Cloudy Weather for P2P
|
|
- Dorcas Hampton
- 5 years ago
- Views:
Transcription
1 Cloudy Weather for P2P with a Chance of Gossip Alberto Montresor Luca Abeni Best paper award in P2P'11 Presented by: amir@sics.se 1
2 Introduction 2
3 Cloud Computing vs. P2P Similarity: Providing the infinite availability of computing and storage resources. Difference: The cloud provides highly available resources, but at a cost. P2P resources are for free, but their availability is shaky. 3
4 Cloud Computing vs. P2P P2P 1/Cost Availability Cloud 4
5 Related Work Several projects have tried to mix the two to get the advantages of both: high availability and low cost. First approach: adding peers to an existing centralized solution. Off loading the services to peers, if does not affect service availability. Second approach: augmenting P2P systems with cloud angels. Adding elastic computing nodes with the specific task of satisfying requirements beyond the reach of a P2P network. 5
6 Third Approach: The Paper Contribution Cloudcast The target application: content distribution. All functionalities of the content distribution application are supported by a passive storage service such: Topology bootstrap and membership management. Information dissemination. No active elastic computing instances are required. 6
7 The Costs Storage and bandwidth costs. To preserve the durability, the storage consumption cannot be reduced. So, let's focus on the bandwidth cost. How? 7
8 How? Cloudcast is based on two gossip protocols: Topology bootstrap and membership management. Information dissemination. How: keep the number of cloud accesses 1 per gossip cycle, independently of the number of clients. 8
9 Background 9
10 Information Dissemination Epidemic protocols a classical solution Nodes gossip about news in random fashion: Rumor mongering: to quickly push the rumors toward on line nodes. Anti entropy: to make sure that everybody gets all the news (push pull). Epidemic protocols require a list of nodes forming the network. Where do we get it from? Peer sampling. 10
11 Peer Sampling Peer sampling service provides each peer with continuously up to date random samples of the entire population of peers. Such samples fulfil two purposes: Used by the epidemic broadcast service to obtain random peers. Maintain a random topology connecting all peers. Information Dissemination get random peer Peer Sampling 11
12 A Generic Gossip Protocol A generic gossip protocol executed by node p. Active thread do once every δ time units q = getpeer(state) Sp = preparemsg(state, q) send(req, Sp) to q Passive thread do forever receive(t, Sq) from * if (t = REQ) then Sp = preparemsg(state, q) send(rep, Sp) to q state = update(state, Sq) 12
13 Cyclon State at each node: A partial view containing c neighbour descriptors (c = view size). Node descriptor: address + timestamp (age) getpeer() select the oldest descriptor in the view remove it from the view preparemsg(view, q) active thread: returns a subset of t 1 random nodes, plus a fresh local identifier of itself passive thread: returns a subset of t random nodes update(view, Sq) discard entries in Sq that p already knows add Sq, removing entries sent to q 13
14 Cyclon Peer Sampling Protocol (1/7) n2 n9 1 n5 n4 14
15 Cyclon Peer Sampling Protocol (2/7) n9 n5 1 n2 n5 n4 15
16 Cyclon Peer Sampling Protocol (3/7) n9 n5 1 1 shuffle request n2 n5 n4 16
17 Cyclon Peer Sampling Protocol (4/7) n9 1 shuffle response 1 n2 n5 n4 17
18 Cyclon Peer Sampling Protocol (5/7) n9 1 shuffle response 1 n2 n5 n4 18
19 Cyclon Peer Sampling Protocol (6/7) n9 Update State 1 shuffle response 1 Update State n2 n5 n4 19
20 Cyclon Peer Sampling Protocol (7/7) n2 n9 1 1 n5 n4 20
21 Cloudcast 21
22 Cloudcast Architecture The cloud join the group so there will be always one member. 22
23 Storage Clouds vs. Epidemic Protocols Reducing the number of accesses to the cloud is one of the most important requirements in Cloudcast. Cyclon ensures that the in degree of each peer p tends to stay around c (view size). If number of nodes n > c, the cloud in degree is c and if n < c, then cloud in degree is n. Proving that Cloudcast scales down as well. 23
24 Cloudcast Peer Sampling Cloud is a passive key/value storage, and can not perform computation. Active thread do once every δ time units q = getpeer(state) if (q is cloud) then send(get, VIEW) else Sp = preparemsg(state, q) send(req, Sp) to q Passive thread do forever receive(t, Sq) from * if (t = VIEW) then Sp = emulaterequestmsg() Sq = emulatereplymsg() V = emulateview(sp) send(put, VIEW, V) to q else if (t = REQ) then Sp = preparemsg(state, q) send(rep, Sp) to q State = update(state, Sq) 24
25 Cloudcast Peer Sampling Protocol (1/9) n9 C 1 C 25
26 Cloudcast Peer Sampling Protocol (2/9) n9 C 1 Get(VIEW) C 26
