SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
DAPSYS Conference
Innsbruck, 21-23 September 2006


        The wandering token
   Congestion Avoidance of a Shared
              Resource
Augusto Ciuffoletti
  INFN-CNAF - Bologna
  CoreGRID Institute of Grid Information,
     Resource and Workflow Monitoring Services
Problem and solution

●   Problem: design a scalable (thousands of agents),
    resource sharing solution
●   Requirements:
    –   access granted regularly, not strict real time;
    –   overload gradually degrades service, with limited
        impact on the resource;
    –   algorithm runs on clients; resources and infrastructure
        are legacy
A case study: Video on Demand
●   A provider offers a VoD service to a number of
    susbscribers (news on a 150*120 screen)
●   Video is trasferred using a 200 Mbps
    infrastructure
●   Each transmission uses a 650 Kbps bandwidth
●   Each subscriber downloads distinct chunks of
    video
●   The server uploads chunks of video on demand
●   The infrastructure allows short bursts of transfer
    rate up to two times the agreed 200Mbps
Other applications

●   Intrusive network monitoring applications
    –   only one test per run to avoid interference and overload
●   Expensive queries to a centralized database
    –   only one query at a time allowed
The token wandering idea
●   A unique token circulates in the system, enabling
    members to access the resource only when holding
    the token.
●   Token circulation does not follow a predetermined
    path: next hop destination is selected randomly
    among all members.
●   According to many theoretical results, the
    interarrival time is quite regular, although
    randomly variable.
●   Like any token circulation algorithm, it suffers
    from token loss and duplication.
Token (re)generation rule
●   The agent sets up a timer: when such timer
    expires, a new token is generated, bearing a unique
    identifier.
●   The timer value has the following properties:
    –   it is randomized, to avoid synchronization effects;
    –   minimum value considers application requirements,
        and is well below the required access rate;
    –   expected value is such that the overall distribution of
        timeouts on the time line has an average interarrival
        time below the required access rate;
●   The token regeneration rule can introduce
    spurious tokens (with different id).
Token removal rule
●   This rule aims at removing tokens unnecessarily
    generated by the token regeneration rule
●   Duplicate tokens are prevented by the 3-way token
    passing protocol
●   The token removal rule is applied whenever a
    token is received.
●   Such token is silently dropped if:
    –   the same token was already received and
    –   from that time another token was received with a
        timestamp lower than that of the resident token
●   Removal occurs with a latency, and during that
    time the token can be effectively lost.
Simulation setup
●   The simulator is an ad-hoc finite state machine
    that simulates a variable number of agents:
    –   synchronous token passing operations, and
    –   asynchronous alarms.
●   The case study (650 Kbps VoD on a 200Mbps
    backbone) accommodates up to 300 subscribers.
●   The access rate should be on the average one
    every 1200 seconds.
●   Each subscriber downloads a chunk of 100 Mbytes
    during a slot of time of 4 seconds
Simulation results: n. of tokens




●   The requirement of a unique token is enforced
●   Token loss events (injected one every 10000 time
    units) are recovered: largest gap is 1700 time
    units.
●   No transients after token loss recovery.
●   Limited presence of spurious tokens
Simulation results: concurrency




●   Resource is protected from overload
●   Even under 20% overload:
    –   80% of time there is just one protected event running
    –   during less than 10% of the time there are two
        concurrent downloads (expensive rate applied)
    –   during 1% of the time there are three or more
        concurrent downloads (shaping may occur)
Simulation results: interarrival time




●   Observed performance depends on load.
●   Most events occur before 1200 time units, even on
    full or overload conditions.
●   Longer tail in case of full and overload conditions
    (buffering needed)
Conclusions
●   A Proof of Concept: a random walk approach can
    provide a robust, scalable and efficient solution to
    a distributed coordination problem.
●   A solution to a class of problems: we provide a
    solution to the Soft Mutual Exclusion problem,
    based on a wandering token.
●   A real world case study: the simulation in a Video
    on Demand environment demonstrates
    applicability.

