2007/1/15http://www.logos.ic.i.u-tokyo.ac.jp/~std/lpbcast.ppt1 Lightweight Probabilistic Broadcast M2 Tatsuya Shirai M1 Dai Saito.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

12/09/01 1 SCAMP: lightweight membership service for gossip- based protocols Ayalvadi Ganesh, Anne-Marie Kermarrec & Laurent Massoulié Microsoft Research.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
1 CS 194: Distributed Systems Process resilience, Reliable Group Communication Scott Shenker and Ion Stoica Computer Science Division Department of Electrical.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Unstructured P2P Networks Achieving Robustness and Scalability in Data Dissemination Scenarios Michael Mirold Seminar on Advanced Topics in Distributed.
Playback delay in p2p streaming systems with random packet forwarding Viktoria Fodor and Ilias Chatzidrossos Laboratory for Communication Networks School.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Rumor Routing Algorithm For Sensor Networks
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Reliable Group Communication Quanzeng You & Haoliang Wang.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Unstructured overlays: construction, optimization, applications Anne-Marie Kermarrec Joint work with Laurent Massoulié and Ayalvadi Ganesh.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Virtual Synchrony Jared Cantwell. Review Multicast Causal and total ordering Consistent Cuts Synchronized clocks Impossibility of consensus Distributed.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Multimedia Robert Grimm New York University. Content: Multimedia Overview  Multimedia = audio and video  Saroiu et al.—An Analysis of Internet Content.
Network Multicast Prakash Linga. Last Class COReL: Algorithm for totally-ordered multicast in an asynchronous environment, in face of network partitions.
1 A Distributed Delay-Constrained Dynamic Multicast Routing Algorithm Quan Sun and Horst Langendorfer Telecommunication Systems Journal, vol.11, p.47~58,
Self Healing Wide Area Network Services Bhavjit S Walha Ganesh Venkatesh.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Application Layer Multicast for Earthquake Early Warning Systems Valentina Bonsi - April 22, 2008.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
Communication (II) Chapter 4
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
Probabilistic Broadcast Presented by Keren Censor 1.
Epidemics Michael Ford Simon Krueger 1. IT’S JUST LIKE TELEPHONE! 2.
A Randomized Error Recovery Algorithm for Reliable Multicast Zhen Xiao Ken Birman AT&T Labs – Research Cornell University.
CH2 System models.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
An Efficient Approach for Content Delivery in Overlay Networks Mohammad Malli Chadi Barakat, Walid Dabbous Planete Project To appear in proceedings of.
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
PRESENTED BY A. B. C. 1 User Oriented Regional Registration- Based Mobile Multicast Service Management in Mobile IP Networks Ing-Ray Chen and Ding-Chau.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
1 SmartGossip: An Adaptive Broadcast Service for Wireless Sensor Networks Presented By Thomas H. Hand Duke University Adapted from: “ SmartGossip: An Adaptive.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Pilot: Probabilistic Lightweight Group Communication System for Ad Hoc Networks Authored by Luo, Eugster, and Hubaux Presented by Jin-Hee Cho.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Building Dependable Distributed Systems, Copyright Wenbing Zhao
Self-stabilizing energy-efficient multicast for MANETs.
Network Coding and Reliable Communications Group Modeling Network Coded TCP Throughput: A Simple Model and its Validation MinJi Kim*, Muriel Médard*, João.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Fault Tolerance (2). Topics r Reliable Group Communication.
1 QoS Adaptive Group Communication Antonio Di Ferdinando, Paul D Ezhilchelvan and Isi Mitrani (with inputs from Jon Crowcroft and Panos Gevros)
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Reliable multicast Tolerates process crashes. The additional requirements are: Only correct processes will receive multicasts from all correct processes.
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
湖南大学-信息科学与工程学院-计算机与科学系
Providing Secure Storage on the Internet
EEC 688/788 Secure and Dependable Computing
ExOR:Opportunistic Multi-Hop Routing For Wireless Networks
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Presentation transcript:

