Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1073970.1073990acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
Article

Decentralized algorithms using both local and random probes for P2P load balancing

Published: 18 July 2005 Publication History

Abstract

We study randomized algorithms for placing a sequence of n nodes on a circle with unit perimeter. Nodes divide the circle into disjoint arcs. We desire that a newly-arrived node (which is oblivious of its index in the sequence) choose its position on the circle by learning the positions of as few existing nodes as possible. At the same time, we desire that that the variation in arc-lengths be small. To this end, we propose a new algorithm that works as follows: The kth node chooses r random points on the circle, inspects the sizes of v arcs in the vicinity of each random point, and places itself at the mid-point of the largest arc encountered. We show that for any combination of r and v satisfying rv ¡Ý c log k, where c is a small constant, the ratio of the largest to the smallest arc-length is at most eight w.h.p., for an arbitrarily long sequence of n nodes. This strategy of node placement underlies a novel decentralized load-balancing algorithm that we propose for Distributed Hash Tables (DHTs) in peer-to-peer environments.
Underlying the analysis of our algorithm is <i>Structured Coupon Collection</i> over <i>n/b</i> disjoint cliques with <i>b</i> nodes per clique, for any <i>n</i>, <i>b</i> ≥ 1. Nodes are initially uncovered. At each step, we choose <i>d</i> nodes independently and uniformly at random. If all the nodes in the corresponding cliques are covered, we do nothing. Otherwise, from among the chosen cliques with at least one uncovered node, we select one at random and cover an uncovered node within that clique. We show that as long as <i>bd</i> ≥ <i>c</i> log <i>n</i>, <i>O</i>(<i>n</i>) steps are sufficient to cover all nodes w.h.p. and each of the first Ω(<i>n</i>) steps succeeds in covering a node w.h.p. These results are then utilized to analyze a stochastic process for growing binary trees that are highly balanced -- the leaves of the tree belong to at most four different levels with high probability.