Mais conteúdo relacionado

Destaque

Business Cluster Project
Business Cluster ProjectBusiness Cluster Project
Business Cluster Projectjschiff47
 
Mission Mid Atlantic
Mission Mid AtlanticMission Mid Atlantic
Mission Mid Atlanticjimleary
 
Technology Plan Wong
Technology Plan WongTechnology Plan Wong
Technology Plan WongMo Wong
 
Statement Of Strategy 1.2
Statement Of Strategy 1.2Statement Of Strategy 1.2
Statement Of Strategy 1.2jimleary
 
Star Chart 2008
Star Chart 2008Star Chart 2008
Star Chart 2008Mo Wong
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Specialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry EvaluationSpecialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry Evaluationjschiff47
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolAugusto Ciuffoletti
 
Asperger Syndrome
Asperger SyndromeAsperger Syndrome
Asperger Syndromeryanbos1
 

Destaque (14)

The Pub
The PubThe Pub
The Pub
 
Business Cluster Project
Business Cluster ProjectBusiness Cluster Project
Business Cluster Project
 
Mission Mid Atlantic
Mission Mid AtlanticMission Mid Atlantic
Mission Mid Atlantic
 
Technology Plan Wong
Technology Plan WongTechnology Plan Wong
Technology Plan Wong
 
Statement Of Strategy 1.2
Statement Of Strategy 1.2Statement Of Strategy 1.2
Statement Of Strategy 1.2
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
New Day
New DayNew Day
New Day
 
Star Chart 2008
Star Chart 2008Star Chart 2008
Star Chart 2008
 
ZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoringZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoring
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Specialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry EvaluationSpecialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry Evaluation
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocol
 
2013 03 occi-monitoring
2013 03 occi-monitoring2013 03 occi-monitoring
2013 03 occi-monitoring
 
Asperger Syndrome
Asperger SyndromeAsperger Syndrome
Asperger Syndrome
 

Semelhante a The wandering token

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsQin Liu
 
Multithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfMultithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfHarika Pudugosula
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet workingTharuniDiddekunta
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3Seung-Bum Lee
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdfyohansurya2
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Mumbai Academisc
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012TEST Huddle
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...amin azari
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfMayankRaj687571
 
Distributed Mininet with Symbiosis
Distributed Mininet with SymbiosisDistributed Mininet with Symbiosis
Distributed Mininet with SymbiosisJason Liu
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
An energy aware qos routing protocol
An energy aware qos routing protocolAn energy aware qos routing protocol
An energy aware qos routing protocoljaimin_m_raval
 
PAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmePAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmeNeotys
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Joydeep Banik Roy
 

Semelhante a The wandering token (20)

Avalanche-4-pub.pptx
Avalanche-4-pub.pptxAvalanche-4-pub.pptx
Avalanche-4-pub.pptx
 
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
 
Multithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfMultithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdf
 
Chap2 slides
Chap2 slidesChap2 slides
Chap2 slides
 
Omni ledger
Omni ledgerOmni ledger
Omni ledger
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Distributed Mininet with Symbiosis
Distributed Mininet with SymbiosisDistributed Mininet with Symbiosis
Distributed Mininet with Symbiosis
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
An energy aware qos routing protocol
An energy aware qos routing protocolAn energy aware qos routing protocol
An energy aware qos routing protocol
 
PAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmePAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine Toulme
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Unit i
Unit iUnit i
Unit i
 
Ergo details
Ergo detailsErgo details
Ergo details
 

Mais de Augusto Ciuffoletti

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorAugusto Ciuffoletti
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAugusto Ciuffoletti
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoAugusto Ciuffoletti
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesAugusto Ciuffoletti
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technologyAugusto Ciuffoletti
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast mediaAugusto Ciuffoletti
 

