Leiden; Dec 06Gossip-Based Networking Workshop1 Epidemic Algorithms and Emergent Shape Ken Birman.

Slides:



Advertisements
Similar presentations
Dr. Multicast for Data Center Communication Scalability Ymir Vigfusson Hussam Abu-Libdeh Mahesh Balakrishnan Ken Birman Cornell University Yoav Tock IBM.
Advertisements

CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
Ýmir Vigfússon IBM Research Haifa Labs Ken Birman Cornell University Qi Huang Cornell University Deepak Nataraj Cornell University.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Unstructured overlays: construction, optimization, applications Anne-Marie Kermarrec Joint work with Laurent Massoulié and Ayalvadi Ganesh.
Small-world Overlay P2P Network
CS514: Intermediate Course in Operating Systems Professor Ken Birman Vivek Vishnumurthy: TA.
Using Gossip to Build Scalable Services Ken Birman, CS514 Dept. of Computer Science Cornell University.
Future Usage Environments & Systems Integration November 16 th 2004 HCMDSS planning workshop Douglas C. Schmidt (moderator) David Forslund, Cognition Group.
Topics in Reliable Distributed Systems Lecture 2, Fall Dr. Idit Keidar.
Reliable Distributed Systems Astrolabe. Massive scale. Constant flux Source: Burch and Cheswick The Internet.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
CS5412: ADAPTIVE OVERLAYS Ken Birman 1 CS5412 Spring 2012 (Cloud Computing: Birman) Lecture V.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Distributed Computing Group Keno Albrecht Ruedi Arnold Michael Gähwiler Roger.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Distributed Systems 2006 Group Membership * *With material adapted from Ken Birman.
Ken Birman Cornell University. CS5410 Fall
Epidemic Techniques Chiu Wah So (Kelvin). Database Replication Why do we replicate database? – Low latency – High availability To achieve strong (sequential)
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Searching in Unstructured Networks Joining Theory with P-P2P.
Peer To Peer Distributed Systems Pete Keleher. Why Distributed Systems? l Aggregate resources! –memory –disk –CPU cycles l Proximity to physical stuff.
Navigating in the Dark: New Options for Building Self- Configuring Embedded Systems Ken Birman Cornell University.
P2P Course, Structured systems 1 Introduction (26/10/05)
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
File Sharing : Hash/Lookup Yossi Shasho (HW in last slide) Based on Chord: A Scalable Peer-to-peer Lookup Service for Internet ApplicationsChord: A Scalable.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
1 Koorde: A Simple Degree Optimal DHT Frans Kaashoek, David Karger MIT Brought to you by the IRIS project.
EPIDEMIC TECHNIQUES Ki Suh Lee. OUTLINE Epidemic Protocol Epidemic Algorithms for Replicated Database Maintenance Astrolabe: A Robust and scalable technology.
Peer-to-Peer in the Datacenter: Amazon Dynamo Aaron Blankstein COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Communication (II) Chapter 4
COCONET: Co-Operative Cache driven Overlay NETwork for p2p VoD streaming Abhishek Bhattacharya, Zhenyu Yang & Deng Pan.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 6 Synchronization.
Collaborative Content Delivery Werner Vogels Robbert van Renesse, Ken Birman Dept. of Computer Science, Cornell University A peer-to-peer solution for.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Reliable Distributed Systems Astrolabe. Massive scale. Constant flux Source: Burch and Cheswick The Internet.
Approved for Public Release, Distribution Unlimited QuickSilver: Middleware for Scalable Self-Regenerative Systems Cornell University Ken Birman, Johannes.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
Peer to Peer Networks Distributed Hash Tables Chord, Kelips, Dynamo Galen Marchetti, Cornell University.
CS5412: BIMODAL MULTICAST ASTROLABE Ken Birman CS5412 Spring Lecture XIX.
Leiden; Dec 06Gossip-Based Networking Workshop1 Gossip Algorithms and Emergent Shape Ken Birman.
Scalable Self-Repairing Publish/Subscribe Robbert van Renesse Ken Birman Werner Vogels Cornell University.
CarNet/Grid: Scalable Ad-Hoc Geographic Routing Robert Morris MIT / LCS
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Chord Advanced issues. Analysis Search takes O(log(N)) time –Proof 1 (intuition): At each step, distance between query and peer hosting the object reduces.
1 Version 3.1 Module 6 Routed & Routing Protocols.
CS5412: BIMODAL MULTICAST ASTROLABE Ken Birman Gossip-Based Networking Workshop 1 Lecture XIX Leiden; Dec 06.
BIMODAL MULTICAST ASTROLABE Ken Birman 1 CS6410. Gossip  Recall from early in the semester that gossip spreads in log(system size) time  But is.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Tackling Challenges of Scale in Highly Available Computing Systems Ken Birman Dept. of Computer Science Cornell University.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Using Gossip to Build Scalable Services
Intra-Domain Routing Jacob Strauss September 14, 2006.
CS5412: Bimodal Multicast Astrolabe
TRUST:Team for Research in Ubiquitous Secure Technologies
CS514: Intermediate Course in Operating Systems
A Case for Mutual Notification
CS5412: Using Gossip to Build Overlay Networks
A Scalable Peer-to-peer Lookup Service for Internet Applications
CS5412: Bimodal Multicast Astrolabe
Presentation transcript:

Leiden; Dec 06Gossip-Based Networking Workshop1 Epidemic Algorithms and Emergent Shape Ken Birman

Leiden; Dec 06Gossip-Based Networking Workshop2 On Gossip and Shape Why is gossip interesting? Powerful convergence properties? Especially in support of epidemics Mathematical elegance? But only if the system model cooperates New forms of consistency? But here, connection to randomness stands out as a particularly important challenge

Leiden; Dec 06Gossip-Based Networking Workshop3 On Gossip and Shape Convergence around a materialized “graph” or “network topology” illustrates several of these points Contrasts convergence with logical determinism of traditional protocols Opens the door to interesting analysis But poses deeper questions about biased gossip and randomness

Leiden; Dec 06Gossip-Based Networking Workshop4 Value of convergence Many gossip/epidemic protocols converge exponentially quickly Giving rise to “probability 1.0” outcomes Even model simplifications (such as idealized network) are washed away! A rarity: a theory that manages to predict what we see in practice!

Leiden; Dec 06Gossip-Based Networking Workshop5 Convergence I’ll use the term to refer to protocols that approach a desired outcome exponentially quickly Implies that new information mixes (travels) with at most log(N) delay

Leiden; Dec 06Gossip-Based Networking Workshop6 Consistency A term to capture the idea that if A and B could compare their states, no contradiction is evident In systems with “logical” consistency, we say things like “A’s history is a closed prefix of B’s history under causality” With probabilistic systems we seek exponentially decreasing probability (as time elapses) that A knows “x” but B doesn’t Gossip systems are usually probabilistic

Leiden; Dec 06Gossip-Based Networking Workshop7 Convergent consistency To illustrate our point, contrast Cornell’s Kelips system with MIT’s Chord Chord: The McDonald’s of DHTs Kelips: DHT by Birman, Gupta, Linga. Prakash Linga is extending Kelips to support multi-dimensional indexing, range queries, self-rebalancing Kelips is convergent. Chord isn’t

Leiden; Dec 06Gossip-Based Networking Workshop8 Kelips Take a a collection of “nodes”

Leiden; Dec 06Gossip-Based Networking Workshop9 Kelips N  N members per affinity group Map nodes to affinity groups Affinity Groups: peer membership thru consistent hash

Leiden; Dec 06Gossip-Based Networking Workshop10 Kelips Affinity Groups: peer membership thru consistent hash 1N  Affinity group pointers N members per affinity group idhbeatrtt ms ms Affinity group view 110 knows about other members – 230, 30…

Leiden; Dec 06Gossip-Based Networking Workshop11 Affinity Groups: peer membership thru consistent hash Kelips N  Contact pointers N members per affinity group idhbeatrtt ms ms Affinity group view groupcontactNode …… 2202 Contacts 202 is a “contact” for 110 in group 2

Leiden; Dec 06Gossip-Based Networking Workshop12 Affinity Groups: peer membership thru consistent hash Kelips N  Gossip protocol replicates data cheaply N members per affinity group idhbeatrtt ms ms Affinity group view groupcontactNode …… 2202 Contacts resourceinfo …… cnn.com110 Resource Tuples “cnn.com” maps to group 2. So 110 tells group 2 to “route” inquiries about cnn.com to it.

Leiden; Dec 06Gossip-Based Networking Workshop13 How it works Kelips is entirely gossip based! Gossip about membership Gossip to replicate and repair data Gossip about “last heard from” time used to discard failed nodes Gossip “channel” uses fixed bandwidth … fixed rate, packets of limited size

Leiden; Dec 06Gossip-Based Networking Workshop14 How it works Basically… A stream of gossip data passes by each node, containing information on various kinds of replicated data Node “sips” from the stream, for example exchanging a questionable contact in some group for a better one Based on RTT, “last heard from” time, etc

Leiden; Dec 06Gossip-Based Networking Workshop15 How it works Heuristic: periodically ping contacts to check liveness, RTT… swap so-so ones for better ones. Hmm…Node 19 looks like a great contact in affinity group 2 Node 102 Gossip data stream

Leiden; Dec 06Gossip-Based Networking Workshop16 Convergent consistency Exponential wave of infection overwhelms disruptions Within logarithmic time, reconverges Data structure emerges from gossip exchange of data. Any connectivity at all suffices….

