Computer Networks Seminar Spring 2007 A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives Miguel Jimeno Ken Christensen.

Slides:



Advertisements
Similar presentations
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol Li Fan, Pei Cao and Jussara Almeida University of Wisconsin-Madison Andrei Broder Compaq/DEC.
Advertisements

A Fast Estimation of SRAM Failure Rate Using Probability Collectives Fang Gong Electrical Engineering Department, UCLA Collaborators:
CSC 774 Advanced Network Security
Order Statistics Sorted
Fast Algorithms For Hierarchical Range Histogram Constructions
CSC 774 Advanced Network Security
Huffman code and ID3 Prof. Sin-Min Lee Department of Computer Science.
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
Evaluation of Data Placement Method in Database Run-Time Processing Considering Energy Saving and Application Performance Naho IIMURA† Norifumi NISHIKAWA‡
Benchmarking Parallel Code. Benchmarking2 What are the performance characteristics of a parallel code? What should be measured?
Probabilistic Threshold Range Aggregate Query Processing over Uncertain Data Wenjie Zhang University of New South Wales & NICTA, Australia Joint work:
A Generic Framework for Handling Uncertain Data with Local Correlations Xiang Lian and Lei Chen Department of Computer Science and Engineering The Hong.
SIGMOD 2006University of Alberta1 Approximately Detecting Duplicates for Streaming Data using Stable Bloom Filters Presented by Fan Deng Joint work with.
Bloom Filters Kira Radinsky Slides based on material from:
Zero effort security for the home PC users? By Terje Risa.
Foundations of Constraint Processing, Spring 2008 Evaluation to BT SearchApril 16, Foundations of Constraint Processing CSCE421/821, Spring 2008:
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Foundations of Constraint Processing Evaluation to BT Search 1 Foundations of Constraint Processing CSCE421/821, Spring
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Electrical Engineering and Computer Science.
Bloom filters Probability and Computing Randomized algorithms and probabilistic analysis P109~P111 Michael Mitzenmacher Eli Upfal.
1Bloom Filters Lookup questions: Does item “ x ” exist in a set or multiset? Data set may be very big or expensive to access. Filter lookup questions with.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Computer Simulation A Laboratory to Evaluate “What-if” Questions.
1 SOUTHERN TAIWAN UNIVERSITY ELECTRICAL ENGINEERING DEPARTMENT Gain Scheduler Middleware: A Methodology to Enable Existing Controllers for Networked Control.
New Protocols for Remote File Synchronization Based on Erasure Codes Utku Irmak Svilen Mihaylov Torsten Suel Polytechnic University.
Computer Science Department University of Pittsburgh 1 Evaluating a DVS Scheme for Real-Time Embedded Systems Ruibin Xu, Daniel Mossé and Rami Melhem.
Energy Efficient Digital Networks Rich Brown Lawrence Berkeley National Laboratory Presentation to DOE State Energy Advisory Board Meeting August 14, 2007.
Ahsanul Haque *, Swarup Chandra *, Latifur Khan * and Michael Baron + * Department of Computer Science, University of Texas at Dallas + Department of Mathematical.
Ranking Queries on Uncertain Data: A Probabilistic Threshold Approach Wenjie Zhang, Xuemin Lin The University of New South Wales & NICTA Ming Hua,
1 Lecture 11: Bloom Filters, Final Review December 7, 2011 Dan Suciu -- CSEP544 Fall 2011.
Optimizing multi-pattern searches for compressed suffix arrays Kalle Karhu Department of Computer Science and Engineering Aalto University, School of Science,
Euro-Par, A Resource Allocation Approach for Supporting Time-Critical Applications in Grid Environments Qian Zhu and Gagan Agrawal Department of.
Stochastic DAG Scheduling using Monte Carlo Approach Heterogeneous Computing Workshop (at IPDPS) 2012 Extended version: Elsevier JPDC (accepted July 2013,
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
Optimal Selection of Power Saving Classes in IEEE e Lei Kong, Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University.
Power Management for Universal Plug and Play Jakob Klamra and Martin Olsson Department of Communication Systems Lund Institute of Technology Lund, Sweden.
Copyright © 2011, Performance Evaluation of a Green Scheduling Algorithm for Energy Savings in Cloud Computing Truong Vinh Truong Duy; Sato,
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 Chapter 7 Sampling Distributions. 2 Chapter Outline  Selecting A Sample  Point Estimation  Introduction to Sampling Distributions  Sampling Distribution.
Department of Computer Science & Engineering Green Client/Server Software to Save Energy in Network Devices Axel Vigo, Mentor: Miguel Jimeno, Advisor:
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Introduction to Information and Computer Science
CIAR Summer School Tutorial Lecture 1b Sigmoid Belief Nets Geoffrey Hinton.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
1 1 Slide Simulation Professor Ahmadi. 2 2 Slide Simulation Chapter Outline n Computer Simulation n Simulation Modeling n Random Variables and Pseudo-Random.
Calculating frequency moments of Data Stream
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Bloom Filters. Lecture on Bloom Filters Not described in the textbook ! Lecture based in part on: Broder, Andrei; Mitzenmacher, Michael (2005), "Network.
Cuckoo Filter: Practically Better Than Bloom Author: Bin Fan, David G. Andersen, Michael Kaminsky, Michael D. Mitzenmacher Publisher: ACM CoNEXT 2014 Presenter:
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
REU 2009-Traffic Analysis of IP Networks Daniel S. Allen, Mentor: Dr. Rahul Tripathi Department of Computer Science & Engineering Data Streams Data streams.
Project CS 116 Section 4 Deadline 04/28 11:59PM Points: 12.
= Computer Power Consumption and Management on Kansas State’s Campus
Author: Heeyeol Yu; Mahapatra, R.; Publisher: IEEE INFOCOM 2008
SOUTHERN TAIWAN UNIVERSITY ELECTRICAL ENGINEERING DEPARTMENT
Spatial Online Sampling and Aggregation
Bloom filters Probability and Computing Michael Mitzenmacher Eli Upfal
Evaluation of (Deterministic) BT Search Algorithms
On the Designing of Popular Packages
Evaluation of (Deterministic) BT Search Algorithms
Javad Ghaderi, Tianxiong Ji and R. Srikant
Minwise Hashing and Efficient Search
Bloom filters From Probability and Computing
Evaluation of (Deterministic) BT Search Algorithms
Presentation transcript:

