How To Understand The Power Of Anemic Communication In A Networked System



Similar documents
Why Rumors Spread Fast in Social Networks

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Cloud Computing Architectures and Design Issues

Self-Compressive Approach for Distributed System Monitoring

CS5412: TIER 2 OVERLAYS

Design and Implementation of a P2P Cloud System

SCALABLE RANGE QUERY PROCESSING FOR LARGE-SCALE DISTRIBUTED DATABASE APPLICATIONS *

Scalable Source Routing

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection

A Parameter-Free Load Balancing Mechanism For P2P Networks

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Dynamic Load Balancing for Cluster-based Publish/Subscribe System

New Structured P2P Network with Dynamic Load Balancing Scheme

Load Balancing to Save Energy in Cloud Computing

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Comparison on Different Load Balancing Algorithms of Peer to Peer Networks

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems

International Journal of Advanced Research in Computer Science and Software Engineering

Distributed Computing and Big Data: Hadoop and MapReduce

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Figure 1. The Example of ZigBee AODV Algorithm

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Locality Based Protocol for MultiWriter Replication systems

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Fault-Tolerant Framework for Load Balancing System

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Cellular Computing on a Linux Cluster

Parallel Programming at the Exascale Era: A Case Study on Parallelizing Matrix Assembly For Unstructured Meshes

Analysis of Distributed Algorithms for Density Estimation in VANETs (Poster)

Load Balancing. Load Balancing 1 / 24

Peer-to-peer data storage software Specification and source code

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Performance of networks containing both MaxNet and SumNet links

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

A distributed system is defined as

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

Definition. A Historical Example

Praktikum Wissenschaftliches Rechnen (Performance-optimized optimized Programming)

Protein Protein Interaction Networks

Routing and Transport in Wireless Sensor Networks

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

A Catechistic Method for Traffic Pattern Discovery in MANET

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Enabling Multi-pipeline Data Transfer in HDFS for Big Data Applications

Load Balancing in Peer-to-Peer Data Networks

Load Balancing in Structured Overlay Networks. Tallat M. Shafaat

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Using Peer to Peer Dynamic Querying in Grid Information Services

Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks

Stability of QOS. Avinash Varadarajan, Subhransu Maji

International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

A Survey on Load Balancing and Scheduling in Cloud Computing

Efficient Data Replication Scheme based on Hadoop Distributed File System

An Optimization Model of Load Balancing in P2P SIP Architecture

Research on Trust Management Strategies in Cloud Computing Environment

Preserving Message Integrity in Dynamic Process Migration

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD

Building Platform as a Service for Scientific Applications

How To Cluster Of Complex Systems

Load Balance Strategies for DEVS Approximated Parallel and Distributed Discrete-Event Simulations

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

DAG based In-Network Aggregation for Sensor Network Monitoring

Load Balancing in cloud computing

Join and Leave in Peer-to-Peer Systems: The DASIS Approach

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Transcription:

Invited Talk: Epidemic Protocols for Extreme-scale Computing Global Knowledge without Global Communication Dr. Giuseppe Di Fatta G.DiFatta@reading.ac.uk Wednesday, September 24, 2014

Outline extreme-scale Computing Motivations: global knowledge without global communication Applications: from distributed systems to exascale supercomputing (HPC) Epidemic Data Mining Epidemic Protocols Information dissemination and data aggregation Membership and aggregation protocols Open Issues and Contributions aggregation in asynchronous systems local detection of global convergence dynamics in overlay topologies Conclusions 2

From Large to Extreme-scale Systems Distributed Systems Internet Ubiquitous Computing, Crowd Sensing, P2P Overlay Networks Internet of Things (50 to 100 trillion objects) Decentralised Online Social Networks Ad-hoc Networks Large-scale Wireless Sensor Networks Mobile ad-hoc Networks (MANET) Vehicular Ad-Hoc Networks (VANET) Parallel Systems Towards exascale computing Tianhe-2 (MilkyWay-2): National Supercomputer Center, Sun Yat-sen University, Guangzhou, China, Top500 N.1 since June 2013, 34/55 Pflop/s, 3.12M cores

