35
Speaker : 童童童 MA1G0222 2013.04 .26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie, Member, IEEE, Kai Hwang, Fellow, IEEE, Zhongcheng Li, Member, IEEE

Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

Embed Size (px)

DESCRIPTION

INTRODUCTION MANY Internet applications need to perform large-scale data dissemination from multiple sources. However, this process is often disturbed by network churn conditions caused by unexpected node failures. 3

Citation preview

Page 1: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

Speaker : 童耀民 MA1G02222013.04.26

Churn-Resilient Protocol for Massive DataDissemination in P2P Networks

Authors: Zhenyu Li, Member, IEEE, Gaogang Xie, Member, IEEE, Kai Hwang, Fellow, IEEE, Zhongcheng Li, Member, IEEE

Page 2: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

2

Outline1. (INTRODUCTION)

2. (RELATED WORK)

3. (PROXIMITY-AWARE OVERLAY NETWORKS)

4. (OVERLAY UPDATE OPERATIONS)

5. (MUL TLSOURCE DATA DISSEMINATION)

6. (SIMULATED EXPERIMENTAL RESULTS)

7. (CONCLUSIONS)

Page 3: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

3

INTRODUCTION

• MANY Internet applications need to perform large-scale data dissemination from multiple sources.

• However, this process is often disturbed by network churn conditions caused by unexpected node failures.

Page 4: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

4

INTRODUCTION

• Massive data dissemination is often disrupted by frequent join and departure or failure of client nodes in a peer-to-peer (P2P) network.

• We propose a new churn-resilient protocol (CRP) to assure alternating path and data proximity to accelerate the data dissemination process under network churn.

Page 5: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

5

INTRODUCTION

• The topology of the CRP-enabled overlay design looks like a ring augmented with extra chord links.

• The CRP-enabled overlay is self-adjusted after any node failure.

• A shared spanning tree is extracted from the CRP overlay.

Page 6: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

6

INTRODUCTION

• Instead of using pure tree broadcast, we apply scope flooding in the first few hops and tree traversing in the remaining hops.

• This hybrid design saves delivery time with very small amount of redundancy.

Page 7: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

7

INTRODUCTION

• The contributions of our work are summarized below in four technical aspects:– The CRP-enabled overlay design promotes proximity awareness,

dynamic load balancing, and resilience to network churns by node failures.

– CRP networks reduce the average delivery delay by 28 to 50 percent, compared with using the scope flooding [6] and epidemic broadcast trees [13], [21].

– Even with 40 percent of node failures, the CRP still guarantees atomic broadcast in data dissemination.

– With 10,000 nodes, the CRP network requires to use only 1/3 of the control messages used in a large CAM-Chord [25] network.

Page 8: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

8

RELATED WORK

• There are two types of data dissemination methods: mesh-based pull and tree-based push methods.

• The tree-based push methods achieve a fast dissemination with low overhead.

• The main concern is the vulnerability to node failures.

Page 9: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

9

PROXIMITY-AWARE OVERLAY NETWORKS

• The idea is to map the physical network into the virtual overlay by considering the fact that different links may experience different latencies or link delays and nodes may have different capacities.

• In a physical network, the link latency is measurable.

Page 10: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

10

PROXIMITY-AWARE OVERLAY NETWORKS

• The node capacity of a node represents the maximum number of adjacent nodes to which it can forward the data items, concurrently.

• A node’s out degree is bounded by its capacity.

Page 11: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

11

PROXIMITY-AWARE OVERLAY NETWORKS

Page 12: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

12

PROXIMITY-AWARE OVERLAY NETWORKS

覆蓋網路節點的數量節點 x的容量 (Capacity)

節點 x的節點度 (degree) ,節點 x的度門檻值 (degree threshold),建立 Chord links。所有節點的平均節點度 (degree)

目標訊息的冗餘比例α 網路及容量接近度之間的權重因子

作用域氾濫方法的跳計數 (hop count)

節點 x最遠的鄰居,高權重鏈路 節點 x後繼列表的大小

Page 13: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

13

PROXIMITY-AWARE OVERLAY NETWORKS

• The proximity-aware overlay is built around a unidirectional ring with extra bidirectional chord links.

• The overlay is heterogeneous since links are associated with different weights.