27 Cloudcast Peer Sampling Protocol (3/9) n9 C 1 Reply C 27
28 Cloudcast Peer Sampling Protocol (4/9) n9 C 1 C 28
29 Cloudcast Peer Sampling Protocol (5/9) n9 C 1 Emulate request/reply C 29
30 Cloudcast Peer Sampling Protocol (6/9) request reply n9 C 1 1 Emulate request/reply C 30
31 Cloudcast Peer Sampling Protocol (7/9) n9 C 1 1 Update views C 31
32 Cloudcast Peer Sampling Protocol (8/9) n9 C 1 1 Put(VIEW, V) C 32
33 Cloudcast Peer Sampling Protocol (9/9) n9 C 1 1 C 33
34 Keep or Remove the Cloud Descriptor? n9 C 1 Keep or remove the Cloud descriptor? 1 C 34
35 When to add the Cloud Descriptor? Cloud objects have last modified information. When contacting a cloud: If last modified is too close in time (¼ cycle), too many cloud references do not maintain the cloud reference. If last modified is too far in time (4 cycles), too few cloud reference maintain the cloud reference and create a new one. 35
36 Cloudcast Bootstraping The new node performs a GET operation and retrieve a first view It can be later used to start the normal Cyclon protocol. If the view retrieved from the cloud is smaller than c, this means that n < c, and a cloud descriptor is added. 36
37 Cloudcast Information Dissemination The creator of a new message Write the message in the cloud. Update a message counter in the cloud. Starts a rumor mongering broadcasting on the new message. Rumor mongering (push) Every node sends the hot rumor to a random peer. Stops forwarding the rumor with a given probability (0.2). Anti entropy (push pull) Less frequently, node exchange summaries of the message received so far and download missing ones if needed. 37
38 Experiments 38
39 Simulation based on the Peersim. Experiments 39
40 Simulation based on the Peersim. Experiments Different levels of churn Different levels of message loss 40
41 Conclusion 41
42 Conclusion This paper shows a novel approach that mix the dependability of cloud computing with the low cost of P2P networks. Many open questions: There is obviously an unbalance between peer sampling and message diffusion. Avoiding so many GET/PUT requests. Make the system more adaptive if the groups grows, the cloud is used less and less (just to guarantee durability). 42
43 Question? Acknowledgement Some slides were derived from the slides of Alberto Montresor (University of Trento, Italy) 43
Cloudy Weather for P2P, with a Chance of Gossip
Cloudy Weather for P2P, with a Chance of Gossip Alberto Montresor University of Trento, Italy alberto.montresor@unitn.it Luca Abeni University of Trento, Italy luca.abeni@unitn.it Abstract Peer-to-peer
More informationFast Topology Management in Large Overlay Networks
Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology
More informationGossip Based Information Dissemination in a Distributed System
5 Gossip Based Information Dissemination in a Distributed System 1 Navaraj Chettri, 2 Dhruba Ningombam 1, 2 Computer Science & Engineering, Sikkim Manipal Institute of Technology Gantok, India Abstract-
More informationBlock lectures on Gossip-based protocols
Block lectures on Gossip-based protocols Lecture 1: dissemination, randomness and aggregation Dr. Etienne Rivière University of Neuchâtel Etienne.Riviere@unine.ch Lectures funded by the EU commission as
More informationLast Class: Web Caching. Today: More on Consistency
Last Class: Web Caching Use web caching as an illustrative example Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 16, page 1 Today: More on Consistency
More informationLightweight Gossip-based Distribution Estimation
Lightweight Gossip-based Distribution Estimation Amir H. Payberah, Hanna Kavalionak, Alberto Montresor, Jim Dowling, Seif Haridi Swedish Institute of Computer Science (SICS) University of Trento, Italy
More informationPeerSim: A Brief Introduction
PeerSim: A Brief Introduction Toward simulating gossip protocols Peer To Peer System 2016-2017 Emanuele Carlini - emanuele.carlini@isti.cnr.it Why this lesson? Why this lesson? Why this lesson? Objective:
More informationGossip and Epidemic Protocols
Gossip and Epidemic Protocols Alberto Montresor Abstract A gossip protocol is a distributed communication paradigm inspired by the gossip phenomenon that can be observed in social networks. Initially born
More informationGossiping in Distributed Systems Foundations
Gossiping in Distributed Systems Foundations Maarten van Steen 2 of 41 2 of 41 Introduction Observation: We continue to face hard scalability problems in distributed systems: Systems continue to grow in
More informationGossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary
Gossip Protocols Márk Jelasity Hungarian Academy of Sciences and University of Szeged, Hungary Introduction Gossip-like phenomena are commonplace human gossip epidemics (virus spreading, etc) computer
More informationConsistency and Replication. Why replicate?
