G2-P2P: a Fully Decentralised Fault-Tolerant Cycle-Stealing Framework

Total Page:16

File Type:pdf, Size:1020Kb

G2-P2P: a Fully Decentralised Fault-Tolerant Cycle-Stealing Framework G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework Richard Mason Wayne Kelly Centre for Information Technology Innovation Queensland University of Technology Brisbane, Australia Email: {r.mason, w.kelly}@qut.edu.au Abstract present in this paper is the first that we know of that attempts to support generic cycle stealing over a fully Existing cycle-stealing frameworks are generally decentralised P2P network. based on simple client-server or hierarchical style ar- The benefits of utilizing a fully decentralised P2P chitectures. G2:P2P moves cycle-stealing into the network are obvious – unlimited scalability and no “pure” peer-to-peer (P2P), or fully decentralised single point of failure; however the challenges to arena, removing the bottleneck and single point of achieving this goal are also great. The basic problem failure that centralised systems suffer from. Addition- is that the peers that make up a cycle stealing net- ally, by utilising direct P2P communication, G2:P2P work may vary considerably during the lifetime of a supports a far broader range of applications than the computation running on the network. In a file sharing master-worker style that most cycle-stealing frame- environment, this is not a major problem; it simply works offer. means that searching for a particular song may tem- G2:P2P moves away from the task based program- porarily return no hits. With a long running parallel ming model typical of cycle-stealing systems to a dis- application, however, the consequences of losing even tributed object abstraction which simplifies commu- part of the applications state in most cases will be nication. It uses a distributed hash table based over- catastrophic – requiring the entire application to be lay network to provide an efficient method of referenc- completely rerun. ing application objects while still allowing volunteer Clearly, if a peer node decides to leave the net- machines to come and go from the network. Most work, its current application state and tasks must be importantly, G2:P2P provides a sophisticated fault taken on by some other node, i.e. they must be able tolerance mechanism to ensure applications execute to migrate. For any message passing style frame- correctly. This mechanism is entirely automated, re- work, whether it be based on communicating pro- quiring no special effort on the application developer’s cesses (such as MPI or PVM), or based on commu- part. The framework is implemented as an extension nicating distributed objects (such as Java RMI (Sun to .NET’s Remoting framework, providing a familiar Microsystems 2004), .NET Remoting (Obermeyer & model for application programmers and an easy up- Hawkins 2001) or Gardens (Roe & Szyperski Febru- grade path for existing .NET sequential applications. ary 1998)), there is the need for some form of re- mote reference or addressing scheme. That is, we Keywords: Pure Peer-to-Peer, P2P, kCycle Stealing, need a way of referring to the entities that we wish Fault Tolerance, .NET to communicate with. In traditional message passing systems, these entities reside permanently on a given 1 Introduction physical node. The remote references include the ad- dress of this physical node, so routing messages to Many cycle-stealing applications and frameworks these entities is relatively trivial. have been developed (SETI@home 1999-2004, Kelly, A number of schemes have been proposed for han- Roe & Sumitomo June 2002, Cappello, Christiansen, dling remote references to entities that may migrate. Ionescu, Neary, Schauser & Wu 1997). These systems The original Gardens system (developed at QUT), for are often loosely referred to as peer-to-peer (P2P) example, required all machines that held remote ref- systems, as compute cycles are contributed by peer erences to be informed whenever a migration took nodes. The peer nodes in these cycle stealing systems place. This required a global synchronization and are, however, almost always coordinated by a dedi- so limited scalability. Other systems, such as Java- cated central server node (or nodes) and support only Party (Philippsen & Zenger 1997) use a forwarding master-worker style programming models, or simple scheme, that is, the remote references are not actu- variations thereof. The central server in such systems ally updated, messages are simply send to the ma- often becomes a bottleneck and represents a single chine where the object used to reside, which is ex- point of failure. pected to forward them to the object’s new home. The idea of fully decentralised P2P networks has This requires nodes that have departed from the P2P been studied for some time, however, it has largely network to continue to participate (albeit, to a lesser been applied to file sharing style applications such extent) by agreeing to forward such messages. Our as the notorious music sharing networks (Kan 