How To Understand The Power Of Anemic Communication In A Networked System
|
|
|
- Eunice Dickerson
- 5 years ago
- Views:
Transcription
1 Invited Talk: Epidemic Protocols for Extreme-scale Computing Global Knowledge without Global Communication Dr. Giuseppe Di Fatta Wednesday, September 24, 2014
2 Outline extreme-scale Computing Motivations: global knowledge without global communication Applications: from distributed systems to exascale supercomputing (HPC) Epidemic Data Mining Epidemic Protocols Information dissemination and data aggregation Membership and aggregation protocols Open Issues and Contributions aggregation in asynchronous systems local detection of global convergence dynamics in overlay topologies Conclusions 2
3 From Large to Extreme-scale Systems Distributed Systems Internet Ubiquitous Computing, Crowd Sensing, P2P Overlay Networks Internet of Things (50 to 100 trillion objects) Decentralised Online Social Networks Ad-hoc Networks Large-scale Wireless Sensor Networks Mobile ad-hoc Networks (MANET) Vehicular Ad-Hoc Networks (VANET) Parallel Systems Towards exascale computing Tianhe-2 (MilkyWay-2): National Supercomputer Center, Sun Yat-sen University, Guangzhou, China, Top500 N.1 since June 2013, 34/55 Pflop/s, 3.12M cores
4 Extremely Scalable Computing Scalability number of data objects dimensionality of data objects number of processing elements Communicationbound p Computing in extreme-scale systems Scalability of the communication cost Decentralisation Robustness and fault-tolerance Adaptiveness: ability to cope with dynamic environments Global Knowledge w/o Global Communication 4
5 Epidemic Protocols A communication and computation paradigm for large-scale networked systems: high scalability probabilistic guarantees on convergence speed and accuracy robustness, fault-tolerance, high stability under disruption aka Gossip-based protocols
6 Exponential Growth In epidemiology an epidemic is a disease outbreak that occurs when new cases exceed a "normal" expectation of propagation (a contained propagation). The disease spreads person-to-person: the affected individuals become independent reservoirs leading to further exposures. In uncontrolled outbreaks there is an exponential growth of the infected cases. Figure from: Rapid communications A preliminary estimation of the reproduction ratio for new influenza A(H1N1) from the outbreak in Mexico, March-April 2009", P Y Boëlle, P Bernillon, J C Desenclos, Eurosurveillance, Volume 14, Issue 19, 14 May 2009 Figure from: Controlling infectious disease outbreaks: Lessons from mathematical modelling, T Déirdre Hollingsworth, Journal of Public Health Policy 30, , Sept. 2009
7 Epidemic Computing Idea: Virus Information Disease outbreak Epidemic communication for extreme-scale computing 7
8 Epidemic/Gossip-based Protocol Active thread (cycle-based): Repeat wait some T chose a random peer send local state Passive thread (event-based): Repeat receive remote state If state==infected, then local state=infected A synchronous push mechanism for information dissemination (infection) Uniform Gossiping: assuming a node is able to select a node id (peer) uniformly at random Practical peer sampling: Membership Protocols are used to provide such a function in a practical way. 8
9 expected # protocol cycles Information Dissemination: Propagation Time Time to propagate information originated at one peer Time to complete infection : O(log N) # peers 9
10 Seminal Work and History Demers 1987 (Xerox PARC), Clearinghouse Directory Service Golding 1993, the refdbms distributed bibliographic database system Demers (Xerox PARC), the Bayou project Birman 1998 (Cornell), Bimodal Multicast van Renesse 1999 (Cornell), Astrolabe Karp 2000 (ICSI, Berkeley), Randomized Rumor Spreading In , a surge of studies: several epidemic protocols and their applications in communication networks and distributed systems Di Fatta 2011, first epidemic data mining algorithm for distributed systems Strakova 2011, first application to exascale supercomputing Theoretical work is still making progress but practical protocols and apps have received limited attention.