Extremely Scalable Computing Scalability number of data objects dimensionality of data objects number of processing elements Communicationbound p Computing in extreme-scale systems Scalability of the communication cost Decentralisation Robustness and fault-tolerance Adaptiveness: ability to cope with dynamic environments Global Knowledge w/o Global Communication 4

Epidemic Protocols A communication and computation paradigm for large-scale networked systems: high scalability probabilistic guarantees on convergence speed and accuracy robustness, fault-tolerance, high stability under disruption aka Gossip-based protocols

Exponential Growth In epidemiology an epidemic is a disease outbreak that occurs when new cases exceed a "normal" expectation of propagation (a contained propagation). The disease spreads person-to-person: the affected individuals become independent reservoirs leading to further exposures. In uncontrolled outbreaks there is an exponential growth of the infected cases. Figure from: Rapid communications A preliminary estimation of the reproduction ratio for new influenza A(H1N1) from the outbreak in Mexico, March-April 2009", P Y Boëlle, P Bernillon, J C Desenclos, Eurosurveillance, Volume 14, Issue 19, 14 May 2009 Figure from: Controlling infectious disease outbreaks: Lessons from mathematical modelling, T Déirdre Hollingsworth, Journal of Public Health Policy 30, 328-341, Sept. 2009

Epidemic Computing Idea: Virus Information Disease outbreak Epidemic communication for extreme-scale computing 7

Epidemic/Gossip-based Protocol Active thread (cycle-based): Repeat wait some T chose a random peer send local state Passive thread (event-based): Repeat receive remote state If state==infected, then local state=infected A synchronous push mechanism for information dissemination (infection) Uniform Gossiping: assuming a node is able to select a node id (peer) uniformly at random Practical peer sampling: Membership Protocols are used to provide such a function in a practical way. 8

expected # protocol cycles Information Dissemination: Propagation Time Time to propagate information originated at one peer Time to complete infection : O(log N) # peers 9

Seminal Work and History Demers 1987 (Xerox PARC), Clearinghouse Directory Service Golding 1993, the refdbms distributed bibliographic database system Demers 1993-97 (Xerox PARC), the Bayou project Birman 1998 (Cornell), Bimodal Multicast van Renesse 1999 (Cornell), Astrolabe Karp 2000 (ICSI, Berkeley), Randomized Rumor Spreading In 2000-2005, a surge of studies: several epidemic protocols and their applications in communication networks and distributed systems Di Fatta 2011, first epidemic data mining algorithm for distributed systems Strakova 2011, first application to exascale supercomputing Theoretical work is still making progress but practical protocols and apps have received limited attention.

Open Issues Theoretical studies and simulations typically assume simplistic synchronous communication model with static/reliable network unrealistic global knowledge of the networked system the initial overlay topology is a random graph unlimited or enough protocol rounds to reach convergence In distributed, large and extreme-scale networks: communication is asynchronous, net is not reliable/is dynamic nodes may only know a limited set of neighbours (sparse graph) the initial topology may not be a random graph: poor initial topologies may have serious implications in convergence speed and, even worse, in the convergence guarantee itself convergence is a global property that depends on several factors, which typically are not known locally. 11

Applications

Applications Epidemic protocols have been used to provide scalable and fault-tolerant services, such as: information dissemination (broadcast, multicast) data aggregation: values of aggregate functions more important than individual data (sum, average, sampling, percentiles, etc.) And they have been proposed for various applications: DB replica synchronisation and maintenance Network management and monitoring Failure detection HPC algs and services, e.g., QR factorization and power-capping Epidemic Knowledge Discovery and Data Mining decentralised discovery of global patterns and trends 13