2001, approach allows entities to migrate without requir- Sharman Networks 2004). The framework that we ing global synchronization and without requiring de- parted nodes to continue to participate in any way. Copyright c 2005, Australian Computer Society, Inc. This pa- We do this by using a physical location independent per appeared at Australasian Workshop on Grid Computing address scheme, i.e. an addressing scheme that does and e-Research, Newcastle, Australia. Conferences in Research not include the physical address of the entity. and Practice in Information Technology, Vol. 44. Paul Cod- dington and Andrew Wendelborn, Ed. Reproduction for aca- The idea for our addressing scheme comes from demic, not-for profit purposes permitted provided this text is modern P2P networks, such as Pastry (Rowstron included. & Druschel 2001a), Tapestry (Zhao, Huang, Strib- ling, Rhea, Joseph & Kubiatowicz January 2004), is implemented in the form of such a custom trans- Chord (Stoica, Morris, Karger, Kaashoek & port channel. Application programmers can there- Balakrishnan 2001) and CAN (Ratnasamy, Francis, fore implement parallel applications using our G2- Handley, Karp & Shenker 2000), that implement a P2P framework in much the same way they would fully decentralised distributed hash table (DHT). Pas- any other .NET Remoting application. By exposing try and Tapestry assign a random n-bit identifier to our framework via such a “COTS” interface, together each physical node currently participating in the net- with .NETs support for a wide range of “COTS” pro- work. Data to be stored in the hash table in then gramming languages makes G2-P2P widely accessible hashed and stored on the physical node whose ID and simple to use. is numerically closest (modulo 2n). The beauty of .NET Remoting channels are generally responsi- this approach is that as nodes come and go from the ble for routing messages to remote objects based on network, the hash table entries will be automatically the object’s URI. These URIs are assigned when an mapped (migrated) to new physical nodes. The refer- object is created and generally consist of: a proto- ences to these entries (i.e. the keys) don’t need to be col, a machine address and the ID of the object. In updated. The major technical innovation is the use our case, we define a custom protocol G2P2P. An ex- of a fully decentralised routing algorithm that guar- act machine address is not given as the object may be antees the delivery of lookup messages to the appro- held on different physical machines throughout its life priate physical node in at most O(log N) hops, where time. We instead identify only a logical network name N is the number of physical nodes currently partic- together with a GUID to identify the object. The ipating in the network. Our approach mirrors that network name doesnt refer to the address of an actual of Pastry and Tapestry, but we could equally have machine, but rather a changing collection of machines chosen to follow other modern DHT implementations that are working together to form a P2P network. In- such as Chord and CAN which achieve the same effect cluding such a network name in the URIs allows mul- using slightly different approaches. tiple P2P network instances to coexist. An example For our cycle-stealing framework (G2-P2P) we URI might be g2p2p://plas.qut.edu/fccf281d-47bd- have opted to provide a message passing paradigm 45c7-8f2b-a48d462d171b. Only the network name is in the form of a distributed object model; however, chosen by the application programmer, the GUIDs our basic approach could equally have been applied are auto generated by the G2-P2P framework. to distributed process models such as MPI. We assign .NET Remoting uses a configuration file to list the a 128-bit GUID to each physical node when it joins types of objects that should be created remotely; and the network. Our objects are also assigned and refer- for each of those types, the protocol to use and the enced via a 128-bit GUID. Since we are (randomly) URL of the machine that should host such objects. generating the keys ourselves, there is no need to hash In our case, the URL is the name of a P2P network them; we simply use the object’s GUID directly to instance rather than a specific physical machine. Af- map it to the physical node whose GUID is numeri- ter having read this standard configuration file, the cally closest. The random generation of GUIDs and .NET runtime then knows to convert any attempts associated mapping algorithm will tend to generate to create instances of such types into remote activa- a roughly even number of objects per physical node tions. The end result of such a remote activation is in the same way that traditional hash table buckets a local transparent proxy object (containing the re- tend to have the same number of elements on average. mote object’s URI) which to the client looks exactly In Section 3.5 we describe how this probabilistic load like an instance of the type that it was originally try- balancing approach can be refined.