11 Open Issues Theoretical studies and simulations typically assume simplistic synchronous communication model with static/reliable network unrealistic global knowledge of the networked system the initial overlay topology is a random graph unlimited or enough protocol rounds to reach convergence In distributed, large and extreme-scale networks: communication is asynchronous, net is not reliable/is dynamic nodes may only know a limited set of neighbours (sparse graph) the initial topology may not be a random graph: poor initial topologies may have serious implications in convergence speed and, even worse, in the convergence guarantee itself convergence is a global property that depends on several factors, which typically are not known locally. 11
12 Applications
13 Applications Epidemic protocols have been used to provide scalable and fault-tolerant services, such as: information dissemination (broadcast, multicast) data aggregation: values of aggregate functions more important than individual data (sum, average, sampling, percentiles, etc.) And they have been proposed for various applications: DB replica synchronisation and maintenance Network management and monitoring Failure detection HPC algs and services, e.g., QR factorization and power-capping Epidemic Knowledge Discovery and Data Mining decentralised discovery of global patterns and trends 13
14 Parallel K-Means in share-nothing systems distributed data distributed processes P0 P1 P2 P3 data are intrinsically distributed initialisation generate centroids for first iteration Broadcast compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums centroids for Global communication All-Reduce is not a feasible approach for next iteration: extreme-scale systems repeat until convergence 14
15 Epidemic K-Means distributed data distributed processes P0 P1 P2 P3 data are intrinsically distributed initialisation generate centroids for first iteration Epidemic broadcast of a seed for the random number generator generate centroids for first iteration generate centroids for first iteration generate centroids for first iteration (or static list of seeds for multiple executions) compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums Epidemic Aggregation of sums, counts and errors centroids for next iteration: repeat until convergence 15
16 Simulations - Data Distributions Each node has a fixed number of data points (100). Each data point belongs to a category (colour). Data points are assigned to nodes from uniformly at random (a) to localitydependent allocation (d). 16
17 Clustering Accuracy Accuracy w.r.t. the ideal (centralised) data clustering Clustering Accuracy (average) Standard Deviation epidemic random p2p random p2p local p2p local p2p epidemic Cluster distribution (Jain Index) Cluster distribution (Jain Index) skew data distribution uniform distribution skew data distribution uniform distribution 17
18 Mean Squared Error of Centroids Error w.r.t. the ideal (centralised) centroids Clustering Error (average) Standard Deviation local p2p local p2p random p2p random p2p epidemic Cluster distribution (Jain Index) epidemic Cluster distribution (Jain Index) skew data distribution uniform distribution skew data distribution uniform distribution 18
19 Fault-Tolerance of Epidemic K-Means Clustering accuracy under message loss and churn: 0-20% Clustering Error (average) Standard Deviation local p2p local p2p random p2p random p2p epidemic Cluster distribution (Jain Index) epidemic Cluster distribution (Jain Index) skew data distribution uniform distribution skew data distribution uniform distribution 19
20 Data Aggregation
21 The Data Aggregation Problem (a.k.a. the node aggregation problem) Given a network of N nodes, each node i holding a local value x i, the goal is to determine the value of a global aggregation function f() at every node: f(x 0, x 1,..., x N-1 ) Example of aggregation functions: sum, average, max, min, random samples, quantiles and other aggregate databases queries.
