Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks

Similar documents
Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination

CSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012

Path Optimization in Stream-Based Overlay Networks

DRing: A Layered Scheme for Range Queries over DHTs

Mapping a Dynamic Prefix Tree on a P2P Network

A Scalable Content- Addressable Network

Network-on-chip (NOC) Topologies

Improving Search In Peer-to-Peer Systems

L3S Research Center, University of Hannover

Searching for Shared Resources: DHT in General

Searching for Shared Resources: DHT in General

Delaunay Triangulation Overlays

BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks

Peer-To-Peer Techniques

P2P Network Structured Networks (IV) Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

Topologies. Maurizio Palesi. Maurizio Palesi 1

Topologies. Maurizio Palesi. Maurizio Palesi 1

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World

Many-to-Many Communications in HyperCast

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Peer-to-Peer Streaming Systems. Behzad Akbari

Addressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?

Reliable End System Multicasting with a Heterogeneous Overlay Network

Multicast. Presented by Hakim Weatherspoon. Slides borrowed from Qi Huang 2009 and Tom Ternquist 2010

CSE 5306 Distributed Systems

Building a low-latency, proximity-aware DHT-based P2P network

CS 43: Computer Networks BitTorrent & Content Distribution. Kevin Webb Swarthmore College September 28, 2017

File Structures and Indexing

Early Measurements of a Cluster-based Architecture for P2P Systems

CS4700/CS5700 Fundamentals of Computer Networks

P2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli

Locality-Aware and Churn-Resilient Load Balancing Algorithms in Structured Peer-to-Peer Networks

EE122: Multicast. Kevin Lai October 7, 2002

EE122: Multicast. Internet Radio. Multicast Service Model 1. Motivation

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems.

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

Tracker-based Peer Selection using ALTO Map Information

Interconnection Networks: Topology. Prof. Natalie Enright Jerger

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

CBRBrain: Provide Content Based Routing Service Over Internet Backbone

CS 43: Computer Networks. 14: DHTs and CDNs October 3, 2018

Overlay Networks for Multimedia Contents Distribution

Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks

P2P Network Structured Networks: Distributed Hash Tables. Pedro García López Universitat Rovira I Virgili

Lecture 13: Traffic Engineering

CSE 473 Introduction to Computer Networks. Final Exam Review

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD

Data Structures Brett Bernstein

DHT Overview. P2P: Advanced Topics Filesystems over DHTs and P2P research. How to build applications over DHTS. What we would like to have..

Assignment 5. Georgia Koloniari

Architectures for Distributed Systems

Multicast EECS 122: Lecture 16

Peer-to-Peer (P2P) Systems

Decentralized Approach for Balancing Load in Dynamic Cloud Environment

Towards Efficient Load Balancing in Structured P2P Systems

Octoshape. Commercial hosting not cable to home, founded 2003

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Survey on Novel Load Rebalancing for Distributed File Systems

Friday Four Square! 4:15PM, Outside Gates

Peer-to-Peer Networks Pastry & Tapestry 4th Week

Eng 3553 Lab #5 TCP Throughput

Mesh-Based Content Routing Using XML

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

P2P Dissemination / ALM

Why Are You Still Using Shortest Path? - Path Selection Strategy Utilizing High-functional Nodes -

Codes, Bloom Filters, and Overlay Networks. Michael Mitzenmacher

Predicting connection quality in peer-to-peer real-time video streaming systems

A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays

Fault Resilience of Structured P2P Systems

INF5070 media storage and distribution systems. to-peer Systems 10/

A Common API for Structured Peer-to- Peer Overlays. Frank Dabek, Ben Y. Zhao, Peter Druschel, Ion Stoica

CSE 5306 Distributed Systems. Naming

Today CSCI Coda. Naming: Volumes. Coda GFS PAST. Instructor: Abhishek Chandra. Main Goals: Volume is a subtree in the naming space

GLive: The Gradient overlay as a market maker for mesh based P2P live streaming

! Naive n-way unicast does not scale. ! IP multicast to the rescue. ! Extends IP architecture for efficient multi-point delivery. !

