SlideShare a Scribd company logo
1 of 12
Download to read offline
DAPSYS Conference
Innsbruck, 21-23 September 2006


        The wandering token
   Congestion Avoidance of a Shared
              Resource
Augusto Ciuffoletti
  INFN-CNAF - Bologna
  CoreGRID Institute of Grid Information,
     Resource and Workflow Monitoring Services
Problem and solution

●   Problem: design a scalable (thousands of agents),
    resource sharing solution
●   Requirements:
    –   access granted regularly, not strict real time;
    –   overload gradually degrades service, with limited
        impact on the resource;
    –   algorithm runs on clients; resources and infrastructure
        are legacy
A case study: Video on Demand
●   A provider offers a VoD service to a number of
    susbscribers (news on a 150*120 screen)
●   Video is trasferred using a 200 Mbps
    infrastructure
●   Each transmission uses a 650 Kbps bandwidth
●   Each subscriber downloads distinct chunks of
    video
●   The server uploads chunks of video on demand
●   The infrastructure allows short bursts of transfer
    rate up to two times the agreed 200Mbps
Other applications

●   Intrusive network monitoring applications
    –   only one test per run to avoid interference and overload
●   Expensive queries to a centralized database
    –   only one query at a time allowed
The token wandering idea
●   A unique token circulates in the system, enabling
    members to access the resource only when holding
    the token.
●   Token circulation does not follow a predetermined
    path: next hop destination is selected randomly
    among all members.
●   According to many theoretical results, the
    interarrival time is quite regular, although
    randomly variable.
●   Like any token circulation algorithm, it suffers
    from token loss and duplication.
Token (re)generation rule
●   The agent sets up a timer: when such timer
    expires, a new token is generated, bearing a unique
    identifier.
●   The timer value has the following properties:
    –   it is randomized, to avoid synchronization effects;
    –   minimum value considers application requirements,
        and is well below the required access rate;
    –   expected value is such that the overall distribution of
        timeouts on the time line has an average interarrival
        time below the required access rate;
●   The token regeneration rule can introduce
    spurious tokens (with different id).
Token removal rule
●   This rule aims at removing tokens unnecessarily
    generated by the token regeneration rule
●   Duplicate tokens are prevented by the 3-way token
    passing protocol
●   The token removal rule is applied whenever a
    token is received.
●   Such token is silently dropped if:
    –   the same token was already received and
    –   from that time another token was received with a
        timestamp lower than that of the resident token
●   Removal occurs with a latency, and during that
    time the token can be effectively lost.
Simulation setup
●   The simulator is an ad-hoc finite state machine
    that simulates a variable number of agents:
    –   synchronous token passing operations, and
    –   asynchronous alarms.
●   The case study (650 Kbps VoD on a 200Mbps
    backbone) accommodates up to 300 subscribers.
●   The access rate should be on the average one
    every 1200 seconds.
●   Each subscriber downloads a chunk of 100 Mbytes
    during a slot of time of 4 seconds
Simulation results: n. of tokens




●   The requirement of a unique token is enforced
●   Token loss events (injected one every 10000 time
    units) are recovered: largest gap is 1700 time
    units.
●   No transients after token loss recovery.
●   Limited presence of spurious tokens
Simulation results: concurrency




●   Resource is protected from overload
●   Even under 20% overload:
    –   80% of time there is just one protected event running
    –   during less than 10% of the time there are two
        concurrent downloads (expensive rate applied)
    –   during 1% of the time there are three or more
        concurrent downloads (shaping may occur)
Simulation results: interarrival time




●   Observed performance depends on load.
●   Most events occur before 1200 time units, even on
    full or overload conditions.
●   Longer tail in case of full and overload conditions
    (buffering needed)
Conclusions
●   A Proof of Concept: a random walk approach can
    provide a robust, scalable and efficient solution to
    a distributed coordination problem.
●   A solution to a class of problems: we provide a
    solution to the Soft Mutual Exclusion problem,
    based on a wandering token.
●   A real world case study: the simulation in a Video
    on Demand environment demonstrates
    applicability.

More Related Content

Viewers also liked

Business Cluster Project
Business Cluster ProjectBusiness Cluster Project
Business Cluster Projectjschiff47
 
Mission Mid Atlantic
Mission Mid AtlanticMission Mid Atlantic
Mission Mid Atlanticjimleary
 
Technology Plan Wong
Technology Plan WongTechnology Plan Wong
Technology Plan WongMo Wong
 
Statement Of Strategy 1.2
Statement Of Strategy 1.2Statement Of Strategy 1.2
Statement Of Strategy 1.2jimleary
 
Star Chart 2008
Star Chart 2008Star Chart 2008
Star Chart 2008Mo Wong
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDAugusto Ciuffoletti
 
Specialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry EvaluationSpecialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry Evaluationjschiff47
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolAugusto Ciuffoletti
 
