SlideShare a Scribd company logo
Presented by:
Michael Iline & Ariel Krinitsa
Advanced Topics in Communication
                                   2/05/2011
       Introduction
       Motivation
       Related Work
         Tree-based Protocols and Extensions
         Gossip-based Protocols
       Design and Optimization of DONet
        Node Join and Membership Management
        Buffer Map Representation and Exchange
        Scheduling Algorithm
        Failure Recovery and Partnership Refinement
       Analysis of Overlay Radius
       Experimental Results
   Many multimedia applications, such as NetTV and
    news broadcast, involve live media streaming from a
    source to a large population of users.


   IP Multicast is probably the most efficient. But it
    remains confined due to the lack of incentives to install
    multicast capable routers and to carry multicast traffic.
   Application-level solution is called overlay nodes, and
    multicast is then achieved through data relaying
    among these nodes.


   Construction algorithms have tree structure for data
    delivering.
   This works well with dedicated infrastructure routers as
    in IP multicast, it often mismatches an application-level
    overlay with dynamic nodes.
     As the autonomous overlay nodes can easily crash or leave.
     A tree is highly vulnerable
     Have high bandwidth and stringent continuity demands.
   Sophisticated structures like mesh and forest can
    partially solve the problem, but they are much more
    complex and often less scalable.
   A data-centric design of a streaming overlay:
     availability of data guides the flow directions, not a specific
      overlay structure
     it is more suitable for overlay with high dynamic nodes
      (semistatic structure)
     All the nodes have strong buffering capabilities and can
      adaptively and intelligently determine the data forwarding
      directions
   The core operations in DONet are very simple:
     easy to implement
     efficient
     robust and resilient
   The key design issues of DONet:
     How the partnerships are formed
     How the data availability information are encoded and
      exchanged
     How the video data are supplied and retrieved among partners
A brief detour to explain base concepts and protocols




      CoolStreaming/DONet A Data-Driven Overlay Network for Efficient Live Media Streaming
   Numerous overlay multicast systems can be classified
    into two categories: proxy-assisted and peer-to-peer
    based.

     Proxy-assisted
       Servers or application-level proxies are strategically placed.

     Peer-to-peer based
       Self-organized overlay networks.
       Based multimedia distribution service.

    DONet belongs to peer-to-peer based category.
   Constructing and maintaining an efficient distribution
    tree among the overlay nodes is a key issue to these
    systems.
   An internal node in a tree has a higher load and its leave
    or crash often causes buffer underflow in a large
    population of descendants.
   DONet has a simpler and straight data-driven
    design, which does not maintain more complex
    structure, nor relies on an advanced coding scheme.
   Implementing a gossiping protocol in DONet for
    membership management.
   What is Membership?
     “Who knows whom” relation
      ▪ A knows C, C knows F
      ▪ But D does not know C, J does not know B
                                        C                F                I
                          A
                                               D
                                                                  H
                                    B
                                                                               J
                                                              G
                                               E
        CoolStreaming/DONet A Data-Driven Overlay Network for Efficient Live Media Streaming
a node sends a newly generated message to a set of randomly selected
nodes; these nodes do similarly in the next round.
   Gossip-based dissemination protocols
     Each member forwards the message to randomly chosen group
      members
     Probabilistic guarantee [Reliability] ( guarantee message
      delivery with high probability)
     Scalable
     Resilient to node/link failures
   However, traditional gossip-based multicast protocols
    rely on non-scalable membership protocol
     Each node has the complete view of the system
     High overhead in storage and synchronization
   Aiming at the weakness of traditional full membership
    protocols, SCAMP proposes a scalable probabilistic
    membership protocol for gossip-based multicast
   Scalable, fully decentralized
     Each node maintains partial, yet sufficient system view
   Self-reconfigurable
     View size in each member can change when system size
      changes
     Any isolated node can rejoin the system automatically with
      isolation recovery mechanism
   Basic membership management
     Subscription
     Un-subscription
     Isolation Recovery
      ▪ Simply solved by using heart beating and re-subscribing


   Graph rebalancing mechanisms
     Indirection
     Lease Mechanism
   Each node k maintains two lists of group members
     PartialView : a list containing its gossip targets
     InView : a list of nodes which k is one of their gossip targets
   Subscription (new node join)
     Contact: New nodes join the group by sending a subscription
      request to an arbitrary member.



