1 CompuP2P: An Architecture for Sharing of Computing Resources In Peer-to-Peer Networks With Selfish Nodes Rohit Gupta and Arun K. Somani

Slides:



Advertisements
Similar presentations
Current methods for negotiating firewalls for the Condor ® system Bruce Beckles (University of Cambridge Computing Service) Se-Chang Son (University of.
Advertisements

Distributed Processing, Client/Server and Clusters
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
SLA-Oriented Resource Provisioning for Cloud Computing
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Speaker: Cathrin Weiß 11/23/2004 Proseminar Peer-to-Peer Information Systems.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up.
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Peer-to-Peer Distributed Search. Peer-to-Peer Networks A pure peer-to-peer network is a collection of nodes or peers that: 1.Are autonomous: participants.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
1 Routing and Scheduling in Web Server Clusters. 2 Reference The State of the Art in Locally Distributed Web-server Systems Valeria Cardellini, Emiliano.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Introduction to Peer-to-Peer (P2P) Systems Gabi Kliot - Computer Science Department, Technion Concurrent and Distributed Computing Course 28/06/2006 The.
CS 104 Introduction to Computer Science and Graphics Problems
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
On Line Markets for Distributed Object Services: The MAJIC System Lior Levy, Liad Blumrosen and Noam Nisan The Hebrew University, Jerusalem Presented by.
Introduction  What is an Operating System  What Operating Systems Do  How is it filling our life 1-1 Lecture 1.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Wide-area cooperative storage with CFS
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
On-Demand Media Streaming Over the Internet Mohamed M. Hefeeda, Bharat K. Bhargava Presented by Sam Distributed Computing Systems, FTDCS Proceedings.
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
Distributed Systems Early Examples. Projects NOW – a Network Of Workstations University of California, Berkely Terminated about 1997 after demonstrating.
Towards Efficient Load Balancing in Structured P2P Systems Yingwu Zhu, Yiming Hu University of Cincinnati.
Effizientes Routing in P2P Netzwerken Chord: A Scalable Peer-to- peer Lookup Protocol for Internet Applications Dennis Schade.
Parallel Computing The Bad News –Hardware is not getting faster fast enough –Too many architectures –Existing architectures are too specific –Programs.
Computer System Architectures Computer System Software
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
Aspects of E-Science, Mathematics and Theoretical Computer Science Professor Iain Stewart Department of Computer Science University of Durham March 2003.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
MapReduce: Simplified Data Processing on Large Clusters Jeffrey Dean and Sanjay Ghemawat.
Grid Appliance – On the Design of Self-Organizing, Decentralized Grids David Wolinsky, Arjun Prakash, and Renato Figueiredo ACIS Lab at the University.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
The Design of A Distributed Rating Scheme for Peer-to-peer Systems Debojyoti Dutta 1, Ashish Goel 2, Ramesh Govindan 1, Hui Zhang 1 1 University of Southern.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Serverless Network File Systems Overview by Joseph Thompson.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Evaluating Wireless Network Performance David P. Daugherty ITEC 650 Radford University March 23, 2006.
Data Communications and Networks Chapter 9 – Distributed Systems ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Malugo – a scalable peer-to-peer storage system..
System Models Advanced Operating Systems Nael Abu-halaweh.
Distributed Hash Tables (DHT) Jukka K. Nurminen *Adapted from slides provided by Stefan Götz and Klaus Wehrle (University of Tübingen)
1 Distributed Hash tables. 2 Overview r Objective  A distributed lookup service  Data items are distributed among n parties  Anyone in the network.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Memory Management.
OpenMosix, Open SSI, and LinuxPMI
Meng Cao, Xiangqing Sun, Ziyue Chen May 28th, 2014
Comparison of LAN, MAN, WAN
An Introduction to Computer Networking
Outline Midterm results summary Distributed file systems – continued
Presentation transcript:

1 CompuP2P: An Architecture for Sharing of Computing Resources In Peer-to-Peer Networks With Selfish Nodes Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Iowa State University

2 Outline CompuP2P overview Prototype implementation for compute power sharing Comparison with Condor, and POPCORN Open Issues