Recommended publications
  • A Flexible Middleware for Metacomputing a Flexible
    IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2B, February 2006 92 A flexible middleware for metacomputing in multimulti----domaindomain networks Franco Frattolillo Research Centre on Software Technology Department of Engineering, University of Sannio Benevento, Italy Summary technologies, but they require further and significant Middlewares are software infrastructures able to harness the advances in mechanisms, techniques, and tools to bring enormous, but often poorly utilized, computing resources together computational resources distributed over the existing on the Internet in order to solve large-scale problems. Internet to efficiently solve a single large-scale problem However, most of such resources, particularly those existing according to the new scenario introduced by grid within “departmental” organizations, cannot often be considered computing [2, 3, 4]. In fact, in such a scenario, cluster actually available to run large-scale applications, in that they cannot be easily exploited by most of the currently used computing still remains a valid and actual support to high middlewares for grid computing. In fact, such resources are performance parallel computing, since clusters of usually represented by computing nodes belonging to non- workstations represent high performance/cost ratio routable, private networks and connected to the Internet through computing platforms and are widely available within publicly addressable IP front-end nodes. This paper presents a “departmental” organizations, such
    [Show full text]
  • Four-Dimensional Model for Describing the Status of Peers in Peer-To-Peer Distributed Systems
    Turkish Journal of Electrical Engineering & Computer Sciences Turk J Elec Eng & Comp Sci (2013) 21: 1646 { 1664 http://journals.tubitak.gov.tr/elektrik/ ⃝c TUB¨ ITAK_ Research Article doi:10.3906/elk-1108-27 Four-dimensional model for describing the status of peers in peer-to-peer distributed systems Seyedeh Leili MIRTAHERI,1;∗ Ehsan Mousavi KHANEGHAH,1 Mohsen SHARIFI,1 Behrouz MINAEI-BIDGOLI,1 Bijan RAAHEMI,2 Mohammad Norouzi ARAB,1 Abbas Saleh ARDESTANI3 1School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran 2School of Information Technology and Engineering, University of Ottawa, Ottawa, Ontario, Canada 3Department of Business Management, Faculty of Management, Islamic Azad University Central Tehran Branch, Tehran, Iran Received: 09.08.2011 • Accepted: 15.03.2012 • Published Online: 02.10.2013 • Printed: 28.10.2013 Abstract: One of the important aspects of decision making and management in distributed systems is collecting accurate information about the available resources of the peers. The previously proposed approaches for collecting such information completely depend on the system's architecture. In the server-oriented architecture, servers assume the main role of collecting comprehensive information from the peers and the system. Next, based on the information about the features of the basic activities and the system, an exact description of the peers' status is produced. Accurate decisions are then made using this description. However, the amount of information gathered in this architecture is too large, and it requires massive processing. On the other hand, updating the information takes time, causing delays and undermining the validity of the information. In addition, due to the limitations imposed by the servers, such architecture is not scalable and dynamic enough.
    [Show full text]
  • From Computational Science to Internetics: Integration of Science with Computer Science
    Syracuse University SURFACE Northeast Parallel Architecture Center College of Engineering and Computer Science 2002 From Computational Science to Internetics: Integration of Science with Computer Science Geoffrey C. Fox Syracuse University, Northeast Parallel Architectures Center Follow this and additional works at: https://surface.syr.edu/npac Part of the Computer Sciences Commons, and the Curriculum and Instruction Commons Recommended Citation Fox, Geoffrey C., "From Computational Science to Internetics: Integration of Science with Computer Science" (2002). Northeast Parallel Architecture Center. 80. https://surface.syr.edu/npac/80 This Article is brought to you for free and open access by the College of Engineering and Computer Science at SURFACE. It has been accepted for inclusion in Northeast Parallel Architecture Center by an authorized administrator of SURFACE. For more information, please contact [email protected]. From Computational Science to Internetics Integration of Science with Computer Science Geoffrey C. Fox Syracuse University Northeast Parallel Architectures Center 111 College Place Syracuse, New York 13244-4100 [email protected] http://www.npac.syr.edu In honor of John Rice at Purdue University Abstract We describe how our world dominated by Science and Scientists has been changed and will be revolutionized by technologies moving with Internet time. Computers have always been well-used tools but in the beginning only the science counted and little credit or significance was attached to any computing activities associated with scientific research. Some 20 years ago, this started to change and the area of computational science gathered support with the NSF Supercomputer centers playing a critical role. However this vision has stalled over the last 5 years with information technology increasing in importance.