                                        B

                   request                      D
            N                  A


                                            C



                                                                    19
   Subscription (new node join)
     New subscription: When a node receives a new subscription
      request, it forwards the new node-id to all members of its own
      local view. It also creates c additional copies (to be discussed
      later).

                                             B
                               request
                                           request       D
            N                    A
                                         request
                                          request
                                                     C



                                                                         20
   Subscription (new node join)
     Forwarded subscription: When a node receives a forwarded
      subscription
      ▪ With probability p = 1/(1+size of PartialViewk), add the subscriber
        into its PartialView
      ▪ Otherwise, forward the subscription to a randomly chosen node
        from k’s PartialView
                                         accept                 E
                                           B                forward

                                                      D
            N                       A                           F
                                                      forward

                                                  C       forward
                                                                      G

                                                                              21
   Subscription (new node join)
     Keeping a subscription: When a node decides to keep the
      subscription, it integrates the new subscriber in its
      PartialView, and informs the subscriber to update its InView


                                                        E
                                      B             forward
                        accept
                                              D
            N                    A                      F
                                              forward

                                          C       forward
                                                              G


                                                                     22

   Unsubscription (node leaves)
     Views:
      ▪ Let PartialViewn = { i(1), i(2), … , i(L) }
      ▪ Let InViewn = { j(1), j(2), … ,j(L’) }
     Informs nodes j…(1)~j(L’-c-1) to replace its id with
      i(1)~i(L’-c-1) (mod L), respectively
     Informs nodes j(L’-c)~j(L’) to remove it from their
      lists.                    replace
                      A                           C
                              x             x
                                      N
                              x             x
                             remove
                      B                           D

                                                             24
   If the leaving node has a in-degree d, the total number
    of arcs decreases by d+c+1
     d-c-1 by replacing
     (c+1)*2 by removing
   E[Mn-1]≈(c+1)(n-1)log(n-1)
   UnSubscriptions preserve the desired mean degree of
    arcs



                                                        25
   Basic membership management
     Subscription
     Un-subscription
     Recovery Isolation
      ▪ Simply solved by using heart beating and re-subscribing


   Graph rebalancing mechanisms
     Indirection
     Lease Mechanism
   Indirection mechanisms
     How would a newly joint node select a node to contact?
      Choosing at random uniformly among existing members
      requires global information.
     Solution: the initial contact forwards the newcomer’s
      subscription request to a node which is chosen approximately at
      random among all existing nodes.
      ▪ Balance the lists by Indirection mechanisms
        ▪ The node which receives the subscription request forwards the
          “token” with a counter value
        ▪ Decrement the counter every hop forwarded
        ▪ The member where token with zero counter arrives acts as a contact
          node

                                                                      27
   Lease mechanisms
     Each subscription has a finite lifetime
     Each node is responsible to resubscribe to a random
      chosen member from its PartialView
      ▪ Subscriber’s PartialView remains the same
      ▪ However, each node’s PartialView gradually changes (even there
        is no change to the system)
   Advantages
     Helps to rebalance the size of partial views across group
      members
     Removes invalid information caused by leaving the group
      without unsubscribing

                                                                28
   Distribution of partial view size




                                        29
   Resilience to node failures (Full view VS Partial view)




                                                      30
   Pros
     Fully decentralized protocol with O(logn) partial view size
     With a very close performance to full membership protocol
   Cons
     The reason why indirection does not improve the performance
      is not solved completely

                                                                         ?
                                                                    34
   SCAMP
     Membership management system for gossip-based multicast
     Partial View (O(log n)) per member in average
      ▪   Scalable
      ▪   No global system size needed
      ▪   Self-reconfigurating
      ▪   Used with O(log n) gossip-based multicast

     Achieve load balancing by using several techniques
      ▪ Indirection
          ▪ Distribution of contact work
      ▪ Lease mechanism
          ▪ Good to often change the view?
So, how does it work?