22 Data Aggregation: e.g., Sum N 1 x i i 0 Centralised approach: all receive operations, and all additions, must be serialized: O(N) s Divide-and-conquer strategy to perform the global sum with a binary tree: the number of communication steps is reduced from O(N) to O(log(N)). 22
23 All-to-all Communication MPI AllReduce MPI predefined operations: max, min, sum, product, and, or, xor all processes compute identical results number of communication steps: log(n) number of messages: N*log(N) time t 3 f ( x0, x1,..., x N 1) Any global function which can be approximated well using linear combinations. t 2 t 1 t 0 x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 23
24 Fault-Tolerance and Robustness The parallel approach requires global communication. It is not fault tolerant: even a single node or link failure cannot be tolerated. A delay on a single communication may have an effect on all nodes. node failure 24
25 Epidemic Aggregation Protocols
26 Epidemic/Gossip-based Protocol Active thread (cycle-based): Repeat wait some T chose a random peer send local state Passive thread (event-based): Repeat receive remote state [reply with local state] merge remote and local state definition of state and merge function (aggregation protocol) E.g., average, sum, percentiles, etc. based on randomised communication: peer selection mechanism (membership protocol) Aggregation Protocol Membership Protocol 26
27 Epidemic Data Aggregation: Global Average Simulation of epidemic aggregation: local estimations of global average Network of 10K nodes: each node holds a local value. Worst case analysis: peak distribution, i.e. information originated at one node Very high value Higher value Target value (0.01% error) Lower value 27
28 Epidemic Protocols Push epidemic each peer sends state to other member Pull epidemic each peer requests state from other member expected #rounds the same Asymmetric Gossiping Push/Pull epidemic Push and Pull in one exchange reduces #rounds at increased communication cost Symmetric Gossiping 28
29 Asymmetric/Symmetric Approaches in Uniform Gossip, at any cycle the probability that a node receives a number x of messages follows a binomial distribution. Asymmetric: at each cycle, 36.8% of nodes do not receive any push message. Symmetric: at each cycle, every node receives at least one pull message. 29
30 The Push-Sum Protocol (PSP) Each node i holds and updates the local sum s t,i and a weight w t,i. Initialisation: Node i sends the pair <x i,w 0,i > to itself. At each cycle t: j <½s t,j, ½w t,j > i <½s t,i, ½w t,i > Update at node i: s t+1,i = ½s t,j + ½s t,i + ½s t,z <½s t,i, ½w t,i > w t+1,i = ½w t,j + ½w t,i + ½w t,z variance reduction step z u 30
31 The Push-Sum Protocol (PSP) Settings for various aggregation functions: Convergence: accuracy, consistency and speed 31
32 Mass Conservation Invariant The mass conservation invariant states that, for the case Average, the average of all local values is always the correct average and the sum of all weights is always N. Protocols violating this invariant do not converge to the true global aggregate. 32
33 Diffusion Speed The diffusion speed is how quickly values originating at a source diffuse evenly through a network (convergence). The number of protocol iterations such that the value at a node is diffused through the network, i.e., a peak distribution is transformed in a uniform distribution. The diffusion speed is typically given as the complexity of the number of iteration steps as function of the network size, maximum error and maximum probability that the approximation at a node is larger than the maximum error. PSP diffusion speed: with probability 1- the relative error in the approximation of the global aggregate is within, in at most O(log(N) + log(1/ ) + log(1/ )) cycles, where and are arbitrarily small positive constants. 33
34 The Push-Pull Gossip (PPG) Protocol PPG aggregated average: at a push msg nodes reply with a pull msg: local values are exchanged and averaged. 1 Node i selects a random node j to exchange their local values. Each node compute the average and updates the local pair. v t+1,i = ½(v t,j + v t,i ) variance reduction step: i 2 v t+1,j = ½(v t,j + v t,i ) j The push-pull operations need to be performed atomically. If not, the conservation of mass in the system is not guaranteed and the protocol does not converge to the true global aggregate. u 2 4 i 3 1 j 34
35 The Symmetric Push-Sum Protocol (SPSP) SPSP is a Push-Pull scheme with asynchronous communication no atomic operation is required. <½s t,i, ½w t,i > <½s t,j, ½w t,j > i <½s t,i, ½w t,i > <½s t,j, ½w t,j > j 35
