gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] storm/doc/pegboard/storm_gisp_simulation--hempp...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] storm/doc/pegboard/storm_gisp_simulation--hempp...
Date: Tue, 03 Jun 2003 04:58:22 -0400

CVSROOT:        /cvsroot/storm
Module name:    storm
Changes by:     Hermanni Hyytiälä <address@hidden>      03/06/03 04:58:22

Modified files:
        doc/pegboard/storm_gisp_simulation--hemppah: peg.rst 

Log message:
        incomplete

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/storm/storm/doc/pegboard/storm_gisp_simulation--hemppah/peg.rst.diff?tr1=1.1&tr2=1.2&r1=text&r2=text

Patches:
Index: storm/doc/pegboard/storm_gisp_simulation--hemppah/peg.rst
diff -u storm/doc/pegboard/storm_gisp_simulation--hemppah/peg.rst:1.1 
storm/doc/pegboard/storm_gisp_simulation--hemppah/peg.rst:1.2
--- storm/doc/pegboard/storm_gisp_simulation--hemppah/peg.rst:1.1       Mon Jun 
 2 09:28:14 2003
+++ storm/doc/pegboard/storm_gisp_simulation--hemppah/peg.rst   Tue Jun  3 
04:58:22 2003
@@ -5,8 +5,8 @@
 
 :Authors:  Hermanni Hyytiälä
 :Date-Created: 2003-06-02
-:Last-Modified: $Date: 2003/06/02 13:28:14 $
-:Revision: $Revision: 1.1 $
+:Last-Modified: $Date: 2003/06/03 08:58:22 $
+:Revision: $Revision: 1.2 $
 :Status:   Incomplete
 
 .. :Stakeholders:
@@ -16,8 +16,8 @@
 .. Affect-PEGs:
 
 
-Performing GISP simulations we can increase our understanding about
-GISP's scalability properties and on the other hand, possible issues
+Performing GISP P2P simulations with Storm we can increase our understanding 
+about GISP's scalability properties and on the other hand, possible issues
 related to scalability. Also, we want to know how GISP outperforms
 against different threats such as network partition or security 
 attacks.
@@ -31,77 +31,94 @@
 First of all, we will create a PEG document (this document) which 
 discusses general aspects of the simulation process. Then, we plan 
 to program (rather short) test cases which will test the GISP/Storm 
-P2P properties, discussed in this document. Finally, we wish to
+P2P properties, as discussed in this document. Finally, we will 
 collect and analyse test cases' information and use this information
-later on in our manuscripts.
+in the future in our manuscripts.
 
+We plan to perform all simulations on a single computer using the
+local loopback network interface to communicate with each other. The
+purpose is that Storm-servers would act as if they were on different
+machines. The simulation is ran under a standard Linux/Java environment. 
 
 Research problems
 =================
 
 By using simulation as a research method, we try to test different kinds of
-properties of the GISP protocol. There are number of research problems which
-we try to solve using the simulation process:
-
- - How well GISP can scale is there are lot of concurrent peer joins and
-   leaves in the system ? What about effieciency ?
+properties of the GISP protocol without having to deploy real life 
experiments. 
+There are number of research problems which we try to solve (or understand 
+better) using the simulation process:
+
+ - How well GISP can scale if there are lot of concurrent peer joins and
+   leaves in the system ? What about lookup effieciency when the network
+   grows ?
          
- - How well GISP gisp is able to perform in adverse conditions, e.g., a
+ - How well GISP is able to perform in adverse conditions, e.g., a
    network partition occurs ?
    
- - How well GISP gisp is able to perform against different kind of
+ - How well GISP is able to perform against different kind of
    security attacks and what are the impacts ?
-
+   
+   
+For now, we assume that simulation network is rather optimal, e.g., there
+are no network latencies in the simulation network. In the future, however, 
+we plan to perform simulations in a non-optimal network.
 