Consistency and Replication Today: Consistency models Data-centric consistency models Client-centric consistency models Lecture 15, page 1 Why replicate? Data replication versus compute replication Data
More informationINF5040 (Open Distributed Systems)
INF5040 (Open Distributed Systems) Lucas Provensi (provensi@ifi.uio.no) Department of Informatics University of Oslo November 12, 2012 An application-level network on top of the Internet (overlay network)
More informationTowards a Decentralized Architecture for Optimization
Towards a Decentralized Architecture for Optimization Marco Biazzini, Mauro Brunato and Alberto Montresor University of Trento Dipartimento di Ingegneria e Scienza dell Informazione via Sommarive 1, 381
More informationKleinberg s Small-World Networks. Normalization constant have to be calculated:
Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)
More informationCloud Computing: "network access to shared pool of configurable computing resources"
Large-Scale Networks Gossip-based Protocols Consistency for Large-Scale Data Replication Uwe Roehm / Vincent Gramoli School of Information Technologies The University of Sydney Page 1 Cloud Computing:
More informationSimple, Fast and Deterministic Gossip and Rumor Spreading. Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH
Simple, Fast and Deterministic Gossip and Rumor Spreading Main paper by: B. Haeupler, MIT Talk by: Alessandro Dovis, ETH Presentation Outline What is gossip? Applications Basic Algorithms Advanced Algorithms
More informationT-Man: Gossip-based Fast Overlay Topology Construction
T-Man: Gossip-based Fast Overlay Topology Construction Márk Jelasity University of Szeged, Hungary jelasity@inf.u-szeged.hu Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it Alberto Montresor
More informationConstructing Overlay Networks through Gossip
Constructing Overlay Networks through Gossip Márk Jelasity Università di Bologna Project funded by the Future and Emerging Technologies arm of the IST Programme The Four Main Theses 1: Topology (network
More informationT-Man: Gossip-based Fast Overlay Topology Construction
T-Man: Gossip-based Fast Overlay Topology Construction Márk Jelasity University of Szeged, Hungary jelasity@inf.u-szeged.hu Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it Alberto Montresor
More informationAnti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a
Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy are possible. In push mode, P pushes its database to
More informationA P2P REcommender system based on Gossip Overlays (PREGO)
10 th IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY Bradford,UK, 29 June - 1 July, 2010 Ranieri Baraglia, Patrizio Dazzi, Matteo Mordacchini ISTI,CNR, Pisa,Italy Laura Ricci University
More informationGozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal
Gozar: NAT friendly Peer Sampling with One Hop Distributed NAT Traversal Amir H. Payberah Jim Dowling Seif Haridi {amir,jdowling,seif}@sics.se 1 Introduction 2 Gossip based Peer Sampling Service Gossip
More informationComputing Parable. The Archery Teacher. Courtesy: S. Keshav, U. Waterloo. Computer Science. Lecture 16, page 1
Computing Parable The Archery Teacher Courtesy: S. Keshav, U. Waterloo Lecture 16, page 1 Consistency and Replication Today: Consistency models Data-centric consistency models Client-centric consistency
More informationT-Man: Gossip-based Fast Overlay Topology Construction
T-Man: Gossip-based Fast Overlay Topology Construction Márk Jelasity Research Group on AI, University of Szeged and HAS, PO Box 652, H-6701 Szeged, Hungary Alberto Montresor University of Trento, Italy
More informationAnti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy a
Anti-entropy works as follows: periodically, a server P randomly chooses a server Q and then the two exchange databases. Three modes of anti-entropy are possible. In push mode, P pushes its database to
More informationReplica Placement. Replica Placement
Replica Placement Model: We consider objects (and don t worry whether they contain just data or code, or both) Distinguish different processes: A process is capable of hosting a replica of an object or
More informationSimulating overlay networks with PeerSim. Acknowledgements. Outline. Introduction: P2P Systems
Simulating overlay networks with PeerSim Moreno Marzolla Dipartimento di Informatica Scienza e Ingegneria Università di Bologna http://www.moreno.marzolla.name/ Acknowledgements These slides are based
More informationCS 425 / ECE 428 Distributed Systems Fall 2015
CS 425 / ECE 428 Distributed Systems Fall 2015 Indranil Gupta (Indy) Sep 24, 2015 Lecture 10: Gossiping All slides IG Multicast Fault-tolerance and Scalability Needs: 1. Reliability (Atomicity) 100% receipt
More informationGossip-based Networking for Internet-Scale Distributed Systems
Gossip-based Networking for Internet-Scale Distributed Systems Etienne Rivière 1 and Spyros Voulgaris 2 1 Computer Science Department, Université de Neuchâtel, Switzerland. 2 Vrije Universiteit Amsterdam,
More informationNetworking Seminar Stanford University. Madan Jampani 3/12/2015
Networking Seminar Stanford University Madan Jampani 3/12/2015 Can SDN control plane scale without sacrificing abstractions and performance? Control Plane Data Plane Simple yet powerful abstraction Global
More informationEventual Consistency. Eventual Consistency
Eventual Consistency Many systems: one or few processes perform updates How frequently should these updates be made available to other read-only processes? Examples: DNS: single naming authority per domain
More informationCassandra - A Decentralized Structured Storage System. Avinash Lakshman and Prashant Malik Facebook
Cassandra - A Decentralized Structured Storage System Avinash Lakshman and Prashant Malik Facebook Agenda Outline Data Model System Architecture Implementation Experiments Outline Extension of Bigtable
More informationShuffling with a Croupier: Nat Aware Peer Sampling
Shuffling with a Croupier: Nat Aware Peer Sampling Jim Dowling Amir H. Payberah {jdowling,amir}@sics.se 1 Introduction 2 Gossip based Protocols Gossip based protocols have been widely used in large scale
More informationConsistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary
Consistency and Replication Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Reasons for Replication Reliability/Availability : Mask failures Mask corrupted data Performance: Scalability
More informationDIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1
DIMPLE-II: Dynamic Membership Protocol for Epidemic Protocols 1 Jin Sun and Byung K. Choi Departments of Computer Science Michigan Technological University, Houghton, MI, USA 49931 {jinsun, bkchoi}@mtu.edu
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationCS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks
More informationDistributed Systems: Consistency and Replication
Distributed Systems: Consistency and Replication Alessandro Sivieri Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico, Italy alessandro.sivieri@polimi.it http://corsi.dei.polimi.it/distsys
More informationGossip Protocols. Márk Jelasity. Hungarian Academy of Sciences and University of Szeged, Hungary
Gossip Protocols Márk Jelasity Hungarian Academy of Sciences and University of Szeged, Hungary Introduction Gossip-like phenomena are commonplace human gossip epidemics (virus spreading, etc) computer
More informationSSSim: a Simple and Scalable Simulator for P2P Streaming Systems
SSSim: a Simple and Scalable Simulator for P2P Streaming Systems Luca Abeni, Csaba Kiraly, Renato Lo Cigno DISI University of Trento, Italy {Luca.Abeni;Csaba.Kiraly;Renato.LoCigno}@unitn.it Abstract This
More informationGLive: The Gradient overlay as a market maker for mesh based P2P live streaming
GLive: The Gradient overlay as a market maker for mesh based P2P live streaming Amir H. Payberah Jim Dowling Seif Haridi {amir, jdowling, seif}@sics.se 1 Introduction 2 Media Streaming Media streaming
More informationA POTPOURRI OF DISTRIBUTED COMPUTING RESEARCHES. Patrizio Dazzi. lunedì 25 giugno 12
A POTPOURRI OF DISTRIBUTED COMPUTING RESEARCHES Patrizio Dazzi WHAT DOES DISTRIBUTED MEANS? comes from the latin verb distribuere: dis apart tribuere assign WHAT DOES DISTRIBUTED MEANS? comes from the
More informationCSE 486/586 Distributed Systems
CSE 486/586 Distributed Systems Mutual Exclusion Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Recap: Consensus On a synchronous system There s an algorithm that works. On
More informationG Bayou: A Weakly Connected Replicated Storage System. Robert Grimm New York University
G22.3250-001 Bayou: A Weakly Connected Replicated Storage System Robert Grimm New York University Altogether Now: The Three Questions! What is the problem?! What is new or different?! What are the contributions
More informationInformation Brokerage
Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,
More informationOn Improving the Performance of Cache Invalidation in Mobile Environments
Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO
More informationAdaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks
Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh, Senior Member IEEE Department of Electrical Engineering, IIT, Kanpur {rgupta, abhicm,
More informationBUFFER management is a significant component
1 Stepwise Fair-Share Buffering for Gossip-Based Peer-to-Peer Data Dissemination Oznur Ozkasap, Mine Caglar, Emrah Cem, Emrah Ahi, and Emre Iskender Abstract We consider buffer management in support of