Parallel K-Means in share-nothing systems distributed data distributed processes P0 P1 P2 P3 data are intrinsically distributed initialisation generate centroids for first iteration Broadcast compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums centroids for Global communication All-Reduce is not a feasible approach for next iteration: extreme-scale systems repeat until convergence 14

Epidemic K-Means distributed data distributed processes P0 P1 P2 P3 data are intrinsically distributed initialisation generate centroids for first iteration Epidemic broadcast of a seed for the random number generator generate centroids for first iteration generate centroids for first iteration generate centroids for first iteration (or static list of seeds for multiple executions) compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums compute local clusters: partial sums Epidemic Aggregation of sums, counts and errors centroids for next iteration: repeat until convergence 15

Simulations - Data Distributions Each node has a fixed number of data points (100). Each data point belongs to a category (colour). Data points are assigned to nodes from uniformly at random (a) to localitydependent allocation (d). 16

Clustering Accuracy Accuracy w.r.t. the ideal (centralised) data clustering Clustering Accuracy (average) Standard Deviation epidemic random p2p random p2p local p2p local p2p epidemic Cluster distribution (Jain Index) Cluster distribution (Jain Index) skew data distribution uniform distribution skew data distribution uniform distribution 17

Mean Squared Error of Centroids Error w.r.t. the ideal (centralised) centroids Clustering Error (average) Standard Deviation local p2p local p2p random p2p random p2p epidemic Cluster distribution (Jain Index) epidemic Cluster distribution (Jain Index) skew data distribution uniform distribution skew data distribution uniform distribution 18

Fault-Tolerance of Epidemic K-Means Clustering accuracy under message loss and churn: 0-20% Clustering Error (average) Standard Deviation local p2p local p2p random p2p random p2p epidemic Cluster distribution (Jain Index) epidemic Cluster distribution (Jain Index) skew data distribution uniform distribution skew data distribution uniform distribution 19

Data Aggregation

The Data Aggregation Problem (a.k.a. the node aggregation problem) Given a network of N nodes, each node i holding a local value x i, the goal is to determine the value of a global aggregation function f() at every node: f(x 0, x 1,..., x N-1 ) Example of aggregation functions: sum, average, max, min, random samples, quantiles and other aggregate databases queries.

Data Aggregation: e.g., Sum N 1 x i i 0 Centralised approach: all receive operations, and all additions, must be serialized: O(N) s Divide-and-conquer strategy to perform the global sum with a binary tree: the number of communication steps is reduced from O(N) to O(log(N)). 22

All-to-all Communication MPI AllReduce MPI predefined operations: max, min, sum, product, and, or, xor all processes compute identical results number of communication steps: log(n) number of messages: N*log(N) time t 3 f ( x0, x1,..., x N 1) Any global function which can be approximated well using linear combinations. t 2 t 1 t 0 x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 23

Fault-Tolerance and Robustness The parallel approach requires global communication. It is not fault tolerant: even a single node or link failure cannot be tolerated. A delay on a single communication may have an effect on all nodes. node failure 24

Epidemic Aggregation Protocols

Epidemic/Gossip-based Protocol Active thread (cycle-based): Repeat wait some T chose a random peer send local state Passive thread (event-based): Repeat receive remote state [reply with local state] merge remote and local state definition of state and merge function (aggregation protocol) E.g., average, sum, percentiles, etc. based on randomised communication: peer selection mechanism (membership protocol) Aggregation Protocol Membership Protocol 26

Epidemic Data Aggregation: Global Average Simulation of epidemic aggregation: local estimations of global average Network of 10K nodes: each node holds a local value. Worst case analysis: peak distribution, i.e. information originated at one node Very high value Higher value Target value (0.01% error) Lower value 27

Epidemic Protocols Push epidemic each peer sends state to other member Pull epidemic each peer requests state from other member expected #rounds the same Asymmetric Gossiping Push/Pull epidemic Push and Pull in one exchange reduces #rounds at increased communication cost Symmetric Gossiping 28

