Department of Computer Science, Cornell University. fkatej, hopkik, Contact Info: Abstract:

Similar documents
A, B B, C. Internetwork Router. A, C Gossip Server

Relative frequency. I Frames P Frames B Frames No. of cells

Broadcasting Messages in Fault-Tolerant Distributed Systems: the benefit of handling input-triggered and output-triggered suspicions differently

The Yamaha Corporation


Optimizing Information Flow in the Gossip Objects Platform

On the Characterization of Distributed Virtual Environment Systems

Can the Computer Learn to Play Music Expressively? Christopher Raphael Department of Mathematics and Statistics, University of Massachusetts at Amhers

Experiments to Assess the Cost-Benefits of Test- Suite Reduction

Efficient Reconciliation and Flow Control for Anti-Entropy Protocols

FRAMES PER MULTIFRAME SLOTS PER TDD - FRAME

Computer Coordination With Popular Music: A New Research Agenda 1

data and is used in digital networks and storage devices. CRC s are easy to implement in binary

J. Maillard, J. Silva. Laboratoire de Physique Corpusculaire, College de France. Paris, France

STAT 113: Statistics and Society Ellen Gundlach, Purdue University. (Chapters refer to Moore and Notz, Statistics: Concepts and Controversies, 8e)

Implementation of an MPEG Codec on the Tilera TM 64 Processor

SWITCHED INFINITY: SUPPORTING AN INFINITE HD LINEUP WITH SDV

DCT Q ZZ VLC Q -1 DCT Frame Memory

sr c0 c3 sr c) Throttled outputs Figure F.1 Bridge design models

On-Supporting Energy Balanced K-Barrier Coverage In Wireless Sensor Networks

Video Surveillance *

CS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 3. A Network-Centric View on HPC

Lecture 3: Nondeterministic Computation

P E R F O R M I N G R E P L A C E M E N T I N M O D E M P O O L S

NAA ENHANCING THE QUALITY OF MARKING PROJECT: THE EFFECT OF SAMPLE SIZE ON INCREASED PRECISION IN DETECTING ERRANT MARKING

The Fox News Eect:Media Bias and Voting S. DellaVigna and E. Kaplan (2007)

Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University

Hidden Markov Model based dance recognition

Random Access Scan. Veeraraghavan Ramamurthy Dept. of Electrical and Computer Engineering Auburn University, Auburn, AL

Chapter 12. Synchronous Circuits. Contents

MindMouse. This project is written in C++ and uses the following Libraries: LibSvm, kissfft, BOOST File System, and Emotiv Research Edition SDK.

WHAT MAKES FOR A HIT POP SONG? WHAT MAKES FOR A POP SONG?

Implementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters

THE MAJORITY of the time spent by automatic test

White Paper. Video-over-IP: Network Performance Analysis

Changing the Scan Enable during Shift

Performance Driven Reliable Link Design for Network on Chips

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract:

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

The Promise, and Limitations, of Gossip Protocols

IP Telephony and Some Factors that Influence Speech Quality

Music Morph. Have you ever listened to the main theme of a movie? The main theme always has a

Pattern Smoothing for Compressed Video Transmission

Seamless Workload Adaptive Broadcast

An Improved Fuzzy Controlled Asynchronous Transfer Mode (ATM) Network

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

Behavior Forensics for Scalable Multiuser Collusion: Fairness Versus Effectiveness H. Vicky Zhao, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE

Lab 6: Edge Detection in Image and Video

JJMIE Jordan Journal of Mechanical and Industrial Engineering

The transmission of MPEG-2 VBR video under usage parameter control

Heuristic Search & Local Search

Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video

Faster randomized consensus with an oblivious adversary

Resampling Statistics. Conventional Statistics. Resampling Statistics

Logic Design ( Part 3) Sequential Logic- Finite State Machines (Chapter 3)

CS229 Project Report Polyphonic Piano Transcription

A Statistical Framework to Enlarge the Potential of Digital TV Broadcasting

Distortion Analysis Of Tamil Language Characters Recognition

OCTAVE C 3 D 3 E 3 F 3 G 3 A 3 B 3 C 4 D 4 E 4 F 4 G 4 A 4 B 4 C 5 D 5 E 5 F 5 G 5 A 5 B 5. Middle-C A-440

6.UAP Project. FunPlayer: A Real-Time Speed-Adjusting Music Accompaniment System. Daryl Neubieser. May 12, 2016

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005.

