Title: CS614: Time Instead of Timeout
1CS614 Time Instead of Timeout
- Ken Birman
- February 6, 2001
2What were after
- A general means for distributed communication
- Letting n processes coordinate an action such as
resource management or even replicating a
database. - Paper was first to tackle this issue
- Includes quite a few ideas, only some of which
are adequately elaborated
3Earlier we saw
- Distributed consensus impossible with even one
faulty process. - Impossible to determine if failed or merely
slow. - Solution 1 Timeouts
- Can easily be added to asynchronous algorithms to
provide guarantees about slowness. - Assumption Timeout implies failure.
4 Asynchronous ? Synchronous
- Start with an asynchronous algorithm that isnt
fault-tolerant - Add timeout to each message receipt
- Assumes bounds on the message transmission time
and processing time - Exceeding the bound implies failure
- Easy to bullet-proof a protocol.
- Practical if bounds are very conservative
5Example Resource Allocation
P
I want Resource X
Yes / No, In Use
Q
Timeout 2d
6Null messages
- Notice that if a message doesnt contain real
data, we can sometimes skip sending it - For example if resource isnt in use, I could
skip sending the reply and after d time interpret
your inaction as a NULL message - Lamport is very excited by this option
- A system might send billions of NULL messages per
second! And do nothing on receiving them!!
Billions and billions
7Another Synchronous System
- Round Based
- Each round characterized by time needed to
receive and process all messages.
8Lamports version
- Use Physical Clocks
- Also fault-tolerant realtime atomic broadcast
- Assumptions about time lead to conclusions other
than failure - Passage of time can also have positive value
- Provides generality for distributed computing
problems - State machines
- Resource acquisition and locking
- Expense?
9Assumptions
- Bounded message delay d
- Requires bandwidth guarantees.
- A message delayed by gt d treated as failure.
- Clock Synchronization
- Clock times differ by less than e.
- Use clock synchronization algorithms (could be
costly revisit in next lecture). - Any process can determine message origin (e.g.
using HMAC signatures) - Network cannot be partitioned
10An Algorithm
- If send message queue not empty
- Send m with timestamp Ti
- If receive message queue not empty
- If queue contains exactly one message m
- from j with timestamp Ti - (d e)
- Then Received Message m
- Else Received Message NULL
- Implies ? (d e)
11Example
Ti
Ti ?
i
Message M
Tj
Tj ?
j
Tj
Tj ?
j
e
12More
- This can be expressed more elegantly as a
broadcast algorithm (more later). - Can inductively extend definition to allow for
routing across path of length n - ? (nd e)
- To tolerate f failstop failures, will need f 1
disjoint paths. - To tolerate f Byzantine Failures, will need
2f 1 disjoint paths. - Transmitting NULL message easy do nothing.
13Even More
- For good guarantees, need close synchronization.
- Message arrives Tmessage- e, , Tmessage d e
- Thus, need to wait (d e).
14Synchronization required?
- A means to reliably broadcast to all other
processes. - For process P broadcasting message M at time Tp,
every (correct) process must receive the message
at time Tp ? - For correct j, j, receive by Tj ? and Tj ?,
respectively, or neither does.
15 Atomic Broadcast
- Atomicity
- All correct processors receives same message.
- Same order
- All messages delivered in same order to all
processors. - Termination
- All updates delivered by T ?.
16Lamports Assumption
- Somebody implements Atomic Broadcast black box.
- Next slide summarizes options
- Lamport briefly explains that previous point to
point algorithm is strong enough. - Only assumes ability to send along a path
correctly.
17Atomic Broadcast CASD
- Describes 3 atomic broadcast algorithms.
- All based on Diffusion (Flooding)
- Varying degrees of protection
- 1. Tolerant of omission failures
- ? pd dd e
- 2. Works in presence of Clock Failures
- ? p(d e ) dd e
- 3. Works in presence of Byzantine Failures
- ? p(d e ) dd e
- d much larger than previous for message
authentication
F. Cristian, H. Aghali, R. Strong and D. Dolev,
"Atomic Broadcast From Simple Message Diffusion
to Byzantine Agreement", in Proc. 15th Int. Symp.
on Fault-Tolerant Computing. June 1985.
18State Machine
- General model for computation (State Machine
Computer!) - Describe computation in terms of state
transformations on the state
19State Machines
- Multiple replicas in lock-step
- Number of replicas bounded (below) by
fault-tolerance objectives - Failstop model
- Failover, gt f 1 replicas
- Byzantine model
- Voting, gt 2f 1 replicas
20State MachineImplementation
- Let CLOCK current time
- While ( TRUE )
- Execute MessageCLOCK ?
- Execute Local Processing(CLOCK)
- Generate and Send MessageCLOCK
- If there exist multiple messages with same time
stamp, create an ordering based on sending
process.
21State Machine (Cont.)
- If we use our broadcast algorithm, all processes
will get message by Tsender ? - Using the sending process id to break ties
ensures everyone executes messages in same order.
22State Machines for Distributed Applications
- Resource allocation
- All processes maintain list of which process has
resource locked. - Lock expires after ? seconds
- Requests for resource are broadcast to all
- Rules govern who is granted lock (followed by all
correct processes) - Ensure no starvation
- Maintain consistency of resource locking
23Example Resource Allocation
Ti
i
Request R
Request R
Tj
j
Request R
Tj
j
Wait Time ?
24Comparison
- No explicit acknowledgement needed
- Would be needed in traditional asynchronous
algorithm - But here, requesting process knows that any
conflicting request would arrive within T ?
window.
25Key
- Non-occurrence of event (non-request) tells us of
info we can safely lock the resource! - Cost is the delay, as message sits in holding
pen. - Concern about scalability in n
- We always see n requests in each ? time period,
so ? will grow in n. Not addressed - Must bound request processing time so that all
can be satisfied (else could starve process with
higher id hence lower priority)
26More on Comparison Resource Allocation
- Timeout
- Max Delay 2d
- Average Delay 2dexp
- Messages n dependent on failure mode
- Time Lamport
- Max Delay
- ? d e
- Average Delay
- ? d e
- Messages dependent on failure mode
- l
- But is request processing time the real issue?
27Characterizing e
- e proportional to dvar
- Low level algorithms can achieve good clock
synchronization. - dvar small for low-level algorithms
- dvar large for high-level algorithms
- Variance added by traversing low levels of
protocol stack
28Summary
- Expressing application as state machine
transitions can easily be transferred to
distributed algorithm. - Event based implementation can be easily created
from transitions.
29Other State Machine uses
- Distributed Semaphores
- Transaction Commit
- State Machine synchronization core on top of
distributed apps. - Entire application need not be distributed state
machine.
30Ideas in this paper
- Coordination and passing of time modeled as
synchronous execution of steps of a state machine - Absence of a message becomes NULL message after
delay ? - Notion of dynamic membership (vague)
- Broadcast to drive state machine (vague)
- State transfer for restart (vague)
- Scalability in n (not addressed)
- Fault-tol. (ignores application semantics)
- ?-T behavior (real-time mechanism)
31Discussion
- How far can we take the state machine model?
- Can it be made to scale well?
- Extreme clock synchronization dependence,
practical? Worth it? - Possibly large waiting time for each message,
dependent upon worst case message delivery
latency