    [Show full text]
  • Globus: a Metacomputing Infrastructure Toolkit
    Globus A Metacomputing Infrastructure Toolkit y Ian Foster Carl Kesselman httpwwwglobusorg Abstract Emerging highp erformance applications require the ability to exploit diverse ge ographically distributed resources These applications use highsp eed networks to in tegrate sup ercomputers large databases archival storage devices advanced visualiza tion devices andor scientic instruments to form networked virtual supercomputers or metacomputers While the physical infrastructure to build such systems is b ecoming widespread the heterogeneous and dynamic nature of the metacomputing environment p oses new challenges for developers of system software parallel to ols and applications In this article we introduce Globus a system that we are developing to address these challenges The Globus system is intended to achieve a vertically integrated treatment of application middleware and network A lowlevel toolkit provides basic mechanisms such as communication authentication network information and data access These mechanisms are used to construct various higherlevel metacomputing services such as parallel programming to ols and schedulers Our longterm goal is to build an Adaptive Wide Area Resource Environment AWARE an integrated set of higherlevel services that enable applications to adapt to heterogeneous and dynamically changing meta computing environments Preliminary versions of Globus comp onents were deployed successfully as part of the IWAY networking exp eriment Introduction New classes of highp erformance applications are b eing developed
    [Show full text]
  • Using Metacomputing Tools to Facilitate Large Scale Analyses Of
    Pacific Symposium on Biocomputing 6:360-371 (2001) USING METACOMPUTING TOOLS TO FACILITATE LARGE- SCALE ANALYSES OF BIOLOGICAL DATABASES Allison Waugh1, Glenn A. Williams1, Liping Wei2, and Russ B. Altman1 1Stanford Medical Informatics 251 Campus Drive, MSOB X-215, Stanford, CA 94305-5479 {waugh, gaw, altman} @ smi.stanford.edu 2Exelixis, Inc. 260 Littlefield Ave, South San Francisco, CA 94080 [email protected] ABSTRACT Given the high rate at which biological data are being collected and made public, it is essential that computational tools be developed that are capable of efficiently accessing and analyzing these data. High-performance distributed computing resources can play a key role in enabling large-scale analyses of biological databases. We use a distributed computing environment, LEGION, to enable large-scale computations on the Protein Data Bank (PDB). In particular, we employ the FEATURE program to scan all protein structures in the PDB in search for unrecognized potential cation binding sites. We evaluate the efficiency of LEGION’s parallel execution capabilities and analyze the initial biological implications that result from having a site annotation scan of the entire PDB. We discuss four interesting proteins with unannotated, high-scoring candidate cation binding sites. INTRODUCTION In the last three years the Protein Data Bank (PDB) has increased from 5,811 released atomic coordinate entries to 12,1101. The growth of the PDB is typical of many other biological databases. As these databases increase in size, analyzing their contents in a systematic manner becomes important. Two common analyses are (1) linear scans that examine each entry (such as looking through all DNA sequences for the presence of a new motif), and (2) "all-versus-all" comparisons in which each element is compared with all other elements (such as clustering of structures, as reported in Shindyalov and Bourne2).
    [Show full text]
  • Metacomputing Across Intercontinental Networks S.M
    Future Generation Computer Systems 17 (2001) 911–918 Metacomputing across intercontinental networks S.M. Pickles a,∗, J.M. Brooke a, F.C. Costen a, Edgar Gabriel b, Matthias Müller b, Michael Resch b, S.M. Ord c a Manchester Computing, The University of Manchester, Oxford Road, Manchester M13 9PL, UK b High Performance Computing Center, Stuttgart, Allmandring 30, D-70550 Stuttgart, Germany c NRAL, Jodrell Bank, Macclesfield, Cheshire SK11 9DL, UK Abstract An intercontinental network of supercomputers spanning more than 10 000 miles and running challenging scientific appli- cations was realized at the Supercomputing ’99 (SC99) conference in Portland, OR using PACX-MPI and ATM PVCs. In this paper, we describe how we constructed the heterogeneous cluster of supercomputers, the problems we confronted in terms of multi-architecture and the way several applications handled the specific requirements of a metacomputer. © 2001 Elsevier Science B.V. All rights reserved. Keywords: Metacomputing; High-performance networks; PACX-MPI 1. Overview of the SC99 global network • national high speed networks in each partner coun- try, During SC99 a network connection was set up that • the European high speed research network connected systems in Europe, the US and Japan. For TEN-155, the experiments described in this paper, four super- • a transatlantic ATM connection between the Ger- computers were linked together. man research network (DFN) and the US research network Abilene, • A Hitachi SR8000 at Tsukuba/Japan with 512 pro- • a transpacific ATM research network (TransPAC) cessors (64 nodes). that was connecting Japanese research networks to • A Cray T3E-900/512 at Pittsburgh/USA with 512 STAR-TAP at Chicago.