36 Comparative Analysis (PSP, PPG, SPSP) Convergence speed: variance of the estimated global aggregate over time Percentage of operations with atomicity violation (AVP): 0.3% and 90%, Internet-like topologies, 5000 nodes. PPG and SPSP convergence speed is similar w.r.t. AVP. PSP SPSP PPG 36
37 Comparative Analysis (PSP, PPG, SPSP) The mean percentage error (MPE) over time different AVP levels (from 0.3% to 90%) averages over 100 different simulations: Internet-like and mesh topologies, nodes, different data distributions, asynchronous communication. Only PSP and SPSP converge to the true global aggregate value. PPG SPSP PSP 37
38 Epidemic Membership Protocols
39 Protocol Stack Epidemic application Epidemic application Aggregation Protocol Aggregation Protocol Aggregation Protocol Uniform Gossiping Membership Protocol overlay topology Transport Protocol Network Protocol physical topology 39
40 Epidemic & Membership Protocols Epidemic Protocols: exchange information with other nodes to achieve some application goals (e.g., information dissemination, data aggregation) Membership Protocols: provide the random peer sampling service for the above and is based on an epidemic approach too. node i Epidemic Protocol 3 send a push msg to j node j Epidemic Protocol request a random node 1 2 response with random node j Membership Protocol 40
41 Overlay Topologies The overlay topology must have nice properties. Sparse (out degree): e.g., a fully connected graph is not scalable (global knowledge) Robust: no single points of failure - a star topology has optimal propagation time, but it is not scalable and is not robust. Load balancing (indegree): there should not be bottlenecks. Connectivity: a single connected component The overlay topology must be connected at all times. If at any time the graph degenerates into multiple connected components, it will not heal (*) and the application-layer epidemic protocol will not converge. Good propagation/diffusion: random graphs, expanders 41
42 Epidemic Membership Protocols Practical peer sampling: Partial view of the global system: a local cache of (max size) peer IDs is maintained and used to draw a random entry when requested The cache is initialised with the initial (physical) neighbours. Caches are periodically exchanged (likewise push/pull messages), merged and randomly trimmed to max size. This is equivalent to multiple random walks: the cache entries quickly converges to a random sample of the peers with uniform distribution. random sparse regular graph a b j c Membership Protocol node i push d e f g a b j c pull Membership Protocol node j d e f g 42
43 Epidemic Membership Protocols Practical peer sampling: Partial view of the global system: a local cache of (max size) peer IDs is maintained and used to draw a random entry when requested The cache is initialised with the initial (physical) neighbours. Caches are periodically exchanged (likewise push/pull messages), merged and randomly trimmed to max size. This is equivalent to multiple random walks: the cache entries quickly converges to a random sample of the peers with uniform distribution. random sparse regular graph d b j e Membership Protocol node i Membership Protocol node j a d f g 43
44 Epidemic Membership Protocols At each cycle (synchronous model), the distributed set of caches define a transient random overlay network. The membership protocol keeps changing the overlay topology over time Aim: the random node sampling from the local partial view results in a uniform distribution over the global system Uniform Gossiping The node caches define an overlay network topology: a random sparse regular digraph that keeps changing over time. Some membership protocols: Node Cache Protocol, Cyclon, Send&Forget, Newscast, Eddy 44
45 Multiple connected components Random Overlay Topologies A Membership Protocol is a fully-decentralised generative graph method: it takes an input graph and generates a random output graph with similar properties. (assuming a simplified synchronous network model) Most (not all) MPs adopt (random) regular digraphs: the local cache has fixed size. Ideally we would like the MP to induce an attraction towards strongly connected graphs with equal indegree (or with low variance): the indegree can be used as a measure of robustness. digraphs 1 1 weakly connected digraphs robust and strongly connected digraphs initial condition 2+ 45
