distributed secure load balancing with skew heterogeneity
play

Distributed, Secure Load Balancing with Skew, Heterogeneity, and - PowerPoint PPT Presentation

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer INFOCOM 2005 - March 16, 2005 Motivation - Why balance DHTs? Distributed hash tables (DHTs): Becoming off-the-shelf


  1. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer INFOCOM 2005 - March 16, 2005

  2. Motivation - Why balance DHTs? • Distributed hash tables (DHTs): – Becoming “off-the-shelf” distributed data structures – Was: backup storage; now: ALM, resource discovery • DHTs must be versatile: – Handle variety of loads - low msg loss • Allocate network capacity – Realistic network conditions – Reasonably secure • Numerous load balancing proposals in literature – Unrealistic assumptions – Poor performance 3/16/2005 Jonathan Ledlie - INFOCOM 2005 2

  3. Problematic Assumptions Assumption Reality Physical Nodes Uniform Broad Capacity Heterogeneity Workload Uniform Hotspots (Skew) Membership Stable Lots of Churn Security Pick any ID Malicious participants Current load balancing algorithms are insufficient 3/16/2005 Jonathan Ledlie - INFOCOM 2005 3

  4. k-Choices Algorithm • Support variation in skew, node heterogeneity, and churn • Make IDs verifiable 1. Sample ? ? 2. Cost fn 3. Join ? 3/16/2005 Jonathan Ledlie - INFOCOM 2005 4

  5. Talk Outline • Overview • Preliminaries – DHTs – Security – Network Characteristics • k-Choices • Prior Techniques • Evaluation • Conclusion 3/16/2005 Jonathan Ledlie - INFOCOM 2005 5

  6. DHTs - Refresher • Each node has one or more virtual servers (VSs). • Each virtual server has an ID namespace ( e.g., (0,1], (0,2 160 ]). • Msgs via O(log(N)) hops between any two VSs. (a,b,c) a g (d) e (e,f) (g,h) d Chord-like routing 3/16/2005 Jonathan Ledlie - INFOCOM 2005 6

  7. DHTs - Load Load i (a,b,c) a g (d) e (e,f) f (g,h) d (i,j) b 3/16/2005 Jonathan Ledlie - INFOCOM 2005 7

  8. Sybil Attacks (a,b,c) g a m (d) e (e,f) (m) d Unsecured IDs � > Take over portions of ring 3/16/2005 Jonathan Ledlie - INFOCOM 2005 8

  9. Sybil Attack - Solution • Central authority certifies each ID [Castro02] • k-Choices uses similar scheme to generate limited set of certified IDs. 3/16/2005 Jonathan Ledlie - INFOCOM 2005 9

  10. Outline • Overview • Preliminaries – DHTs – Security – Network Characteristics • k-Choices • Prior Techniques • Evaluation • Conclusion 3/16/2005 Jonathan Ledlie - INFOCOM 2005 10

  11. Characteristics - Skew • Skew: hotspots popular content • Typically Zipf popularity • E.g., Gnutella queries (log-log scale): 3/16/2005 Jonathan Ledlie - INFOCOM 2005 11

  12. Characteristics - Churn • Churn: pattern of participant join and departure. • Pareto (memory-full) distribution (60 minute avg). 3/16/2005 Jonathan Ledlie - INFOCOM 2005 12

  13. Characteristics - Heterogeneity • Network bandwidths vary by five orders-of-magnitude. • Routing capacity varies widely. 3/16/2005 Jonathan Ledlie - INFOCOM 2005 13

  14. Outline • Overview • Preliminaries – DHTs – Security – Network Characteristics • k-Choices • Prior Techniques • Evaluation • Conclusion 3/16/2005 Jonathan Ledlie - INFOCOM 2005 14

  15. k-Choices - Steps 1. Probe 2. Evaluate Cost Function 3. Join 3/16/2005 Jonathan Ledlie - INFOCOM 2005 15

  16. k-Choices - Sample k=3 Sample ID b: Sample ID a: Learn succ(a) actual load, Learn succ(b) actual load, a b target load, and node capacity. target load, and node capacity. Load Capacity c Over target Discover load and capacity at each ID 3/16/2005 Jonathan Ledlie - INFOCOM 2005 16

  17. k-Choices - Cost Function Current Future Load Capacity Load Capacity + ID a = … + ID b = … Choose ID that minimizes mismatch between target and load normalized by capacity. 3/16/2005 Jonathan Ledlie - INFOCOM 2005 17

  18. k-Choices - Properties • Incorporates workload skew and node heterogeneity. • Proactive load balancing - join time • Reactive load balancing - reselect ID • Verifiable IDs 3/16/2005 Jonathan Ledlie - INFOCOM 2005 18

  19. Outline • Overview • Preliminaries • k-Choices • Prior Techniques – log(N) virtual servers – Transfer – Proportion – Threshold • Evaluation • Conclusion 3/16/2005 Jonathan Ledlie - INFOCOM 2005 19

  20. Prior Work - log(N) VS • Namespace balancing (e.g. [Karger97]) • Central Limit Theorem – Total namespace for each node approximately equal Namespace balancing does not equal load balancing . 3/16/2005 Jonathan Ledlie - INFOCOM 2005 20

  21. Prior Work - Transfer • Overload: a) >1 VS: attempt to transfer b) 1 VS: split first, then transfer • Pros: Simple, Good Performance • Cons: Unsecure – Split to arbitrary ID (cut in half) – Transfer to anyone [Rao03,Godfrey04] 3/16/2005 Jonathan Ledlie - INFOCOM 2005 21

  22. Evaluation • Trace Driven Simulation • Results – Determining k – Vary applied load – Vary churn – Vary skew • Pastry Implementation – Throughput – Heterogeneous real node bandwidths (Emulab) 3/16/2005 Jonathan Ledlie - INFOCOM 2005 22

  23. Results - Choosing k 4k nodes, avg capacity=100 m/s, 60 min avg lifetime k=8 sufficiently reduced utilization. 3/16/2005 Jonathan Ledlie - INFOCOM 2005 23

  24. Results - Trace 5508 nodes; median capacity: 191 msgs/sec k-Choices and Transfer performed equally well with skewed workloads. 3/16/2005 Jonathan Ledlie - INFOCOM 2005 24

  25. Results - Implementation Pastry; “lookup+download”; 64x4 nodes - last mile limited k-Choices: 20% throughput improvement 3/16/2005 Jonathan Ledlie - INFOCOM 2005 25

  26. Conclusion • k-Choices: – Approx. same performance as Transfer – Doesn’t change security properties – Not the final word - range queries • Design for empirical system – Namespace balancing? – Skew, wide capacity distribution, churn – Security: Sybil attacks 3/16/2005 Jonathan Ledlie - INFOCOM 2005 26

  27. Questions? • Thanks! • Contact: – Jonathan Ledlie – jonathan@eecs.harvard.edu 3/16/2005 Jonathan Ledlie - INFOCOM 2005 27

  28. Prior Work - Threshold • If our utilization has increased beyond threshold – Compare utilization to neighbors – Shift their IDs? • Else – Compare to set of log(N) random VSs – Move best to be our new predecessor [Ganesan04] 3/16/2005 Jonathan Ledlie - INFOCOM 2005 28

  29. Prior Work - Proportion • Overload: shed VSs • Underload: create them • Pros: No communication • Cons: – Large number of VSs created – New lowest common denominator – Cascading deletes [Dabek01] 3/16/2005 Jonathan Ledlie - INFOCOM 2005 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend