Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci HIERARCHICAL P2P OVERLAYS FOR.

Slides:



Advertisements
Similar presentations
Scheduling in Web Server Clusters CS 260 LECTURE 3 From: IBM Technical Report.
Advertisements

P2PR-tree: An R-tree-based Spatial Index for P2P Environments ANIRBAN MONDAL YI LIFU MASARU KITSUREGAWA University of Tokyo.
1 EuroIMSA 2007 Chamonix, March th 2007 A PUBLISH SUBSCRIBE SUPPORT FOR NETWORKED MULTIPLAYER GAMES IASTED European Conference on INTERNET AND MULTIMEDIA.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
A P2P REcommender system based on Gossip Overlays (PREGO) ‏ R.Baraglia, P.Dazzi M.Mordacchini, L.Ricci A P2P REcommender system based on Gossip Overlays.
Building of P2P Overlay Networks via Voronoi and Gossip Ranieri Baraglia.
What’s the Problem Web Server 1 Web Server N Web system played an essential role in Proving and Retrieve information. Cause Overloaded Status and Longer.
Scalable Content-aware Request Distribution in Cluster-based Network Servers Jianbin Wei 10/4/2001.
1 Routing and Scheduling in Web Server Clusters. 2 Reference The State of the Art in Locally Distributed Web-server Systems Valeria Cardellini, Emiliano.
Peer-to-Peer Support for Massively Multiplayer Games Bjorn Knutsson, Honghui Lu, Wei Xu, Bryan Hopkins Presented by Mohammed Alam (Shahed)
JaDE: A JXTA Support for Distributed Virtual Environments Luca Genovali Laura Ricci Luca Genovali, Laura Ricci Università degli Studi di Pisa JaDE: A JXTA.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang Adaptive Computing and Networking (ACN) Laboratory Department of Computer Science and Information Engineering.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
FernUniversität Hagen:Multimedia and Internetapplications1 VoroDSPT A P2P-Network for Spatial Objects FernUniversität Hagen Informatikzentrum D Hagen.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Carnegie Mellon University Complex queries in distributed publish- subscribe systems Ashwin R. Bharambe, Justin Weisz and Srinivasan Seshan.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
1 IMPROVING RESPONSIVENESS BY LOCALITY IN DISTRIBUTED VIRTUAL ENVIRONMENTS Luca Genovali, Laura Ricci, Fabrizio Baiardi Lucca Institute for Advanced Studies.
1 AINA 2006 Wien, April th 2006 DiVES: A DISTRIBUTED SUPPORT FOR NETWORKED VIRTUAL ENVIRONMENTS The IEEE 20th International Conference on Advanced.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
School of Computer Science and Software Engineering A Networked Virtual Environment Communications Model using Priority Updating Monash University Yang-Wai.
AOI cast Based Compass Routing in Distributed Virtual Environments Michele Albano, Luca Genovali Antonio Quartulli, Laura Ricci AOI CAST TOLERANCE BASED.
Sericce and Resource Discovery Supports over P2P Overlays Emanuele Carlini, Massimo Coppola Patrizio Dazzi, Domenico Laforenza, Laura Ricci SERVICE AND.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
XtreemOS IP project is funded by the European Commission under contract IST-FP XtreemOS WP3.2 - T3.2.3 Scalable Directory Service Design State.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
CS218 – Final Project A “Small-Scale” Application- Level Multicast Tree Protocol Jason Lee, Lih Chen & Prabash Nanayakkara Tutor: Li Lao.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 By Vanessa Newey. 2 Introduction Background Scalability in Distributed Simulation Traditional Aggregation Techniques Problems with Traditional Methods.
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Algorithms for Self-Organization and Adaptive Service Placement in Dynamic Distributed Systems Artur Andrzejak, Sven Graupner,Vadim Kotov, Holger Trinks.
1 Latency Equalization: A Programmable Routing Service Primitive Minlan Yu Joint work with Marina Thottan, Li Li at Bell Labs.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
Mobile Agent Technology for the Management of Distributed Systems - a Case Study Claudia Raibulet& Claudio Demartini Politecnico di Torino, Dipartimento.
Network Aware Resource Allocation in Distributed Clouds.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
Peer to Peer Applications in Ad hoc Networks Author: Jesús Hijas Networking Laboratory Helsinki University of Technology Supervisor:
Seminar 3: Scalability by Zhexin Yang Zhuomin Liu Zhao Wang.
Introduction to Networked Graphics Part 4 of 5: Bandwidth Management & Scalability.
The NIProxy: a Flexible Proxy Server Supporting Client Bandwidth Management and Multimedia Service Provision Maarten Wijnants Wim Lamotte.
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Efficient AOI-Cast for Peer-to-Peer Networked Virtual Environments.
ICS362 – Distributed Systems Dr. Ken Cosh Week 2.
A Grid-enabled Multi-server Network Game Architecture Tianqi Wang, Cho-Li Wang, Francis C.M.Lau Department of Computer Science and Information Systems.
An Adaptive Load Balancing Management for Distributed Virtual Environment Systems Yuanxing Yao 1, Tae-Hyung Kim 1, 1 Department of Computer Science and.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
1 Selection Strategies for Peer-to-Peer 3D Streaming Wei-Lun Sung, Shun-Yun Hu, Jehn-Ruey Jiang National Central University, Taiwan 2008/05/29.
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Malugo – a scalable peer-to-peer storage system..
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Tutorial 3 – Computational Geometry
CHAPTER 3 Architectures for Distributed Systems
An Adaptive Load Balancing Management for
Scalable Peer-to-Peer Networked Virtual Environment
A Case for Mutual Notification
Replica Placement Heuristics of Application-level Multicast
Presentation transcript:

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci HIERARCHICAL P2P OVERLAYS FOR DVE: AN ADDITIVELY WEIGHTED VORONOI APPROACH Michele Albano, Luca Genovali, Laura Ricci International Conference on Ultra Modern Telecommunications, ICUMT Saint Petersburg, October 12-14th, 2009 Università degli Studi di Pisa Dipartimento di Informatica

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci DISTRIBUTED VIRTUAL ENVIRONMENTS Real-Time Distributed Virtual Environments : provide to geographically distributed end-users the illusion of being immersed in a unique shared virtual world real time interactions among users and/or among users and computer controlled entities Examples: – distributed multiplayer games, military simulations Multiplayer Games: a set of entities (avatars, monsters, tanks,…) populate a virtual world each entity communicates to the other ones its state (position, colour,energy,...), or the updates of the passive objects of the DVE real time requirements: the action performed by an entity must be visible to other entities within a bounded interval of time examples:World of Warcraft,Second Life,.....

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci DISTRIBUTED VIRTUAL ENVIRONMENTS Architectural Choices Client – Server Consistency Persistency Security Cost Scalability Fault-tolerance Peer to Peer Scalability Fault-tolerance Cost Complexity Consistency Persistency Architectural Challenges: consistency of the virtual world synchronization state replication real time requirements

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci IMPROVING DVE SCALABILITY Interest Management: DVE communication requirements reduction Area of Interest (AOI) of an entity E: portion of the virtual world including entities that may interact with E – example: a player interacts with entities (players, monsters) located in its surroundings, e.g. in the same room. The definition of the AOI of E depends upon the semantics of the application, e.g. the sight capability of E E is interested in receiving information from entities in its AOI only Existing Approaches: – Multicast groups – Publish-subscribe systems

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci NEIGHBOURS DYNAMIC DISCOVERY When the blue node moves: All its neighbours exit its AOI, the blue nodes is isolated Definition of mechanisms to maintain overlay connectivity When the blue node moves Some nodes enters its AOI (red  green), others exit its AOI (green  red) ‏ Definition of mechanisms to dinamically discover new nodes entering AOI

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci VORONOI TESSELLATIONS Voronoi Tessellation: A partition of the plane into cells Consider a set of sites (black points in the figure) ‏ a cell for each site s including the set of points closer to s than to any other site all edges of the Voronoi tessellation belongs to the bisectors between the sites Voronoi neighbours sites whose cell have an overlapping border Delaunay Triangulation graph connecting Voronoi neighbours

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci VORONOI-BASED DVE The position of each peer in the DVE is exploited to define a Voronoi tessellation of the virtual world P2P overlay = includes Delaunay links which guarantee overlay connectivity A peer P dinamically computes a Voronoi tessellation including the peers in its AOI connects to all its Voronoi neighbours through Delaunay links periodically notifies its position (heartbeat). Two alternative solutions P sends the notification only to its Voronoi neighbours. A routing mechanism to reach all the peers in the AOI is required P sends the notification to all the peers in its AOI 'Pass the word mechanism'. Peers become acquainted of each other through peers located their AOI

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci WEIGHTED VORONOI TESSELLATIONS Weighted Voronoi Tesssellation: exploit metrics different from the standard eucliden one The cell associated with a site s i includes the points closer to s i than to any othet site, according to the new metric Each site is associated with a weight w i Distance of a point x from the site s i Additively Weighted Voronoi: d(s i,x) = ll s i -x ll – w i Multiplicative Weighted Voronoi: d(s i,x) = ll s i -x ll / w i Weighted Voronoi Tessellations: sites with larger weights 'attract' a larger number of points, i.e. are associated with larger Voronoi regions