 Hypothesis
 ==========
 
-Scalability
------------
-
- - GISP can scale well when peers join and leave the system at a 
-   constant rate for a given time period
+ - GISP can scale rather well when peers join and leave the system at a 
+   constant/static rate for a given time period and cost of joining/leaving 
+   is logarithmic (e.g. Start with 1000 blocks and 1000 Storm-servers, 10 
+   peer(s) joins/leaves every 5 seconds).
    
- - GISP cannot scale well when peers join and leave the system at a 
-   (huge) variable rate for a given time period
+ - GISP can scale well and is adaptable if the cost of join/leave is 
+   logarithmic when peers join and leave the system constantly
+   and the variable rate for joining/leaving changes greatly (e.g., Start with 
1000 
+   blocks and 1000 Storm-servers. 1-10 peer(s) joins/leaves every 1-10 
second(s), 
+   at a given time suddenly 100-900 peers joins/leaves randomly).
    
+ - GISP's data lookup is efficient if the number of of lookup length grows 
with a 
+   logarithmic growth inspite that the number of Storm-servers increases 
+   linearly (e.g. 10-10000 Storm-servers, 10000 Storm blocks, with 10-10000
+   Storm-servers perform 10000 lookups randomly)
+     
  - A GISP peer is not able to handle all request properly when great amount 
-   of query requests are performed toward a single peer (a peer is 
-   responsible for a given key). Thus, there can be query hotspots
-   in the system.
-   
- - GISP can scale well if the number of peers and and Storm blocks
-   increase side by side and logarithmic efficiency still holds
-
- - GISP can well if there are heterogeneous peers and logarithmic 
-   data lookup efficiency still holds
- 
- - A java based GISP implementation does not consume much memory if
-   it requires less than X Mb of memory
- 
- 
-Adverse conditions
-------------------
-
- - GISP is not able to self-organize fast enough/efficienly after a fatal 
network
-   partition, i.e., half of the peers "die" suddenly 
- 
- 
-Security
---------
+   of query requests are performed towards a single peer/few peers (a peer is 
+   responsible for a given key). Thus, there can be query/routing hotspots
+   in the system and load balancing properties may not scalable/tolerance
+   against a hostile attack (e.g., 1000 Storm-server system, each server 
+   hosting 1-10 Storm block(s), 1-900 peers (randomly chosen) queries a 
+   single key every 1-10 second(s); calculate average block request 
+   failure, average lookup length, number of timed-out lookups and
+   the distribution of lookup messages processed per peer).
+     
+ - GISP is is rather fault-tolerant if 80% of lookups are succesful when 20% of
+   peers die (This is Chord's simulation result) (e.g., 1000 Storm blocks are 
+   insterted into a 1000 Storm-server system. After insertions, 1-99% of 
+   servers die randomly or in a controlled way. Before GISP starts rebuilding 
+   routing tables, perform 1000 Storm block fetches; calculate average block 
+   request failure, average lookup length and number of timed-out lookups).
  
  - A hostile entity is able to reroute a data lookup to a incorrect 
-   destination peer during a data lookup process
+   destination peer during a data lookup process (e.g., e.g., 1000 Storm 
+   blocks are insterted into a 1000 Storm-server system in which a a fraction
+   of peers are hostile. Perform data lookups 1000 lookups randomly so that 
+   in every lookup process, one forwarding request is rerouted incorrectly 
towards
+   randomly chosen destionation peer; calculate average block request failure, 
+   average lookup length, number of timed-out lookups and the distribution of 
+   lookup messages processed per peer).
 
 
 Issues
 ======
 
-Write something...
+How many virtual peers we are able to simulate on a single machine (e.g.,
+with 256Mb of memory) ?
+
 
 Changes
 =======
 
-Then, there can be free-form sections in which the changes proposed
-are detailed.
+We will program simulation test cases into the Storm CVS module. Currently,
+no changes are required to the Storm implementation codebase.
 




reply via email to

[Prev in Thread] Current Thread [Next in Thread]