Computer Networks Seminar Spring 2007 A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives Miguel Jimeno Ken Christensen Department of Computer Science and Engineering University of South Florida Tampa, FL {mjimeno,

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring The internet consumes 2% of all the electricity consumed in the US. [1] An average PC consumes 120 W when fully powered-on. [10] PCs could add 10% to the typical US residential consumption. P2P Applications make the PC remain “on the net” all the time, (they are idle 99% of the time) Introduction [1]K. Kawamoto, J. Koomey, B. Nordman, R. Brown, M. Piette, M. Ting, and A. Meier, “Electricity Used by Office Equipment and Network Equipment in the U.S.: Detailed Report and Appendices,” Technical Report LBNL-45917, Energy Analysis Department, Lawrence Berkeley National Laboratory, 2001.

Computer Networks Seminar Spring Can a P2P application can be run in small, low- power microcontroller? The PC could then be power managed. The microcontroller can’t store large list of file names. Bloom Filters: Bloom filters are a well known probabilistic data structure for representing a list of file name strings. Introduction

Computer Networks Seminar Spring Figure 1. Bloom filter of size m bits, and k = 4 hash functions. Image Taken from [9] False negatives are not possible, but there is a probability of generating false positives. where m = size of the Bloom filter in bits, k = number of hash functions used to calculate a Bloom filter, and s = number of bits set. Bloom Filters: A group of hash functions are used to map elements into an array of bits. Introduction

Computer Networks Seminar Spring Background Bloom filters were first proposed by Bloom [2] Kirsch et. al. proposed a way to calculate bloom filter with less hashing [7] Lumetta et. al. used the Power of Two Choices to calculate the bloom filter [8] [2] B. Bloom, “Space/Time Tradeoffs in Hash Coding with Allowable Errors,” Communications of the ACM, Vol. 13, No. 7, pp , 1970.

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring We investigated new methods for reducing the probability of false positives for a Bloom filter for fixed m and n. The target is the implementation of this structure in a power management proxy. Research Problem

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring NICs support up to MAC layer, but can’t respond to higher-layer packets. A PC needs to be fully powered-on in order to respond to packets. Applications like P2P file sharing require the PC to be fully powered-on all the time. To manage power in PCs running P2P applications: -We are studying the idea of using small controller to proxy for a sleeping PC. The SmartNIC

Computer Networks Seminar Spring This proxy will be able to maintain P2P TCP connections and respond to query messages. We are exploring locating the controller on the NIC, so it’s a “SmartNIC”. The SmartNIC

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring Best-of-N method: N instances of a Bloom filter are generated and the instance with the least number of bits set to 1 is selected. The “winner” hash group is used to test the bloom filter. The New Design: Best-of-N method 1) What improvement in Pr[false positive] can be achieved? 2) What is the computational cost to generate the filter?