2007/1/15http:// Lightweight Probabilistic Broadcast M2 Tatsuya Shirai M1 Dai Saito

2007/1/15http:// Broadcast in Large Scale Environment End users send messages to all other users more frequently. –P2P BBS –Stock markets These applications need software broadcast. Participating processes change more dynamically compared to processes on servers, –machine crash –login to or logout from applications

2007/1/15http:// Deterministic Broadcast Each process transfers messages along defined routes. This approach provides consistency of message delivery ordering. –Messages from each process reach in the order that it sends Reliability is expressed in “best effort”

2007/1/15http:// Deterministic Broadcast cont. rate of perturbed processes Poor scalability –Single point of failure –Cost of maintaining routing information Low reliability at unstable networks. –Perturbation of few processes makes performance of healthy processes lower.

2007/1/15http:// Probabilistic Broadcast Each process transfers messages to randomly selected processes without using defined routing information. Approximate redundancy enhances reliability. Reliability is relatively high and stable in large scale and unstable environments.

2007/1/15http:// Pbcast [Kenneth et al. 1999] This approach concurrently uses deterministic and probabilistic broadcast. –While network load is low, deterministic broadcast achieve high reliability and low cost. –While network load is high, probabilistic broadcast ensure certain reliability, especially of healthy processes.

2007/1/15http:// Deterministic Broadcast The first protocol is deterministic broadcast. It uses IP multicast, or if it is not available, uses spanning trees randomly composed. –But composing spanning trees needs information of all membership. So this approach is limited to a few hundred processes, as mentioned in this paper.

2007/1/15http:// Anti-Entropy Protocol The second is anti-entropy protocol based on gossip. –In each round, members choose some of other members randomly, send a summary of their message history digest to the selected processes. –Processes receive the digest and check the lack of message, and require the lacking message for original sender. message history membership info. digests message history lack 5, 8! lack 3, 9! 3, 9 message 3, message 9 5, 8 message 5, message 8 5, 8 3, 9

2007/1/15http:// Anti-Entropy Protocol cont. Message size and fanout, the number of processes to which a process send in one round, define network load of this protocol. Message size is limited by message lifetime on each process. –A process send any message for some fixed rounds from initial reception. –After that, the message is gave up

2007/1/15http:// Flow Control Flow control while the network load is high. –The rate of pbcast messages should be limited. Normally every 100ms. –Retransmission should delays in some rounds if many other processes require. digests 3, 9 message 3, message 9 5, 8 message 5, message 8

2007/1/15http:// Evaluations Parameters: –Message loss rate –Fanout, the number of processes Reliability: –(infected processes – failed ones) > all ones/2 for applications based on quorum replication algorithm Throughput: –The number of messages a process receives in 1 second.

2007/1/15http:// Effects of Fanout Predicate I shows pbcast. –Message loss rate is –Deterministic broadcast reaches 10 % of the processes. –50 processes participate. Probability of failure decrease with an increase of the number of fanout to 8. fanout (0~10)

2007/1/15http:// Scalability Predicate I shows pbcast. –Message loss rate is –Deterministic broadcast reaches 10 % of the processes. Probability of failure decrease with bigger scale. –Though broadcast to all processes take more rounds processes (0~60)

2007/1/15http:// Time for broadcast to all processes Messages are received in 12 rounds on an average, less than 20 rounds at 1024 processes. –Fanout is 1 –Det. broadcast is not used. This result shows the means are at O(logN) rounds (0~20) processes

2007/1/15http:// Throughput 150 messages are sent in one second. –When message loss happens frequently fanout is limited to small size. Throughput of perturbed processes decreases, but healthy processes avail full throughput. rate of perturbed processes deterministic pbcast

2007/1/15http:// Throughput cont. Throughput at 200 msg/sec. –25 % of the processes pertube 25 % of the time. –Det. broadcast is unused. High frequency of packet loss causes throughput lower. In this case, average throughput decreases to 60% at 96 processes at high bandwidth. loss rate(0 ~ 0.2) 32~96 processes

2007/1/15http:// Conclusion of pbcast Gossip based protocol achieves scalability and reliability in general network environments. Then, cost of processes are not considered. The next topic is memory management for pbcast.