    [Show full text]
  • Web Based Metacomputing
    Web based metacomputing Tomasz Haupt, Erol Akarsu, Geoffrey Fox, Wojtek Furmanski Northeast Parallel Architecture Center at Syracuse University Abstract Programming tools that are simultaneously sustainable, highly functional, robust and easy to use have been hard to come by in the HPCC arena. This is partially due to the difficulty in developing sophisticated customized systems for what is a relatively small part of the worldwide computing enterprise. Thus we have developed a new strategy - termed HPcc High Performance Commodity Computing[1] - which builds HPCC programming tools on top of the remarkable new software infrastructure being built for the commercial web and distributed object areas. We add high performance to commodity systems using multi tier architecture with GLOBUS metacomputing toolkit as the backend of a middle tier of commodity web and object servers. We have demonstrated the fully functional prototype of WebFlow during Alliance'98 meeting. Introduction Programming tools that are simultaneously sustainable, highly functional, robust and easy to use have been hard to come by in the HPCC arena. This is partially due to the difficulty in developing sophisticated customized systems for what is a relatively small part of the worldwide computing enterprise. Thus we have developed a new strategy - termed HPcc High Performance Commodity Computing[1] - which builds HPCC programming tools on top of the remarkable new software infrastructure being built for the commercial web and distributed object areas. This leverage of a huge industry investment naturally delivers tools with the desired properties with the one (albeit critical) exception that high performance is not guaranteed. Our approach automatically gives the user access to the full range of commercial capabilities (e.g.
    [Show full text]
  • Decision Support System on the Grid 1 Introduction
    The University of Sheffield Decision Support System on The Grid Published at the 2004 Int’l Conference on Knowledge-Based Intelligent Information & Engineering Systems (KES2004), New Zealand. Decision Support System on The Grid M. Ong, X. Ren, G. Allan, V. Kadirkamanathan, HA Thompson and PJ Fleming Rolls-Royce Supported University Technology Centre in Control and Systems Engineering, University of Sheffield, Department of Automatic Control and Systems Engineering, Mappin Street, Sheffield, S1 3JD, United Kingdom. [email protected] Abstract. Aero engines are extremely reliable machines and operational failures are rare. However, currently great effort is being put into reducing the number of in-flight engine shutdowns, aborted take-offs and flight delays through the use of advanced engine health monitoring technology. This represents a benefit to society through reduced delays, reduced anxiety and reduced cost of ownership of aircraft. This is reflected in a change of emphasis within aero engine companies where, instead of selling engines to customers, there is a fundamental shift to adoption of power-by-the-hour contracts. In these contracts, airlines make fixed regular payments based on the hours flown and the engine manufacturer retains responsibility for maintaining the engine. To support this new approach, improvements in in-flight monitoring of engines are being introduced with the collection of much more detailed data on the operation of the engine. At the same time advances have been made in Internet technologies providing a worldwide network of computers that can be used to access and process that data. The explosion of available knowledge within those large datasets also presents its own problems and here it is necessary to work on advanced decision support systems to identify the useful information in the data and provide knowledge-based advice between individual aircraft, airline repair and overhaul bases, world-wide data warehouses and the engine manufacturer.
    [Show full text]
  • Kenneth A. Hawick PD Coddington HA James
    Student: Vidar Tulinius Email: [email protected] Distributed frameworks and parallel algorithms for processing large-scale geographic data Kenneth A. Hawick P. D. Coddington H. A. James Overview Increasing power PC Workstations Mono-processors Geographic information systems (GIS) provide a resource-hungry application domain. Environmental and defense applications need to deal with really large data sets. Outline Metacomputing and grid computing Metacomputing middleware DISCWorld Transparent parallelism Image processing applications Parallel spatial data interpolation Kriging interpolation Spatial data grids Conclusion Parallel techniques Satellite imagery Increased size Improved resolution More frequency channels Data stored as lists of objects Locations Vectors for roads Objects allocated for processing among processors in a load balanced fashion Metacomputing and grid computing Number of resources distributed over a network. High-performance computers Clusters of workstations Disk arrays Tape silos Data archives Data visualization Scientific instruments Metacomputing and grid computing GIS applications adhere well to grid computing Require access to multiple databases Large data sets Require significant computational resources. Metacomputing and grid computing cont. ‘bleeding-edge’ technology Globus Grid Toolkit Low-level Hard to use Requires substantial technical expertise OLDA developed a prototype computational grids. Distributed data archives Distributed computational resources Metacomputing
    [Show full text]
  • Sorcer: Computing and Metacomputing Intergrid
    SORCER: COMPUTING AND METACOMPUTING INTERGRID Michael Soblewski Texas Tech University, Lubbock, TX, U.S.A. [email protected] Keywords: Metacomputing, metaprogramming, grid computing, service-oriented architectures, service-oriented programming. Abstract: This paper investigates grid computing from the point of view three basic computing platforms. Each platform considered consists of virtual compute resources, a programming environment allowing for the development of grid applications, and a grid operating system to execute user programs and to make solving complex user problems easier. Three platforms are discussed: compute grid, metacompute grid and intergrid. Service protocol-oriented architectures are contrasted with service object-oriented architectures, then the current SORCER metacompute grid based on a service object-oriented architecture and a new metacomputing paradigm is described and analyzed. Finally, we explain how SORCER, with its core services and federated file system, can also be used as a traditional compute grid and an intergrid—a hybrid of compute and metacompute grids. 1 INTRODUCTION leveraging the dynamically federating resources. We can distinguish three generic grid platforms, The term “grid computing” originated in the early which are described below. 1990s as a metaphor for accessing computer power Programmers use abstractions all the time. The as easy as an electric power grid. Today there are source code written in programming language is an many definitions of grid computing with a varying abstraction of the machine language. From machine focus on architectures, resource management, language to object-oriented programming, layers of access, virtualization, provisioning, and sharing abstractions have accumulated like geological strata. between heterogeneous compute domains. Thus, Every generation of programmers uses its era’s diverse compute resources across different programming languages and tools to build programs administrative domains form a grid for the shared of next generation.