Asymmetric/Symmetric Approaches in Uniform Gossip, at any cycle the probability that a node receives a number x of messages follows a binomial distribution. Asymmetric: at each cycle, 36.8% of nodes do not receive any push message. Symmetric: at each cycle, every node receives at least one pull message. 29

The Push-Sum Protocol (PSP) Each node i holds and updates the local sum s t,i and a weight w t,i. Initialisation: Node i sends the pair <x i,w 0,i > to itself. At each cycle t: j <½s t,j, ½w t,j > i <½s t,i, ½w t,i > Update at node i: s t+1,i = ½s t,j + ½s t,i + ½s t,z <½s t,i, ½w t,i > w t+1,i = ½w t,j + ½w t,i + ½w t,z variance reduction step z u 30

The Push-Sum Protocol (PSP) Settings for various aggregation functions: Convergence: accuracy, consistency and speed 31

Mass Conservation Invariant The mass conservation invariant states that, for the case Average, the average of all local values is always the correct average and the sum of all weights is always N. Protocols violating this invariant do not converge to the true global aggregate. 32

Diffusion Speed The diffusion speed is how quickly values originating at a source diffuse evenly through a network (convergence). The number of protocol iterations such that the value at a node is diffused through the network, i.e., a peak distribution is transformed in a uniform distribution. The diffusion speed is typically given as the complexity of the number of iteration steps as function of the network size, maximum error and maximum probability that the approximation at a node is larger than the maximum error. PSP diffusion speed: with probability 1- the relative error in the approximation of the global aggregate is within, in at most O(log(N) + log(1/ ) + log(1/ )) cycles, where and are arbitrarily small positive constants. 33

The Push-Pull Gossip (PPG) Protocol PPG aggregated average: at a push msg nodes reply with a pull msg: local values are exchanged and averaged. 1 Node i selects a random node j to exchange their local values. Each node compute the average and updates the local pair. v t+1,i = ½(v t,j + v t,i ) variance reduction step: i 2 v t+1,j = ½(v t,j + v t,i ) j The push-pull operations need to be performed atomically. If not, the conservation of mass in the system is not guaranteed and the protocol does not converge to the true global aggregate. u 2 4 i 3 1 j 34

The Symmetric Push-Sum Protocol (SPSP) SPSP is a Push-Pull scheme with asynchronous communication no atomic operation is required. <½s t,i, ½w t,i > <½s t,j, ½w t,j > i <½s t,i, ½w t,i > <½s t,j, ½w t,j > j 35

Comparative Analysis (PSP, PPG, SPSP) Convergence speed: variance of the estimated global aggregate over time Percentage of operations with atomicity violation (AVP): 0.3% and 90%, Internet-like topologies, 5000 nodes. PPG and SPSP convergence speed is similar w.r.t. AVP. PSP SPSP PPG 36

Comparative Analysis (PSP, PPG, SPSP) The mean percentage error (MPE) over time different AVP levels (from 0.3% to 90%) averages over 100 different simulations: Internet-like and mesh topologies, 1000-5000 nodes, different data distributions, asynchronous communication. Only PSP and SPSP converge to the true global aggregate value. PPG SPSP PSP 37

Epidemic Membership Protocols

Protocol Stack Epidemic application Epidemic application Aggregation Protocol Aggregation Protocol Aggregation Protocol Uniform Gossiping Membership Protocol overlay topology Transport Protocol Network Protocol physical topology 39

Epidemic & Membership Protocols Epidemic Protocols: exchange information with other nodes to achieve some application goals (e.g., information dissemination, data aggregation) Membership Protocols: provide the random peer sampling service for the above and is based on an epidemic approach too. node i Epidemic Protocol 3 send a push msg to j node j Epidemic Protocol request a random node 1 2 response with random node j Membership Protocol 40