                SplitStream: High-bandwidth multicast in a cooperative environment
 There are three key
  modules:

     Membership manager

     Partnership manager

     Scheduler



                            The system diagram of a DONet node
   DONet node can be either a receiver or a supplier, or
    both.


   Nodes periodically exchange data availability
    information with a set of partners.


   An exception is the source node - origin node, which is
    always a supplier.
   Each DONet node has a unique identifier, such as IP
    address and a membership cache (mCache)containing a
    partial list of the identifiers.


   Newly node first contacts the origin node, which
    randomly selects a deputy node from its mCache and
    redirects the new node to the deputy.


   Use SCAM (Scalable Gossiping Membership Protocol) to
    distribute membership messages among nodes.
   Two events trigger updates of an mCache entry:
       1.the membership message is to be forwarded to
    other nodes through gossiping
        2. the node serves as a deputy and the entry is to be
    included in the partner candidate list.
Illustration of the partnership in DONet (origin node: A)
   A sliding window of 120-segment can effectively
    represent the buffer map of node.


   Using 120 bits to record a BM, with bit 1 indicating that
    a segment is available and 0 otherwise.
Problem: From which partner to fetch which data
                       segment ?
   Constraints
     Data availability
     Playback deadline
     Heterogeneous partner bandwidth


   This problem is a variation of the Parallel machine scheduling
     NP-hard problem
     The situation will become worse in a highly dynamic environment
     Resort a simple heuristic of fast response time

   For each expected Set i
        Check availability at partners
         If i exists                                                                        Supplier
          update the deadline [Prtnerj,Seti]                                    Setk

                                                                                 Setk+1

                                                                                 Setk+2

                                                                                 Setk+3


                                                   …   Setk    Setk+1   Setk+2      Setk+3     …
                                          Prtnra       11sec   13sec    17sec       14sec
                                          Prtnrb                        7sec        7sec
                                          Prtnrc                                    19sec
                                          Prtnrd               8sec                 15sec
                                          Prtnre                                    32sec
                                          Prtnrf                                    11sec
                                          Prtnrg                                    8sec


                                                                                                       Supplier
                                                                                           Setk        Prtnra
                                                                                           Setk+1

                                                                                           Setk+2

                                                                                           Setk+3


         …   Setk    Setk+1   Setk+2   Setk+3   …            …   Setk    Setk+1   Setk+2      Setk+3     …
Prtnra       11sec   13sec    17sec    14sec        Prtnra       11sec   10sec    14sec       11sec
Prtnrb                        7sec     7sec         Prtnrb                        7sec        7sec
Prtnrc                                 19sec        Prtnrc                                    19sec
Prtnrd               8sec              15sec        Prtnrd               8sec                 15sec
Prtnre                                 32sec        Prtnre                                    32sec
Prtnrf                                 11sec        Prtnrf                                    11sec
Prtnrg                                 8sec         Prtnrg                                    8sec


                                                                                                       Supplier
                                                                                           Setk        Prtnra
                                                                                           Setk+1      Prtnrd
                                                                                           Setk+2

                                                                                           Setk+3


         …   Setk    Setk+1   Setk+2   Setk+3   …            …   Setk    Setk+1   Setk+2      Setk+3     …
Prtnra       11sec   10sec    14sec    11sec        Prtnra       11sec   10sec    14sec       11sec
Prtnrb                        7sec     7sec         Prtnrb                        7sec        7sec
Prtnrc                                 19sec        Prtnrc                                    19sec
Prtnrd               8sec              15sec        Prtnrd               8sec                 10sec
Prtnre                                 32sec        Prtnre                                    32sec
Prtnrf                                 11sec        Prtnrf                                    11sec
Prtnrg                                 8sec         Prtnrg                                    8sec


