Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.

Slides:



Advertisements
Similar presentations
Introduction to Algorithms
Advertisements

EE384y: Packet Switch Architectures
Bellwork If you roll a die, what is the probability that you roll a 2 or an odd number? P(2 or odd) 2. Is this an example of mutually exclusive, overlapping,
Analysis of Computer Algorithms
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Milan Vojnović Microsoft Research Cambridge Collaborators: E. Perron and D. Vasudevan 1 Consensus – with Limited Processing and Signalling.
Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Turing Machines January 2003 Part 2:. 2 TM Recap We have seen how an abstract TM can be built to implement any computable algorithm TM has components:
Data Visualization Lecture 4 Two Dimensional Scalar Visualization
Reductions Complexity ©D.Moshkovitz.
Correctness of Gossip-Based Membership under Message Loss Maxim GurevichIdit Keidar Technion.
Algorithms for Geometric Covering and Piercing Problems Robert Fraser PhD defence Nov. 23, 2012.
Comp 122, Spring 2004 Order Statistics. order - 2 Lin / Devi Comp 122 Order Statistic i th order statistic: i th smallest element of a set of n elements.
Two-Market Inter-domain Bandwidth Contracting
THERMAL-AWARE BUS-DRIVEN FLOORPLANNING PO-HSUN WU & TSUNG-YI HO Department of Computer Science and Information Engineering, National Cheng Kung University.
1 Verification of Parameterized Systems Reducing Model Checking of the Few to the One. E. Allen Emerson, Richard J. Trefler and Thomas Wahl Junaid Surve.
David Luebke 1 6/7/2014 ITCS 6114 Skip Lists Hashing.
Shadow Prices vs. Vickrey Prices in Multipath Routing Parthasarathy Ramanujam, Zongpeng Li and Lisa Higham University of Calgary Presented by Ajay Gopinathan.
The Weighted Proportional Resource Allocation Milan Vojnović Microsoft Research Joint work with Thành Nguyen Microsoft Research Asia, Beijing, April, 2011.
1 Designing Hash Tables Sections 5.3, 5.4, Designing a hash table 1.Hash function: establishing a key with an indexed location in a hash table.
Compressing Forwarding Tables Ori Rottenstreich (Technion, Israel) Joint work with Marat Radan, Yuval Cassuto, Isaac Keslassy (Technion, Israel) Carmi.
Chapter 9 -- Simplification of Sequential Circuits.
Hash Tables.
MAT 103 Probability In this chapter, we will study the topic of probability which is used in many different areas including insurance, science, marketing,
The Capacity of Wireless Networks
Great Theoretical Ideas in Computer Science
Two Segments Intersect?
Scale Free Networks.
K-means Clustering Ke Chen.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Addition 1’s to 20.
25 seconds left…...
Section 5: More Parallel Algorithms
Week 1.
Week 10 Creating Positioned Layouts
CSE 473/573 Computer Vision and Image Processing (CVIP) Ifeoma Nwogu Lecture 27 – Overview of probability concepts 1.
Rizwan Rehman Centre for Computer Studies Dibrugarh University
Choosing an Order for Joins
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Tree Clustering for Constraint Networks 1 Chris Reeson Advanced Constraint Processing Fall 2009 By Rina Dechter & Judea Pearl Artificial Intelligence,
The Small World Phenomenon: An Algorithmic Perspective Speaker: Bradford Greening, Jr. Rutgers University – Camden.
1 Analyzing Kleinberg’s Small-world Model Chip Martel and Van Nguyen Computer Science Department; University of California at Davis.
Trees Chapter 11.
Epp, section 10.? CS 202 Aaron Bloomfield
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
all-pairs shortest paths in undirected graphs
Secret Sharing, Matroids, and Non-Shannon Information Inequalities.
Minimum Vertex Cover in Rectangle Graphs
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Efficient access to TIN Regular square grid TIN Efficient access to TIN Let q := (x, y) be a point. We want to estimate an elevation at a point q: 1. should.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
Fault Tolerant Storage And Quorum Systems in Dynamic Environments Uri Nadav, Master thesis Advisor: Moni Naor The Weizmann Institute of Science.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
Improved results for a memory allocation problem Rob van Stee University of Karlsruhe Germany Leah Epstein University of Haifa Israel WADS 2007 WAOA 2007.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith CohenScott Shenker Some slides are taken from the authors’ original presentation.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
A Torus Quorum Protocol for Distributed Mutual Exclusion A Torus Quorum Protocol for Distributed Mutual Exclusion S.D. Lang and L.J. Mao School of Computer.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Peer-to-Peer Networks 07 Degree Optimal Networks
Haim Kaplan and Uri Zwick
Broadcast Encryption Amos Fiat & Moni Naor Advances in Cryptography - CRYPTO ’93 Proceeding, LNCS, Vol. 773, 1994, pp Multimedia Security.
Presentation transcript:

Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science

Slide - 2 Quorum Systems A quorum system is an intersecting family of sets over some universe. Formal Definition:  U – Universe  Hello World  is called a quorum system. A, B are called quorum sets. Examples  Majority – all sets that contain more than half of the elements.  Dictatorship – all sets that contain a specific element.  Many more…

Slide - 3 Quorum Systems - Applications The universe is associated with a set of processors.  Mutual exclusion: In order to enter a critical section, a user must get permission from a quorum set. Intersection property guaranties mutual exclusion. [GB85].  Data replication: Divide the quorum sets into reading sets and writing sets. Intersection property guaranties effective search.  More….