46 The Expander Membership Protocol A novel membership protocols inspired by the concept of expander graphs, aka expanders. An expander is a sparse graph with strong connectivity. The strong connectivity can be quantified by an index of expansion quality. The Expander Membership Protocol is designed to maximise the expansion quality of the overlay topology. quasi-random peer selection: random search of a push-pull peer that minimizes cache overlap. 46
47 Expansion Quality The vertex expansion index h(v,s) and its minimum over different sample sizes (typically 0<s<½ V ): h( V, S) h min ( V, s) ( S) V \ S ( S) min S V, S s V \ S V: the set of network nodes S: a sample of nodes, S V, S =s (S): the boundary of S, i.e. the set of nodes not in S and 1-hop distant from at least one node in S. Set of the network nodes Boundary Nodes Sample 47
48 Message Forwarding Mechanism Case 1: Q x is local cache of node x and Q y is local cache of node y. Each iteration node x will send push message to node y. If Q x Q y <= T max, then y will accept the push message and reply with pull message. 3 Pull Msg y 2 Accept x 1 Push Msg 48
49 Message Forwarding Mechanism Case 2: Each iteration node x will send push message to randomly selected node y. If Q x Q y > T max, then y will forward the push message to another randomly selected node from Q y and repeat the same step until the message is accepted. 5 Pull Msg 4 Accept x z 1 Push Msg y 2 Reject 3 Forwarding Push Msg 49
50 Message Forwarding Mechanism Case 3: In order to prevent excessive communication overhead and delay, the forwarding procedure will be repeated up to H max, then the message will return to the node with lowest similarity and force it to accept the message. 6 Pull Msg 5 Force Accept 4 Reject and Hop = H max x i z 1 Push Msg y 3 Forwarding Push Msg 2 Reject 50
51 Recovery Mechanism (WIP) The simple protocol may still lead to multiple connected components when the initial condition is particularly poor (e.g., ring of communities) and in the presence of interleaving in push-pull operations An additional heuristic mechanism has been incorporated to facilitate the recovery from multiple connected components back to a single one. Work in progress: only limited experimental verification General idea to fix loss of connectivity: Interleaving causes unwanted duplication of cache entries If somewhere a duplicate is generated, somewhere else an unwanted drop is made. Some selected entries rather than dropped are stored in a secondary cache. When local duplication is detected, then entries from secondary cache is recovered. 51
52 Simulations Task: computing global aggregation value (peak distribution) Network size: Aggregation protocol: SPSP, peak distribution Membership protocols: Cyclon, Eddy, S&F, Node Cache Protocol, Expander Protocol, Ideal Random Initial overlay topologies (with poor expansion): circular regular graph ring of communities 52
53 Minimum Expansion Index Comparison of different membership protocols init: circular regular graph chart: minimum vertex expansion index: h min (G,5% V ) 53
54 Minimum Expansion Index Comparison of different membership protocols init: ring of communities chart: minimum vertex expansion index: h min (G,5% V ) 54
55 Convergence Speed Comparison of different membership protocols init: circular regular graph chart: convergence speed 55
56 Connected Components Comparison of different membership protocols init: ring of communities chart: max number (over several trials) of connected components vs #cycle 56
57 Global Synchronisation
58 % node Convergence 1. Local convergence Global convergence 3 3. Local detection of global convergence (global synchronisation) Simulations: 10K nodes, peak distribution, 5 Aggregation protocols, init random graph Chart: number of nodes (%) locally converged to the global aggregate within a tolerance error for different accuracy thresholds (stddev). 1 cycle based on global knowledge only available in simulations. 58
59 Global Synchronisation Can global convergence be estimated locally? Multiple independent aggregation protocols local variance is used to detect convergence global synchronisation without global communication Global Synchronisation Aggregation Protocol #1 Aggregation Protocol #2 Aggregation Protocol #k Membership Protocol {f 1 (), f 2 (),, f k ()} [µ, ] 59
60 Global Synchronisation Global convergence depends on several factors, network conditions and application requirements. Ideal synchronisation vs local detection method 6M The ideal step transition (in red) is based on global knowledge, only available in simulations. The local method is based on local knowledge available at each node. 60
61 Global Synchronisation Convergence transition of different methods (ε = 10 4 and N = 10 4 )