                                                                                                       Supplier
                                                                                           Setk        Prtnra
                                                                                           Setk+1      Prtnrd
                                                                                           Setk+2      Prtnra
                                                                                           Setk+3


         …   Setk    Setk+1   Setk+2   Setk+3   …            …   Setk    Setk+1   Setk+2      Setk+3     …
Prtnra       11sec   10sec    14sec    11sec        Prtnra       11sec   10sec    14sec       5sec
Prtnrb                        7sec     7sec         Prtnrb                        7sec        7sec
Prtnrc                                 19sec        Prtnrc                                    19sec
Prtnrd               8sec              10sec        Prtnrd               8sec                 10sec
Prtnre                                 32sec        Prtnre                                    32sec
Prtnrf                                 11sec        Prtnrf                                    11sec
Prtnrg                                 8sec         Prtnrg                                    8sec


                                                                                                       Supplier
                                                                                           Setk        Prtnra
                                                                                           Setk+1      Prtnrd
                                                                                           Setk+2      Prtnra
                                                                                           Setk+3      Prtnrf
         …   Setk    Setk+1   Setk+2   Setk+3   …            …   Setk    Setk+1   Setk+2      Setk+3     …
Prtnra       11sec   10sec    14sec    5sec         Prtnra       11sec   10sec    14sec       5sec
Prtnrb                        7sec     7sec         Prtnrb                        7sec        7sec
Prtnrc                                 19sec        Prtnrc                                    19sec
Prtnrd               8sec              10sec        Prtnrd               8sec                 10sec
Prtnre                                 32sec        Prtnre                                    32sec
Prtnrf                                 11sec        Prtnrf                                    11sec
Prtnrg                                 8sec         Prtnrg                                    8sec
   The departure can be easily detected after an idle time
    of TFRC or BM exchange.

   An affected node can quickly react through re-
    scheduling using the BM information of the remaining
    partners.

   Operations to further enhance resilience:
     Graceful departure: the departure message when departing
     Node failure: the departure message on behalf the failed node.
   The departure message is gossiped similarly to the
    membership message.

   Each node periodically establish new partnerships with
    nodes randomly selected from its mCache.

   The new partner with the lowest score can be rejected
    to keep a stable number of partners.
        using function
   Coverage ratio for distance k
     (# of neighbors: M, total nodes: N)
                                 M ( M 1) k 2
                                  ( M 2) N
                         1 e
     E.g. 95% nodes are covered in 6 hops when M=4, N=500
   Average distance O(logN)
   DONet vs Tree-based overlay
     Much lower outage probability
   PlanetLab
     An open platform for developing, deploying, and accessing
      planetary-scale services
   Involved 200~300 nodes during experiment period (May
    to June, 2004)
   Streaming rate: 500 Kbps




    *http://www.planet-lab.org/
   Continuity index: number of segments that arrive before or
    on playback deadlines over the total number segments
     Data continuity, 200 nodes, 500 kbps streaming
   A practical DONet implementation
   First version release: May, 2004
   Support Real Video and Windows Media format
   Broadcast live sport programs at 450~755 Kbps
   Attached 30000 users
   Heterogeneous network environment
     LAN, CABLE, DSL, …
   Present the design of DONet for live media streaming
     Data-driven design
     Scalable membership and partnership management algorithm
     Heuristic scheduling algorithm
   The experiment results on PlantLab demonstrate
    DONet delivers quite good playback quality in a highly
    dynamic networks
   A practical implementation was also released for
    broadcasting live programs
CoolStreaming