Slide - 4 Example – The PATHS Quorum System Suggested by [NW94]. Element  Pair of dual (crossing) edges. Quorum Set  Left – Right path + Top – Bottom path. Every top-bottom path in the dual grid intersects every left- right path in the grid. Data replication:  Top Bottom – Writing.  Right Left – Reading.

Slide - 5 Load  Each quorum set is chosen by the user with some probability.  Imposes a probability of accessing a processor.  The load measures the access probability of the busiest processor. Example: In the Majority system, if a random set of size n/2 + 1 is chosen, the load is asymptotically half (and this is best possible). Theorem [NW94]: The load of a quorum system is at least  The load is at least. ( For every system and every access strategy ). The PATHS system has load of. Measures of Quality - Load Let c be the size of the smallest quorum set.

Slide - 6 Availability.  Assume each processor fails with some fixed probability p. What is the probability that there still exists a quorum set? Theorem[PW95] : If then the singleton has the ‘best’ availability. The PATHS system has a live quorum set with probability, ( for ). Measures of Quality - Availability

Slide - 7 Measures of Quality – Probe Complexity A random portion of the processors are down.  How many processors should be queried before a live quorum is found? Adaptive algorithms – more efficient [HP01, KXG00, PW96]. Non adaptive algorithms (predefined set of probed elements) – Easy to implement in parallel.  Given a network topology, what is the communication complexity of accessing these processors [Bazzi96]. Processors from the same quorum should be ‘close’ to one another.

Slide - 8 Our Contributions Probe Complexity:  Lower bound for non-adaptive algorithms.  Tight upper bound for PATHS.  Tight adaptive upper bound for PATHS. Introduce Dynamic PATHS (DPATHS).  Dynamic P2P style version in which processors may join and leave.  Scales well.  Maintains the good properties of PATHS.

Slide - 9 Probe Complexity vs Load Probe complexity depends on the load.  Example: Only a small number of processors participate in quorum sets  Small probe complexity and high load.  Notation: 1/c – the load of the quorum system. X – set of probed elements. Non-adaptive algorithm must choose X in advance. p – failure probability. The PATHS system has a non-adaptive probe complexity of Theorem: If then If load is then

Slide - 10 Probe Complexity – Upper Bound A failed edge corresponds to a surviving dual edge that crosses it.  An edge fails with probability  Dual edge fails with probability A top – bottom path must circumvent red components of dual graph. By Menshikov’s Theorem - All red components are of diameter O(log n), therefore a strip of width O(log n) would contain a path w.h.p. Survived dual edge. Conclusion: The non-adaptive probe complexity of PATHS is

Slide - 11 Adaptive Probe Complexity All red components have small diameter. All red component have small volume. Smart DFS finds a path of length. Optimal load implies quorum sets are of size. Conclusion: PATHS has optimal adaptive probe comp. Survived dual edge. Non-adaptive probe complexity is strictly higher than adaptive complexity.

Slide - 12 Paths Quorum System - Summary Load -. Optimal Availability – Very high when. Optimal Probe Complexity –  Non-adaptive -. Optimal (for load).  Adaptive -. Optimal (for load). Load after failures -. Optimal. Network implementation - Supports probing algorithms (think of edges as links).

Slide - 13 Dynamic Quorum Systems. Motivation: Peer-to-Peer applications. Related Work – dynamic probabilistic quorums[AM03] Processors may join and leave the quorum system. Objectives:  Low cost of Join/Leave  Maintain the intersection property (integrity). New quorum sets Adjust old quorum sets that are no longer valid.  Scalability Load should reduce when processors join. Availability should increase when processors join. Probe complexity should not grow by much.

Slide - 14 Dynamic Quorums Main Idea: Assign each processor to a point in a continuous space. The underlying space is the unit square. Divide the space into cells using a Voronoi diagram. CAN[01] suggests dividing the space into rectangles.  A cell consists of all the points that are closest to the processor.  Average degree of a cell is always 6.  Adding and removing a point is a local computation.

Slide - 15 Voronoi Diagram – The Delaunay Graph

Slide - 16 Voronoi Diagram – Join\Leave

Slide - 17 Random Voronoi Diagram If each processor chooses its location uniformly and independently then:  The average degree is 6 (always), the maximum degree is with high probability.  The average area of a cell is. The maximum area of a cell is with high probability.  The average projection on the axis lines is of length. The maximum projection is with high probability.

Slide - 18 The Dynamic Paths Quorum System

Slide - 19 Integrity Old Quorum sets may not be valid anymore.  Solution – application dependent. New processor must join the quorum set.

Slide - 20 Dynamic Paths – Measurs of Quality Load – Depends on the size of the cell’s projection on the axis lines. Might reach. Availability – Probability a live quorum set exists when converges to 1 (when n ). The exact rate of convergence is unknown. Probe Complexity – Probably good. A Menshikov style theorem for Voronoi Diagrams is conjectured but not proven. If all cells are of size then there exists such that for failure probability, the qualities of PATHS follow to DPATHS.

Slide - 21 Open Questions Load balancing schemes. Devise simple and reliable protocols for maintaining all cells in equal size. Good for many applications (such as building expanders [NW03]).  Sample log n locations, and enter the largest cell encountered.  Deterministic solutions? Simpler solutions? Menshikov style theorems for random Voronoi Diagrams - pushing the failure probability all the way to half. (Hard). Can resilience for worst case faults be achieved without damaging other parameters?