Minimizing Churn in Distributed Systems P. Brighten Godfrey, Scott Shenker, and Ion Stoica UC Berkeley SIGCOMM’06.

Slides:



Advertisements
Similar presentations
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Advertisements

Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
CS4550: Computer Networks II network layer basics 3 routing & congestion control.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
SplitStream by Mikkel Hesselager Blanné Erik K. Aarslew-Jensen.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Peer-to-Peer Support for Massively Multiplayer Games Bjorn Knutsson, Honghui Lu, Wei Xu, Bryan Hopkins Presented by Mohammed Alam (Shahed)
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
A New Approach for the Construction of ALM Trees using Layered Coding Yohei Okada, Masato Oguro, Jiro Katto Sakae Okubo International Conference on Autonomic.
2001 Winter CS215 Course Project Simulation Comparison of Routing Algorithms for Multicast with Bandwidth Reservation Zhihong Duan
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Exploring Tradeoffs in Failure Detection in P2P Networks Shelley Zhuang, Ion Stoica, Randy Katz HIIT Short Course August 18-20, 2003.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Load Balancing in Structured P2P Systems (DHTs) Sonesh Surana [Brighten Godfrey, Karthik Lakshminarayanan, Ananth Rao, Ion Stoica,
OSMOSIS Final Presentation. Introduction Osmosis System Scalable, distributed system. Many-to-many publisher-subscriber real time sensor data streams,
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Aggregating Information in Peer-to-Peer Systems for Improved Join and Leave Distributed Computing Group Keno Albrecht Ruedi Arnold Michael Gähwiler Roger.
Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker UC Berkeley (and now MIT) December.
Wide-area cooperative storage with CFS
P2P Course, Structured systems 1 Introduction (26/10/05)
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Modeling and Evaluation of Fibre Channel Storage Area Networks Xavier Molero, Federico Silla, Vicente Santonia and Jose Duato.
SIMULATING A MOBILE PEER-TO-PEER NETWORK Simo Sibakov Department of Communications and Networking (Comnet) Helsinki University of Technology Supervisor:
Designing a DHT for low latency and high throughput Robert Vollmann P2P Information Systems.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Thesis Proposal Data Consistency in DHTs. Background Peer-to-peer systems have become increasingly popular Lots of P2P applications around us –File sharing,
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
The Impact of DHT Routing Geometry on Resilience and Proximity K. Gummadi, R. Gummadi..,S.Gribble, S. Ratnasamy, S. Shenker, I. Stoica.
Information-Centric Networks07a-1 Week 7 / Paper 1 Internet Indirection Infrastructure –Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh.
On the Cost/Delay Tradeoff of Wireless Delay Tolerant Geographic Routing Argyrios Tasiopoulos MSc, student, AUEB Master Thesis presentation.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
Quantitative Evaluation of Unstructured Peer-to-Peer Architectures Fabrício Benevenuto José Ismael Jr. Jussara M. Almeida Department of Computer Science.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
Paper Survey of DHT Distributed Hash Table. Usages Directory service  Very little amount of information, such as URI, metadata, … Storage  Data, such.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Slide #1 Performance Evaluation of Routing Protocol for Low Power and Lossy Networks (RPL) draft-tripathi-roll-rpl-simulation-04 IETF Virtual Interim WG.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to-Peer Search Wesley W. Terpstra, Jussi Kangasharju, Christof.
Reliable Multicast Routing for Software-Defined Networks.
Peer to Peer Network Design Discovery and Routing algorithms
Aug 22, 2002Sigcomm 2002 Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen AT&T Labs-research Scott Shenker ICIR.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
An overlay for latency gradated multicasting Anwitaman Datta SCE, NTU Singapore Ion Stoica, Mike Franklin EECS, UC Berkeley
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Peer-to-Peer (P2P) File Systems. P2P File Systems CS 5204 – Fall, Peer-to-Peer Systems Definition: “Peer-to-peer systems can be characterized as.
CS694 - DHT1 Distributed Hash Table Systems Hui Zhang University of Southern California.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Internet Indirection Infrastructure (i3)
Peer-to-Peer (P2P) File Systems
A Case for Mutual Notification
Friendships that last Peer lifespan and its role in P2P protocols
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
Presentation transcript:

Minimizing Churn in Distributed Systems P. Brighten Godfrey, Scott Shenker, and Ion Stoica UC Berkeley SIGCOMM’06

2 Road Map Introduction Simulation  Basic Properties Analysis Applications Discussion Conclusion

3 Introduction Churn  Change in the set of participating nodes due to joins, graceful leaves, and failures A quantitative guide to the churn form selection strategies Analytically characterize the performance of strategies Compare the performance of strategies with different real traces