More Related Content

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CoolStreaming

  • 1. Presented by: Michael Iline & Ariel Krinitsa Advanced Topics in Communication 2/05/2011
  • 2. Introduction  Motivation  Related Work  Tree-based Protocols and Extensions  Gossip-based Protocols  Design and Optimization of DONet  Node Join and Membership Management  Buffer Map Representation and Exchange  Scheduling Algorithm  Failure Recovery and Partnership Refinement  Analysis of Overlay Radius  Experimental Results
  • 3.
  • 4. Many multimedia applications, such as NetTV and news broadcast, involve live media streaming from a source to a large population of users.  IP Multicast is probably the most efficient. But it remains confined due to the lack of incentives to install multicast capable routers and to carry multicast traffic.
  • 5. Application-level solution is called overlay nodes, and multicast is then achieved through data relaying among these nodes.  Construction algorithms have tree structure for data delivering.
  • 6. This works well with dedicated infrastructure routers as in IP multicast, it often mismatches an application-level overlay with dynamic nodes.  As the autonomous overlay nodes can easily crash or leave.  A tree is highly vulnerable  Have high bandwidth and stringent continuity demands.  Sophisticated structures like mesh and forest can partially solve the problem, but they are much more complex and often less scalable.
  • 7. A data-centric design of a streaming overlay:  availability of data guides the flow directions, not a specific overlay structure  it is more suitable for overlay with high dynamic nodes (semistatic structure)  All the nodes have strong buffering capabilities and can adaptively and intelligently determine the data forwarding directions  The core operations in DONet are very simple:  easy to implement  efficient  robust and resilient
  • 8. The key design issues of DONet:  How the partnerships are formed  How the data availability information are encoded and exchanged  How the video data are supplied and retrieved among partners
  • 9. A brief detour to explain base concepts and protocols CoolStreaming/DONet A Data-Driven Overlay Network for Efficient Live Media Streaming
  • 10. Numerous overlay multicast systems can be classified into two categories: proxy-assisted and peer-to-peer based.  Proxy-assisted  Servers or application-level proxies are strategically placed.  Peer-to-peer based  Self-organized overlay networks.  Based multimedia distribution service. DONet belongs to peer-to-peer based category.
  • 11. Constructing and maintaining an efficient distribution tree among the overlay nodes is a key issue to these systems.  An internal node in a tree has a higher load and its leave or crash often causes buffer underflow in a large population of descendants.
  • 12. DONet has a simpler and straight data-driven design, which does not maintain more complex structure, nor relies on an advanced coding scheme.
  • 13. Implementing a gossiping protocol in DONet for membership management.  What is Membership?  “Who knows whom” relation ▪ A knows C, C knows F ▪ But D does not know C, J does not know B C F I A D H B J G E CoolStreaming/DONet A Data-Driven Overlay Network for Efficient Live Media Streaming
  • 14. a node sends a newly generated message to a set of randomly selected nodes; these nodes do similarly in the next round.
  • 15. Gossip-based dissemination protocols  Each member forwards the message to randomly chosen group members  Probabilistic guarantee [Reliability] ( guarantee message delivery with high probability)  Scalable  Resilient to node/link failures  However, traditional gossip-based multicast protocols rely on non-scalable membership protocol  Each node has the complete view of the system  High overhead in storage and synchronization
  • 16. Aiming at the weakness of traditional full membership protocols, SCAMP proposes a scalable probabilistic membership protocol for gossip-based multicast  Scalable, fully decentralized  Each node maintains partial, yet sufficient system view  Self-reconfigurable  View size in each member can change when system size changes  Any isolated node can rejoin the system automatically with isolation recovery mechanism
  • 17. Basic membership management  Subscription  Un-subscription  Isolation Recovery ▪ Simply solved by using heart beating and re-subscribing  Graph rebalancing mechanisms  Indirection  Lease Mechanism
