DOC PREVIEW
U of I CS 525 - Epidemics

This preview shows page 1-2-3-4-5-32-33-34-35-65-66-67-68-69 out of 69 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 69 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

EpidemicsHistoryMulticast RoutingSlide 4Atomic MulticastSlide 6“Best Effort” Multicast RoutingSlide 8Slide 9Epidemic AlgorithmsSlide 11Epidemic Algorithms in DatabasesSlide 13Slide 14Slide 15Slide 16Slide 17Epidemic Push/PullSlide 19Slide 20Slide 21Slide 22Bimodal MulticastThe pbcast Algorithm (from [1])Slide 25Slide 26Slide 27Slide 28Slide 29Slide 30Slide 31Slide 32Slide 33Slide 34Slide 35Slide 36Slide 37Slide 38Slide 39Slide 40Slide 41Slide 42Slide 43Slide 44Slide 45Slide 46Ad-Hoc Routing EpidemicsSlide 48Slide 49Slide 50Slide 51Slide 52Slide 53Slide 54Slide 55Slide 56OverviewDiscussionSlide 59Slide 60Slide 61Slide 62Slide 63Slide 64Slide 65Slide 66Slide 67Slide 68Slide 69EpidemicsPresented By:Lucas Cook and Wade FagenCS 525, The University of Illinois (UIUC)6 February 2007HistoryTwo schools of algorithms multicast:ProactiveReactiveExisting Algorithms/Implementations:SRMIP Multicast (best-effort)NNTP (gossip)IRC (hierarchical multicast)PSYC (multicast; more “web”-like than IRC)Multicast Routing“Reliable” Multicast Routing:Ensure that a message sent from any node is received by all other nodes within any distributed system.…but we don’t live in an “ideal” world.Multicast RoutingThree general categories:Algorithms that provide “strong” reliability properties.Ex: atomic multicastsRound: #1 #2 #3 …Atomic MulticastNodes only process at the beginning of roundsNew rounds don’t start until all previous messages are receivedRound: #1 #2 #3 …Multicast RoutingThree general categories:“strong” reliability algorithms“best-effort” reliability algorithmsEx: MUSE algorithmProvides no assurance of end-to-end reliability assuranceProblems and solutions exist both at the physical network layer and the overlay areaFocus of distributed systems: overlay“Best Effort” Multicast RoutingMany algorithms implement some neighbor-based approach…“Best Effort” Multicast RoutingEnd-to-end assurance may be lost by one node’s failure:Multicast RoutingThree general categories:“strong” reliability algorithms“best-effort” reliability algorithms“proactively probabilistic” multicast algorithmsProvides predictable reliabilityGoal: Achieve better reliability than “best-effort” without the overhead of “strong” reliabilityMethod: EpidemicsEpidemic AlgorithmsEpidemics help ensure probabilistic end-to-end reliability with an assurance of “almost all” or “almost none” structureTradeoff between scale and reliability: epidemics allow for expansive scale with near-perfect reliabilityEpidemic AlgorithmsTo be less verbose, the following citations are used throughout the presentation:[1]: Bimodal multicast, K Birman et al, ACM TOCS 1999 [2]: Epidemic algorithms for replicated database maintenance, A. Demers et al, PODC 1987.[3]: Gossip-based ad hoc routing, Z. Haas et al, Infocom 2002Epidemic Algorithms in DatabasesSite updating has been a key problem since the beginning of distributed database work:Data is injected at one siteData needs to be updated at every siteIncoming TransactionEpidemic Algorithms in DatabasesClassic Examples:NNTPFirst use of e-mail serversetc…Epidemic Algorithms in DatabasesThree core concepts:Direct CommunicationBottleneck!Anti-Entropy MeasurePossible full comparison (slow!)Rumor Management Only updates!Epidemic Algorithms in DatabasesThree states of a message /nodeSusceptive: Message not received at nodeInfective: Message is actively propagated by nodeRemoved: Message is no longer actively propagated by nodeEpidemic Algorithms in DatabasesDecide on two phase algorithm:Phase 1: Rumor MongeringProbabilistic spread of messages to (hopefully) nearly all nodesConsiderations between Push/Pull modelsEpidemic Algorithms in DatabasesDecide on two phase algorithm:Phase 1: Rumor MongeringPhase 2: Epidemic (Anti-Entropy)Ran periodically in the backgroundRan at each nodeEpidemic Push/PullGeneric Epidemic MessageAn epidemic message contains a summary of recent eventsTwo types: “push” and “pull”The different types of messages allow formalization of the mathematicsEpidemic Push/PullA “push” is a message sent from some infected site to a susceptible site.Incoming TransactionpushEpidemic Push/PullA “pull” is a message sent from some susceptible site to an infected siteIncoming TransactionpushpullpushEpidemic Algorithms in DatabasesWith the general idea, the specifics of [2] relate to databases:Two primary distributed operations“Data Insertion”: INSERT, UPDATE“Data Deletion”: DELETEEpidemic message for DELETE are augmented with a “death certificate”In [2], SELECT is simply done locally at each distributed end point of the databaseEpidemic Algorithms in DatabasesResults published in [2]Key Result: Replacing deterministic algorithms for database consistencyActual Results: Simulation-based solution onlyShowed internal based resultsSimulation of traditional schemes wasn’t done for accurate comparisonBimodal Multicast[1] presents a bimodal multicast algorithm called pbcastpbcast := “probabilistic broadcast”The pbcast Algorithm (from [1])Six Properties:Atomicity (probabilistically)Throughput StabilityOrdering (FIFO)Multicast StabilityDetection of Lost MessagesScalability[Acceptability of soft failures]The pbcast Algorithm (from [1])Two sub-protocols:Part 1: Hierarchical broadcastUnreliable, “best-effort” approachPart 2: Anti-entropy to correct packet loss if neededResults in predictable end-to-end assurancesThe pbcast Algorithm (from [1])Basic Hierarchical Broadcast:m1m1m1Node 1: {1}Node 2: {1}Node 3: {1}Node 4: {1}The pbcast Algorithm (from [1])Basic Hierarchical Broadcast:m1m1m1m2m2m2m2m2m2m2m2m1m1m1m1m1Node 1: {1, 2}Node 2: {1, 2}Node 3: {1, 2}Node 4: {1, 2}The pbcast Algorithm (from [1])Basic Hierarchical Broadcast:m3m2m2m2m1m1m1m1m2m1m1m2m1m1m1m2m1m2m1m1m2m1m3m2m1m1m2m1m2m3m2m1m1m2m1Node 1: {1, 2}Node 2: {1, 2}Node 3: {1, 2, 3}Node 4: {1, 2}Node 1: {1, 2}Node 2: {1, 2}Node 3: {1, 2, 3}Node 4: {1, 2}Node 1: {1, 2}Node 2: {1, 2}Node 3: {1, 2, 3}Node 4: {1, 2}The pbcast Algorithm (from [1])Basic Hierarchical


View Full Document

U of I CS 525 - Epidemics

Documents in this Course
Epidemics

Epidemics

12 pages

LECTURE

LECTURE

7 pages

LECTURE

LECTURE

39 pages

LECTURE

LECTURE

41 pages

P2P Apps

P2P Apps

49 pages

Lecture

Lecture

48 pages

GRIFFIN

GRIFFIN

25 pages

Load more
Download Epidemics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Epidemics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Epidemics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?