1 1
Selfish Overlay Network Formation
Georgios Smaragdakis
Selfish Overlay Network Formation Georgios Smaragdakis 1 1 - - PowerPoint PPT Presentation
Selfish Overlay Network Formation Georgios Smaragdakis 1 1 Deutsche Telekom Laboratories. T-Labs, An-Institute of Technische Universitt Berlin T-Labs, Ben-Gurion University T-Labs US, Stanford University 2 2 Strategic Research
1 1
Georgios Smaragdakis
2 2
T-Labs US, Stanford University T-Labs, Ben-Gurion University T-Labs, An-Institute of Technische Universität Berlin
3 3
Intelligent Networks Quality and Usability Lab Security in Telecommunications Service-centric Networking
Measurement and Security
Networks
Distribution Networks
Technology
Vision Computing
Physical Interaction
Technology
Security
Security
Security
and Cryptography
2010
4 4
Innovation Development
innovative solutions, as a basis for the commercial use by the Group‘s business areas.
Strategic Research
the long-term technology research and applied research.
foundation for the development of innovative solutions in Innovation Development.
5 5
6 6
Norwegian University of Science and Technology Technische Universität Berlin Fraunhofer-Institut für Nachrichtentechnik Heinrich-Hertz-Institut Fraunhofer-Institut für Offene Kommunikationssystem e Ben-Gurion University Ludwig-Maximilian- Universität München Technische Universität München Rheinische Friedrich- Wilhelms-Universität Bonn Imperial College London École Nationale d’Ingénieurs de Brest Univeridad Carlos III de Madrid Technische Universität Darmstadt Universite Catholique de Louvain École Polytechnique Fédérale de Lausanne Universität St. Gallen Stanford University University of Illinois Boston University Princeton University UC Berkeley/ICSI
7 1
Georgios Smaragdakis
Joint work with Nikolaos Laoutaris, Azer Bestavros, John Byers, Pietro Michiardi, Mema Roussopoulos and Vassilis Lekakis
8
physical plane
O 1 O 2 O 3 R 1 R 2 R 3 R 4
plane
2
9
Investment:
Flat Resource Allocation
Market:
3
10 4
(e.g. RON)
random or proximity based neighbor selection
(e.g. Bullet, Splitstream)
(e.g. Detour, QRON)
(e.g. BitTorrent)
(e.g. Chord, Pastry, Tapestry)
11
pair wise delay or available bandwidth, storage, cpu cycles, budget…
diurnal variation of traffic, dynamic routing or pricing, node churn…
different prospective, conflicting objectives
5
12
Appl i cat i
t
m i ng syst em s I NFOCOM ’ 7 Tr a ns a c t i
Ne t wo r k i ng Co NEXT 2 8
I nf
2 8 , TPDS
6
13
Appl i cat i
t
m i ng syst em s
7
14
−
∈
i j V
v j i S i i
8
15
9
16
vi: Choose k neighbors vi
i
i
i
u w
−
∈
i j V
v j i S ij i
e r a l l s
i
∈S
i
vi ’ s r esi dual net w or k
Se t
r e s i d ua l no d e s Se t
r e s i d ua l wi r i ng
10
17
11
18
k- m edi an: Find a subset I of F and a function σ:CI, to: min ( Σi,j sjcij ) such that |I| ≤ k
12
19
13
20
u w
w , u can be
ai ned f r
k- m edi an
r ever sed di st ances
w u vi
−
∈
i j V
v j i S ij i
Si nce t he w i r i ng cost i s t he sam e
14
21
vi u w
−
∈
i j V
v j i S ij i
e r a l l s
i
∈S
i
vi ’ s r esi dual net w or k
[Arya et al,STOC’01]
i
i
i
Se t
r e s i d ua l no d e s Se t
r e s i d ua l wi r i ng
15
22
min
−
∈
i j V
v j i S ij i
16
23
n=15 k=2 k=3 k=8 k=11
Uniform Preference Skewness of preference k (Link density)
I n- degr ees ar e hi ghl y skew ed even under uni f
m pr ef er ence ! Qua l i t y
a s e d “ p r e f e r e nt i a l a t t a c h me nt ”
17
24
[Laoutaris, Poplawsi, Rajaraman, Sundaram, Teng,PODC’08]
Link density Skewness of preference Link density Skewness of preference
18
25
Appl i cat i
t
m i ng syst em s
19
26
20
27
(k=2) k-Random/BR k-Closest/BR k-Regular/BR BRITE 1.44 1.53 3.61 PlanetLab 2.23 1.48 3.84 AS 2.04 1.90 4.78
21
28
k k k
AS-Level (n=50) PlanetLab (n=50) BRITE (n=50)
0 2 3 5 11 22 0 2 3 5 11 22 0 2 3 5 11 22
22
29
k k k 0 2 3 5 11 22 0 2 3 5 11 22 0 2 3 5 11 22
AS-Level (n=50) PlanetLab (n=50) BRITE (n=50)
23
30
k k k 0 2 3 5 11 22 0 2 3 5 11 22 0 2 3 5 11 22
“Common pattern is not good”
AS-Level (n=50) PlanetLab (n=50) BRITE (n=50)
24
31
The BR graph is highly optimized!
k k k 0 2 3 5 11 22 0 2 3 5 11 22 0 2 3 5 11 22
AS-Level (n=50) PlanetLab (n=50) BRITE (n=50)
25
32
Appl i cat i
t
m i ng syst em s
26
33 7
34 28
System Architecture
Link state protocol to support connectivity
information dissemination.