More informationDistributed Algorithms Models
Distributed Algorithms Models Alberto Montresor University of Trento, Italy 2016/04/26 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Contents 1 Taxonomy
More informationPeer-to-Peer Signalling. Agenda
Peer-to-Peer Signalling Marcin Matuszewski marcin@netlab.hut.fi S-38.115 Signalling Protocols Introduction P2P architectures Skype Mobile P2P Summary Agenda 1 Introduction Peer-to-Peer (P2P) is a communications
More informationDISTRIBUTED REPUTATION-BASED MECHANISMS FOR TRUST PROPAGATION IN LARGE GROUPS DIONYSIOS KONSTANTINOS KOSTOULAS
c Copyright by Dionysios Konstantinos Kostoulas, 2005 DISTRIBUTED REPUTATION-BASED MECHANISMS FOR TRUST PROPAGATION IN LARGE GROUPS BY DIONYSIOS KONSTANTINOS KOSTOULAS B.S., University of Patras, 2002
More informationCS 333 Introduction to Operating Systems. Class 14 Page Replacement. Jonathan Walpole Computer Science Portland State University
CS 333 Introduction to Operating Systems Class 14 Page Replacement Jonathan Walpole Computer Science Portland State University Page replacement Assume a normal page table (e.g., BLITZ) User-program is
More informationAn Analytical Model of Information Dissemination for a Gossip-based Protocol
An Analytical Model of Information Dissemination for a Gossip-based Protocol Rena Bakhshi, Daniela Gavidia, Wan Fokkink, and Maarten van Steen Department of Computer Science, Vrije Universiteit Amsterdam,
More informationModule 7 - Replication
Module 7 - Replication Replication Why replicate? Reliability Avoid single points of failure Performance Scalability in numbers and geographic area Why not replicate? Replication transparency Consistency
More informationGossip Peer Sampling in Real World
Gossip Peer Sampling in Real World Amir H. Payberah (amir@sics.se) 1/55 Gossip Peer Sampling 2/55 Peer Sampling Service The peer sampling service provides each node with a list of nodes in the system.
More informationGossip-Based Dissemination of Time
Warsaw University Faculty of Mathematics, Informatics and Mechanics Vrije Universiteit Amsterdam Faculty of Sciences Konrad Iwanicki Student id. no.: 189391 (WU), 1493817 (VU) Gossip-Based Dissemination
More informationUseNet and Gossip Protocol
CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network
More informationIntuitive distributed algorithms. with F#
Intuitive distributed algorithms with F# Natallia Dzenisenka Alena Hall @nata_dzen @lenadroid A tour of a variety of intuitivedistributed algorithms used in practical distributed systems. and how to prototype
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 3/6/2012 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 In many data mining
More informationCS505: Distributed Systems
Cristina Nita-Rotaru CS505: Distributed Systems Protocols. Slides prepared based on material by Prof. Ken Birman at Cornell University, available at http://www.cs.cornell.edu/ken/book/ Required reading
More informationAvailable online at ScienceDirect. Procedia Computer Science 78 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 (2016 ) 595 602 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur,
More informationOverview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04
Overview of Sensor Network Routing Protocols WeeSan Lee weesan@cs.ucr.edu 11/1/04 Outline Background Data-centric Protocols Flooding & Gossiping SPIN Directed Diffusion Rumor Routing Hierarchical Protocols
More informationConsistency and Replication (part b)
Consistency and Replication (part b) EECS 591 Farnam Jahanian University of Michigan Tanenbaum Chapter 6.1-6.5 Eventual Consistency A very weak consistency model characterized by the lack of simultaneous
More informationCS Amazon Dynamo
CS 5450 Amazon Dynamo Amazon s Architecture Dynamo The platform for Amazon's e-commerce services: shopping chart, best seller list, produce catalog, promotional items etc. A highly available, distributed
More informationSelf-Adapting Epidemic Broadcast Algorithms
Self-Adapting Epidemic Broadcast Algorithms L. Rodrigues U. Lisboa ler@di.fc.ul.pt J. Pereira U. Minho jop@di.uminho.pt July 19, 2004 Abstract Epidemic broadcast algorithms have a number of characteristics,
More informationPower Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul
Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK
More informationDelft University of Technology Parallel and Distributed Systems Report Series. Dispersy Bundle Synchronization
Delft University of Technology Parallel and Distributed Systems Report Series Dispersy Bundle Synchronization Niels Zeilemaker, Boudewijn Schoon, Johan Pouwelse niels@zeilmaker.nl Completed January 2013.