Leiden; Dec 06Gossip-Based Networking Workshop17 … subject to a small caveat To bound the load, Kelips Gossips at a constant rate Limits the size of packets …Kelips has limited incoming “info rate” Behavior when the limit is continuously exceeded is not well understood.

Leiden; Dec 06Gossip-Based Networking Workshop18 What about Chord? Chord is a “true” data structure mapped into the network Ring of nodes (hashed id’s) Superimposed binary lookup trees Other cached “hints” for fast lookups Chord is not convergently consistent

Leiden; Dec 06Gossip-Based Networking Workshop19 … so, who cares? Chord lookups can fail… and it suffers from high overheads when nodes churn Loads surge just when things are already disrupted… quite often, because of loads And can’t predict how long Chord might remain disrupted once it gets that way Worst case scenario: Chord can become inconsistent and stay that way

Leiden; Dec 06Gossip-Based Networking Workshop20 Chord picture Cached link Finger links

Leiden; Dec 06Gossip-Based Networking Workshop21 Chord picture Europe USA Transient Network Partition

Leiden; Dec 06Gossip-Based Networking Workshop22 The problem? Chord can enter abnormal states in which it can’t repair itself Chord never states the global invariant… in some partitioned states, the local heuristics that trigger repair won’t detect a problem If there are two or more Chord rings, perhaps with finger pointers between them, Chord will malfunction badly! The Fine Print The scenario you have been shown is of low probability. In all likelihood, Chord would repair itself after any partitioning failure that might really arise. Caveat emptor and all that.

Leiden; Dec 06Gossip-Based Networking Workshop23 So… can Chord be fixed? Epichord doesn’t have this problem Uses gossip to share membership data If the rings have any contact with each other, they will heal Similarly, Kelips would heal itself rapidly after partition Gossip is a remedy for what ails Chord!

Leiden; Dec 06Gossip-Based Networking Workshop24 Insight? Perhaps large systems shouldn’t try to “implement” conceptually centralized data structures! Instead seek emergent shape using decentralized algorithms

Leiden; Dec 06Gossip-Based Networking Workshop25 Emergent shape We know a lot about a related question Given a connected graph, cost function Nodes have bounded degree Use a gossip protocol to swap links until some desired graph emerges Another related question Given a gossip overlay, improve it by selecting “better” links (usually, lower RTT) Example: The “Anthill” framework of Alberto Montresor, Ozalp Babaoglu, Hein Meling and Francesco Russo

Leiden; Dec 06Gossip-Based Networking Workshop26 Problem description Given a description of a data structure (for example, a balanced tree) … design a gossip protocol such that the system will rapidly converge towards that structure even if disrupted Do it with bounced per-node message rates, sizes (network load less important) Use aggregation to test tree quality?

Leiden; Dec 06Gossip-Based Networking Workshop27 Connection to self-stabilization Self-stabilization theory Describe a system and a desired property Assume a failure in which code remains correct but node states are corrupted Proof obligation: property reestablished within bounded time Kelips is self-stabilizing. Chord isn’t.

Leiden; Dec 06Gossip-Based Networking Workshop28 Let’s look at a second example Astrolabe system uses a different emergent data structure – a tree Nodes are given an initial location – each knows its “leaf domain” Inner nodes are elected using gossip and aggregation

Astrolabe Intended as help for applications adrift in a sea of information Structure emerges from a randomized gossip protocol This approach is robust and scalable even under stress that cripples traditional systems Developed at RNS, Cornell By Robbert van Renesse, with many others helping… Today used extensively within Amazon.com

Leiden; Dec 06Gossip-Based Networking Workshop30 Astrolabe is a flexible monitoring overlay NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic?SMTP?Word Versi on swift falcon cardinal swift.cs.cornell.edu cardinal.cs.cornell.edu Periodically, pull data from monitored systems NameTimeLoadWeblogic?SMTP?Word Versi on swift falcon cardinal NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal

Leiden; Dec 06Gossip-Based Networking Workshop31 Astrolabe in a single domain Each node owns a single tuple, like the management information base (MIB) Nodes discover one-another through a simple broadcast scheme (“anyone out there?”) and gossip about membership Nodes also keep replicas of one-another’s rows Periodically (uniformly at random) merge your state with some else…

