SlideShare uma empresa Scribd logo
1 de 5
Maintaining Data Consistency in Structured P2P Systems



Abstract—

A fundamental challenge of supporting mutable data replication in a Peer-to-Peer
(P2P) system is to efficiently maintain consistency. This paper presents a
framework for Balanced Consistency Maintenance (BCoM) in structured P2P
systems with heterogeneous node capabilities and various workload patterns.
Replica nodes of each object are organized into a tree structure for disseminating
updates, and a sliding window update protocol is developed for consistency
maintenance. We present an analytical model to optimize the window size
according to the dynamic network conditions, workload patterns and resource
limits. In this way, BCoM balances the consistency strictness, object availability
for updates, and update propagation performance for various application
requirements. On top of the dissemination tree, two enhancements are proposed: 1)
a fast recovery scheme to strengthen the robustness against node and link failures,
and 2) a node migration policy to remove and prevent bottlenecks allowing more
efficient update delivery.

Reasons for the proposal :

P2P systems are typically large, where peers with heterogeneous resource
capabilities experience varying network latencies. Also, the frequent joining and
leaving of nodes make the P2P overlay failure prone. Even “deadlock” may occur
when a crashed replica node causes other replica nodes to wait forever. Hence,
system scalability is restricted due to low data availability resulting from long
synchronization delay. At the other extreme, eventual consistency allows replica
nodes to concurrently update their local copies, only requiring that all replica
copies become identical after a long enough failure-free and update-free interval.
Since replica nodes are highly unreliable in P2P systems, the node issuing update
may have gone offline by the time update conflicts are detected, leading to
unresolvable conflicts. It is infeasible to rely on a long duration without any failure
or further updates. As a result, eventual consistency fails to provide any end-to-end
performance guarantee to P2P users. Hence a proper method is needed for
Maintaining data cache in Structured P2P systems.

Existing system & demerits:

Existing bounded consistency techniques for P2P systems can be divided into two
categories: probabilistic consistency [17], [18] and time-bounded consistency [19],
[20], both of which have limitations. Probabilistic consistency only guarantees
consistency on most nodes. It cannot guarantee that every node receives all
updates. Thus, it is not applicable to the situation where all intermediate updates
are valued by every user.

Time-bounded consistency sets a uniform temporal constraint on inconsistency for
all nodes. In the situation where nodes have various update frequencies, it is
impossible to set a temporal constrain that works for all nodes.

Proposed system :



This paper presents a Balanced Consistency Maintenance (BCoM) protocol for
structured P2P systems to balance between consistency strictness, object
availability for updates, and update dissemination latency.

BCoM aims to:

1) provide bounded consistency for maintaining a large number of replicas of a
mutable object;

2) balance the consistency strictness, object availability for updating, and update
propagation performance based on dynamic network conditions, workload
patterns, and resource constraints;

3) make the consistency maintenance robust against frequent node churn and
failures. To fulfill these objectives, BCoM organizes all replica nodes of an object
into a d-ary dissemination tree (dDT) on top of the P2P overlay for disseminating
updates. It applies three core techniques: the sliding window update protocol, the
ancestor cache scheme, and the tree node migration policy on a dDT for
consistency maintenance.

Protocols :

Basic Operations in Sliding Window Update

The sliding window update protocol regulates the consistency strictness in a dDT.
“Sliding” refers to the incremental adjustment of the window size based on
dynamic system conditions. If dDTi of object i is assigned a sliding window size
ki, any replica node in dDTi can buffer up to ki unacknowledged updates before
getting blocked from receiving new updates. In other words, each node in dDTi is
given a buffer of size ki. At the beginning, the root receives the first update, sends
it to all children and waits for their ACKs. There are two types of ACKs, R_ACK
and NR_ACK. Both indicate that the update has been received. The difference is
that R_ACK means the sender is ready to receive the next update; NR_ACK means
the sender is not ready. While waiting, the root accepts and buffers the incoming
updates as long as its buffer is not overflowed. When receiving an R_ACK from a
child, the root sends the next update to this child if there is a buffered update that

has not been sent to this child. When receiving an NR_ACK from a child, it marks
the update to be received by this child and stops sending update to this child. After
receiving ACKs from all children, the update is removed from the root’s buffer.

Ancestor Cache Maintenance :

Each replica node maintains a cache of mi ancestors starting from its parent
leading to the root in dDTi. The value of mi is set based on the node churn rate
(i.e., the number of nodes joining and leaving the system during a given period) so
that the probability that all mi nodes simultaneously fail is negligibly small. If a
node does not have mi ancestors, it caches all the ancestors from its parent to the
root. A node contacts its cached ancestors sequentially layer by layer upward when
its parent becomes unreachable. This can be detected by ACKs and maintenance
messages. Sequentially contacting enables a node to find the closest ancestor. The
root is finally contacted if all the other ancestors are unavailable. The root failure is
handled by the overlay routing, as a node with the nearest ID will replace the
crashed node to be the new root. Different replication schemes may be used to
reduce the cost of root failure, which is specific to a structured P2P overlay and
beyond the scope of this paper.