Overlay Topologies The overlay topology must have nice properties. Sparse (out degree): e.g., a fully connected graph is not scalable (global knowledge) Robust: no single points of failure - a star topology has optimal propagation time, but it is not scalable and is not robust. Load balancing (indegree): there should not be bottlenecks. Connectivity: a single connected component The overlay topology must be connected at all times. If at any time the graph degenerates into multiple connected components, it will not heal (*) and the application-layer epidemic protocol will not converge. Good propagation/diffusion: random graphs, expanders 41

Epidemic Membership Protocols Practical peer sampling: Partial view of the global system: a local cache of (max size) peer IDs is maintained and used to draw a random entry when requested The cache is initialised with the initial (physical) neighbours. Caches are periodically exchanged (likewise push/pull messages), merged and randomly trimmed to max size. This is equivalent to multiple random walks: the cache entries quickly converges to a random sample of the peers with uniform distribution. random sparse regular graph a b j c Membership Protocol node i push d e f g a b j c pull Membership Protocol node j d e f g 42

Epidemic Membership Protocols Practical peer sampling: Partial view of the global system: a local cache of (max size) peer IDs is maintained and used to draw a random entry when requested The cache is initialised with the initial (physical) neighbours. Caches are periodically exchanged (likewise push/pull messages), merged and randomly trimmed to max size. This is equivalent to multiple random walks: the cache entries quickly converges to a random sample of the peers with uniform distribution. random sparse regular graph d b j e Membership Protocol node i Membership Protocol node j a d f g 43

Epidemic Membership Protocols At each cycle (synchronous model), the distributed set of caches define a transient random overlay network. The membership protocol keeps changing the overlay topology over time Aim: the random node sampling from the local partial view results in a uniform distribution over the global system Uniform Gossiping The node caches define an overlay network topology: a random sparse regular digraph that keeps changing over time. Some membership protocols: Node Cache Protocol, Cyclon, Send&Forget, Newscast, Eddy 44

Multiple connected components Random Overlay Topologies A Membership Protocol is a fully-decentralised generative graph method: it takes an input graph and generates a random output graph with similar properties. (assuming a simplified synchronous network model) Most (not all) MPs adopt (random) regular digraphs: the local cache has fixed size. Ideally we would like the MP to induce an attraction towards strongly connected graphs with equal indegree (or with low variance): the indegree can be used as a measure of robustness. digraphs 1 1 weakly connected digraphs robust and strongly connected digraphs initial condition 2+ 45

The Expander Membership Protocol A novel membership protocols inspired by the concept of expander graphs, aka expanders. An expander is a sparse graph with strong connectivity. The strong connectivity can be quantified by an index of expansion quality. The Expander Membership Protocol is designed to maximise the expansion quality of the overlay topology. quasi-random peer selection: random search of a push-pull peer that minimizes cache overlap. 46

Expansion Quality The vertex expansion index h(v,s) and its minimum over different sample sizes (typically 0<s<½ V ): h( V, S) h min ( V, s) ( S) V \ S ( S) min S V, S s V \ S V: the set of network nodes S: a sample of nodes, S V, S =s (S): the boundary of S, i.e. the set of nodes not in S and 1-hop distant from at least one node in S. Set of the network nodes Boundary Nodes Sample 47

Message Forwarding Mechanism Case 1: Q x is local cache of node x and Q y is local cache of node y. Each iteration node x will send push message to node y. If Q x Q y <= T max, then y will accept the push message and reply with pull message. 3 Pull Msg y 2 Accept x 1 Push Msg 48

Message Forwarding Mechanism Case 2: Each iteration node x will send push message to randomly selected node y. If Q x Q y > T max, then y will forward the push message to another randomly selected node from Q y and repeat the same step until the message is accepted. 5 Pull Msg 4 Accept x z 1 Push Msg y 2 Reject 3 Forwarding Push Msg 49

