SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
DAPSYS Conference
Innsbruck, 21-23 September 2006


        The wandering token
   Congestion Avoidance of a Shared
              Resource
Augusto Ciuffoletti
  INFN-CNAF - Bologna
  CoreGRID Institute of Grid Information,
     Resource and Workflow Monitoring Services
Problem and solution

●   Problem: design a scalable (thousands of agents),
    resource sharing solution
●   Requirements:
    –   access granted regularly, not strict real time;
    –   overload gradually degrades service, with limited
        impact on the resource;
    –   algorithm runs on clients; resources and infrastructure
        are legacy
A case study: Video on Demand
●   A provider offers a VoD service to a number of
    susbscribers (news on a 150*120 screen)
●   Video is trasferred using a 200 Mbps
    infrastructure
●   Each transmission uses a 650 Kbps bandwidth
●   Each subscriber downloads distinct chunks of
    video
●   The server uploads chunks of video on demand
●   The infrastructure allows short bursts of transfer
    rate up to two times the agreed 200Mbps
Other applications

●   Intrusive network monitoring applications
    –   only one test per run to avoid interference and overload
●   Expensive queries to a centralized database
    –   only one query at a time allowed
The token wandering idea
●   A unique token circulates in the system, enabling
    members to access the resource only when holding
    the token.
●   Token circulation does not follow a predetermined
    path: next hop destination is selected randomly
    among all members.
●   According to many theoretical results, the
    interarrival time is quite regular, although
    randomly variable.
●   Like any token circulation algorithm, it suffers
    from token loss and duplication.
Token (re)generation rule
●   The agent sets up a timer: when such timer
    expires, a new token is generated, bearing a unique
    identifier.
●   The timer value has the following properties:
    –   it is randomized, to avoid synchronization effects;
    –   minimum value considers application requirements,
        and is well below the required access rate;
    –   expected value is such that the overall distribution of
        timeouts on the time line has an average interarrival
        time below the required access rate;
●   The token regeneration rule can introduce
    spurious tokens (with different id).
Token removal rule
●   This rule aims at removing tokens unnecessarily
    generated by the token regeneration rule
●   Duplicate tokens are prevented by the 3-way token
    passing protocol
●   The token removal rule is applied whenever a
    token is received.
●   Such token is silently dropped if:
    –   the same token was already received and
    –   from that time another token was received with a
        timestamp lower than that of the resident token
●   Removal occurs with a latency, and during that
    time the token can be effectively lost.
Simulation setup
●   The simulator is an ad-hoc finite state machine
    that simulates a variable number of agents:
    –   synchronous token passing operations, and
    –   asynchronous alarms.
●   The case study (650 Kbps VoD on a 200Mbps
    backbone) accommodates up to 300 subscribers.
●   The access rate should be on the average one
    every 1200 seconds.
●   Each subscriber downloads a chunk of 100 Mbytes
    during a slot of time of 4 seconds
Simulation results: n. of tokens




●   The requirement of a unique token is enforced
●   Token loss events (injected one every 10000 time
    units) are recovered: largest gap is 1700 time
    units.
●   No transients after token loss recovery.
●   Limited presence of spurious tokens
Simulation results: concurrency




●   Resource is protected from overload
●   Even under 20% overload:
    –   80% of time there is just one protected event running
    –   during less than 10% of the time there are two
        concurrent downloads (expensive rate applied)
    –   during 1% of the time there are three or more
        concurrent downloads (shaping may occur)
Simulation results: interarrival time




●   Observed performance depends on load.
●   Most events occur before 1200 time units, even on
    full or overload conditions.
●   Longer tail in case of full and overload conditions
    (buffering needed)
Conclusions
●   A Proof of Concept: a random walk approach can
    provide a robust, scalable and efficient solution to
    a distributed coordination problem.
●   A solution to a class of problems: we provide a
    solution to the Soft Mutual Exclusion problem,
    based on a wandering token.
●   A real world case study: the simulation in a Video
    on Demand environment demonstrates
    applicability.

Weitere ähnliche Inhalte

Andere mochten auch

Technology Plan Wong
Technology Plan WongTechnology Plan Wong
Technology Plan Wong
Mo Wong
 
Star Chart 2008
Star Chart 2008Star Chart 2008
Star Chart 2008
Mo Wong
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Augusto Ciuffoletti
 
Asperger Syndrome
Asperger SyndromeAsperger Syndrome
Asperger Syndrome
ryanbos1
 

Andere mochten auch (14)

The Pub
The PubThe Pub
The Pub
 
Business Cluster Project
Business Cluster ProjectBusiness Cluster Project
Business Cluster Project
 
Mission Mid Atlantic
Mission Mid AtlanticMission Mid Atlantic
Mission Mid Atlantic
 
Technology Plan Wong
Technology Plan WongTechnology Plan Wong
Technology Plan Wong
 
Statement Of Strategy 1.2
Statement Of Strategy 1.2Statement Of Strategy 1.2
Statement Of Strategy 1.2
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
New Day
New DayNew Day
New Day
 
Star Chart 2008
Star Chart 2008Star Chart 2008
Star Chart 2008
 
ZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoringZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoring
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Specialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry EvaluationSpecialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry Evaluation
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocol
 
2013 03 occi-monitoring
2013 03 occi-monitoring2013 03 occi-monitoring
2013 03 occi-monitoring
 