Leiden; Dec 06Gossip-Based Networking Workshop32 State Merge: Core of Astrolabe epidemic NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic?SMTP?Word Versi on swift falcon cardinal swift.cs.cornell.edu cardinal.cs.cornell.edu

Leiden; Dec 06Gossip-Based Networking Workshop33 State Merge: Core of Astrolabe epidemic NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic?SMTP?Word Versi on swift falcon cardinal swift.cs.cornell.edu cardinal.cs.cornell.edu swift cardinal

Leiden; Dec 06Gossip-Based Networking Workshop34 State Merge: Core of Astrolabe epidemic NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic?SMTP?Word Versi on swift falcon cardinal swift.cs.cornell.edu cardinal.cs.cornell.edu

Leiden; Dec 06Gossip-Based Networking Workshop35 Observations Merge protocol has constant cost One message sent, received (on avg) per unit time. The data changes slowly, so no need to run it quickly – we usually run it every five seconds or so Information spreads in O(log N) time But this assumes bounded region size In Astrolabe, we limit them to rows

Leiden; Dec 06Gossip-Based Networking Workshop36 Big systems… A big system could have many regions Looks like a pile of spreadsheets A node only replicates data from its neighbors within its own region

Leiden; Dec 06Gossip-Based Networking Workshop37 Scaling up… and up… With a stack of domains, we don’t want every system to “see” every domain Cost would be huge So instead, we’ll see a summary NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal cardinal.cs.cornell.edu NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal NameTimeLoadWeblogic ? SMTP?Word Version swift falcon cardinal

Leiden; Dec 06Gossip-Based Networking Workshop38 Astrolabe builds a hierarchy using a P2P protocol that “assembles the puzzle” without any servers NameLoadWeblogic?SMTP?Word Version … swift falcon cardinal NameLoadWeblogic?SMTP?Word Version … gazelle zebra gnu NameAvg Load WL contactSMTP contact SF NJ Paris San Francisco New Jersey SQL query “summarizes” data Dynamically changing query output is visible system-wide NameLoadWeblogic?SMTP?Word Version … swift falcon cardinal NameLoadWeblogic?SMTP?Word Version … gazelle zebra gnu NameAvg Load WL contactSMTP contact SF NJ Paris

Leiden; Dec 06Gossip-Based Networking Workshop39 Large scale: “fake” regions These are Computed by queries that summarize a whole region as a single row Gossiped in a read-only manner within a leaf region But who runs the gossip? Each region elects “k” members to run gossip at the next level up. Can play with selection criteria and “k”

Leiden; Dec 06Gossip-Based Networking Workshop40 Hierarchy is virtual… data is replicated NameLoadWeblogic?SMTP?Word Version … swift falcon cardinal NameLoadWeblogic?SMTP?Word Version … gazelle zebra gnu NameAvg Load WL contactSMTP contact SF NJ Paris San Francisco New Jersey Yellow leaf node “sees” its neighbors and the domains on the path to the root. Falcon runs level 2 epidemic because it has lowest load Gnu runs level 2 epidemic because it has lowest load

Leiden; Dec 06Gossip-Based Networking Workshop41 Hierarchy is virtual… data is replicated NameLoadWeblogic?SMTP?Word Version … swift falcon cardinal NameLoadWeblogic?SMTP?Word Version … gazelle zebra gnu NameAvg Load WL contactSMTP contact SF NJ Paris San Francisco New Jersey Green node sees different leaf domain but has a consistent view of the inner domain

Leiden; Dec 06Gossip-Based Networking Workshop42 Worst case load? A small number of nodes end up participating in O(log fanout N) epidemics Here the fanout is something like 50 In each epidemic, a message is sent and received roughly every 5 seconds We limit message size so even during periods of turbulence, no message can become huge. Instead, data would just propagate slowly Robbert has recently been working on this case

Leiden; Dec 06Gossip-Based Networking Workshop43 Emergent shapes Kelips: Nodes start with a-priori assignment to affinity groups, end up with a superimposed pointer structure Astrolabe: Nodes start with a-priori leaf domain assignments, build the tree What other kinds of data structures can be achieved with emergent protocols?