4 Road Map Introduction Simulation  Basic Properties Analysis Applications Discussion Conclusion

5 Churn Simulations Model System Model  Node status Up (in use, or available), down  Nodes in use Definition of churn  Example Two nodes fail and replaced by others

6 Selection Strategies Predictive fixed strategies  Fixed decent Select randomly from 50% with more up time  Fixed most available The most time up  Fixed longest lived Greatest average session time Agnostic fixed strategies  Fixed random Predictive replacement strategies  Max Expectation Greatest expected remaining uptime  Longest uptime Longest current uptime  Optimal Agnostic replacement strategies  Random Replacement (RR)  Passive Preference list Fail and then replace  Active preference list

7 Traces Synthetic traces  PDF a = 1.5 and b fixed so that mean is 30 minutes

8 Simulation Setup Event-based simulator  Selection algorithm to react immediately after each change Chord protocol simulator  No loss, except the node fail when then datagram is in flight At least 10 trails Sample 1000 random nodes 95% confidence intervals

9 Basic Properties Synthetic Pareto lifetimes Fixed k = 50 Fixed strategies are the same  The same mean session time

10 Benefit of Replacement Strategies 1.3~5 times improvement The dynamically selecting nodes for long- running distributed application would be worthwhile

11 Benefit of Replacement Strategies The best fixed strategies match the performance of the best replacement one  The trace are shorter

12 Agnostic Strategies RR is worse for small k, but is with in a factor of 2 of Max Expectation RR is 1.2~3 times better than Passive and 2.5~10 times better than Active PL

13 Road Map Introduction Simulation  Basic Properties Analysis Applications Discussion Conclusion

14 Analysis of Fixed and PL strategies Fixed strategies  Node recover instantaneously Each failure and recovery, normalized by time  The number of a node failure  Expected churn Passive Preference List strategies  If k is large, then same as Fixed strategies Active Preference List strategies  It pays more to switch back after the recovery of the node

15 Analysis of Random Replacement Intuition  Waiting time paradox RR is (roughly) selecting the current session of a random node This is biased towards longer sessions  RR does very badly when stable nodes are rare One with mean r >> 1 and others’ are 1 Churn of RR is about 2 and the best fixed strategies is Churn rate

16 Analysis of Random Replacement Agreement of the analysis with a simulation for n = 20 and the previous Pareto-distributed session time plot

17 Characteristics of Random Replacement X’ is more skewed than X  If E[X’] = E[X], then x’ and x are the yth percentile values of X’ and X The churn of RR decreases as the distributions become more “skewed” If the session time distributions are stable and have equal mean, RR’s expected churn is at most twice the expected churn of any fixed or Preference List strategy

18 Road Map Introduction Simulation  Basic Properties Analysis Applications Discussion Conclusion

19 Anycast Whenever its current server fails, it obtains a list of the m servers to which it has lowest latency and connects to random on of these m Switching to another server is not counted Latencies were obtained from a synthetic edge network delay space generator  It is modeled on measurements of latency between DNS servers

20 Anycast Trade of between server list m and latency t t increases => Passive PL m increases => RR hybrid:  ω decrease: Passive PL to Longest Uptime

21 Anycast When session time is small, the end host experiences the mean server failure tare, as in Active PL

22 DHT Neighbor Selection Long-distant neighbor  Deterministic topology (Active PL)  Randomized topology (RR) Simulation  Sample n nodes from Gnutella  Feed into Chord protocol simulator  Two node send message to a node with single key It is failed when two message are lossed

23 DHT Neighbor Selection Randomized topology are more stable, but have slightly longer routes Randomized topology also can reduce maintenance bandwidth

24 Multicast Select one of m suitable nodes as parent  Suitable: available bandwidth to serve another child  Strategies Longest uptime, Minimum Depth, Minimum Latency  Homogeneous bandwidth

25 Multicast

26 DHT Replica Placement Root set (Passive PL)  Nodes with ID closer to key (Object) should keep the replica Root directory (RR)  Replica of directory is the same as root set  Replica may be on any node in the system Simulation  Lazy replication  On equal footing

27 DHT Replica Placement There are many permanent failures in Gnutella traces

28 Road Map Introduction Simulation  Basic Properties Analysis Applications Discussion Conclusion

29 Discussion When would one use Random Replacement?  Minimize churn Longest Uptime  RR would be easier to implement Uptime is not easy to determine Network problem, liar What about load balance?  The result do not address fairness between users

30 Road Map Introduction Simulation  Basic Properties Analysis Applications Discussion Conclusion

31 Conclusion A guide to performance of a range of node selection strategies in real-world traces Highlight and explain analytically the god performance of RR relative to smart strategies Explain the performance implications of a variety of existing distributed systems designs