62 Transition Period Nodes detect global convergence at different times during a transition period. Chart: the number of cycles from 0% to 100% of nodes that have detected global convergence for different methods. 3 62
63 Conclusions Extreme Computing based on Epidemic Protocols fully decentralised fault-tolerant suitable for extreme-scale networked systems suitable for asynchronous and dynamic networks Contributions: Symmetric Push-Sum Protocols (SPSP), an aggregation protocol The Expander Membership Protocol Methods of global convergence detection (synchronisation) Epidemic K-Means, the first epidemic data mining algorithm Current work Refining and extending the Expander Membership Protocol: incorporating a connectivity recovery mechanism 63
64 Open Issues and Future Work Local estimation of convergence: better and faster convergence detection and synchronisation Asynchronous epidemic protocols (w/o cycles) Epidemic formulation of data mining algorithms: e.g., decision tree induction, recommender systems, etc. Protection against malicious nodes and loss of network connectivity Practical applicability still to be shown Need to identify potential user applications and their deployment strategy 64
65 Publications 1. F. Blasa, S. Cafiero, G. Fortino,, "Symmetric Push-Sum Protocol for Decentralised Aggregation", The International Conference on Advances in P2P Systems (AP2PS), Lisbon, Portugal, Nov , , F. Blasa, S. Cafiero, G. Fortino, "Epidemic K-Means Clustering", IEEE ICDM Workshop on Knowledge Discovery Using Cloud and Distributed Computing Platforms (KDCloud), Vancouver, Canada, 11 Dec , F. Blasa, S. Cafiero, G. Fortino, "Fault tolerant decentralised k-means clustering for asynchronous large-scale networks, Journal of Parallel and Distributed Computing, Elsevier, Volume 73, Issue 3, March 2013, Pages P. Poonpakdee, N. G. Orhon,, "Convergence Detection in Epidemic Aggregation", Proc. of Euro-Par 2013 Workshops, Aachen, Germany, Aug , 2013, Springer LNCS. 5. P. Poonpakdee,, "Expansion Quality of Epidemic Protocols", Proceedings of the 8th International Symposium on Intelligent Distributed Computing (IDC), Madrid, Spain, Sept. 3-5, 2014, Studies in Computational Intelligence, Springer, Vol. 570, 2015, pp
66 References Mathematical models of Epidemics Nicholas C. Grassly & Christophe Fraser, "Mathematical models of infectious disease transmission, Nature Reviews Microbiology 6, (June 2008) Gossip-based protocols for information dissemination: A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, D. Terry, Epidemic algorithms for replicated database maintenance, in: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, PODC 87, ACM, 1987, pp R. Karp, C. Schindelhauer, S. Shenker, B. Vocking, Randomized rumor spreading, in: Proceedings of the 41st Annual Symposium on Foundations of Computer Science, IEEE Computer Society, 2000, pp Eugster, P.T.; Guerraoui, R.; Kermarrec, A.-M.; Massoulie, L.;, "Epidemic information dissemination in distributed systems," Computer, vol.37, no.5, pp , May Gossip protocols for the data aggregation problem: D. Kempe, A. Dobra, J. Gehrke, Gossip-based computation of aggregate information, in: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, 2003, pp M. Jelasity, A. Montresor, O. Babaoglu, Gossip-based aggregation in large dynamic networks, ACM Transactions on Computer Systems 23, 2005, S. Boyd, A. Ghosh, B. Prabhakar, D. Shah, Randomized gossip algorithms, Information Theory, IEEE Transactions on 52 (6), 2006, F. Blasa, S. Cafiero, G. Fortino,, "Symmetric Push-Sum Protocol for Decentralised Aggregation", The International Conference on Advances in P2P Systems (AP2PS), Lisbon, Portugal, Nov , Gossip-based protocols surveys, general studies, applications: Samir Khuller, Yoo-Ah Kim, and Yung-Chun Wan, "On generalized gossiping and broadcasting", Journal of Algorithms, 59, 2, May 2006, Dependability in aggregation by averaging, P. Jesus, C. Baquero, and P. Almeida, 1st Symposium on Informatics (INForum 2009), Sept. 2009, pp Rafik Makhloufi, Gregory Bonnet, Guillaume Doyen, and Dominique Gaiti, "Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey", The 4th IEEE International Workshop on Modelling Autonomic Communications Environments (MACE), P. Jesus, C. Baquero, and P. Almeida, Dependability in aggregation by averaging, 1st Symposium on Informatics (INForum 2009), Sept. 2009, pp Philip Soltero, Patrick Bridges, Dorian Arnold, and Michael Lang, A gossip-based approach to exascale system services, Proc. of the 3rd International Workshop on Runtime and Operating Systems for Supercomputers (ROSS '13), ACM,
67 extreme Computing Questions?