    [Show full text]
  • Distributed Frameworks and Parallel Algorithms for Processing Large-Scale Geographic Data
    Parallel Computing 29 (2003) 1297–1333 www.elsevier.com/locate/parco Distributed frameworks and parallel algorithms for processing large-scale geographic data Kenneth A. Hawick a,*, P.D. Coddington b,1, H.A. James a a Computer Science Division, School of Informatics, University of Wales, Bangor, North Wales LL57 1UT, UK b Department of Computer Science, University of Adelaide, SA 5005, Australia Received 13 August 2002; accepted 23 April 2003 Abstract The number of applications that require parallel and high-performance computing tech- niques has diminished in recent years due to to the continuing increase in power of PC, work- station and mono-processor systems. However, Geographic information systems (GIS) still provide a resource-hungry application domain that can make good use of parallel techniques. We describe our work with geographical systems for environmental and defence applications and some of the algorithms and techniques we have deployed to deliver high-performance pro- totype systems that can deal with large data sets. GIS applications are often run operationally as part of decision support systems with both a human interactive component as well as large scale batch or server-based components. Parallel computing technology embedded in a distri- buted system therefore provides an ideal and practical solution for multi-site organisations and especially government agencies who need to extract the best value from bulk geographic data. We describe the distributed computing approaches we have used to integrate bulk data and metadata sources and the grid computing techniques we have used to embed parallel services in an operational infrastructure. We describe some of the parallel techniques we have used: for data assimilation; for image and map data processing; for data cluster analysis; and for data mining.
    [Show full text]
  • Unstructured Peer-To-Peer Networks for Sharing Processor Cycles
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 2004 Unstructured Peer-to-Peer Networks for Sharing Processor Cycles Asad Awan Ronaldo A. Ferreira Suresh Jagannathan Purdue University, [email protected] Ananth Y. Grama Purdue University, [email protected] Report Number: 04-033 Awan, Asad; Ferreira, Ronaldo A.; Jagannathan, Suresh; and Grama, Ananth Y., "Unstructured Peer-to-Peer Networks for Sharing Processor Cycles" (2004). Department of Computer Science Technical Reports. Paper 1616. https://docs.lib.purdue.edu/cstech/1616 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. UNSTRUCTURED PEER-TO-PEER NETWORKS FOR SHARING PROCESSOR CYCLES Asad Awan Ronaldo Ferreira Suresh Jagannathan Ananth Grama Department of Computer Sciences Purdue University West Lafayette, IN 47907 CSD TR #04-033 December 2004 Unstructured Peer-to-Peer Networks for Sharing Processor Cycles Asad Awan Ronaldo Ferreira Suresh Jagannathan Ananth Grama Department of Computer Sciences Purdue University West Lafayette, IN 47907 Email: {awan,rf,suresh,ayg}@cs.purdue.edu Abstract vironment for cycle sharing as a major driver for a move towards a P2P solution for harnessing idle CPU cycles of Motivated by the needs and success ofprojects such as Internet hosts. Such an environment would allow any par­ SETI@llOme and genome@home, we propose an architec­ ticipant to submit tasks, in contrast to the inflexible nature turefor a sustainable large-scale peer-to-peer environment of a client-server model. Furthermore, an open P2P system for distributed cycle sharing among Internet hosts.
    [Show full text]