Message Forwarding Mechanism Case 3: In order to prevent excessive communication overhead and delay, the forwarding procedure will be repeated up to H max, then the message will return to the node with lowest similarity and force it to accept the message. 6 Pull Msg 5 Force Accept 4 Reject and Hop = H max x i z 1 Push Msg y 3 Forwarding Push Msg 2 Reject 50

Recovery Mechanism (WIP) The simple protocol may still lead to multiple connected components when the initial condition is particularly poor (e.g., ring of communities) and in the presence of interleaving in push-pull operations An additional heuristic mechanism has been incorporated to facilitate the recovery from multiple connected components back to a single one. Work in progress: only limited experimental verification General idea to fix loss of connectivity: Interleaving causes unwanted duplication of cache entries If somewhere a duplicate is generated, somewhere else an unwanted drop is made. Some selected entries rather than dropped are stored in a secondary cache. When local duplication is detected, then entries from secondary cache is recovered. 51

Simulations Task: computing global aggregation value (peak distribution) Network size: 10000 Aggregation protocol: SPSP, peak distribution Membership protocols: Cyclon, Eddy, S&F, Node Cache Protocol, Expander Protocol, Ideal Random Initial overlay topologies (with poor expansion): circular regular graph ring of communities 52

Minimum Expansion Index Comparison of different membership protocols init: circular regular graph chart: minimum vertex expansion index: h min (G,5% V ) 53

Minimum Expansion Index Comparison of different membership protocols init: ring of communities chart: minimum vertex expansion index: h min (G,5% V ) 54

Convergence Speed Comparison of different membership protocols init: circular regular graph chart: convergence speed 55

Connected Components Comparison of different membership protocols init: ring of communities chart: max number (over several trials) of connected components vs #cycle 56

Global Synchronisation

% node Convergence 1. Local convergence 1 2. 2 Global convergence 3 3. Local detection of global convergence (global synchronisation) Simulations: 10K nodes, peak distribution, 5 Aggregation protocols, init random graph Chart: number of nodes (%) locally converged to the global aggregate within a tolerance error for different accuracy thresholds (stddev). 1 cycle based on global knowledge only available in simulations. 58

Global Synchronisation Can global convergence be estimated locally? Multiple independent aggregation protocols local variance is used to detect convergence global synchronisation without global communication Global Synchronisation Aggregation Protocol #1 Aggregation Protocol #2 Aggregation Protocol #k Membership Protocol {f 1 (), f 2 (),, f k ()} [µ, ] 59

Global Synchronisation Global convergence depends on several factors, network conditions and application requirements. Ideal synchronisation vs local detection method 6M 2 3 2 3 The ideal step transition (in red) is based on global knowledge, only available in simulations. The local method is based on local knowledge available at each node. 60

Global Synchronisation Convergence transition of different methods (ε = 10 4 and N = 10 4 ) 2 3 61

Transition Period Nodes detect global convergence at different times during a transition period. Chart: the number of cycles from 0% to 100% of nodes that have detected global convergence for different methods. 3 62

Conclusions Extreme Computing based on Epidemic Protocols fully decentralised fault-tolerant suitable for extreme-scale networked systems suitable for asynchronous and dynamic networks Contributions: Symmetric Push-Sum Protocols (SPSP), an aggregation protocol The Expander Membership Protocol Methods of global convergence detection (synchronisation) Epidemic K-Means, the first epidemic data mining algorithm Current work Refining and extending the Expander Membership Protocol: incorporating a connectivity recovery mechanism 63

Open Issues and Future Work Local estimation of convergence: better and faster convergence detection and synchronisation Asynchronous epidemic protocols (w/o cycles) Epidemic formulation of data mining algorithms: e.g., decision tree induction, recommender systems, etc. Protection against malicious nodes and loss of network connectivity Practical applicability still to be shown Need to identify potential user applications and their deployment strategy 64

