Sliver: A fast distributed slicing algorithm Ymir Vigfusson Cornell University Ymir Vigfusson Cornell University Vincent Gramoli EPFL & UniNE Switzerland.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

12/09/01 1 SCAMP: lightweight membership service for gossip- based protocols Ayalvadi Ganesh, Anne-Marie Kermarrec & Laurent Massoulié Microsoft Research.
PLATO: Predictive Latency- Aware Total Ordering Mahesh Balakrishnan Ken Birman Amar Phanishayee.
Dr. Multicast for Data Center Communication Scalability Ymir Vigfusson Hussam Abu-Libdeh Mahesh Balakrishnan Ken Birman Cornell University Yoav Tock IBM.
Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Gossip-Based Computation of Aggregation Information
CS4432: Database Systems II
SocioPlug Polystyrene: Survivable Shape for Self-Organising Data François Taïani Joint work with: Hoel Kervadec (INSA Rennes) Simon Bouget (ENS Rennes)
“SUB-2-SUB” Self-Organizing Collaborative Content-based Pub/Sub Spyros Voulgaris, Etienne Rivière, Anne-Marie Kermarrec, Maarten van Steen.
20/10/2006ALPAGE1 Ordered slicing of very large scale overlay networks Mark Jelasity University of Bologna, Italy Anne-Marie Kermarrec INRIA Rennes/IRISA,
Cognitive Publish/Subscribe for Heterogeneous Clouds Šarūnas Girdzijauskas, Swedish Institute of Computer Science (SICS) Joint work with:
Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays Håvard Johansen University of Tromsø Norway André Allavena Robbert van Renesse University.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
Dynamic Bayesian Networks (DBNs)
Distributed Slicing in Dynamic Systems A. Fernández, V. Gramoli, E. Jiménez, A-M. Kermarrec, M. Raynal.
Fabian Kuhn, Microsoft Research, Silicon Valley
Ýmir Vigfússon IBM Research Haifa Labs Ken Birman Cornell University Qi Huang Cornell University Deepak Nataraj Cornell University.
Ph.D. thesis defense. August 21, Ýmir Vigfússon Joint work with: Hussam Abu-Libdeh, Mahesh Balakrishnan, Ken Birman, Gregory Chockler, Qi Huang,
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
Analyzing the Results of a Simulation and Estimating Errors Jason Cooper.
Computational problems, algorithms, runtime, hardness
Speed Dating despite Jammers Dominik Meier Yvonne-Anne Pignolet Stefan Schmid Roger Wattenhofer.
Hardware-based Load Generation for Testing Servers Lorenzo Orecchia Madhur Tulsiani CS 252 Spring 2006 Final Project Presentation May 1, 2006.
4. Convergence of random variables  Convergence in probability  Convergence in distribution  Convergence in quadratic mean  Properties  The law of.
Distributed Clustering for Robust Aggregation in Large Networks Ittay Eyal, Idit Keidar, Raphi Rom Technion, Israel.
Distributed Slicing in Dynamic Systems A. Fernández, V. Gramoli, E. Jiménez, A-M. Kermarrec, M. Raynal.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
Dr. Multicast for Data Center Communication Scalability Ymir Vigfusson Hussam Abu-Libdeh Mahesh Balakrishnan Ken Birman Cornell University Yoav Tock IBM.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
Qi Huang Ýmir Vigfússon Ken Birman Haoyuan Li Cornell University IBM Research Haifa Labs Cornell University.
EPIDEMIC TECHNIQUES Ki Suh Lee. OUTLINE Epidemic Protocol Epidemic Algorithms for Replicated Database Maintenance Astrolabe: A Robust and scalable technology.
Multiply and Divide Decimals
Chapter 2 Review. Using Mental Math, solve the following: 25,000 x 20 = ?
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Fast, Faster, and Correct Roy Friedman Technion Haifa Israel Based on work and discussions with Vadim Drabkin and Gabi Kliot.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Module 1: Statistical Issues in Micro simulation Paul Sousa.
Efficient P2P backup through buffering at the edge S. Defrance, A.-M. Kermarrec (INRIA), E. Le Merrer, N. Le Scouarnec, G. Straub, A. van Kempen.
Februar 17, 2006GDS meeting - LIP1 MOve: an application-Malleable Overlay UIUC / INRIA Collaboration.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Bayesian Classification. Bayesian Classification: Why? A statistical classifier: performs probabilistic prediction, i.e., predicts class membership probabilities.
Hadoop System simulation with Mumak Fei Dong, Tianyu Feng, Hong Zhang Dec 8, 2010.
Efficient computation of Robust Low-Rank Matrix Approximations in the Presence of Missing Data using the L 1 Norm Anders Eriksson and Anton van den Hengel.
LT Network Codes Mary-Luc Champel, Kevin Huguenin, Anne-Marie Kermarrec and Nicolas Le Scouarnec Technicolor, Rennes, France IEEE ICDCS (International.
Copyright © 2006, UCD Dublin Systems Research Group School of Computer Science and Informatics UCD Dublin, Belfield, Dublin 4, Ireland
Scalable Self-Repairing Publish/Subscribe Robbert van Renesse Ken Birman Werner Vogels Cornell University.
Network Coordinates : Internet Distance Estimation Jieming ZHU
Channel-Independent Viterbi Algorithm (CIVA) for DNA Sequencing
HASE: A Hybrid Approach to Selectivity Estimation for Conjunctive Queries Xiaohui Yu University of Toronto Joint work with Nick Koudas.
Q1) A precedes C. B precedes D & E. C precedes F & G. D precedes G.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
Working Group Security and Incentives Robbert van Renesse Jeroen Doumen Gilles Tredan Harry Li Rachid Guerraoui Lorenzo Alvisi Boris Koldehofe.
Expediting Peer-to-Peer Simulation using GPU Di Niu, Zhengjun Feng Apr. 14 th, 2009.
Today.
DIMPLE: DynamIc Membership ProtocoL for Epidemic protocols
CS5412: Using Gossip to Build Overlay Networks
Using surface code experimental output correctly and effectively
Strayer University at Arlington, VA
Blockchains and Food Supply Chains
Random WALK, BROWNIAN MOTION and SDEs
CS5412: Using Gossip to Build Overlay Networks
(sort of) Benchmark #3 Review!
RANDOM NUMBERS SET # 1:
CS5412: Using Gossip to Build Overlay Networks
Maximum Likelihood Estimation (MLE)
Presentation transcript:

Sliver: A fast distributed slicing algorithm Ymir Vigfusson Cornell University Ymir Vigfusson Cornell University Vincent Gramoli EPFL & UniNE Switzerland Anne-Marie Kermarrec INRIA Rennes France Vincent Gramoli EPFL & UniNE Switzerland Anne-Marie Kermarrec INRIA Rennes France Ken Birman Cornell University Robbert van Renesse Cornell University Ken Birman Cornell University Robbert van Renesse Cornell University Joint work with:

The Distributed Slicing Problem n nodes, each has an attribute value x i n nodes, each has an attribute value x i

The Distributed Slicing Problem n nodes, each has an attribute value x i n nodes, each has an attribute value x i Divide the sorted list of x i s into k slices Divide the sorted list of x i s into k slices n nodes, each has an attribute value x i n nodes, each has an attribute value x i Divide the sorted list of x i s into k slices Divide the sorted list of x i s into k slices

The Distributed Slicing Problem n nodes, each has an attribute value x i n nodes, each has an attribute value x i Divide the sorted list of x i s into k slices Divide the sorted list of x i s into k slices Each node i wants to independently know to which of the k slices x i belongs Each node i wants to independently know to which of the k slices x i belongs n nodes, each has an attribute value x i n nodes, each has an attribute value x i Divide the sorted list of x i s into k slices Divide the sorted list of x i s into k slices Each node i wants to independently know to which of the k slices x i belongs Each node i wants to independently know to which of the k slices x i belongs

The Distributed Slicing Problem n nodes, each has an attribute value x i n nodes, each has an attribute value x i Divide the sorted list of x i s into k slices Divide the sorted list of x i s into k slices Each node i wants to independently know to which of the k slices x i belongs Each node i wants to independently know to which of the k slices x i belongs n nodes, each has an attribute value x i n nodes, each has an attribute value x i Divide the sorted list of x i s into k slices Divide the sorted list of x i s into k slices Each node i wants to independently know to which of the k slices x i belongs Each node i wants to independently know to which of the k slices x i belongs Im in slice 2!

The Distributed Slicing Problem Large network with high rate of churn

The Distributed Slicing Problem Large network with high rate of churn Example: Choosing super-peers in the network Large network with high rate of churn Example: Choosing super-peers in the network

Sliver: Distributed slicing algorithm Each node i gossips x i (and other known values) to c random nodes

Sliver: Distributed slicing algorithm Each node i gossips x i (and other known values) to c random nodes Node j keeps track of data it receives Value, sender, expiration time Suppose B j values out of m are below x j Each node i gossips x i (and other known values) to c random nodes Node j keeps track of data it receives Value, sender, expiration time Suppose B j values out of m are below x j

Sliver: Distributed slicing algorithm Each node i gossips x i (and other known values) to c random nodes Node j keeps track of data it receives Value, sender, expiration time Suppose B j values out of m are below x j Node j estimates its slice as Each node i gossips x i (and other known values) to c random nodes Node j keeps track of data it receives Value, sender, expiration time Suppose B j values out of m are below x j Node j estimates its slice as

ResultsResults All nodes know their slice within 1 w.h.p. after rounds in expectation All nodes know their slice within 1 w.h.p. after rounds in expectation

ResultsResults All nodes know their slice within 1 w.h.p. after rounds in expectation Experiments on Emulab and simulations on Skype traces indicate rapid convergence and churn- tolerance Conclusion: Sliver is simple and robust with fast convergence properties. All nodes know their slice within 1 w.h.p. after rounds in expectation Experiments on Emulab and simulations on Skype traces indicate rapid convergence and churn- tolerance Conclusion: Sliver is simple and robust with fast convergence properties.