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci ADDITIVELY WEIGHTED VORONOI Weight is represented by a circle. Weightless peers (weight=0) may exist Bisectors are hyperbolic A simple model: every site begins to grow in a different point in time, proportional to its weight In the figure – Sites B(weightless), rs. D (heavy) are hidden, they own no Voronoi region, because they have been absorbed by A, rs. C – Weightless sites F, rs. E, are visible, i.e. they own a Voronoi region, because they are far enough from heavy sites weightless sites may be visible, heavy sites (weight  0) may be hidden visible peers are associated with a Voronoi region A B C D E F A

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci MULTIPLICATIVE WEIGHTED VORONOI Each site grows at a different rate Bisectors are usually circular arcs Regions can be surrounded The regions associated to the sites may not cover the whole plane

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci MODELLING HIERARCHICAL P2P OVERLAYS P2P overlays often include heterogeneous peers, characterized by different computational resources Hierarchical P2P networks exploit the heterogeneity of peers to define a hierarchy of peers This solution is often exploited in file-sharing P2P overlays (Gnutella 0.6, Kazaa,..) No DVE hierarchical P2P overlay has been proposed till now Our proposal: to exploit AWV tessellation to define a hierarchical P2P overlay – A site for each peer P – The weight of P proportional to its bandwidth (further computational resources may be considered) ‏

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci MODELLING HIERARCHICAL P2P DVE Load among peers may be balanced by a proper chooice of their weights Balancing the load of passive objects management – each peer is assigned to the peer whose Voronoi region includes the coordinates of the object – peer with larger weights owns larger Voronoi regions and manage more objects Balancing the notification traffic – Superpeer = Visible Peer which has absorbed some hidden peer – A superpeer may act as a proxy on the P2P overlay for its hidden peers hidden peers exploits P to forward/receive their notifications, for instance heartbeat notifications

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci MODELLING HIERARCHICAL P2P OVERLAYS AWV based DVE: an example Red points = visible peers, Black points = hidden peers Circles radius is proportional to the peer weight A, B = Superpeers – A rs. B propogate the notifications of D rs. E to their visible Voronoi neighbours When a weightless peer is far away from an heavy peer – It is not absorbed by a superpeer and owns a voronoi region – It manages objects, belongs to the overlay network and send/receive events notifications – further load balance mechanisms are required in this case

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci ROUTING OVER AWV OVERLAYS Several strategies for routing heartbeats in Voronoi based overlays have been recently proposed These approaches must be revised to take into account hidden peers Each hidden peer H sends its notification to its superpeer SP SP dispatches this notifications to its further hidden peers in the AOI of H its visible neighbours which belongs to the AOI of H or have an hidden peer whose AOI intersects the AOI of H ‏

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci ROUTING OVER AWV OVERLAYS A propagates the heartbeat of D to further hidden peer belonging to the AOI of D A propagates the heartbeat of D to B because E, hidden by B, belongs to the AOI of D

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci AWT EVALUATION Evaluation through a set of preliminary simulations Peersim: A scalable event driven P2P simulator CGAL (Computational Geometry Algorithms Library) An Open Source Project providing easy access to efficient and reliable geometric algorithms in the form of a C++ library – A package implementing Apollonius graphs Additive Weighted Voronoi Diagram = Voronoi diagram of a set of disks under the Euclidean metric No support for Multiplicative Weighted Voronoi SWIG (Simplified Wrapper and Interface Generator) exploited to link CGAL and Peersim

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci TUNING THE WEIGHT Different simulation runs, each one characterized by a different weight 800 weightless peers, 100 heavy peers Left hand side: mean number of visible peers against cycle number Right hand side : mean number of hidden peers against cycle number

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci DECREASING THE WEIGHT 800 weightless peers, 100 heavy peers all with the same weight p is decreased during the simulation when p  80 only all the weightless peers are hidden, i.e. each weightless peer has a superpeer Each Superpeer manages 8 hidden peers, on the average

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci OBJECT MANAGEMENT 800 weightless peers, 100 heavy peers all with the same weight 4000 passive objects p is decreased during the simulation when p  80 only the heavy peers owns the objects, because the 800 weightless peers are hidden by the 100 heavy peers

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci NUMBER OF LINKS OF VISIBLE PEERS 800 weightless peers, 100 heavy ones the weight p is modified during the simulation, from p=100 to p=0 the figure shows the mean number of links from heavy peers to visible peers (upper line) ‏ from weightless peers to visible peers(middle line)

Hierarchical P2P Overlays for DVE: An Additively Weighted Voronoi Based Approach Michele Albano Luca Genovali Laura Ricci CONCLUSIONS An additive weighted Voronoi approach to model hierarchical P2P networks Object Management is balanced among the peers according to their computational power Peers with low bandwidth can rely on a close heavy peer as a proxy for notification forwarding Future works: – definition of a proper routing algorithm for AWV tessellations – investigation of multiplicative weighted Voronoi Diagrams more sophisticated mobility models