Page 14: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

14

PROXIMITY-AWARE OVERLAY NETWORKS

• The first node is located at any position on the base ring.

• An n-node (n > 0) base ring is split into n equal-distance intervals.

• Each node x has two immediate neighbors: the predecessor and successor along the ring, denoted as prdx and sucx, respectively.

Page 15: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

15

PROXIMITY-AWARE OVERLAY NETWORKS

• We apply both network proximity and capacity proximity in CRP protocol.

• The network proximity is measured by the latency or closeness of two nodes in physical IP networks.

Page 16: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

16

PROXIMITY-AWARE OVERLAY NETWORKS

• Capacity A3 B4 C2 + D3 + E4

Page 17: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

17

OVERLAY UPDATE OPERATIONS

• (e x,y) denotes the overlay link that connects node x and node y (x≠y).

• Network Proximity Weight (NPW)

• Capacity Proximity Weight (CPW)

• c(x,y) = | cx -cy |

Page 18: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

18

OVERLAY UPDATE OPERATIONS

• Proximity Weight (PW)

• We further extend the weight functions to a set of two links, S = {(x,y),(r,s)}.

Page 19: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

19

OVERLAY UPDATE OPERATIONS

• Thus, we set the value of b to 15。

• Neighborhood Operations:

Page 20: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

20

覆蓋更新操作(OVERLAY UPDATE OPERATIONS)

Page 21: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

21

OVERLAY UPDATE OPERATIONS

• neighborhood transition ((d))

Page 22: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

22

OVERLAY UPDATE OPERATIONS

Page 23: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

23

OVERLAY UPDATE OPERATIONS

• PW(S1) e(x.xf) and e(y.yf) • PW(S2) e(x,y) and e(xf.yf)

Page 24: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

24

MUL TLSOURCE DATA DISSEMINATION

• In this section, we specify the data dissemination process, which is improved from the scope-flooding and tree traversing schemes.

• Shared Tree Construction:– The first joining node is chosen as the root.– A new joining node selects the physically closest neighbor in the tree

as its parent. – Periodically (e.g., every 2 minutes), the root node selects another

node with high capacity as a new root to build a new tree.

Page 25: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

25

MUL TLSOURCE DATA DISSEMINATION

Page 26: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

26

MUL TLSOURCE DATA DISSEMINATION

• Churn Resilience and Recovery:• Every single node keeps the information of its ancestor nodes

on the tree.

• This information is used to determine whether a particular node is an ancestor node of it or not.

• The information is updated when the node’s ancestors change.

Page 27: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

27

SIMULATED EXPERIMENTAL RESULTS

• We developed an event-driven P2P simulator to compare CRP with four tree-based designs: CAM-chord, ACOM, GoCast, and Plumtree.

• We simulate a P2P network up to 20,000 nodes.

• All nodes join at once. From the 300th second, 1,000 nodes are randomly chosen to send data items simultaneously.

Page 28: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

28

SIMULATED EXPERIMENTAL RESULTS

• Average delivery

Page 29: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

29

SIMULATED EXPERIMENTAL RESULTS

• Average message replication ratio

Page 30: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

30

SIMULATED EXPERIMENTAL RESULTS

• Control message

Page 31: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

31

SIMULATED EXPERIMENTAL RESULTS

Page 32: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

32

CONCLUSIONS

• The newly developed CRP protocol is shown effective to perform massive data dissemination in P2P networks under the churn conditions.

• It combines the advantages of scope flooding and tree traversing to achieve high performance.

• The simulation results show that the CRP design reduces the average delivery time by 28-50 percent with only 1 percent message redundancy, compared with those experienced in scope flooding and epidemic broadcast tree designs.

Page 33: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

33

END

Page 34: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

34

Page 35: Speaker : 童耀民 MA1G0222 2013.04.26 Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks Authors: Zhenyu Li, Member, IEEE, Gaogang Xie,

35

跳躍計數 (Hop Count)

• 在網絡中,跳躍計數 (hop count)代表一個特定數據 (分組 )通過的設備的總數。• 一般說來,跳躍數據越多地必須通過轉發到達它們的目的地,傳輸延遲發生的可能性越大。• 跳躍計數是其中的一種路由選擇度量尺度,其用於測量在源和目的地之間的距離。