Why Rumors Spread Fast in Social Networks
Why Rumors Spread Fast in Social Networks Benjamin Doerr 1, Mahmoud Fouz 2, and Tobias Friedrich 1,2 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2 Universität des Saarlandes, Saarbrücken,
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Cloud Computing Architectures and Design Issues
Cloud Computing Architectures and Design Issues Ozalp Babaoglu, Stefano Ferretti, Moreno Marzolla, Fabio Panzieri {babaoglu, sferrett, marzolla, panzieri}@cs.unibo.it Outline What is Cloud Computing? A
Self-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
CS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
Design and Implementation of a P2P Cloud System
Design and Implementation of a P2P Cloud Ozalp Babaoglu, Moreno Marzolla, Michele Tamburini {babaoglu, marzolla}@cs.unibo.it, [email protected] Our Goal Assemble a Cloud out of individual devices E.g.
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *
SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS * Maha Abdallah LIP6, Université Paris 6, rue du Capitaine Scott 75015 Paris, France [email protected] Hung Cuong Le
Scalable Source Routing
Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data
A Parameter-Free Load Balancing Mechanism For P2P Networks
A Parameter-Free Load Balancing Mechanism For P2P Networks Tyler Steele, Vivek Vishnumurthy and Paul Francis Department of Computer Science, Cornell University, Ithaca, NY 14853 {ths22,francis,vivi}@cs.cornell.edu
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Dynamic Load Balancing for Cluster-based Publish/Subscribe System
Dynamic Load Balancing for Cluster-based Publish/Subscribe System Hojjat Jafarpour, Sharad Mehrotra and Nalini Venkatasubramanian Department of Computer Science University of California, Irvine {hjafarpo,
New Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
Load Balancing to Save Energy in Cloud Computing
presented at the Energy Efficient Systems Workshop at ICT4S, Stockholm, Aug. 2014 Load Balancing to Save Energy in Cloud Computing Theodore Pertsas University of Manchester United Kingdom [email protected]
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: [email protected] # K.Meena 2, Assistant Professor
DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks K.N.Sirisha *, S.Bhagya Rekha M.Tech,Software Engineering Noble college of Engineering & Technology for Women Web Technologies
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Distributed Computing and Big Data: Hadoop and MapReduce
Distributed Computing and Big Data: Hadoop and MapReduce Bill Keenan, Director Terry Heinze, Architect Thomson Reuters Research & Development Agenda R&D Overview Hadoop and MapReduce Overview Use Case:
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
Large-Scale Data Sets Clustering Based on MapReduce and Hadoop
Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE
Cellular Computing on a Linux Cluster
Cellular Computing on a Linux Cluster Alexei Agueev, Bernd Däne, Wolfgang Fengler TU Ilmenau, Department of Computer Architecture Topics 1. Cellular Computing 2. The Experiment 3. Experimental Results
Parallel Programming at the Exascale Era: A Case Study on Parallelizing Matrix Assembly For Unstructured Meshes
Parallel Programming at the Exascale Era: A Case Study on Parallelizing Matrix Assembly For Unstructured Meshes Eric Petit, Loïc Thebault, Quang V. Dinh May 2014 EXA2CT Consortium 2 WPs Organization Proto-Applications
Analysis of Distributed Algorithms for Density Estimation in VANETs (Poster)
2012 IEEE Vehicular Networking Conference (VNC) Analysis of Distributed Algorithms for Density Estimation in VANETs (Poster) Nabeel Akhtar, Sinem Coleri Ergen and Oznur Ozkasap Department of Computer Engineering
Load Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait
Peer-to-peer data storage software Specification and source code
GLORIA is funded by the European Union 7th Framework Programme (FP7/2007-2013) under grant agreement n 283783 Specification and source code CODE: DEL-050 VERSION: 01 DATE: November 28 th, 2012 Authors:
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
A distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Praktikum Wissenschaftliches Rechnen (Performance-optimized optimized Programming)
Praktikum Wissenschaftliches Rechnen (Performance-optimized optimized Programming) Dynamic Load Balancing Dr. Ralf-Peter Mundani Center for Simulation Technology in Engineering Technische Universität München
Protein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
Routing and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta ([email protected]) Niky Riga ([email protected]) Georgios Smaragdakis ([email protected]) Wei Li ([email protected]) Vijay Erramilli ([email protected]) References
Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0
INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network
1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, [email protected] 2, Qu Zheng Beijing University of Posts and Telecommunications, [email protected] Abstract
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Enabling Multi-pipeline Data Transfer in HDFS for Big Data Applications
Enabling Multi-pipeline Data Transfer in HDFS for Big Data Applications Liqiang (Eric) Wang, Hong Zhang University of Wyoming Hai Huang IBM T.J. Watson Research Center Background Hadoop: Apache Hadoop
Load Balancing in Peer-to-Peer Data Networks
Load Balancing in Peer-to-Peer Data Networks David Novák Masaryk University, Brno, Czech Republic [email protected] Abstract. One of the issues considered in all Peer-to-Peer Data Networks, or Structured
Load Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks
: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
Using Peer to Peer Dynamic Querying in Grid Information Services
Using Peer to Peer Dynamic Querying in Grid Information Services Domenico Talia and Paolo Trunfio DEIS University of Calabria HPC 2008 July 2, 2008 Cetraro, Italy Using P2P for Large scale Grid Information
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques Subhashree K 1, Prakash P S 2 1 Student, Kongu Engineering College, Perundurai, Erode 2 Assistant Professor,
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
A Survey on Load Balancing and Scheduling in Cloud Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel
Efficient Data Replication Scheme based on Hadoop Distributed File System
, pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Research on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
Preserving Message Integrity in Dynamic Process Migration
Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: [email protected]
SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD
International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE
Building Platform as a Service for Scientific Applications
Building Platform as a Service for Scientific Applications Moustafa AbdelBaky [email protected] Rutgers Discovery Informa=cs Ins=tute (RDI 2 ) The NSF Cloud and Autonomic Compu=ng Center Department
How To Cluster Of Complex Systems
Entropy based Graph Clustering: Application to Biological and Social Networks Edward C Kenley Young-Rae Cho Department of Computer Science Baylor University Complex Systems Definition Dynamically evolving
Load Balance Strategies for DEVS Approximated Parallel and Distributed Discrete-Event Simulations
Load Balance Strategies for DEVS Approximated Parallel and Distributed Discrete-Event Simulations Alonso Inostrosa-Psijas, Roberto Solar, Verónica Gil-Costa and Mauricio Marín Universidad de Santiago,
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Load Balancing in cloud computing
Load Balancing in cloud computing 1 Foram F Kherani, 2 Prof.Jignesh Vania Department of computer engineering, Lok Jagruti Kendra Institute of Technology, India 1 [email protected], 2 [email protected]
Join and Leave in Peer-to-Peer Systems: The DASIS Approach
Join and Leave in Peer-to-Peer Systems: The DASIS Approach Keno Albrecht, Ruedi Arnold, Michael Gähwiler, Roger Wattenhofer {kenoa@inf, rarnold@inf, mgaehwil@student, wattenhofer@inf}.ethz.ch Department
Hosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],