  • 18. Each node k maintains two lists of group members  PartialView : a list containing its gossip targets  InView : a list of nodes which k is one of their gossip targets
  • 19. Subscription (new node join)  Contact: New nodes join the group by sending a subscription request to an arbitrary member. B request D N A C 19
  • 20. Subscription (new node join)  New subscription: When a node receives a new subscription request, it forwards the new node-id to all members of its own local view. It also creates c additional copies (to be discussed later). B request request D N A request request C 20
  • 21. Subscription (new node join)  Forwarded subscription: When a node receives a forwarded subscription ▪ With probability p = 1/(1+size of PartialViewk), add the subscriber into its PartialView ▪ Otherwise, forward the subscription to a randomly chosen node from k’s PartialView accept E B forward D N A F forward C forward G 21
  • 22. Subscription (new node join)  Keeping a subscription: When a node decides to keep the subscription, it integrates the new subscriber in its PartialView, and informs the subscriber to update its InView E B forward accept D N A F forward C forward G 22
  • 23.
  • 24. Unsubscription (node leaves)  Views: ▪ Let PartialViewn = { i(1), i(2), … , i(L) } ▪ Let InViewn = { j(1), j(2), … ,j(L’) }  Informs nodes j…(1)~j(L’-c-1) to replace its id with i(1)~i(L’-c-1) (mod L), respectively  Informs nodes j(L’-c)~j(L’) to remove it from their lists. replace A C x x N x x remove B D 24
  • 25. If the leaving node has a in-degree d, the total number of arcs decreases by d+c+1  d-c-1 by replacing  (c+1)*2 by removing  E[Mn-1]≈(c+1)(n-1)log(n-1)  UnSubscriptions preserve the desired mean degree of arcs 25
  • 26. Basic membership management  Subscription  Un-subscription  Recovery Isolation ▪ Simply solved by using heart beating and re-subscribing  Graph rebalancing mechanisms  Indirection  Lease Mechanism
  • 27. Indirection mechanisms  How would a newly joint node select a node to contact? Choosing at random uniformly among existing members requires global information.  Solution: the initial contact forwards the newcomer’s subscription request to a node which is chosen approximately at random among all existing nodes. ▪ Balance the lists by Indirection mechanisms ▪ The node which receives the subscription request forwards the “token” with a counter value ▪ Decrement the counter every hop forwarded ▪ The member where token with zero counter arrives acts as a contact node 27
  • 28. Lease mechanisms  Each subscription has a finite lifetime  Each node is responsible to resubscribe to a random chosen member from its PartialView ▪ Subscriber’s PartialView remains the same ▪ However, each node’s PartialView gradually changes (even there is no change to the system)  Advantages  Helps to rebalance the size of partial views across group members  Removes invalid information caused by leaving the group without unsubscribing 28
  • 29. Distribution of partial view size 29
  • 30. Resilience to node failures (Full view VS Partial view) 30
  • 31.
  • 32.
  • 33.
  • 34. Pros  Fully decentralized protocol with O(logn) partial view size  With a very close performance to full membership protocol  Cons  The reason why indirection does not improve the performance is not solved completely ? 34
  • 35. SCAMP  Membership management system for gossip-based multicast  Partial View (O(log n)) per member in average ▪ Scalable ▪ No global system size needed ▪ Self-reconfigurating ▪ Used with O(log n) gossip-based multicast  Achieve load balancing by using several techniques ▪ Indirection ▪ Distribution of contact work ▪ Lease mechanism ▪ Good to often change the view?
  • 36. So, how does it work? SplitStream: High-bandwidth multicast in a cooperative environment
  • 37.  There are three key modules:  Membership manager  Partnership manager  Scheduler The system diagram of a DONet node
  • 38. DONet node can be either a receiver or a supplier, or both.  Nodes periodically exchange data availability information with a set of partners.  An exception is the source node - origin node, which is always a supplier.
  • 39. Each DONet node has a unique identifier, such as IP address and a membership cache (mCache)containing a partial list of the identifiers.  Newly node first contacts the origin node, which randomly selects a deputy node from its mCache and redirects the new node to the deputy.  Use SCAM (Scalable Gossiping Membership Protocol) to distribute membership messages among nodes.