DSP Laboratory: Analog to Digital and Digital to Analog Conversion *

Achieving High Encoding Efficiency With Partial Dynamic LFSR Reseeding

Solution of Linear Systems

MSB LSB MSB LSB DC AC 1 DC AC 1 AC 63 AC 63 DC AC 1 AC 63

Modeling memory for melodies

Note for Applicants on Coverage of Forth Valley Local Television

How to Predict the Output of a Hardware Random Number Generator

Cryptanalysis of LILI-128

AP Statistics Sampling. Sampling Exercise (adapted from a document from the NCSSM Leadership Institute, July 2000).

How to Obtain a Good Stereo Sound Stage in Cars

1. Introduction. Abstract. 1.1 Logic Criteria

Precision testing methods of Event Timer A032-ET

Follow this and additional works at: Part of the Library and Information Science Commons

Automatic Piano Music Transcription

Department of Computer Science. Final Year Project Report

Chapter 21. Margin of Error. Intervals. Asymmetric Boxes Interpretation Examples. Chapter 21. Margin of Error

LAB 1: Plotting a GM Plateau and Introduction to Statistical Distribution. A. Plotting a GM Plateau. This lab will have two sections, A and B.

Retiming Sequential Circuits for Low Power

CPS311 Lecture: Sequential Circuits

Color Quantization of Compressed Video Sequences. Wan-Fung Cheung, and Yuk-Hee Chan, Member, IEEE 1 CSVT

2550 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 6, JUNE 2008

Pitch correction on the human voice

SIMULATION OF PRODUCTION LINES THE IMPORTANCE OF BREAKDOWN STATISTICS AND THE EFFECT OF MACHINE POSITION

Understanding Compression Technologies for HD and Megapixel Surveillance

MATH& 146 Lesson 11. Section 1.6 Categorical Data

Sharif University of Technology. SoC: Introduction

Key-based scrambling for secure image communication

An optimal broadcasting protocol for mobile video-on-demand

Adaptive Key Frame Selection for Efficient Video Coding

ITU-T Y Specific requirements and capabilities of the Internet of things for big data

Department of Electrical and Computer Engineering Mid-Term Examination Winter 2012

IP TV Bandwidth Demand: Multicast and Channel Surfing

Gossip Spread in Social Network Models

Bootstrap Methods in Regression Questions Have you had a chance to try any of this? Any of the review questions?

Wipe Scene Change Detection in Video Sequences

A Video Frame Dropping Mechanism based on Audio Perception

Sampling: What you don t know can hurt you. Juan Muñoz

Clock Gate Test Points

Improving music composition through peer feedback: experiment and preliminary results

Transcription:

A Gossip Protocol for Subgroup Multicast Kate Jenkins, Ken Hopkinson, Ken Birman Department of Computer Science, Cornell University fkatej, hopkik, keng@cs.cornell.edu Contact Info: Phone: (607) 255-9199 Fax: (607) 255-4428 Address: Dept of CS, Cornell University (Upson Hall), Ithaca 14853 Abstract: Gossip-based multicast can be an eective tool for providing highly reliable and scalable message dissemination. Previous work has shown it to be useful in a variety of group communication settings when processes all belong to a single process group. In this paper, we consider the problem of gossiping within overlapping process subgroups. If each subgroup independently runs the standard gossip protocol, then the total gossip overhead could be high for a process that is a memberofmany subgroups. We present anovel gossip protocol that allows individual subgroup members to trade-o update quality for gossip overhead, enabling processes to belong to several subgroups while maintaining a low total gossip overhead. Our results include a mathematical model for message dissemination under this modied gossip protocol, and an algorithm that computes gossip parameters such that all processes within a subgroup achieve their desired update quality. Preliminary results are promising. 1 Introduction Process groups are useful in many reliable group communication settings. A process group is a set of processes that share state, updated using multicast messages to achieve a common goal. Process groups are often found as part of a larger virtual synchrony group communication framework, where there is a view manager that manages group membership, with reliability guarantees for message delivery. Some applications use large numbers of process groups, often with heavily overlapping membership. For example, process groups have been used for a reliable network le system and a fault-tolerant distributed object system (see [7]). People have developed light-weight group services to amortize the virtual synchrony overhead when there are large numbers of overlapping process groups [7, 5]. Another recent development in reliable group communication has been the application of epidemic rumormongering techniques to reliable multicast [4]. Epidemic \gossip" protocols provide strong probabilistic reliability guarantees, and are extremely scalable. Gossip protocols were rst developed to improve consistency management of replicated databases [3], and have also successfully been used for failure detection [9] and membership detection [6]. A pure gossip protocol takes place in rounds, where in each round a participating process selects another uniformly at random they share information. There are a number variations on how this is done. In \push" gossip, the process that initiates the gossip \infects" the selected target with information. It has been shown that in a group of N machines, if one machine starts out with a novel piece of information, it takes O(log N) rounds for every machine to become infected with that information (with high probability) [1, 8]. These are called epidemic algorithms because the analysis of their behavior stems from work in epidemiology, studying the spead of infection within a population. In scenarios where participants are constantly generating new information, one could have gossip running continuously, with the same overhead for each participant. 1

We consider a modied gossip protocol that can be useful when some processes want to be members of a gossip group, but are willing to accept a tradeo between the amount of information they receive in order to incur a smaller gossip overhead. In particular, we consider the situation where group members are interested in receiving updates generated by other members, as long as they arrive within some xed time after being generated. We call this the timeout. Each group member can specify a \quality rating" between 0 and 1. A member with rating r wants to receive wants to incur fraction r of the gossip overhead of the other group members, and is willing to receive only fraction r of the updates. Such a protocol could be useful in a group communication setting where there is a large number of overlapping process groups, and some processes are interested in the information generated by many groups yet could not handle the gossip overhead of being full members all of the groups. This problem is motivated by an application to power networks, where processes participating in load-following contracts require very detailed data and are willing to pay for it, while other processes merely monitor the contract and require much less detail. The latter processes would prefer to pay less for lower-quality data. We call our protocol \gravitational gossip", because it evokes the fact that messages are more likely to be both sent and received by the \heavier" members with high quality ratings within the group. In this paper, we restrict our attention to gossiping within a single LAN. We assume that the communication graph is fully connected and that the distributions of latencies are similar on all links, and do not worry about router congestion or other issues that would need to be addressed in a real implementation. We present a mathematical model for gravitational gossip and an algorithm that uses this model to compute the gossip parameters necessary to achieve the desired performance. We then compute the gossip overhead incurred by machines belonging to multiple subgroups at dierent ratings. 2 Gravitational Gossip Gravitational gossip is similar to push gossip, except that instead of selecting one target uniformly at random each round, the frequency of target selection and the choice of target is weighted by some extra parameters. Throughout this exposition, we will use the terms \member", \process" and \machine" interchangeably. Each machine has two parameters, its infectivity and its susceptibility. We denote these by I m and S m respectively for machine m. During a round of gravitational gossip, machine i gossips to machine j with probability I i S j (as compared to 1/N for standard gossip). All machines at the same rating will be assigned the same infectivities and susceptibilities. We say these machines belong to the same strata. In an abuse of notation, we will let I r and S r denote these values for rating r. This model of infection spreading is referred to as proportionate mixing in the epidemiological literature [2]. We refer to a machine that has received the update as being infected, and one that has not received it yet as being suspectible. Our problem reduces to nding values for I and S that achieve the desired level of infection for machines at each quality rating. 3 A Mathematical Model We make some assumptions when developing a model for the protocol's behavior. One assumption is that there are large numbers of machines at each rating. A second is that the fraction of machines infected by each round is very close to its expected value (i.e. there is very little variance). Boris Pittel proved this to be the case for the standard push protocol when each message is gossiped independently [8], and we anticipate that this is still the case for gravitational gossip. Given these assumptions, we can create deterministic recurrence relations for the fraction of susceptible machines at each rating as a function of time (measured in rounds). 2