Overlay monitoring and maintenance mechanism. Computationally efficient neighbor selection.
Performance Evaluation
Average performance in real operational scenaria. Performance under different performance metrics (delay,
system load, available bandwidth)
Overhead of the implementation. Performance under churn. Applications.
35 29
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs
111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs 111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs 111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs 111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs 111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs 111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs 111. 1. 1. 1 122. 2. 2. 2 25m secs 111. 1. 1. 1 133. 3. 3. 3 165m secs
36 30
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
37 31
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
38 32
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
39 33
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
40 34
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4 99. 9. 9. 9
41 35
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
133. 3. 3. 3 DO W N
42
Objectives
36
Nodes:
months. Wiring policies:
Regular (DHT).
seconds. Metrics of interest:
(pathChirp). Control variables:
43 37
EG O I ST
delay/EGOIST delay
44 38
Wiring delay/EGOIST delay
EG O I ST EG O I ST
45 39
111. 1. 1. 1
10% ut i l i zat i
10% ut i l i zat i
10% ut i l i zat i
46 40
EG O I ST
delay/EGOIST delay
47 41
111. 1. 1. 1
3M bps 1M bps 3M bps 2M bps pat hChi r p
48 42
EG O I ST
bwth/EGOIST bwth
49 43
EGOIST wiring Approximate EGOIST wiring (e= 10%)
CPU, memory and bandwidth consumption is minimal.
EGOIST delay/optimal delay EGOIST re-wirings
Normalized delay
50 44
111. 1. 1. 1 122. 2. 2. 2 133. 3. 3. 3 144. 4. 4. 4
51 45
Efficiency Index
EG O I ST
K-Random K-Regular K-Closest Hybrid-EGOIST
Connect ed i n O ( T/ n)
52 46
Efficiency Index
EG O I ST
K-Random K-Regular K-Closest Hybrid-EGOIST
53 47
[Quake III traces from Donnybrook, SIGCOMM’08 EGOIST k-Closest k-Random k-Regular
54
Appl i cat i
t
m i ng syst em s
48
55
49
56
50
57
51
58
52
59
53
60
54
61
55
62
i,
j)
j
56
63
57
64
Both Max-Sum and Max-Min are NP-hard Max-Min: Choose k Reduction to the SET-COVER
2
3
i
j
1
1
2
3
58
65
1
2
3
1
2
3
i
j
Wiring {si}, for the residual wiring S-i
60
66
File ID Node ID Delivery Time
Naive Max-Sum Max-Min
File ID File ID
Synchronization!
download time
61
67
62
68
Selfish nodes can reap substantial performance gain.
performance!
63
69
Selfish wiring strategies are easily realizable
Selfish wiring must be a component of any system to protect it from abuse
Selfish wiring behavior can be used for efficient dynamic service provisioning
64
70 65
71
72
Worst delay in the overlay:
k 0 2 3 5 11 22
73
74 24
Delay/ Delay with abuse
t r ut hf ul EG O I ST t r ut hf ul EG O I ST
Untruthful Truthful Untruthful Truthful
Many Untruthful nodes Single Untruthful node
75
Parallel upload/ download
Local scheduling
Flat connectivity
Overlay node Seeder Leecher
76
all nodes before the next step
77
the uplink capacity [Tian et al., ICPP’06]
(-) Monitor overhead
78
[Massoulie et al., Infocom’07]
79
Objective: M i ni m i ze the aver age download time
Neighbor selection strategy of node vi: max (sum (MaxFlow(vi, vj)), for all vj
80
Objective: M i ni m i ze the t
al download time
Neighbor selection strategy of node vi: max (min (MaxFlow(vi, vj)), for all vj
81
Formation of stable graphs Each node strives to improve both the upload and download flow Performance of swarming on optimized graphs
be realizable
82
File ID Node ID Delivery Time
Naive Max-Sum Max-Min
File ID File ID
Flattens distribution time! Guarantees synchronization! Comparable average download time
83
Uncapaci t at ed Faci l i t y Locat i
( UFL) : Find a subset I of F and a function σ:CI to min ( Σi fi + Σi,j sjcij )
F: set of facilities fi: cost to
facility C: set of clients, cij: cost connecting client jfacility I sj: demand of node j
84
f
i
i
13