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationMCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India
MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India (ravindrathore@gmail.com) Abstract - We have implicitly assumed that the client-side software of a web-based
More informationPeerSim Stefano Ferretti Dept. Computer Science & Engineering University of Bologna
PeerSim Stefano Ferretti Dept. Computer Science & Engineering University of Bologna Email: s.ferretti@unibo.it 1 Slide credits: dr. Moreno Marzolla Copyright 2015, Stefano Ferretti, Università di Bologna,
More informationBackground. Distributed Key/Value stores provide a simple put/get interface. Great properties: scalability, availability, reliability
Background Distributed Key/Value stores provide a simple put/get interface Great properties: scalability, availability, reliability Increasingly popular both within data centers Cassandra Dynamo Voldemort
More informationGossip-based Protocols for Large-scale Distributed Systems
Gossip-based Protocols for Large-scale Distributed Systems DSc Dissertation Márk Jelasity Szeged, 2013 ii Contents Preface 1 1 Gossip Protocol Basics 3 1.1 Gossip and Epidemics............................
More informationProbabilistic Estimation of Network Size and Diameter
Probabilistic Estimation of Network Size and Diameter Jorge C. S. Cardoso E.Artes / CITAR Universidade Católica Portuguesa (UCP) Porto, Portugal Email: jorgecardoso@ieee.org Carlos Baquero and Paulo Sérgio
More informationPulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams
Noname manuscript No. (will be inserted by the editor) Pulp: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams Pascal Felber Anne-Marie Kermarrec Lorenzo Leonini Etienne
More informationImportant Lessons. Today's Lecture. Two Views of Distributed Systems
Important Lessons Replication good for performance/ reliability Key challenge keeping replicas up-to-date Wide range of consistency models Will see more next lecture Range of correctness properties L-10
More informationPeer-to-peer Sender Authentication for . Vivek Pathak and Liviu Iftode Rutgers University
Peer-to-peer Sender Authentication for Email Vivek Pathak and Liviu Iftode Rutgers University Email Trustworthiness Sender can be spoofed Need for Sender Authentication Importance depends on sender Update
More informationScaling Out Key-Value Storage
Scaling Out Key-Value Storage COS 418: Distributed Systems Logan Stafman [Adapted from K. Jamieson, M. Freedman, B. Karp] Horizontal or vertical scalability? Vertical Scaling Horizontal Scaling 2 Horizontal
More informationCS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud They were invented purely as content indexing systems,
More informationCS 333 Introduction to Operating Systems. Class 14 Page Replacement. Jonathan Walpole Computer Science Portland State University
CS 333 Introduction to Operating Systems Class 14 Page Replacement Jonathan Walpole Computer Science Portland State University Page replacement Assume a normal page table (e.g., BLITZ) User-program is
More informationX X C 1. Recap. CSE 486/586 Distributed Systems Gossiping. Eager vs. Lazy Replication. Recall: Passive Replication. Fault-Tolerance and Scalability
Recap Distributed Systems Gossiping Steve Ko Computer Sciences and Engineering University at Buffalo Consistency models Linearizability Sequential consistency Causal consistency Eventual consistency Depending
More informationLesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network
Lesson 9 Applications of DHT: Bittorrent Mainline DHT, the KAD network 20/03/2017 1 IMPLEMENTATION OF KADEMLIA Kademlia is the protocol used by the largest public DHTs. Vuze ( before known as Azureus),
More informationConsistency and Replication
Consistency and Replication Introduction Data-centric consistency Client-centric consistency Distribution protocols Consistency protocols 1 Goal: Reliability Performance Problem: Consistency Replication
More informationIMPLEMENTATION AND EVALUATION OF A SELF MANAGING CLUSTER MIDDLEWARE THAT SCALES IN SYSTEM SIZE AND NUMBER OF APPLICATIONS.