Asperger Syndrome
Asperger SyndromeAsperger Syndrome
Asperger Syndromeryanbos1
 

Viewers also liked (14)

The Pub
The PubThe Pub
The Pub
 
Business Cluster Project
Business Cluster ProjectBusiness Cluster Project
Business Cluster Project
 
Mission Mid Atlantic
Mission Mid AtlanticMission Mid Atlantic
Mission Mid Atlantic
 
Technology Plan Wong
Technology Plan WongTechnology Plan Wong
Technology Plan Wong
 
Statement Of Strategy 1.2
Statement Of Strategy 1.2Statement Of Strategy 1.2
Statement Of Strategy 1.2
 
Laboratorio Openstack
Laboratorio OpenstackLaboratorio Openstack
Laboratorio Openstack
 
New Day
New DayNew Day
New Day
 
Star Chart 2008
Star Chart 2008Star Chart 2008
Star Chart 2008
 
ZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoringZHAW 2016 - OCCI for monitoring
ZHAW 2016 - OCCI for monitoring
 
Grid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRIDGrid Infrastructure Architecture A Modular Approach from CoreGRID
Grid Infrastructure Architecture A Modular Approach from CoreGRID
 
Specialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry EvaluationSpecialty Retail Clothing Industry Evaluation
Specialty Retail Clothing Industry Evaluation
 
Collision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocolCollision avoidance using a wandering token in the PTP protocol
Collision avoidance using a wandering token in the PTP protocol
 
2013 03 occi-monitoring
2013 03 occi-monitoring2013 03 occi-monitoring
2013 03 occi-monitoring
 
Asperger Syndrome
Asperger SyndromeAsperger Syndrome
Asperger Syndrome
 

Similar to The wandering token

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsQin Liu
 
Multithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfMultithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfHarika Pudugosula
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet workingTharuniDiddekunta
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3Seung-Bum Lee
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdfyohansurya2
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Mumbai Academisc
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012TEST Huddle
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...amin azari
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfMayankRaj687571
 
Distributed Mininet with Symbiosis
Distributed Mininet with SymbiosisDistributed Mininet with Symbiosis
Distributed Mininet with SymbiosisJason Liu
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
An energy aware qos routing protocol
An energy aware qos routing protocolAn energy aware qos routing protocol
An energy aware qos routing protocoljaimin_m_raval
 
PAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmePAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmeNeotys
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Joydeep Banik Roy
 

Similar to The wandering token (20)

Avalanche-4-pub.pptx
Avalanche-4-pub.pptxAvalanche-4-pub.pptx
Avalanche-4-pub.pptx
 
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsSAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics
 
Multithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdfMultithreaded Programming Part- III.pdf
Multithreaded Programming Part- III.pdf
 
Chap2 slides
Chap2 slidesChap2 slides
Chap2 slides
 
Omni ledger
Omni ledgerOmni ledger
Omni ledger
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
6. QoS Concepts.pdf
6. QoS Concepts.pdf6. QoS Concepts.pdf
6. QoS Concepts.pdf
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
 
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
Mike Bartley - Innovations for Testing Parallel Software - EuroSTAR 2012
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Distributed Mininet with Symbiosis
Distributed Mininet with SymbiosisDistributed Mininet with Symbiosis
Distributed Mininet with Symbiosis
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
An energy aware qos routing protocol
An energy aware qos routing protocolAn energy aware qos routing protocol
An energy aware qos routing protocol
 
PAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine ToulmePAC 2019 virtual Antoine Toulme
PAC 2019 virtual Antoine Toulme
 
Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!Winter is coming? Not if ZooKeeper is there!
Winter is coming? Not if ZooKeeper is there!
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
Unit i
Unit iUnit i
Unit i
 
Ergo details
Ergo detailsErgo details
Ergo details
 

More from Augusto Ciuffoletti

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systemsAugusto Ciuffoletti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorAugusto Ciuffoletti
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAugusto Ciuffoletti
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoAugusto Ciuffoletti
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesAugusto Ciuffoletti
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technologyAugusto Ciuffoletti
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolAugusto Ciuffoletti
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitectureAugusto Ciuffoletti
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast mediaAugusto Ciuffoletti
 

More from Augusto Ciuffoletti (15)

An open-source testbed for IoT systems
An open-source testbed for IoT systemsAn open-source testbed for IoT systems
An open-source testbed for IoT systems
 
0 basic
0 basic0 basic
0 basic
 
Thingspeak: integrazione
Thingspeak: integrazioneThingspeak: integrazione
Thingspeak: integrazione
 
Thingspeak: fondamenti
Thingspeak: fondamentiThingspeak: fondamenti
Thingspeak: fondamenti
 
Design and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensorDesign and implementation of a low-cost modular sensor
Design and implementation of a low-cost modular sensor
 