Leiden; Dec 06Gossip-Based Networking Workshop44 Van Renesse’s dreadful aggregation tree A B C D E F G H I J K L M N O P ACEGIKMO B F J N DL  An event e occurs at H P learns O(N) time units later! G gossips with H and learns e

Leiden; Dec 06Gossip-Based Networking Workshop45 What went wrong? In Robbert’s horrendous tree, each node has equal “work to do” but the information-space diameter is larger! Astrolabe benefits from “instant” knowledge because the epidemic at each level is run by someone elected from the level below

Leiden; Dec 06Gossip-Based Networking Workshop46 Insight: Two kinds of shape We’ve focused on the aggregation tree But in fact should also think about the information flow tree

Leiden; Dec 06Gossip-Based Networking Workshop47 Information space perspective Bad aggregation graph: diameter O(n) Astrolabe version: diameter  O(log(n)) H – G – E – F – B – A – C – D – L – K – I – J – N – M – O – P A – B C – D E – F G – H I – J K – L M – N O – P

Leiden; Dec 06Gossip-Based Networking Workshop48 Gossip and bias Often useful to “bias” gossip, particularly if some links are fast and others are very slow A C D F Z E Y B X Roughly half the gossip will cross this link! Demers: Shows how to adjust probabilities to even the load. Ziao later showed that must also fine-tune gossip rate

Leiden; Dec 06Gossip-Based Networking Workshop49 How does bias impact information-flow graph Earlier, all links were the same Now, some links carry Less information And may have longer delays Open question: Model bias in information flow graphs and explore implications

Leiden; Dec 06Gossip-Based Networking Workshop50 Gossip and bias Biased systems adjust gossip probabilities to accomplish some goal Kate Jenkins: “Gravitational gossip” (ICDCS ‘01) illustrates how far this can be carried A world of multicast groups in which processes subscribe to x % of the traffic in each group Kate showed how to set probabilities from a set of such subscriptions… resulting protocol was intuitively similar to a simulation of a gravitational well…

Leiden; Dec 06Gossip-Based Networking Workshop51 Gravitational Gossip

Leiden; Dec 06Gossip-Based Networking Workshop52 Gravitational Gossip a b Inner ring: Nodes want 100% of the traffic Middle ring: Nodes want 75% of the traffic Outer ring: Nodes want 20% of the traffic Jenkins: When a gossips to b, includes information about topic t in a way weighted by b’s level of interest in topic t

Leiden; Dec 06Gossip-Based Networking Workshop53 Questions about bias When does the biasing of gossip target selection break analytic results? Example: Alves and Hopcroft show that with fanout too small, gossip epidemics can die out, logically partitioning a system Question: Can we relate the question to flooding on an an expander graph?

Leiden; Dec 06Gossip-Based Networking Workshop54 … more questions Notice that Astrolabe forces participants to agree on what the aggregation hierarchy should contain In effect, we need to “share interest” in the aggregation hierarchy This allows us to bound the size of messages (expected constant) and the rate (expected constant per epidemic)

Leiden; Dec 06Gossip-Based Networking Workshop55 The question Could we design a gossip-based system for “self-centered” state monitoring? Each node poses a query, Astrolabe style, on the state of the system We dynamically construct an overlay for each of these queries The “system” is the union of these overlays

Leiden; Dec 06Gossip-Based Networking Workshop56 Self-centered monitoring

Leiden; Dec 06Gossip-Based Networking Workshop57 Self-centered queries… Offhand, looks like a bad idea If everyone has an independent query And everyone is iid in all the obvious ways Than everyone must invest work proportional to the number of nodes monitored by each query In particular if queries touch O(n) nodes, global workload is O(n 2 )

Leiden; Dec 06Gossip-Based Networking Workshop58 Aggregation … but in practice, it seems unlikely that queries would look this way More plausible is something Zipf-like A few queries look at broad state of system Most look at relatively few nodes And a small set of aggregates might be shared by the majority of queries Assuming this is so, can one build a scalable gossip overlay / monitoring infrastructure?

Leiden; Dec 06Gossip-Based Networking Workshop59 Questions about shape Can a system learn its own shape? Obviously we can do this by gossiping the full connectivity graph But are there ways to gossip constant amounts of information at a constant rate and still learn a reasonable approximation to the topology of the system? Related topic: “sketches” in databases

Leiden; Dec 06Gossip-Based Networking Workshop60 … yet another idea Today, “structural” gossip protocols usually Put nodes into some random initial graph Nodes know where they would “like” to be Biological systems: Huge collections of nodes (cells) know roles Then they optimize (against something: what?) to better play those roles Create gossip systems for very large numbers of nodes that behave like biological systems?

Leiden; Dec 06Gossip-Based Networking Workshop61 Emergent Shape: Topics Consistency models Necessary conditions for convergent consistency Role of randomness Implications of bias Emergent structures Self-centered aggregation Bandwidth-limited systems; “sketches” Using aggregation to fine-tune a shape with constant costs