let, x r (t) = fraction of susceptible machines at rating r at time t Note that we can also interpret x r (t) as the probability that any given machine at rating r is still susceptible by time t. Then, x r (t +1)=P (machine m at rating r is susceptible at time t +1) = P (m was susceptible at time t) P (no infected machines gossiped to m at time t +1) = x r (t) P (each machine that gossiped to rating r at time t + 1 missed m) = x r (t) (1 ; 1=N r ) num gossips to rating r at time t +1 x r (t) (1 ; 1=N r ) N rs r P j I jn j (1;x j (t)) x r (t) e ;Sr Pj IjNj (1;xj(t)) Where the sum in the exponent sums over all of the dierent ratings, and N r is the numberofmachines with rating r. Now, let (t) = P j I j N j (1 ; x j (t)). Putting this all together, we get a system of recurrence relations: x 1 (t +1)=x 1 (t) e ;S1(t) x r1 (t +1)=x r1 (t) e ;S r 1 (t) x r2 (t +1)=x r2 (t) e ;S r 2 (t) ::: x rk (t +1)=x rk (t) e ;Sr k (t) This gives us our prediction for the fraction of susceptible machines at each rating at each round. The fraction of infected machines at round t is just 1 ; x r (t) for each rating r. Note that it depends on our choices of S r 's, I r 's, N r 's and x r (0)'s. There is one very nice property which follows directly from these recurrence relations. Namely, 8t x r (t) (x 1 (t)) S r=s 1 This can be shown true by induction, since it gives: x r (t +1)=x r (t) e ;S r(t) =(x 1 (t)) S r =S 1 (e ;S1(t) ) S r=s 1 =(x 1 (t) e ;S1(t) ) S r =S 1 =(x 1 (t + 1)) S r=s 1 and x r (0) x 1 (0) S r=s 1 for N 1 large. 3

4 Model Parameter Prediction Recall that the problem we set out solve istohave machines at rating r have probability r of receiving any given time-series update before it times out, and to have them initiate r times as many gossips as a machine at rating 1. Translated into our gravitational gossip framework, that means we want to nd values I 1 I r1 ::: I rk,ands 1 S r1 ::: S rk such that: x 1 (timeout) 0 and such that I r1 =I 1 = r 1 ::: I rk =I 1 = r k. x r1 (timeout) 1 ; r 1 ::: x rk (timeout) 1 ; r k Note that from the recurrence relations, x 1 (t) will never equal 0 (although it will get arbitrarily close). This follows from the fact that no matter now long we wait, the probability that a given machine will become infected will never equal 1 since there is always some chance it will be missed. Instead, we let the user specify an additional parameter,, and nd parameters such thatx 1 (timeout) <. The parameter prediction algorithm works as follows: We know that for any xed parameter settings, there is some smallest time T such that x 1 (T ) <. By the result of the previous section, at that time, x r (T )=(x 1 (T )) Sr=S1 < Sr=S1, for each rating r. So we let S 1 =1,andpick S r such that x r (T ) < 1 ; r. Namely, wewant Sr =1; r, sowechoose: S r =log (1 ; r) = log 2 (1 ; r)= log 2 () 8r This gives us the desired fractions of infected machines at each rating at time T.However, we want this to be achieved by time timeout. To achieve this, we can globally scale all of the susceptibilities by some value. No matter what the value of is, whenever x 1 (t) <the fraction of susceptibles at the other ratings will satisfy the desired proportions. Varying just aects the time at which this occurs. Hence, we binary search on the value of to nd one for which x 1 (timeout) <,butx 1 (timeout ; 1). Wetesta given value of by running the recurrence relations with the corresponding parameter values. This algorithm runs quickly, and provides good parameter values for the mathematical model. The following gure shows a plot of the fraction of infected machines (according to our model) at each of three quality ratings as a function of time. The plot was generated for one subgroup containing 100 machines at rating 1, 100 at rating 0.5, and 200 at rating 0.25, with a timeout value of 15. We useddelta =0:01, and set each machine's infectivity proportional to its rating. We applied the above algorithm to determine susceptibilities that would give the desired fraction of infected machines at each rating within timeout rounds. We then ran the recurrence relations with these computed parameters to produce the gure. In the gure, the vertical line indicates the timeout value. From left to right, the other three lines indicate the fraction of infected machines at rating 1, 0.5, and 0.25 respectively. As we can see, by round 15, we do have 1/2 of the rating 0.5 machines infected, and 1/4 of the rating 0.25 machines. Recall that we used = 0:01. At round 15, 99 percent of the rating 1 machines are infected. Thus, the computed parameters give us the results we expected. 4