References

[1]
Ittai Abraham, Baruch Awerbuch, Yossi Azar, Yair Bartal, Dahlia Malkhi, and Elan Pavlov. A generic scheme for building overlay networks in adversarial scenarios. In Proc. Intl. Parallel and Distributed Processing Symposium (IPDPS 2003), April 2003.]]
[2]
Micah Adler, Eran Halperin, Richard M Karp, and Vijay V Vazirani. A stochastic process on the hypercube with applications to peer-to-peer networks. In Proc. 35nd ACM Symposium on Theory of Computing (STOC 2003), pages 575--584, June 2003.]]
[3]
Noga Alon. Problems and results in extremal combinatorics, II. Available as http://www.math.tau.ac.il/~nogaa/PDFFS/publications.html, 2004.]]
[4]
James Aspnes, Jonathan Kirsch, and Arvind Krishnamurthy. Load balancing and locality in range-queriable data structures. In Proc. 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), June 2004.]]
[5]
James Aspnes and Gauri Shah. Skip graphs. In Proc. 14th ACM-SIAM Symposium on Discrete Algorithms (SODA 2003), pages 384--393, January 2003.]]
[6]
Yossi Azar, Andrei Z Broder, Anna R Karlin, and Eli Upfal. Balanced allocations. SIAM Journal of Computing, 29(1):180--200, 1999.]]
[7]
John W Byers, Jeffrey Considine, and Michael Mitzenmacher. Geometric generalizations of the power of two choices. In Proc. 16th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2004), pages 54--63, June 2004.]]
[8]
Miguel Castro, Peter Druschel, Y Charlie Hu, and Antony I T Rowstron. Topology-aware routing in structured peer-to-peer overlay networks. In Proc. Intl. Workshop on Future Directions in Distrib. Computing (FuDiCo 2003), pages 103--107, 2003.]]
[9]
Herman Chernoff. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Annals of Mathmematical Statistics, 23(4):493--509, 1952.]]
[10]
Frank Dabek, M Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. Wide-area cooperative storage with CFS. In Proc. 18th ACM Symposium on Operating Systems Principles (SOSP 2001), pages 202--215, 2001.]]
[11]
Devdatt P Dubhashi and Desh Ranjan. Balls and bins: A study in negative dependence. Random Structures and Algorithms, 13(2):99--124, 1998.]]
[12]
Pierre Fraigniaud and Philippe Gauron. (brief announcement) An overview of the content-addressable network D2B. In Proc 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), pages 151--151, July 2003.]]
[13]
Prasanna Ganesan, Mayank Bawa, and Hector Garcia-Molina. Online balancing of range-partitioned data with applications to peer-to-peer systems. In Proc. 30th Intl. Conf. on Very Large Data Bases (VLDB 2004), 2004.]]
[14]
Prasanna Ganesan and Gurmeet Singh Manku. Optimal routing in Chord. In Proc. 15th ACM-SIAM Symposium on Discrete Algorithms (SODA 2004), pages 169--178, January 2004.]]
[15]
George Giakkoupis and Vassos Hadzilacos. A scheme for load balancing in hetergoneous distributed hash tables. In Proc. 24th ACM Symposium on Principles of Distributed Computing (PODC 2005), July 2005.]]
[16]
P. Brighten Godfrey, Karthik Lakshminarayanan, Sonesh Surana, Richard M Karp, and Ion Stoica. Load balancing in dynamic structured P2P systems. In Proc. IEEE INFOCOM 2004, March 2004.]]
[17]
P. Brighten Godfrey and Ion Stoica. Heterogeneity and load balance in distributed hash tables. In Proc. IEEE INFOCOM 2005, March 2004.]]
[18]
Gaston H Gonnet. Expected length of the longest probe sequence in hash code searching. Journal of the ACM, 28(2):289--304, 1981.]]
[19]
Krishna P Gummadi, Ramakrishna Gummadi, Steven D Gribble, Sylvia Ratnasamy, Scott Shenker, and Ion Stoica. The impact of DHT routing geometry on resilience and proximity. In Proc. ACM SIGCOMM 2003, pages 381--394, 2003.]]
[20]
Nicholas J A Harvey, Michael Jones, Stefan Saroiu, Marvin Theimer, and Alec Wolman. SkipNet: A scalable overlay network with practical locality properties. In Proc. 4th USENIX Symposium on Internet Technologies and Systems (USITS 2003), 2003.]]
[21]
Wassily Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301):13--30, March 1963.]]
[22]
Norman Lloyd Johnson and Samuel Kotz. Urn Models and their Applications: An Approach to Modern Discrete Probability Theory. John Wiley and Sons, 1977.]]
[23]
M. Frans Kaashoek and David R Karger. Koorde: A simple degree-optimal hash table. In Proc. 2nd Intl. Workshop on Peer-to-Peer Systems (IPTPS 2003), pages 98--107, 2003.]]
[24]
David R Karger, Eric Lehman, Frank Thomson Leighton, Matthew S Levine, Daniel Lewin, and Rina Panigrahy. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web. In Proc. 29th ACM Symposium on Theory of Computing (STOC 1997), pages 654--663, May 1997.]]
[25]
David R Karger and Matthias Ruhl. Simple efficient load balancing algorithms for peer-to-peer systems. In Proc. 16th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2004), pages 36--43, June 2004.]]
[26]
Valerie King and Jared Saia. Choosing a random peer. In Proc. 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), pages 125--130, July 2004.]]
[27]
Valentin F Kolchin, Boris A Sevast'yanov, and Vladimir P Chistyakov. Random Allocations. V H Winston & Sons, 1978.]]
[28]
Abhishek Kumar, Shashidhar Merugu, Jun Jim Xu, and Xingxing Yu. Ulysses: A robust, low-diameter, low-latency peer-to-peer network. In Proc. 11th IEEE International Conference on Network Protocols (ICNP 2003), pages 258--267, November 2003.]]
[29]
Dmitri Loguinov, Anuj Kumar, Vivek Rai, and Sai Ganesh. Graph-theoretic analysis of structured peer-to-peer systems: Routing distance and fault resilience. In Proc. ACM SIGCOMM 2003, pages 395--406, 2003.]]
[30]
Dahlia Malkhi, Moni Naor, and David Ratajczak. Viceroy: A scalable and dynamic emulation of the butterfly. In Proc 21st ACM Symposium on Principles of Distributed Computing (PODC 2002), pages 183--192, 2002.]]
[31]
Gurmeet Singh Manku. Routing networks for distributed hash tables. In Proc. 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), pages 133--142, July 2003.]]
[32]
Gurmeet Singh Manku. Balanced binary trees for ID management and load balance in distributed hash tables. In Proc. 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004), pages 197--205, July 2004.]]
[33]
Gurmeet Singh Manku. Dipsea: A Modular Distributed Hash Table. PhD dissertation, Stanford University, Department of Computer Science, August 2004.]]
[34]
Gurmeet Singh Manku, Mayank Bawa, and Prabhakar Raghavan. Symphony: Distributed hashing in a small world. In Proc. 4th USENIX Symposium on Internet Technologies and Systems (USITS 2003), pages 127--140, 2003.]]
[35]
Gurmeet Singh Manku, Moni Naor, and Udi Wieder. Know thy neighbor's neighbor: The power of lookahead in randomized P2P networks. In Proc. 36th ACM Symposium on Theory of Computing (STOC 2004), pages 54--63, June 2004.]]
[36]
Petar Maymounkov and David Mazières. Kademlia: A peer-to-peer information system based on the XOR metric. In Proc. 1st Intl. Workshop on Peer-to-Peer Systems (IPTPS 2002), pages 53--65, 2002.]]
[37]
Michael Mitzenmacher. The Power of Two Choices in Randomized Load Balancing. PhD dissertation, University of California at Berkeley, Department of Computer Science, 1996.]]
[38]
Michael Mitzenmacher, Andrea W Richa, and R Sitaraman. The power of two random choices: A survey of techniques and results. In Handbook of Randomized Computing (Vol 1). Kluwer Academic Press, 2001.]]
[39]
Rajeev Motwani and Prabhakar Raghavan. Randomized Algorithms. Cambridge University Press, 1995.]]
[40]
Moni Naor and Udi Wieder. Novel architectures for P2P applications: The continuous-discrete approach. In Proc. 15th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2003), pages 50--59, June 2003.]]
[41]
Martin Raab and Angelika Steger. Balls into bins -- a simple and tight analysis. In Randomization and Approximation Techniques in Computer Science (RANDOM 1998), Lecture Notes in Computer Science 1518, pages 159--170, October 1998.]]
[42]
Sylvia Ratnasamy, Paul Francis, Mark Handley, and Richard M Karp. A scalable Content-Addressable Network. In Proc. ACM SIGCOMM 2001, pages 161--172, 2001.]]
[43]
Sean Rhea, Denis Geels, Timothy Roscoe, and John Kubiatowicz. Handling churn in a DHT. In Proc. 2004 USENIX Annual Technical Conference, pages 127--140, June 2004.]]
[44]
Antony I T Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms (Middleware 2001), pages 329--350, 2001.]]
[45]
Ion Stoica, Robert Morris, David Karger, M Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. ACM SIGCOMM 2001, pages 149--160, 2001.]]
[46]
Hui Zhang, Ashish Goel, and Ramesh Govindan. Incrementally improving lookup latency in distributed hash table systems. In Proc. ACM SIGMETRICS 2003, pages 114--125, June 2003.]]
[47]
Ben Y Zhao, Ling Huang, Jeremy Stribling, Sean C Rhea, Anthony D Joseph, and John D Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 22(1), January 2004.]]

