Implementing declarative overlays Boom Thau Loo Tyson Condie Joseph M. Hellerstein Petros Maniatis Timothy Roscoe Ion Stoica.

Slides:



Advertisements
Similar presentations
P2: Implementing Declarative Overlays
Advertisements

Forward Data Cache Integration Pattern
Declarative Networking: Language, Execution and Optimization Boon Thau Loo 1, Tyson Condie 1, Minos Garofalakis 2, David E. Gay 2, Joseph M. Hellerstein.
Implementing Declarative Overlays Timothy Roscoe Joint work with Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Ion Stoica Intel.
Intel Research Timothy Roscoe P2: Implementing Declarative Overlays Timothy Roscoe Boon Thau Loo, Tyson Condie, Petros Maniatis, Ion Stoica, David Gay,
Implementing Declarative Overlays Boon Thau Loo 1 Tyson Condie 1, Joseph M. Hellerstein 1,2, Petros Maniatis 2, Timothy Roscoe 2, Ion Stoica 1 1 University.
Declarative Networking Mothy Joint work with Boon Thau Loo, Tyson Condie, Joseph M. Hellerstein, Petros Maniatis, Ion Stoica Intel Research and U.C. Berkeley.
A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance Found in: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO.
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
The Design and Implementation of Declarative Networks Boon Thau Loo University of Pennsylvania, University of California-Berkeley * *This dissertation.
Edelweiss: Automatic Storage Reclamation for Distributed Programming Neil Conway Peter Alvaro Emily Andrews Joseph M. Hellerstein University of California,
Implementing Declarative Overlays From two talks by: Boon Thau Loo 1 Tyson Condie 1, Joseph M. Hellerstein 1,2, Petros Maniatis 2, Timothy Roscoe 2, Ion.
Berkeley dsn declarative sensor networks problem David Chu, Lucian Popa, Arsalan Tavakoli, Joe Hellerstein approach related dsn architecture status  B.
Declarative sensor networks David Chu Computer Science Division EECS Department UC Berkeley DBLunch UC Berkeley 2 March 2007.
CAST i CAST iCAST / TRUST Collaboration Presenter : David Chu 2007 June 5 A Declarative Sensor Network Architecture.
Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Mayamounkov David Mazières A few slides are taken from the authors’ original.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
An Associative Broadcast Based Coordination Model for Distributed Processes James C. Browne Kevin Kane Hongxia Tian Department of Computer Sciences The.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
Berkeley slides were used for this tutorial 1 Internet Networking Spring 2003 Tutorial 3 DUAL Algorithm.
Zero-programming Sensor Network Deployment 學生:張中禹 指導教授:溫志煜老師 日期: 5/7.
P2p, Fall 05 1 Querying the Internet with PIER (PIER = Peer-to-peer Information Exchange and Retrieval) VLDB 2003 Ryan Huebsch, Joe Hellerstein, Nick Lanham,
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
A State-based Programming Model and System for Wireless Sensor Networks Reporter : Zhi-Yuan Yang 2010/5/24.
Collaboration Diagrams. Example Building Collaboration Diagrams.
The End of Internet Architecture Author: Timothy Roscoe Presented by Gross, Zhaosheng Zhu.
6/27/2015Page 1 This presentation is based on WS-Membership: Failure Management in Web Services World B. Ramamurthy Based on Paper by Werner Vogels and.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
A Case for End System Multicast Author: Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan and Hui Zhang.
SQL Overview Defining a Schema CPSC 315 – Programming Studio Spring 2008 Project 1, Lecture 3 Slides adapted from those used by Jeffrey Ullman, via Jennifer.
SQL Overview Defining a Schema CPSC 315 – Programming Studio Slides adapted from those used by Jeffrey Ullman, via Jennifer Welch Via Yoonsuck Choe.
Optimizing Queries and Diverse Data Sources Laura M. Hass Donald Kossman Edward L. Wimmers Jun Yang Presented By Siddhartha Dasari.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
SensIT PI Meeting, January 15-17, Self-Organizing Sensor Networks: Efficient Distributed Mechanisms Alvin S. Lim Computer Science and Software Engineering.
Implementation Yaodong Bi. Introduction to Implementation Purposes of Implementation – Plan the system integrations required in each iteration – Distribute.
Using Queries for Distributed Monitoring and Forensics Atul Singh Rice University Peter Druschel Max Planck Institute for Software Systems Timothy Roscoe.
Declarative Routing: Extensible Routing with Declarative Queries UC Berkeley: Boon Thau Loo, Joseph M. Hellerstein, Ion Stoica. Intel Research: Joseph.
Event-Condition-Action Rule Languages over Semistructured Data George Papamarkos.
5 Copyright © 2009, Oracle. All rights reserved. Right-Time Data Warehousing with OWB.
PIER & PHI Overview of Challenges & Opportunities Ryan Huebsch † Joe Hellerstein † °, Boon Thau Loo †, Sam Mardanbeigi †, Scott Shenker †‡, Ion Stoica.
Chapter 7 Advanced SQL Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Lecture Set 14 B new Introduction to Databases - Database Processing: The Connected Model (Using DataReaders)
Titanium/Java Performance Analysis Ryan Huebsch Group: Boon Thau Loo, Matt Harren Joe Hellerstein, Ion Stoica, Scott Shenker P I E R Peer-to-Peer.
MobileMAN Integration and Experimentation of Legacy Mobile Multihop Ad Hoc Networks Eleonora Borgia, Marco Conti, and Franca Delmastro Institute for Informatics.
Nikitas N. Karanikolas, Maria Nitsiou, Emmanuel J. Yannakoudakis and Christos Skourlas CUDL Language Semantics, Liven Up the FDB Data Model.
Modeling Component-based Software Systems with UML 2.0 George T. Edwards Jaiganesh Balasubramanian Arvind S. Krishna Vanderbilt University Nashville, TN.
8 1 Chapter 8 Advanced SQL Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Customizable Routing with Declarative Queries Boon Thau Loo 1 Collaborators: Joseph M. Hellerstein 1,2, Karthik Lakshminarayanan 1, Raghu Ramakrishnan.
CSS446 Spring 2014 Nan Wang.  To understand the implementation of linked lists and array lists  To analyze the efficiency of fundamental operations.
INTRODUCTION lecture1 1. Data base concept Data is a meaningless static value. What does 3421 means? Information is the data you process in a manner that.
Dec. 13, 2002 WISE2002 Processing XML View Queries Including User-defined Foreign Functions on Relational Databases Yoshiharu Ishikawa Jun Kawada Hiroyuki.
Session 1 Module 1: Introduction to Data Integrity
Professor: Dr. Shu-Ching Chen TA: Hsin-Yu Ha Function, Trigger used in PosgreSQL.
Object storage and object interoperability
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
The Cost of Inconsistency in Chord Shelley Zhuang, Ion Stoica, Randy Katz OASIS/i3 Retreat, January 2005.
Declarative Networking: Language, Execution and Optimization
Declarative Networking
Self Healing and Dynamic Construction Framework:
Database Fundamentals
Declarative Networking
Reading Report 11 Yin Chen 1 Apr 2004
B. Ramamurthy Based on Paper by Werner Vogels and Chris Re
By Werner Vogels and Chris Re
By Werner Vogels and Chris Re
Presentation transcript:

Implementing declarative overlays Boom Thau Loo Tyson Condie Joseph M. Hellerstein Petros Maniatis Timothy Roscoe Ion Stoica

Presentation Introduction P2 approach Overlog examples (NARADA mesh) Implementation Performance Conclusions

INTRODUCTION Overlay networks are used in variety of distributed systems. P2: a facility, deployable as a service or library, for the declarative construction, maintenance, and sharing of an overlay network Applications: concise a logical description of an overlay network, and P2 executes this to maintain routing data structures, perform resource discovery and forwarding functionality. Goal: simplify the process of selecting, implementing, deploying and evolving an overlay network design.

INTRODUCTION P2 does not aim as optimized performance as e.g. C, C++ or Java implementations. CHORD: 47 logical rules (full Overlog specification), MACEDON 320 statements. P2: Simplified approach (16 rules, NARADA)  Target is to demonstrate that declarative overlay descriptions can be implemented by P2 with acceptable performance.

P2 approach A combination of protocol- and structure centric approach that would be most attractive for overlay specification and runtime. P2 employs 2 types on relations: Soft-state tables (network state) Streams of transient tuples (stream query engines)

Overlog P2 specification language for overlays. Overlog designed for distribution of context data and messages. Overlog: P2 adds constructs to specify physical distribution properties. Tuples are physically generated, stored and sent Queries over streams Deletion of tuples

NARADA Summary of functionality (16 rules): 1.Each node maintains a set of neighbors, and a set of members in the group. 2.Each member epidemically propagates keep-alive messages for itself (Associated to monotonically increased sequence number) 3.Neighbors exchange information about membership liveness and sequence numbers. (members learn the liveness of each member) 4.If member fails to hear direct neighbor for a period, it declares neighbor dead. (updates its own membership state and propagates the rest population) 5.Periodical updates to measure roundtrip latency. 1.If latency time improves -> node A adds node B to its neighbor set 2.If latency time exceeds -> node A removes node B from its neighbor set

Example of NARADA based Overlog declarations Overlog syntacts: :- Neighbor and member are tables whose tuples are retained for 120 seconds: materialize(neighbor, 120, infinity, keys(2)). materialize(member, 120, infinity, keys(2)). materialize(sequence, infinity, 1, keys(2)). Rule (R1): R1 refreshEvent(X) :- periodic(X, E, 3). “Table refreshEvent has a row with value (X), for any X, if table periodic has a row with value (X, E, 3), for some E.”

P2 Implementation Platform: Linux Code: C++ Codelines: ~20k (+ 3 rd party support)

Block diagram of a P2 node

Performance (FIG. 3)

Performance (FIG. 4)

Conclusion The P2 approach looks promising Overlays can be specified concisely Performance is acceptable Overlog allows easy modification

Thank You!