Module SDS: Scalable Distributed Systems. Gabriel Antoniu, KERDATA & Davide Frey, ASAP INRIA

Algorithms Dr. Haim Levkowitz

Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

Understanding Mesh-based Peer-to-Peer Streaming

Spotify Behind the Scenes

Brocade: Landmark Routing on Peer to Peer Networks. Ling Huang, Ben Y. Zhao, Yitao Duan, Anthony Joseph, John Kubiatowicz

EECS 122: Introduction to Computer Networks Overlay Networks and P2P Networks. Overlay Networks: Motivations

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Cribbage Count In Cribbage scoring, there are several ways of accumulating points in a pile of playing cards. Among these are

SECURITY ISSUES IN P2P NETWORK USING ANALYSIS OF STREAMING SERVICES

International Journal of Advanced Research in Computer Science and Software Engineering

CSE 1 23: Computer Networks

Distributed Hash Table

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Application Layer Multicast For Efficient Peer-to-Peer Applications

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

EXTERNAL SORTING. Sorting

PART IV. Given 2 sorted arrays, What is the time complexity of merging them together?

Chapter 3 : Topology basics

Introduction to Peer-to-Peer Systems

Last Time. CSE 486/586 Distributed Systems Distributed Hash Tables. What We Want. Today s Question. What We Want. What We Don t Want C 1

Transcription:

Degree Hunter: on the Impact of Balancing Node Degrees in de Bruijn- Based Overlay Networks 23 April 2010 Pierre FRAIGNIAUD * - Hoang Anh PHAN** (*) (**) CNRS/LIAFA and University Paris Diderot

Loading Balancing: Problematic Load Balancing: a technique to distribute load evenly across two or more nodes. Objectives: Optimal resource utilization Maximizing throughput Minimizing response time Avoiding overload Problems: Bandwidth heterogeneity Load dynamic change Popularity of resources Load: stress concerning : Memory, CPU, Bandwith, Storage, Power, 2 kinds of load: Signaling: lookup, routing,etc. Data transfert load 2

Load Balancing: State of the art Virtual server [Rao et al. - IPTPS] [Dabek et al. - SOSP] : Virtual server = subset of the keys Moving virtual servers from a «heavy» node and a «light» node during runtime Controlling the resource location [Bayer, Considine, Mitzenmacher IPTPS 03] Multiple hash functions per resource. Computed key is stored in the peer with the smallest load Controlling the node location [Karger & Ruhl IPTPS 04] [Rieche et al. IEEE LCN 04] Underloaded node migrates itself to portions of the address space pointing to lots of data items, in order to share the load with the node responsible for this overloaded address space. 3

D2B Protocol De Bruijn B(d,k) graph: The nodes are the words of length k on an alphabet of d symbols. x 2 x k 0 x 1 x k x 2 x k 1... x 2 x k d-1 Features: Number of nodes = d k In-degree = Out-degree = d Diameter (longest shortest path)= k Simple routing 4

D2B Protocol P2P System D2B-d dimension [P. Fraigniaud & P. Gauron 2003]: ID of a node: NodeId, words on an alphabet of d symbols. ID of a resource: Key, words of length m on an alphabet of d symbols. The responsible node stores the information, i.e. the key, concerning a resource (IP address of its owner) iff its NodeId is a prefix of the key. Example of routing: D2B 4-dimension Key k =30203201 Node u = 112302[0,1] 5

Load Balancing: Degree Hunter (1/6) Degree Hunter: Main ideas: Hunting the nodes with a large key space: short ID Hunting the nodes with too large or too small number of out-going neighbors (children) Why are these nodes hunted? Node with a small out-degree: fault tolerance, construction of multicast trees Node with a large out-degree: updating connections, large #packet duplications on the multicast trees. Objectives: Balancing the key space among all nodes Balancing the degrees of the nodes Avoiding additional load Avoiding the increase of the response time Avoiding the increase of the time for JOIN/LEAVE 3 decentralized mechanisms and 1 centralized mechanism 6

Load Balancing: Degree Hunter (2/6) Degree Hunter in D2B-2d STANDARD: Message [Join] with key = <01100 > 7

Load Balancing: Degree Hunter (3/6) Degree Hunter in D2B-2d ALL-SINGLE: Stop at a node that is the unique out-neighbor of all its inneighbors Properties: Reduce the #nodes having a unique child while not creating nodes with high out-degrees. Adapted to data streaming 8

Load Balancing: Degree Hunter (4/6) Degree Hunter in D2B-2d 1-SINGLE: Stops when a node which is the unique out-neighbor of at least one of its in-neighbors is found Properties: Reduces the #nodes having a unique child but may create nodes with high out-degrees. Adapted to file sharing systems. 9