Cited By

View all
  • (2021)Load balancing with dynamic set of balls and binsProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451107(1262-1275)Online publication date: 15-Jun-2021
  • (2021)On the Viability of Entropy for Improving Fault Tolerance and Load Balancing in Grid ComputingAdvanced Machine Learning Technologies and Applications10.1007/978-3-030-69717-4_28(275-285)Online publication date: 5-Mar-2021
  • (2019)Dynamic scaling for parallel graph computationsProceedings of the VLDB Endowment10.14778/3324301.332430512:8(877-890)Online publication date: 1-Apr-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SPAA '05: Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
July 2005
346 pages
ISBN:1581139861
DOI:10.1145/1073970
  • General Chair:
  • Phil Gibbons,
  • Program Chair:
  • Paul Spirakis
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. binary trees
  2. bins and balls
  3. cliques
  4. coupon collection
  5. decentralized algorithms
  6. distributed hash tables
  7. load balancing
  8. peer to peer systems

Qualifiers

  • Article

Conference

SPAA05

Acceptance Rates

Overall Acceptance Rate 447 of 1,461 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Load balancing with dynamic set of balls and binsProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451107(1262-1275)Online publication date: 15-Jun-2021
  • (2021)On the Viability of Entropy for Improving Fault Tolerance and Load Balancing in Grid ComputingAdvanced Machine Learning Technologies and Applications10.1007/978-3-030-69717-4_28(275-285)Online publication date: 5-Mar-2021
  • (2019)Dynamic scaling for parallel graph computationsProceedings of the VLDB Endowment10.14778/3324301.332430512:8(877-890)Online publication date: 1-Apr-2019
  • (2018)Consistent hashing with bounded loadsProceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3174304.3175309(587-604)Online publication date: 7-Jan-2018
  • (2017)Distributed Load Balancing for the Resilient Publish/Subscribe Overlay in SeDAXIEEE Transactions on Network and Service Management10.1109/TNSM.2016.264767814:1(147-160)Online publication date: 1-Mar-2017
  • (2016)Improving DHT Load Balance Using the Churn2016 IEEE International Conference on Computer and Information Technology (CIT)10.1109/CIT.2016.41(354-360)Online publication date: Dec-2016
  • (2012)Simple dynamic load balancing mechanism for structured P2P network and its evaluationInternational Journal of Grid and Utility Computing10.1504/IJGUC.2012.0477633:2/3(126-135)Online publication date: 1-Jul-2012
  • (2011)The Benefits of Estimated Global Information in DHT Load Balancing2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing10.1109/CCGrid.2011.11(382-391)Online publication date: May-2011
  • (2011)Randomized load balancing strategies with churn resilience in peer-to-peer networksJournal of Network and Computer Applications10.1016/j.jnca.2010.07.01134:1(252-261)Online publication date: 1-Jan-2011
  • (2011)A P2P load balancing-supported ID management algorithmWuhan University Journal of Natural Sciences10.1007/s11859-011-0753-816:4(293-300)Online publication date: 2-Aug-2011
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media