Tree Node Migration

Any nonleaf node will be blocked from receiving new updates if one of its
descendants has a buffer overflow in the sliding window update protocol. It is quite
possible that a lower layer node performs faster than a bottleneck node. This
motivates us to promote the faster node to a higher level and degrade the
bottleneck node to a lower level. For example in Fig. 1, assume node 1 is the
bottleneck node causing the root 0 to be blocked. The faster node may be a
descendant of the bottleneck node as shown in (A) or a descendant of a sibling of
the bottleneck node as shown in (B). When blocking occurs, node 0 can swap the
bottleneck node 1 with a faster descendant who has more recent updates, like node
4, to remove blocking. Before blocking occurs, node 1 can be swapped with its
fastest child who has the same update version to prevent blocking. The
performance improvement through node migration is confirmed by our analytical
model in Section 3. There are two forms of node migration, as described below. .
Blocking triggered migration. The blocked node searches for a faster descendant
who has a more recent update than the bottleneck node, and swaps them to remove
blocking. .

Nonblocking migration. When a node observes a child performing faster than
itself, it swaps with this child. Such migration prevents blocking and speeds up the
update propagation for the subtree rooted at the parent node.
Maintaining data consistency in

Mais conteúdo relacionado

Mais procurados

A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksIAEME Publication
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksiaemedu
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...IAEME Publication
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolCSCJournals
 

Mais procurados (7)

A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
B0781013215
B0781013215B0781013215
B0781013215
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
The detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networksThe detection of routing misbehavior in mobile ad hoc networks
The detection of routing misbehavior in mobile ad hoc networks
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering Protocol
 

Semelhante a Maintaining data consistency in

What is active-active
What is active-activeWhat is active-active
What is active-activeSaif Ahmad
 
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMS
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMSA SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMS
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMSijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGijp2p
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network forijp2p
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zonesvishnuRajan20
 
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DEMC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DEAravind NC
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Joydeep Banik Roy
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference ModelVishnu Vardhan
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed SystemsDilum Bandara
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
VoD Solutions
VoD SolutionsVoD Solutions
VoD SolutionsInfosys
 
Container independent failover framework
Container independent failover frameworkContainer independent failover framework
Container independent failover frameworktelestax
 
Container Independent failover framework - Mobicents Summit 2011
Container Independent failover framework - Mobicents Summit 2011Container Independent failover framework - Mobicents Summit 2011
Container Independent failover framework - Mobicents Summit 2011telestax
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
 
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdfDSIVABALASELVAMANIMC
 

Semelhante a Maintaining data consistency in (20)

What is active-active
What is active-activeWhat is active-active
What is active-active
 
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMS
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMSA SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMS
A SECURE EPIDEMIC BASED UPDATE PROTOCOL FOR P2P SYSTEMS
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMINGA HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
A HYBRID PUSH-PULL OVERLAY NETWORK FOR PEER-TO-PEER VIDEO STREAMING
 
A hybrid push pull overlay network for
A hybrid push pull overlay network forA hybrid push pull overlay network for
A hybrid push pull overlay network for
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Byzantine
ByzantineByzantine
Byzantine
 
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DEMC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
MC0085 – Advanced Operating Systems - Master of Computer Science - MCA - SMU DE
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!
 
The ISO_OSI Reference Model
The ISO_OSI Reference ModelThe ISO_OSI Reference Model
The ISO_OSI Reference Model
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
VoD Solutions
VoD SolutionsVoD Solutions
VoD Solutions
 
Container independent failover framework
Container independent failover frameworkContainer independent failover framework
Container independent failover framework
 
Container Independent failover framework - Mobicents Summit 2011
Container Independent failover framework - Mobicents Summit 2011Container Independent failover framework - Mobicents Summit 2011
Container Independent failover framework - Mobicents Summit 2011
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONSECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION
 
34
3434
34
 
33
3333
33
 
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
20MCE22 - BLOCKCHAIN TECHNOLOGY_NOTES.pdf
 

Mais de IMPULSE_TECHNOLOGY (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
23
2323
23
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Último

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Último (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Maintaining data consistency in

