can be spoofed Need for Sender Authentication Importance depends on sender Update

More information

Scaling Out Key-Value Storage

Scaling Out Key-Value Storage Scaling Out Key-Value Storage COS 418: Distributed Systems Logan Stafman [Adapted from K. Jamieson, M. Freedman, B. Karp] Horizontal or vertical scalability? Vertical Scaling Horizontal Scaling 2 Horizontal

More information

CS5412: TIER 2 OVERLAYS

CS5412: TIER 2 OVERLAYS 1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud They were invented purely as content indexing systems,

More information

CS 333 Introduction to Operating Systems. Class 14 Page Replacement. Jonathan Walpole Computer Science Portland State University

CS 333 Introduction to Operating Systems. Class 14 Page Replacement. Jonathan Walpole Computer Science Portland State University CS 333 Introduction to Operating Systems Class 14 Page Replacement Jonathan Walpole Computer Science Portland State University Page replacement Assume a normal page table (e.g., BLITZ) User-program is

More information

X X C 1. Recap. CSE 486/586 Distributed Systems Gossiping. Eager vs. Lazy Replication. Recall: Passive Replication. Fault-Tolerance and Scalability

X X C 1. Recap. CSE 486/586 Distributed Systems Gossiping. Eager vs. Lazy Replication. Recall: Passive Replication. Fault-Tolerance and Scalability Recap Distributed Systems Gossiping Steve Ko Computer Sciences and Engineering University at Buffalo Consistency models Linearizability Sequential consistency Causal consistency Eventual consistency Depending

More information

Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network

Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network 20/03/2017 1 IMPLEMENTATION OF KADEMLIA Kademlia is the protocol used by the largest public DHTs. Vuze ( before known as Azureus),

More information

Consistency and Replication

Consistency and Replication Consistency and Replication Introduction Data-centric consistency Client-centric consistency Distribution protocols Consistency protocols 1 Goal: Reliability Performance Problem: Consistency Replication

More information

IMPLEMENTATION AND EVALUATION OF A SELF MANAGING CLUSTER MIDDLEWARE THAT SCALES IN SYSTEM SIZE AND NUMBER OF APPLICATIONS.

IMPLEMENTATION AND EVALUATION OF A SELF MANAGING CLUSTER MIDDLEWARE THAT SCALES IN SYSTEM SIZE AND NUMBER OF APPLICATIONS. IMPLEMENTATION AND EVALUATION OF A SELF MANAGING CLUSTER MIDDLEWARE THAT SCALES IN SYSTEM SIZE AND NUMBER OF APPLICATIONS by Erik Häggbrink Master of Science Laboratory for Communication Networks Royal

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

DS-Means: Distributed Data Stream Clustering

DS-Means: Distributed Data Stream Clustering DS-Means: Distributed Data Stream Clustering Alessio Guerrieri and Alberto Montresor University of Trento, Italy Abstract. This paper proposes DS-means, a novel algorithm for clustering distributed data

More information

Review Session. Ennan Zhai

Review Session. Ennan Zhai Review Session Ennan Zhai ennan.zhai@yale.edu Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search Today s Mission USENET & Gossip Firewall

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Dynamo: Key-Value Cloud Storage

Dynamo: Key-Value Cloud Storage Dynamo: Key-Value Cloud Storage Brad Karp UCL Computer Science CS M038 / GZ06 22 nd February 2016 Context: P2P vs. Data Center (key, value) Storage Chord and DHash intended for wide-area peer-to-peer systems

More information

Randomized gossip algorithms for maintaining a distributed bulletin board with guaranteed age properties

Randomized gossip algorithms for maintaining a distributed bulletin board with guaranteed age properties CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2009; 21:1907 1927 Published online 31 March 2009 in Wiley InterScience (www.interscience.wiley.com)..1418 Randomized

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Lecture #6: Mining Data Streams Seoul National University 1 Outline Overview Sampling From Data Stream Queries Over Sliding Window 2 Data Streams In many data mining situations,

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

Replication. Consistency models. Replica placement Distribution protocols

Replication. Consistency models. Replica placement Distribution protocols Replication Motivation Consistency models Data/Client-centric consistency models Replica placement Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Client-centric

More information

Chord on Demand. Mark Jelasity University of Bologna, Italy.

Chord on Demand. Mark Jelasity University of Bologna, Italy. Chord on Demand Alberto Montresor University of Bologna, Italy montresor@cs.unibo.it Mark Jelasity University of Bologna, Italy jelasity@cs.unibo.it Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it

More information

CS510 Operating System Foundations. Jonathan Walpole

CS510 Operating System Foundations. Jonathan Walpole CS510 Operating System Foundations Jonathan Walpole Page Replacement Page Replacement Assume a normal page table (e.g., BLITZ) User-program is executing A PageInvalidFault occurs! - The page needed is

More information

The XtreemOS Resource Selection Service

The XtreemOS Resource Selection Service The XtreemOS Resource Selection Service CORINA STRATAN, VU University Amsterdam JAN SACHA and JEFF NAPPER, Bell Labs PAOLO COSTA, Imperial College London GUILLAUME PIERRE, VU University Amsterdam Many

More information

GNUnet Distributed Data Storage

GNUnet Distributed Data Storage GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview

More information

DYNAMO: AMAZON S HIGHLY AVAILABLE KEY-VALUE STORE. Presented by Byungjin Jun

DYNAMO: AMAZON S HIGHLY AVAILABLE KEY-VALUE STORE. Presented by Byungjin Jun DYNAMO: AMAZON S HIGHLY AVAILABLE KEY-VALUE STORE Presented by Byungjin Jun 1 What is Dynamo for? Highly available key-value storages system Simple primary-key only interface Scalable and Reliable Tradeoff:

More information

Peer-to-peer systems and overlay networks

Peer-to-peer systems and overlay networks Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems

More information

Spray: an Adaptive Random Peer Sampling Protocol

Spray: an Adaptive Random Peer Sampling Protocol : an Adaptive Random Peer Sampling Protocol Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour Mostefaoui To cite this version: Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour

More information