IMPLEMENTATION AND EVALUATION OF A SELF MANAGING CLUSTER MIDDLEWARE THAT SCALES IN SYSTEM SIZE AND NUMBER OF APPLICATIONS by Erik Häggbrink Master of Science Laboratory for Communication Networks Royal
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationDS-Means: Distributed Data Stream Clustering
DS-Means: Distributed Data Stream Clustering Alessio Guerrieri and Alberto Montresor University of Trento, Italy Abstract. This paper proposes DS-means, a novel algorithm for clustering distributed data
More informationReview Session. Ennan Zhai
Review Session Ennan Zhai ennan.zhai@yale.edu Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search Today s Mission USENET & Gossip Firewall
More informationWeb-based Energy-efficient Cache Invalidation in Wireless Mobile Environment
Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University
More informationDynamo: Key-Value Cloud Storage
Dynamo: Key-Value Cloud Storage Brad Karp UCL Computer Science CS M038 / GZ06 22 nd February 2016 Context: P2P vs. Data Center (key, value) Storage Chord and DHash intended for wide-area peer-to-peer systems
More informationRandomized gossip algorithms for maintaining a distributed bulletin board with guaranteed age properties
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. 2009; 21:1907 1927 Published online 31 March 2009 in Wiley InterScience (www.interscience.wiley.com)..1418 Randomized
More informationIntroduction to Data Mining
Introduction to Data Mining Lecture #6: Mining Data Streams Seoul National University 1 Outline Overview Sampling From Data Stream Queries Over Sliding Window 2 Data Streams In many data mining situations,
More informationChapter 4 Communication
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI
More informationAdaptive Data Dissemination in Mobile ad-hoc Networks
Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin
More informationReplication. Consistency models. Replica placement Distribution protocols
Replication Motivation Consistency models Data/Client-centric consistency models Replica placement Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Client-centric
More informationChord on Demand. Mark Jelasity University of Bologna, Italy.
Chord on Demand Alberto Montresor University of Bologna, Italy montresor@cs.unibo.it Mark Jelasity University of Bologna, Italy jelasity@cs.unibo.it Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it
More informationCS510 Operating System Foundations. Jonathan Walpole
CS510 Operating System Foundations Jonathan Walpole Page Replacement Page Replacement Assume a normal page table (e.g., BLITZ) User-program is executing A PageInvalidFault occurs! - The page needed is
More informationThe XtreemOS Resource Selection Service
The XtreemOS Resource Selection Service CORINA STRATAN, VU University Amsterdam JAN SACHA and JEFF NAPPER, Bell Labs PAOLO COSTA, Imperial College London GUILLAUME PIERRE, VU University Amsterdam Many
More informationGNUnet Distributed Data Storage
GNUnet Distributed Data Storage DHT and Distance Vector Transport Nathan S. Evans 1 1 Technische Universität München Department of Computer Science Network Architectures and Services July, 24 2010 Overview
More informationDYNAMO: AMAZON S HIGHLY AVAILABLE KEY-VALUE STORE. Presented by Byungjin Jun
DYNAMO: AMAZON S HIGHLY AVAILABLE KEY-VALUE STORE Presented by Byungjin Jun 1 What is Dynamo for? Highly available key-value storages system Simple primary-key only interface Scalable and Reliable Tradeoff:
More informationPeer-to-peer systems and overlay networks
Complex Adaptive Systems C.d.L. Informatica Università di Bologna Peer-to-peer systems and overlay networks Fabio Picconi Dipartimento di Scienze dell Informazione 1 Outline Introduction to P2P systems
More informationSpray: an Adaptive Random Peer Sampling Protocol
: an Adaptive Random Peer Sampling Protocol Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour Mostefaoui To cite this version: Brice Nédelec, Julian Tanke, Davide Frey, Pascal Molli, Achour
More information