Publications 1. F. Blasa, S. Cafiero, G. Fortino,, "Symmetric Push-Sum Protocol for Decentralised Aggregation", The International Conference on Advances in P2P Systems (AP2PS), Lisbon, Portugal, Nov. 20-25, 2011. 2., F. Blasa, S. Cafiero, G. Fortino, "Epidemic K-Means Clustering", IEEE ICDM Workshop on Knowledge Discovery Using Cloud and Distributed Computing Platforms (KDCloud), Vancouver, Canada, 11 Dec. 2011. 3., F. Blasa, S. Cafiero, G. Fortino, "Fault tolerant decentralised k-means clustering for asynchronous large-scale networks, Journal of Parallel and Distributed Computing, Elsevier, Volume 73, Issue 3, March 2013, Pages 317 329. 4. P. Poonpakdee, N. G. Orhon,, "Convergence Detection in Epidemic Aggregation", Proc. of Euro-Par 2013 Workshops, Aachen, Germany, Aug. 26-30, 2013, Springer LNCS. 5. P. Poonpakdee,, "Expansion Quality of Epidemic Protocols", Proceedings of the 8th International Symposium on Intelligent Distributed Computing (IDC), Madrid, Spain, Sept. 3-5, 2014, Studies in Computational Intelligence, Springer, Vol. 570, 2015, pp 291-300. 65

References Mathematical models of Epidemics Nicholas C. Grassly & Christophe Fraser, "Mathematical models of infectious disease transmission, Nature Reviews Microbiology 6, 477-487 (June 2008) Gossip-based protocols for information dissemination: A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, D. Terry, Epidemic algorithms for replicated database maintenance, in: Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, PODC 87, ACM, 1987, pp. 1 12. R. Karp, C. Schindelhauer, S. Shenker, B. Vocking, Randomized rumor spreading, in: Proceedings of the 41st Annual Symposium on Foundations of Computer Science, IEEE Computer Society, 2000, pp. 565. Eugster, P.T.; Guerraoui, R.; Kermarrec, A.-M.; Massoulie, L.;, "Epidemic information dissemination in distributed systems," Computer, vol.37, no.5, pp. 60-67, May 2004. Gossip protocols for the data aggregation problem: D. Kempe, A. Dobra, J. Gehrke, Gossip-based computation of aggregate information, in: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, 2003, pp. 482 491. M. Jelasity, A. Montresor, O. Babaoglu, Gossip-based aggregation in large dynamic networks, ACM Transactions on Computer Systems 23, 2005, 219 252. S. Boyd, A. Ghosh, B. Prabhakar, D. Shah, Randomized gossip algorithms, Information Theory, IEEE Transactions on 52 (6), 2006, 2508 2530. F. Blasa, S. Cafiero, G. Fortino,, "Symmetric Push-Sum Protocol for Decentralised Aggregation", The International Conference on Advances in P2P Systems (AP2PS), Lisbon, Portugal, Nov. 20-25, 2011. Gossip-based protocols surveys, general studies, applications: Samir Khuller, Yoo-Ah Kim, and Yung-Chun Wan, "On generalized gossiping and broadcasting", Journal of Algorithms, 59, 2, May 2006, 81-106. Dependability in aggregation by averaging, P. Jesus, C. Baquero, and P. Almeida, 1st Symposium on Informatics (INForum 2009), Sept. 2009, pp. 482 491. Rafik Makhloufi, Gregory Bonnet, Guillaume Doyen, and Dominique Gaiti, "Decentralized Aggregation Protocols in Peer-to-Peer Networks: A Survey", The 4th IEEE International Workshop on Modelling Autonomic Communications Environments (MACE), 2009. P. Jesus, C. Baquero, and P. Almeida, Dependability in aggregation by averaging, 1st Symposium on Informatics (INForum 2009), Sept. 2009, pp. 482 491. Philip Soltero, Patrick Bridges, Dorian Arnold, and Michael Lang, A gossip-based approach to exascale system services, Proc. of the 3rd International Workshop on Runtime and Operating Systems for Supercomputers (ROSS '13), ACM, 2013. 66

extreme Computing Questions?