  • 40. Two events trigger updates of an mCache entry: 1.the membership message is to be forwarded to other nodes through gossiping 2. the node serves as a deputy and the entry is to be included in the partner candidate list.
  • 41. Illustration of the partnership in DONet (origin node: A)
  • 42. A sliding window of 120-segment can effectively represent the buffer map of node.  Using 120 bits to record a BM, with bit 1 indicating that a segment is available and 0 otherwise.
  • 43. Problem: From which partner to fetch which data segment ?  Constraints  Data availability  Playback deadline  Heterogeneous partner bandwidth  This problem is a variation of the Parallel machine scheduling  NP-hard problem  The situation will become worse in a highly dynamic environment  Resort a simple heuristic of fast response time
  • 44.
  • 45. For each expected Set i  Check availability at partners  If i exists Supplier  update the deadline [Prtnerj,Seti] Setk Setk+1 Setk+2 Setk+3 … Setk Setk+1 Setk+2 Setk+3 … Prtnra 11sec 13sec 17sec 14sec Prtnrb 7sec 7sec Prtnrc 19sec Prtnrd 8sec 15sec Prtnre 32sec Prtnrf 11sec Prtnrg 8sec
  • 46. Supplier Setk Prtnra Setk+1 Setk+2 Setk+3 … Setk Setk+1 Setk+2 Setk+3 … … Setk Setk+1 Setk+2 Setk+3 … Prtnra 11sec 13sec 17sec 14sec Prtnra 11sec 10sec 14sec 11sec Prtnrb 7sec 7sec Prtnrb 7sec 7sec Prtnrc 19sec Prtnrc 19sec Prtnrd 8sec 15sec Prtnrd 8sec 15sec Prtnre 32sec Prtnre 32sec Prtnrf 11sec Prtnrf 11sec Prtnrg 8sec Prtnrg 8sec
  • 47. Supplier Setk Prtnra Setk+1 Prtnrd Setk+2 Setk+3 … Setk Setk+1 Setk+2 Setk+3 … … Setk Setk+1 Setk+2 Setk+3 … Prtnra 11sec 10sec 14sec 11sec Prtnra 11sec 10sec 14sec 11sec Prtnrb 7sec 7sec Prtnrb 7sec 7sec Prtnrc 19sec Prtnrc 19sec Prtnrd 8sec 15sec Prtnrd 8sec 10sec Prtnre 32sec Prtnre 32sec Prtnrf 11sec Prtnrf 11sec Prtnrg 8sec Prtnrg 8sec
  • 48. Supplier Setk Prtnra Setk+1 Prtnrd Setk+2 Prtnra Setk+3 … Setk Setk+1 Setk+2 Setk+3 … … Setk Setk+1 Setk+2 Setk+3 … Prtnra 11sec 10sec 14sec 11sec Prtnra 11sec 10sec 14sec 5sec Prtnrb 7sec 7sec Prtnrb 7sec 7sec Prtnrc 19sec Prtnrc 19sec Prtnrd 8sec 10sec Prtnrd 8sec 10sec Prtnre 32sec Prtnre 32sec Prtnrf 11sec Prtnrf 11sec Prtnrg 8sec Prtnrg 8sec
  • 49. Supplier Setk Prtnra Setk+1 Prtnrd Setk+2 Prtnra Setk+3 Prtnrf … Setk Setk+1 Setk+2 Setk+3 … … Setk Setk+1 Setk+2 Setk+3 … Prtnra 11sec 10sec 14sec 5sec Prtnra 11sec 10sec 14sec 5sec Prtnrb 7sec 7sec Prtnrb 7sec 7sec Prtnrc 19sec Prtnrc 19sec Prtnrd 8sec 10sec Prtnrd 8sec 10sec Prtnre 32sec Prtnre 32sec Prtnrf 11sec Prtnrf 11sec Prtnrg 8sec Prtnrg 8sec
  • 50. The departure can be easily detected after an idle time of TFRC or BM exchange.  An affected node can quickly react through re- scheduling using the BM information of the remaining partners.  Operations to further enhance resilience:  Graceful departure: the departure message when departing  Node failure: the departure message on behalf the failed node.
  • 51. The departure message is gossiped similarly to the membership message.  Each node periodically establish new partnerships with nodes randomly selected from its mCache.  The new partner with the lowest score can be rejected to keep a stable number of partners. using function
  • 52. Coverage ratio for distance k  (# of neighbors: M, total nodes: N) M ( M 1) k 2 ( M 2) N 1 e  E.g. 95% nodes are covered in 6 hops when M=4, N=500  Average distance O(logN)
  • 53. DONet vs Tree-based overlay  Much lower outage probability
  • 54. PlanetLab  An open platform for developing, deploying, and accessing planetary-scale services  Involved 200~300 nodes during experiment period (May to June, 2004)  Streaming rate: 500 Kbps *http://www.planet-lab.org/
  • 55. Continuity index: number of segments that arrive before or on playback deadlines over the total number segments  Data continuity, 200 nodes, 500 kbps streaming
  • 56.
  • 57.
  • 58. A practical DONet implementation  First version release: May, 2004  Support Real Video and Windows Media format  Broadcast live sport programs at 450~755 Kbps  Attached 30000 users
  • 59. Heterogeneous network environment  LAN, CABLE, DSL, …
  • 60.
  • 61. Present the design of DONet for live media streaming  Data-driven design  Scalable membership and partnership management algorithm  Heuristic scheduling algorithm  The experiment results on PlantLab demonstrate DONet delivers quite good playback quality in a highly dynamic networks  A practical implementation was also released for broadcasting live programs