1 fraction of infected nodes at each rating vs. time 0.9 0.8 rating 1 rating 0.5 rating 0.25 0.7 fraction of infected nodes 0.6 0.5 0.4 0.3 0.2 0.1 0 0 2 4 6 8 10 12 14 16 18 20 time (in rounds) Figure 1: Plot of the fraction of infected machines vs. number of gossip rounds, using gossip parameters predicted by our model. Parameters were predicted for one subgroup with 100 machines at rating 1, 100 at rating 0.5, and 200 at rating 0.25, with a timeout value of 15. 5 Results We now return to the problem of estimating gossip overhead when individual machines may belong to multiple subgroups at varying quality ratings. Each of the subgroups gossip independently, and for the sake of our analysis, we assume that all of the data to be gossiped within a subgroup ts inside one gossip message. By gossip overhead, we mean the expected number of gossip messages initiated and received by a machine in a gossip round, for all of its subgroups. We are interested in a variety of possible subgroup congurations, but for now restrict our attention to the case where each machine belongs to the same number of subgroups at each rating, and where each subgroup has the same number of participating machines at each rating and the same timeout value. This has the advantage that all machines will have the same expected gossip overhead. We then use the parameter prediction method from the previous section to determine what this overhead will be. Recall that in our gossip protocol, a subgroup member m gossips to member n with probability I m S n, where I m is the infectivity ofm and S n is the susceptibility ofn. Since we are now considering multiple subgroups, and a machine can have dierent ratings within dierent subgroups, we will revise our notation to I g (m), S g (n) for the infectivity ofm within subgroup g, and the susceptibility ofn in g, respectively. Hence the expected number of messages m will sent ton in a round as a member of g will also be I g (m)s g (n). Each subgroup gossips independently, so the total number of gossips initiated by a machine m will be the sum of the number it initiated as a member of each subgroup. By linearity of expectation, the expected number of messages sent by m as part of g will be P n2g I g(m)s g (n), and the number overall will be: X g:m2g I g (m)( X n2g S g (n)) 5