Asperger Syndrome
Asperger SyndromeAsperger Syndrome
Asperger Syndrome
 

Ähnlich wie The wandering token

Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
Mumbai Academisc
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
amin azari
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
jaimin_m_raval
 
An energy aware qos routing protocol
An energy aware qos routing protocolAn energy aware qos routing protocol
An energy aware qos routing protocol
jaimin_m_raval
 

Ähnlich wie The wandering token (20)

Avalanche-4-pub.pptx
Avalanche-4-pub.pptxAvalanche-4-pub.pptx
Avalanche-4-pub.pptx
 
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
 
Multithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfMultithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdf
 
Chap2 slides
Chap2 slidesChap2 slides
Chap2 slides
 
Omni ledger
Omni ledgerOmni ledger
Omni ledger
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Distributed Mininet with Symbiosis
Distributed Mininet with SymbiosisDistributed Mininet with Symbiosis
Distributed Mininet with Symbiosis
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
An energy aware qos routing protocol
An energy aware qos routing protocolAn energy aware qos routing protocol
An energy aware qos routing protocol
 
PAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmePAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine Toulme
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Unit i
Unit iUnit i
Unit i
 
Ergo details
Ergo detailsErgo details
Ergo details
 

Mehr von Augusto Ciuffoletti

Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Augusto Ciuffoletti
 

Mehr von Augusto Ciuffoletti (15)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
Open Cloud Computing Interface
Open Cloud Computing InterfaceOpen Cloud Computing Interface
Open Cloud Computing Interface
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architecture
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilities
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technology
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

The wandering token

  • 1. DAPSYS Conference Innsbruck, 21-23 September 2006 The wandering token Congestion Avoidance of a Shared Resource Augusto Ciuffoletti INFN-CNAF - Bologna CoreGRID Institute of Grid Information, Resource and Workflow Monitoring Services
  • 2. Problem and solution ● Problem: design a scalable (thousands of agents), resource sharing solution ● Requirements: – access granted regularly, not strict real time; – overload gradually degrades service, with limited impact on the resource; – algorithm runs on clients; resources and infrastructure are legacy
  • 3. A case study: Video on Demand ● A provider offers a VoD service to a number of susbscribers (news on a 150*120 screen) ● Video is trasferred using a 200 Mbps infrastructure ● Each transmission uses a 650 Kbps bandwidth ● Each subscriber downloads distinct chunks of video ● The server uploads chunks of video on demand ● The infrastructure allows short bursts of transfer rate up to two times the agreed 200Mbps
  • 4. Other applications ● Intrusive network monitoring applications – only one test per run to avoid interference and overload ● Expensive queries to a centralized database – only one query at a time allowed
  • 5. The token wandering idea ● A unique token circulates in the system, enabling members to access the resource only when holding the token. ● Token circulation does not follow a predetermined path: next hop destination is selected randomly among all members. ● According to many theoretical results, the interarrival time is quite regular, although randomly variable. ● Like any token circulation algorithm, it suffers from token loss and duplication.
  • 6. Token (re)generation rule ● The agent sets up a timer: when such timer expires, a new token is generated, bearing a unique identifier. ● The timer value has the following properties: – it is randomized, to avoid synchronization effects; – minimum value considers application requirements, and is well below the required access rate; – expected value is such that the overall distribution of timeouts on the time line has an average interarrival time below the required access rate; ● The token regeneration rule can introduce spurious tokens (with different id).
  • 7. Token removal rule ● This rule aims at removing tokens unnecessarily generated by the token regeneration rule ● Duplicate tokens are prevented by the 3-way token passing protocol ● The token removal rule is applied whenever a token is received. ● Such token is silently dropped if: – the same token was already received and – from that time another token was received with a timestamp lower than that of the resident token ● Removal occurs with a latency, and during that time the token can be effectively lost.
  • 8. Simulation setup ● The simulator is an ad-hoc finite state machine that simulates a variable number of agents: – synchronous token passing operations, and – asynchronous alarms. ● The case study (650 Kbps VoD on a 200Mbps backbone) accommodates up to 300 subscribers. ● The access rate should be on the average one every 1200 seconds. ● Each subscriber downloads a chunk of 100 Mbytes during a slot of time of 4 seconds
  • 9. Simulation results: n. of tokens ● The requirement of a unique token is enforced ● Token loss events (injected one every 10000 time units) are recovered: largest gap is 1700 time units. ● No transients after token loss recovery. ● Limited presence of spurious tokens
  • 10. Simulation results: concurrency ● Resource is protected from overload ● Even under 20% overload: – 80% of time there is just one protected event running – during less than 10% of the time there are two concurrent downloads (expensive rate applied) – during 1% of the time there are three or more concurrent downloads (shaping may occur)
  • 11. Simulation results: interarrival time ● Observed performance depends on load. ● Most events occur before 1200 time units, even on full or overload conditions. ● Longer tail in case of full and overload conditions (buffering needed)
  • 12. Conclusions ● A Proof of Concept: a random walk approach can provide a robust, scalable and efficient solution to a distributed coordination problem. ● A solution to a class of problems: we provide a solution to the Soft Mutual Exclusion problem, based on a wandering token. ● A real world case study: the simulation in a Video on Demand environment demonstrates applicability.