2007/1/15http:// Membership Management Assumption –Each process knows all Members memory consumption in large scale communication required to ensure the consistency of the Membership –Problems of Scalability in Large scale environment

2007/1/15http:// Membership Management of lpbcast Member Management + Gossip –Each process knows a subset of all Members –Sending messages with Member information –Size limitation of Membership Management Buffer Fixed Memory consumption

2007/1/15http:// Memory Management The Memory requirement for a process should not change (in large scale) –Buffer of Membership Management –Buffer of outgoing message →Scalability pbcast with a viewpoint of “Memory Consumption”

2007/1/15http:// lpbcast algorithm Assumptions –Each process has unique ID –Each message has unique ID (including process ID) –joining/leaving (= subscribing/unsubscribing) Buffers –Events : event notifications –EventIDs : Event IDs –Subs : subscription information –unSubs : unsubscription information –View : targets of gossip message Size limitation for all Buffers –Especially in Events and Subs

2007/1/15http:// sending lpbcast(e) –Add e to Events periodical gossip –Send buffers to a subset of View (every 50ms) e e Events EventIDs View Subs unSubs e Mes

2007/1/15http:// receiving When receiving gossip… –Membership Management add Mes.unSubs : unSubs ・ remove Mes.unSubs : View,Subs add Mes.Subs : View,Subs If size of View is too large, move some items to Subs randomly View Mes.unSubs Mes.Subs Subs

2007/1/15http:// receiving When receiving gossip… –Event transmission Events received for the first time are transmitted to other processes in View If size of Events is too large, remove randomly –Retrieving Event When receiving undelivered event ID in Mes.EventIDs, a request of retrieving Event Events e Unknown e e EventIDs Unknown e ID

2007/1/15http:// subscribing Subscribing process should know at least one node in specific Members Sending Gossip with appending itself to Subs When timeout, making retransmission View

2007/1/15http:// unsubscribing Sending Gossip with appending itself to unSubs –The process is gradually removed from individual view –Set timeout to unSubs messages –Assumption : removed process will not recover soon unSubs

2007/1/15http:// features of lpbcast Throughput is as high as pbcast A estimation of Memory consumption The membership algorithm and the dissemination of events are dealt with at the same level. Each view is independent uniformly –True P2P Model →suitable for WAN –Need to recognize the “locality”

2007/1/15http:// [m1,m2] Optimization Age-base –Optimization of Events Buffer –Now : Events Buffer is purged randomly →better to remove well disseminated messages –Age = # of hops P1 P2 bcast(m1) bcast(m2)gossip(m2) [m1] deliver(m2) [m1,m2]

2007/1/15http:// Optimization Frequency-base –Optimization of Subs Buffer –Now : Subs Buffer is purged randomly → better to remove well-known processes –well-known = included in Subs Buffers P1 P2 P3 Subs(P1, P2) Subs(P2) [P2] [P1,P2]

2007/1/15http:// Experiment : # of rounds Simulation –Prob. of Message loss : 0.05 –Prob. of process crash : 0.01 # of rounds to disseminate 99% of all processes Logarithmically –Fanout = 3

2007/1/15http:// Experiment : Reliability –SUN Ultra 10 (Solaris2.6, Memory256Mb) –100Mbps Ethernet –40msg/round, len(Events)=60 A probability for any given process of delivering any given event notification

2007/1/15http:// Experiment : Optimization Effect Age-based optimization –Delivery ratio = (# of delivered message)/(# of broadcast) –30msg/round len(Events)=30 Fanout=4 60processes Optimized Random

2007/1/15http:// Conclusion Scalability+Reliability Bimodal Multicast –Gossip based protocol achieves scalability and reliability. Lightweight Probabilistic Broadcast –Paying attention to cost of processes –memory management for pbcast. –Lightweight in large scale environment