Open Cloud Computing Interface
Open Cloud Computing InterfaceOpen Cloud Computing Interface
Open Cloud Computing Interface
 
Automated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architectureAutomated deployment of a microservice based monitoring architecture
Automated deployment of a microservice based monitoring architecture
 
OCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demoOCCI Monitoring at OGF42 - Concepts and demo
OCCI Monitoring at OGF42 - Concepts and demo
 
Extending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilitiesExtending the OCCI API with monitoring capabilities
Extending the OCCI API with monitoring capabilities
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
TIP: a course about IP convergence technology
TIP: a course about IP convergence technologyTIP: a course about IP convergence technology
TIP: a course about IP convergence technology
 
Design of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocolDesign of a secure "Token Passing" protocol
Design of a secure "Token Passing" protocol
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring ArchitecturePrototype Implementation of a Demand Driven Network Monitoring Architecture
Prototype Implementation of a Demand Driven Network Monitoring Architecture
 
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588  - Collision avoidance for Delay_Req messages in broadcast mediaIEEE1588  - Collision avoidance for Delay_Req messages in broadcast media
IEEE1588 - Collision avoidance for Delay_Req messages in broadcast media
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

The wandering token

  • 1. DAPSYS Conference Innsbruck, 21-23 September 2006 The wandering token Congestion Avoidance of a Shared Resource Augusto Ciuffoletti INFN-CNAF - Bologna CoreGRID Institute of Grid Information, Resource and Workflow Monitoring Services
  • 2. Problem and solution ● Problem: design a scalable (thousands of agents), resource sharing solution ● Requirements: – access granted regularly, not strict real time; – overload gradually degrades service, with limited impact on the resource; – algorithm runs on clients; resources and infrastructure are legacy
  • 3. A case study: Video on Demand ● A provider offers a VoD service to a number of susbscribers (news on a 150*120 screen) ● Video is trasferred using a 200 Mbps infrastructure ● Each transmission uses a 650 Kbps bandwidth ● Each subscriber downloads distinct chunks of video ● The server uploads chunks of video on demand ● The infrastructure allows short bursts of transfer rate up to two times the agreed 200Mbps
  • 4. Other applications ● Intrusive network monitoring applications – only one test per run to avoid interference and overload ● Expensive queries to a centralized database – only one query at a time allowed
  • 5. The token wandering idea ● A unique token circulates in the system, enabling members to access the resource only when holding the token. ● Token circulation does not follow a predetermined path: next hop destination is selected randomly among all members. ● According to many theoretical results, the interarrival time is quite regular, although randomly variable. ● Like any token circulation algorithm, it suffers from token loss and duplication.
  • 6. Token (re)generation rule ● The agent sets up a timer: when such timer expires, a new token is generated, bearing a unique identifier. ● The timer value has the following properties: – it is randomized, to avoid synchronization effects; – minimum value considers application requirements, and is well below the required access rate; – expected value is such that the overall distribution of timeouts on the time line has an average interarrival time below the required access rate; ● The token regeneration rule can introduce spurious tokens (with different id).
  • 7. Token removal rule ● This rule aims at removing tokens unnecessarily generated by the token regeneration rule ● Duplicate tokens are prevented by the 3-way token passing protocol ● The token removal rule is applied whenever a token is received. ● Such token is silently dropped if: – the same token was already received and – from that time another token was received with a timestamp lower than that of the resident token ● Removal occurs with a latency, and during that time the token can be effectively lost.
  • 8. Simulation setup ● The simulator is an ad-hoc finite state machine that simulates a variable number of agents: – synchronous token passing operations, and – asynchronous alarms. ● The case study (650 Kbps VoD on a 200Mbps backbone) accommodates up to 300 subscribers. ● The access rate should be on the average one every 1200 seconds. ● Each subscriber downloads a chunk of 100 Mbytes during a slot of time of 4 seconds
  • 9. Simulation results: n. of tokens ● The requirement of a unique token is enforced ● Token loss events (injected one every 10000 time units) are recovered: largest gap is 1700 time units. ● No transients after token loss recovery. ● Limited presence of spurious tokens
  • 10. Simulation results: concurrency ● Resource is protected from overload ● Even under 20% overload: – 80% of time there is just one protected event running – during less than 10% of the time there are two concurrent downloads (expensive rate applied) – during 1% of the time there are three or more concurrent downloads (shaping may occur)
  • 11. Simulation results: interarrival time ● Observed performance depends on load. ● Most events occur before 1200 time units, even on full or overload conditions. ● Longer tail in case of full and overload conditions (buffering needed)
  • 12. Conclusions ● A Proof of Concept: a random walk approach can provide a robust, scalable and efficient solution to a distributed coordination problem. ● A solution to a class of problems: we provide a solution to the Soft Mutual Exclusion problem, based on a wandering token. ● A real world case study: the simulation in a Video on Demand environment demonstrates applicability.