Editor's Notes

  1. המערכת מבוססת על ניהול השתתפותבמערכת סקאלאבילית אמיתית אי אפשר להכיר את כולםמה זו בעצם השתתפות?
  2. בשביל לנהל מידע חלקי נשתמש בשיטת העברת הודעות על בסיס פרוטוקול "רכילות" או אלגוריתמי מגיפהובסיסה היא : כאשר קודקוד (משתתף) מייצר הודעה כלשהי – היא נשלחת לסט חלקי ורנדומלי של קודקודים אחרים מתוך כלל השכנים הידועים כאשר קודקוד שכן מקבל הודעה כזו – הוא עושה את אותו הדבר.בעצם – הבחירה הרנדומלית של מטרות לרכילות מייצרת סוג של עמידות לנפילות וכשלים ברשת ומאפשרת פעולה לא נקודתיתאמינות מושגת ע"י הכרת כמות גדולה אך מספקת של שכנים תוך ידיעה (הערכה חכמה) מה החלק היחסי של הכמות הזו מכלל הקודקודים במערכת.In gossip-based protocols, messages are propagated as follows: When a node generates a message, it sends it to a random subset of other nodes. When any node receives a message for the first time, it does the same. The random choice of gossip targets provides resilience to random failures and enables decentralized operation. Reliability is achieved by introducing sufficient redundancy by making the number of gossip targets chosen by each member large enough, as a function of the group size.
  3. Scalability: The size of the partial view maintained at each node should grow slowly with the group size.Reliability: The partial views at each node should be large enough to support gossip with reliability comparable to that of traditional schemes relying on full knowledge of group membership.
  4. Decentralized operation: The partial views should be updated as members subscribe or unsubscribe while maintaining the above properties. The updates should take place using only local information. The partial view sizes should scale automatically to the correct value as a function of the system size, even though no node knows the system size.Isolation Recovery: An important property of traditional gossip schemes is that, each time a node gossips a multicast message, it selects new gossip targets at random. Hence, while a node may occasionally miss a message, it is very unlikely that it will be left out repeatedly. In contrast, if nodes select their gossip targets from a partial view that remains unchanged for long periods, then a mechanism for recovering from isolation is needed.
  5. We remarked above that the basic protocol creates partial views of the required size provided new subscriptions are targeted uniformly at existing members and unsubscriptions are independent of the current view size. The latter is a reasonable assumption, but the former is not; one would instead expect newcomers to contact one node among a few whose identities are publicly advertised. We would like to ensure that the protocol continues to perform well in such a scenario.
  6. In practice, some nodes might be used as contact nodes more often than the othersThe average list lengths grow faster than expectedThe lists of the contact nodes grow quickly