3 CompuP2P: An Overview CompuP2P is a peer-to-peer (P2P) utility infrastructure designed to span WANs Dynamically build markets for a computing resource Uses game theoretic ideas to govern pricing of computing resources Usage Provide computation capabilities to processing-intensive user applications, like network simulations, graphics Support storage intensive applications such as data-bases and file systems

4 System Model Assumes a P2P configuration that uses Chord for addressing and peer connectivity Nodes are selfish, earn profit by selling their computing resources Sellers incur a cost, referred to as marginal costs Resource Units Compute power: cycles/sec for T time units Memory storage: giga(mega) bytes for T time units

5 Overview of Chord Chord provides fast distributed hash function that maps keys to nodes Each node and key is assigned an m-bit identifier Identifiers are ordered on an identifier circle modulo 2 m Key k is assigned to the first node (called the successor node ) whose identifier is equal to or follows (the identifier of) k in the identifier space

6 Chord Lookup Protocol Keys 1, 2, 6 Successor(1) = 1 Successor(2) = 3 Successor(6) = 0 Lookup successor(1) from node 3

7 Construction of Compute Power Markets Markets for different amounts of compute power are created A market deals in only one type of commodity. Commodity here refers to compute power in a certain well- defined range The same node can be responsible (i.e. be a market owner MO) for running multiple markets Two schemes Single overlay Processor overlay

8 Single Overlay Scheme The number of CPU cycles/sec gives the Chord ID of the market and the successor is the MO MO = successor(C) Simple to implement Can lead to uneven assignment of markets among nodes and requires large number of hops MO for (5,8]

9 Processor Overlay Scheme More uniformly assign markets among nodes MO = successor(hash(C)) MOs form an additional overlay IDs equal to the commodity values The lookup returns the IP address of the market trading in commodity equal to or greater in value than requested Emulates the best-fit approach Lookup is faster (O(log M) steps) in processor overlay Requires extra overhead

10 Processor Overlay Scheme Chord overlay (numbers next to the nodes are the Chord IDs) Processor Overlay 1, MO for C= , MO for C=1 and CMID=1 2 3 Instance of node with Chord ID=1 Instance of physical node with Chord ID=4 C = average idle capacity in cycles/sec

11 Incentives to Market Owners (MO) MOs make profit by charging listing price Fixed listing pricing Same price charged to all the sellers (buyers) Simple but unfair and difficult to implement Variable listing pricing Depends on the dynamics of the markets Fairer but trickier due to selfish MOs

12 Incentives to Sellers Use of marginal costs is the optimal pricing strategy Bertrand oligopoly Sellers have control over prices Prices equal to marginal costs …means NO profits !!!

13 Pricing Compute Power Reverse Vickrey auction for fixed listing pricing Select the lowest cost supplier at the price of the second lowest marginal cost Max-min payoff strategy for variable listing pricing Set the payoffs to the MO and seller opposite to each other Sellers 1,2,…N with costs MC 1, MC 2,…MC N in increasing order of values Buyer relies on the MO to get information about the sellers Buyer looking to minimize its cost Payoff functions used by buyers are well known

14 Max-Min Payoffs Proposition a)Collusion is avoided b)The lowest cost supplier is always selected c) The total cost to the buyer is bounded d) Payoffs are market dynamics dependent

15 Prototype Implementation Implemented a Java-based prototype Using it for running compute intensive simulations Printing quota as a form of virtual currency Users submit a task-specification file as input Describe the inputs and precedence relation among the sub-tasks comprising a task Class files can be downloaded from a well-defined code server Fault-tolerance Handling node crashes Dynamic checkpointing Use PJama

16 Comparison With Related Projects (UC Berkeley 1996) Only one central server can allocate tasks to others Condor (University of Wisconsin-Madison 1985) All machines under the control of a single cluster head Task management, scheduling, and checkpointing is centralized POPCORN ( Hebrew University 1997 ) Uses a trusted centralized market

17 Open Issues CompuP2P relies on a monetary payment scheme Using reputation as a substitute for currency Verifying computation results Redundant computations Can complicate pricing

18 Questions