  • 1. Maintaining Data Consistency in Structured P2P Systems Abstract— A fundamental challenge of supporting mutable data replication in a Peer-to-Peer (P2P) system is to efficiently maintain consistency. This paper presents a framework for Balanced Consistency Maintenance (BCoM) in structured P2P systems with heterogeneous node capabilities and various workload patterns. Replica nodes of each object are organized into a tree structure for disseminating updates, and a sliding window update protocol is developed for consistency maintenance. We present an analytical model to optimize the window size according to the dynamic network conditions, workload patterns and resource limits. In this way, BCoM balances the consistency strictness, object availability for updates, and update propagation performance for various application requirements. On top of the dissemination tree, two enhancements are proposed: 1) a fast recovery scheme to strengthen the robustness against node and link failures, and 2) a node migration policy to remove and prevent bottlenecks allowing more efficient update delivery. Reasons for the proposal : P2P systems are typically large, where peers with heterogeneous resource capabilities experience varying network latencies. Also, the frequent joining and leaving of nodes make the P2P overlay failure prone. Even “deadlock” may occur when a crashed replica node causes other replica nodes to wait forever. Hence, system scalability is restricted due to low data availability resulting from long synchronization delay. At the other extreme, eventual consistency allows replica nodes to concurrently update their local copies, only requiring that all replica copies become identical after a long enough failure-free and update-free interval. Since replica nodes are highly unreliable in P2P systems, the node issuing update may have gone offline by the time update conflicts are detected, leading to
  • 2. unresolvable conflicts. It is infeasible to rely on a long duration without any failure or further updates. As a result, eventual consistency fails to provide any end-to-end performance guarantee to P2P users. Hence a proper method is needed for Maintaining data cache in Structured P2P systems. Existing system & demerits: Existing bounded consistency techniques for P2P systems can be divided into two categories: probabilistic consistency [17], [18] and time-bounded consistency [19], [20], both of which have limitations. Probabilistic consistency only guarantees consistency on most nodes. It cannot guarantee that every node receives all updates. Thus, it is not applicable to the situation where all intermediate updates are valued by every user. Time-bounded consistency sets a uniform temporal constraint on inconsistency for all nodes. In the situation where nodes have various update frequencies, it is impossible to set a temporal constrain that works for all nodes. Proposed system : This paper presents a Balanced Consistency Maintenance (BCoM) protocol for structured P2P systems to balance between consistency strictness, object availability for updates, and update dissemination latency. BCoM aims to: 1) provide bounded consistency for maintaining a large number of replicas of a mutable object; 2) balance the consistency strictness, object availability for updating, and update propagation performance based on dynamic network conditions, workload patterns, and resource constraints; 3) make the consistency maintenance robust against frequent node churn and failures. To fulfill these objectives, BCoM organizes all replica nodes of an object
  • 3. into a d-ary dissemination tree (dDT) on top of the P2P overlay for disseminating updates. It applies three core techniques: the sliding window update protocol, the ancestor cache scheme, and the tree node migration policy on a dDT for consistency maintenance. Protocols : Basic Operations in Sliding Window Update The sliding window update protocol regulates the consistency strictness in a dDT. “Sliding” refers to the incremental adjustment of the window size based on dynamic system conditions. If dDTi of object i is assigned a sliding window size ki, any replica node in dDTi can buffer up to ki unacknowledged updates before getting blocked from receiving new updates. In other words, each node in dDTi is given a buffer of size ki. At the beginning, the root receives the first update, sends it to all children and waits for their ACKs. There are two types of ACKs, R_ACK and NR_ACK. Both indicate that the update has been received. The difference is that R_ACK means the sender is ready to receive the next update; NR_ACK means the sender is not ready. While waiting, the root accepts and buffers the incoming updates as long as its buffer is not overflowed. When receiving an R_ACK from a child, the root sends the next update to this child if there is a buffered update that has not been sent to this child. When receiving an NR_ACK from a child, it marks the update to be received by this child and stops sending update to this child. After receiving ACKs from all children, the update is removed from the root’s buffer. Ancestor Cache Maintenance : Each replica node maintains a cache of mi ancestors starting from its parent leading to the root in dDTi. The value of mi is set based on the node churn rate (i.e., the number of nodes joining and leaving the system during a given period) so that the probability that all mi nodes simultaneously fail is negligibly small. If a node does not have mi ancestors, it caches all the ancestors from its parent to the root. A node contacts its cached ancestors sequentially layer by layer upward when
  • 4. its parent becomes unreachable. This can be detected by ACKs and maintenance messages. Sequentially contacting enables a node to find the closest ancestor. The root is finally contacted if all the other ancestors are unavailable. The root failure is handled by the overlay routing, as a node with the nearest ID will replace the crashed node to be the new root. Different replication schemes may be used to reduce the cost of root failure, which is specific to a structured P2P overlay and beyond the scope of this paper. Tree Node Migration Any nonleaf node will be blocked from receiving new updates if one of its descendants has a buffer overflow in the sliding window update protocol. It is quite possible that a lower layer node performs faster than a bottleneck node. This motivates us to promote the faster node to a higher level and degrade the bottleneck node to a lower level. For example in Fig. 1, assume node 1 is the bottleneck node causing the root 0 to be blocked. The faster node may be a descendant of the bottleneck node as shown in (A) or a descendant of a sibling of the bottleneck node as shown in (B). When blocking occurs, node 0 can swap the bottleneck node 1 with a faster descendant who has more recent updates, like node 4, to remove blocking. Before blocking occurs, node 1 can be swapped with its fastest child who has the same update version to prevent blocking. The performance improvement through node migration is confirmed by our analytical model in Section 3. There are two forms of node migration, as described below. . Blocking triggered migration. The blocked node searches for a faster descendant who has a more recent update than the bottleneck node, and swaps them to remove blocking. . Nonblocking migration. When a node observes a child performing faster than itself, it swaps with this child. Such migration prevents blocking and speeds up the update propagation for the subtree rooted at the parent node.