Load Balancing: Degree Hunter (5/6) Degree Hunter in D2B-2d ID-LENGTH: routes [JOIN] to (among its neighbors): Node having a largest key space (short ID). In case of a tie, node whose in-neighbors have a small out-degree In case of a double tie, node who is the unique child of many nodes Stops when the curent node is locally the best. Properties: Balances the key space among nodes while reducing the number of nodes having a unique child, without adding nodes with large out-degree. Adapted to streaming + file sharing systems. 10

Load Balancing: Degree Hunter (6/6) Degree Hunter dans D2B-2d TRACKER: Maintains a short list of insertion points: the nodes to be contacted when joining the system. List is sorted according to the same rules as ID-LENGTH Dynamic mechanism: limited size (500 nodes), updated after each modification of the network If the list is empty: STANDARD method 11

Degree Hunter: Evaluations (1/8) Simulator: Peersim Jelasity &A. Montresor, G-P Jesi & S. Voulgari]: discret events & packet layer Parameters of D2B system: 50.000 nodes Fowarding delay for a message between 2 nodes: 10 to 100ms Buffer = 1Mb at each node Download bandwidth: 6Mb to 20Mb/s, upload: 1Mb/s Evolution of system s size during simulation 2 phases: Transition phase: 15 mns Steady phase (50000 nœuds): 10 mns, entrance freq = leaving freq = 0.5s (average) 12

Degree Hunter: Evaluations (2/8) Fraction of the number of nodes having only one out-neighbor 13

Degree Hunter: Evaluations (3/8) Histogram of the in-degrees at the end of the steady state period 14

Degree Hunter: Evaluations (4/8) Impact on congestion and latencies (1/3) Average number of hops for a JOIN, as a function of the size of the system 15

Degree Hunter: Evaluations (5/8) Impact on congestion and latencies (2/3) Average time for a JOIN as a function of the size of the system during the transition phase 16

Degree Hunter: Evaluations (6/8) Impact on congestion and latencies (3/3) Distribution of the nb of LOOKUP/PUBLISH requests traversing a node at the steady state period (about 1000 requests/s for all nodes of the system). 17

Degree Hunter: Evaluations (7/8) Impact on multicast performances (1/2) BFS Protocol Each multicast group use one BFS tree to distribute datas to all the members The root (= source) of the multicast tree is responsible for distributing the datas in its tree 2TREES Protocol : Each group composed of 2 internally disjoint BFS trees rooted at <0..0> and <1..1> [J-C. Bermond & P. Fraigniaud -1994] Racine = Source.. Source 1 3 5 2 8 <00..00> 4 6 <11..11> Critical injection rate: maximum injection rate enabling no packet to be lost 7 18

Degree Hunter: Evaluations (8/8) Impact on multicast performances (2/2) Packet loss ratio as a function of the application packet injection rate for the multicast protocol 2TREES (1 group, 100 members). 19

Conclusions 3 decentralized mechanisms for load balancing: 1-SINGLE: adapted to file sharing systems ALL-SINGLE: adapted to media streaming ID-LENGTH: adapted to both (but less local) Controling dynamicaly the degree and key space of nodes 20

Thank you for your attention! 21

Backup Slide: Evaluations Fraction of the number of nodes having 2 in-neighbors, as a function of time 22

Backup Slide: Evaluations Impact on congestion and latencies Average time for a JOIN as a function of time 23

Backup Slide: Evaluations Impact on congestion and latencies Average and maximum times for LOOKUP/PUBLISH as a function of the size of the system 24

Backup Slide: Evaluations Impact on congestion and latencies Distribution of nb of LOOKUP/PUBLISH requests par seconde traversing a node per second, at the steady state. 25

Backup Slide: Evaluations Histogram of the out-degrees at the end of the steady state period 26

Backup Slide: Evaluations Impact on congestion and latencies Maximum number of hops for a JOIN, as a function of the size of the system 27

Backup Slide: Evaluations Impact on multicast performances Packet loss ratio as a function of the application packet injection rate for the multicast protocol BFS (1 group, 100 members). 28

Backup Slide: Evaluations Impact on multicast performances Packet loss ratio as a function of the application packet injection rate for the multicast protocol BFS (100 groups, 100 members/groups). 29

Backup Slide: Evaluations Impact on multicast performances Packet loss ratio as a function of the application packet injection rate for the multicast protocol 2TREES (100 groups). 30