Computer Networks Seminar Spring In order to compute N instances quickly, we developed a new pseudo-hashing method called “RNG hashing”. This method, based on a Random Number Generator, generates multiple hashes from one initial “seed” hash. The New Design: Best-of-N method

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring We define S to be the random variable for the number of bits set in a Bloom filter. Using order statistics we can determine the distribution of the minimum value of the independent samples S 1, S 2, …, S N (selected as Best-of-N). For order statistics, if f(s) and F(s) are known, then Analysis of Best-of-N Method

Computer Networks Seminar Spring For a continuous distribution, The mean can be computed as Based on heuristic and empirical evidence, the distribution of S appears to be close to normal. Now we have that where μ=E[S] and σ= σ[S]. We know that Analysis of Best-of-N Method

Computer Networks Seminar Spring We derive The probability of false positive for our method is then: where E[S min ] is computed by substituting above. Analysis of Best-of-N Method

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring For a given m and n where k is chosen optimally, we study the probability of false positive as a function of N. Numerical Results 30%

Computer Networks Seminar Spring For Figure 5, n = 1000 and m = 16,000. For Figure 6, same n, but m = 32,000 Numerical Results

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring Environment -Dell OptiPlex GX620 PC (Pentium4, 3.4 Ghz, 2 MBytes cache) with 1 GByte RAM. -WindowsXP, gcc compiler (version mingw-special from Dev C++. -A list of 25,000 strings of unique music file names was obtained using Bearshare 5.2. Response Variables -Probability of false positive for the Bloom filter. -Execution time to generate a Bloom filter. Experiments Evaluation

Computer Networks Seminar Spring Control variables -Hashing method used. CRC32, Md5, RNG Method, Kirsch Method -Bloom filter parameters m, n, and k. -Best-of-N parameter N. -Number of strings used in the string test set. Experiments Description -False Positive Exp 1: Vary N, measure Prob. of False Positive. -False Positive Exp 2: Vary N, measure False Pos. -Run-time experiment: Collect CPU time for each N. Experiments Evaluation

Computer Networks Seminar Spring The experimental results for probability of false positive perfectly agree with the analysis. CPU time results of RNG method were as good as Kirsch method, and better than CRC32. Experiments Evaluation Kirsch and RNG

Computer Networks Seminar Spring Introduction & Background Research Problem The SmartNIC The new Design: Best-of-N Method Analysis of Best-of-N Method Numerical Results & Experiments Evaluation Summary & Future Work Outline

Computer Networks Seminar Spring Two Improvements to Bloom filters -A new Best-of-N method that reduces the probability of false positive by generating N instances of a Bloom filter and selecting the best one. -A new RNG hashing method that generates pseudo hashes given a single seed hash. Bloom filters could be implemented in a power management proxy for P2P applications. Savings of up to 85 Mill. could be obtained if 25% of PCs running P2P applications use SmartNICs. Summary & Future Work

Computer Networks Seminar Spring A. Broder and M. Mitzenmacher, “Network Applications of Bloom Filters: A Survey,” Internet Mathematics, Vol. 1, No. 4, pp , Energy Information Administration, “U.S Household Electricity Report,” July Available: 5. L. Fan, P. Cao, and J. Almeida, “Bloom Filters - The Math,” Available: papers/summary-cache/node8.html. 6. A. Kirsch and M. Mitzenmacher, “Less Hashing, Same Performance: Building a Better Bloom Filter,” Technical Report TR-02-5, Computer Science Group, Harvard University, S. Lumetta and M. Mitzenmacher, “Using the Power of Two Choices to Improve Bloom Filters,” unpublished, Available: postscripts/bftwo.ps. 8. A. Pagh, R. Pagh, and S. Rao, “An Optimal Bloom Filter Replacement,” Proceedings of the 16th Annual ACM-SIAM Symposium on Discrete Algorithms, pp , US Department of Energy, Energy Efficiency and Renewable Energy, “Estimating Appliance and Home Electronic Energy Use,” Available: References

Computer Networks Seminar Spring Thanks! I’ll be happy to answer any questions.