Note that when all machines belong to the same number of subgroups at each rating, and all subgroups have the same numberofmembers at each rating, P n2g S g(n) will be a constant independent of g, and Pg:m2g I g(m) will be a constant independent ofm. Hence all machines will have the same outgoing gossip overhead. Similarly, the expected number of messages m will receive in a gossip round is: which will also be independent of m. X g:m2g S g (m)( X n2g I g (n)) Hence, given the infectivities and susceptibilities determined by our algorithm for each subgroup, we can compute the expected total gossip overhead for each machine. To better understand the eect of quality ratings, timeout values, and subgroup size on gossip overhead, we compute the expected gossip overhead as a function of timeout value and subgroup size for two dierent subgroup congurations. The results are shown in the gure below. In one conguration, each machine is in 2 subgroups, with rating 1 for both subgroups. In the second conguration, each machine is in 4 subgroups, 1 at rating 1, 1 at rating 0.5, and 2 at rating 0.25. Note that both of these ratings that sum to 2. Gossip overhead when each machine belongs to 2 subgroups, at rating 1 gossip overhead 10 5 0 8 8000 10 6000 12 14 4000 16 2000 18 0 number of machines timeout, in number of rounds Gossip overhead when each machine belongs to 4 subgroups, 1 at rating 1, 1 at 0.5, and 2 at 0.25 10000 10 gossip overhead 5 0 8 10 12 14 timeout, in number of rounds 16 18 0 2000 8000 6000 4000 number of machines 10000 Figure 2: Comparison of gossip overhead as function of timeout and subgroup size for two dierent subgroup congurations. In one case, each machine belongs to two subgroups at rating=1. In the other, each machine belongs to 4 subgroups, at ratings 1, 0.5, 0.25,and 0.25. As we can see from the gure, overhead generally increases with decreasing timeout values. Decreasing the timeout value can cause a large increase in gossip overhead when the timeout is small. Also, increasing the group size causes only a very small increase in gossip overhead for xed timeout value when the timeout 6

value is moderate. For such timeout values, both congurations give a gossip overhead of around 2 for subgroup sizes up to 10,000. One interesting feature is that the conguration with 4 subgroups has gossip overhead comparable to, and sometimes better than, the conguration with only 2 subgroups. This suggests that having variable quality ratings for subgroup members can be a useful way to allow a machine to belong to many subgroups while maintaining low gossip overhead. 6 Conclusions and Future Work We presented the gravitational gossip protocol and showed that it can be used for reliable subgroup communication. It allows processes to be members of several subgroups at reduced quality ratings with comparable overhead to that of machines in a few subgroups at higher quality ratings. Furthermore, it denes a clear tradeo between information quality and gossip overhead which can be chosen by each member individually. In the interests of brevity and deadlines, there are several topics that were left out of this writeup. The data presented above is based on a mathematical model. It remains to be demonstrated how well this corresponds to reality. There are implementation details that were ignored in this writeup. Ken Hopkinson is currently implementing a real application of gravitational gossip techniques to a problem in the electric power grid. We only considered very restricted subgroup congurations. We would like to analyze the protocol overhead with more realistic subgroups. We only considered the case in which subgroups gossip independently. If there is considerable overlap between subgroups, then they could often share gossip messages. We are looking at ways to share gossip messages between subgroups, in order to generate fewer messages but have each message contain more data samples. In this paper, we only considered gossip within a single LAN. We are interested in analyzing gossip subgroup communication in more general network topologies. 7 Acknowledgements We would like to thank Carlos Castillo-Chavez for enlightening discussions about epidemic modelling. References [1] N. T. J. Bailey. The Mathematical Theory of Infectious Diseases and its Applications (second edition). Hafner Press, 1975. [2] Carlos Castillo-Chavez. Personal communication. Department of Biometrics, Cornell University. [3] A. Demers et al. Epidemic algorithms for replicated database maintenance. In Proceedings of 6th ACM Symposium on Principles of Distributed Computing, pages 1{12, Vancouver, British Columbia, 1987. [4] K. Birman et al. Bimodal multicast. Technical Report Department of Computer Science Technical Report TR-98-1665, Cornell University, Ithaca, NY, 1998. [5] L. Rodrigues et al. A dynamic light-weight group service. In Proceedings of the 15th IEEE Symposium on Reliable Distributed Systems, Niagara on the Lake, Canada, 1996. [6] K. Guo. Scalable membership detection protocols. Technical Report Department of Computer Science Technical Report TR-98-1684, Cornell University, 1998. 7

[7] K. Guo and L. Rodrigues. Dynamic light-weight groups. In Proceedings of the 17th IEEE International Conference on Distributed Computing Systems, Baltimore, MD, 1996. [8] B. Pittel. On spreading a rumor. SIAM Journal of Applied Mathematics, 47:213{223, 1987. [9] R. van Renesse, Y. Minsky, and M. Hayden. A gossip-style failure detection service. In Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware '98), pages 55 { 70, The Lake District, England, 1998. 8