Mais de Augusto Ciuffoletti (15)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
Open Cloud Computing Interface
Open Cloud Computing InterfaceOpen Cloud Computing Interface
Open Cloud Computing Interface
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architecture
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilities
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technology
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

The wandering token

  • 1. DAPSYS Conference Innsbruck, 21-23 September 2006 The wandering token Congestion Avoidance of a Shared Resource Augusto Ciuffoletti INFN-CNAF - Bologna CoreGRID Institute of Grid Information, Resource and Workflow Monitoring Services
  • 2. Problem and solution ● Problem: design a scalable (thousands of agents), resource sharing solution ● Requirements: – access granted regularly, not strict real time; – overload gradually degrades service, with limited impact on the resource; – algorithm runs on clients; resources and infrastructure are legacy
  • 3. A case study: Video on Demand ● A provider offers a VoD service to a number of susbscribers (news on a 150*120 screen) ● Video is trasferred using a 200 Mbps infrastructure ● Each transmission uses a 650 Kbps bandwidth ● Each subscriber downloads distinct chunks of video ● The server uploads chunks of video on demand ● The infrastructure allows short bursts of transfer rate up to two times the agreed 200Mbps
  • 4. Other applications ● Intrusive network monitoring applications – only one test per run to avoid interference and overload ● Expensive queries to a centralized database – only one query at a time allowed
  • 5. The token wandering idea ● A unique token circulates in the system, enabling members to access the resource only when holding the token. ● Token circulation does not follow a predetermined path: next hop destination is selected randomly among all members. ● According to many theoretical results, the interarrival time is quite regular, although randomly variable. ● Like any token circulation algorithm, it suffers from token loss and duplication.
  • 6. Token (re)generation rule ● The agent sets up a timer: when such timer expires, a new token is generated, bearing a unique identifier. ● The timer value has the following properties: – it is randomized, to avoid synchronization effects; – minimum value considers application requirements, and is well below the required access rate; – expected value is such that the overall distribution of timeouts on the time line has an average interarrival time below the required access rate; ● The token regeneration rule can introduce spurious tokens (with different id).
  • 7. Token removal rule ● This rule aims at removing tokens unnecessarily generated by the token regeneration rule ● Duplicate tokens are prevented by the 3-way token passing protocol ● The token removal rule is applied whenever a token is received. ● Such token is silently dropped if: – the same token was already received and – from that time another token was received with a timestamp lower than that of the resident token ● Removal occurs with a latency, and during that time the token can be effectively lost.
  • 8. Simulation setup ● The simulator is an ad-hoc finite state machine that simulates a variable number of agents: – synchronous token passing operations, and – asynchronous alarms. ● The case study (650 Kbps VoD on a 200Mbps backbone) accommodates up to 300 subscribers. ● The access rate should be on the average one every 1200 seconds. ● Each subscriber downloads a chunk of 100 Mbytes during a slot of time of 4 seconds
  • 9. Simulation results: n. of tokens ● The requirement of a unique token is enforced ● Token loss events (injected one every 10000 time units) are recovered: largest gap is 1700 time units. ● No transients after token loss recovery. ● Limited presence of spurious tokens
  • 10. Simulation results: concurrency ● Resource is protected from overload ● Even under 20% overload: – 80% of time there is just one protected event running – during less than 10% of the time there are two concurrent downloads (expensive rate applied) – during 1% of the time there are three or more concurrent downloads (shaping may occur)
  • 11. Simulation results: interarrival time ● Observed performance depends on load. ● Most events occur before 1200 time units, even on full or overload conditions. ● Longer tail in case of full and overload conditions (buffering needed)
  • 12. Conclusions ● A Proof of Concept: a random walk approach can provide a robust, scalable and efficient solution to a distributed coordination problem. ● A solution to a class of problems: we provide a solution to the Soft Mutual Exclusion problem, based on a wandering token. ● A real world case study: the simulation in a Video on Demand environment demonstrates applicability.