Skip to main content

1+1 Protection of Overlay Distributed Computing Systems: Modeling and Optimization

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7336))

Abstract

The development of the Internet and growing amount of data produced in various systems have triggered the need to construct distributed computing systems required to process the data. Since in some cases, results of computations are of great importance, (e.g., analysis of medical data, weather forecast, etc.), survivability of computing systems, i.e., capability to provide continuous service after failures of network elements, becomes a significant issue. Most of previous works in the field of survivable computing systems consider a case when a special dedicated optical network is used to connect computing sites. The main novelty of this work is that we focus on overlay-based distributed computing systems, i.e., in which the computing system works as an overlay on top of an underlying network, e.g., Internet. In particular, we present a novel protection scheme for such systems. The main idea of the proposed protection approach is based on 1+1 protection method developed in the context of connection-oriented networks. A new ILP model for joint optimization of task allocation and link capacity assignment in survivable overlay distributed computing systems is introduced. The objective is to minimize the operational (OPEX) cost of the system including processing costs and network capacity costs. Moreover, two heuristic algorithms are proposed and evaluated. The results show that provisioning protection to all tasks increases the OPEX cost by 110% and 106% for 30-node and 200-node systems, respectively, compared to the case when tasks are not protected.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Travostino, A., Mambretti, J., Karmous-Edwards, G. (eds.): Grid Networks Enabling Grids with Advanced Communication Technology. Wiley (2006)

    Google Scholar 

  2. Nabrzyski, J., Schopf, J., Węglarz, J. (eds.): Grid Resource Management: State of the Art and Future Trends. Kluwer Academic Publishers (2004)

    Google Scholar 

  3. Milojicic, D., et al.: Peer to Peer computing. HP Laboratories Palo Alto, HPL-2002-57 (2002)

    Google Scholar 

  4. Wilkinson, B.: Grid Computing: Techniques and Applications. Chapman & Hall/CRC Computational Science (2009)

    Google Scholar 

  5. Grover, W.D.: Mesh-Based Survivable Networks: Options and Strategies for Optical, MPLS, SONET, and ATM Networking. Prentice Hall PTR, New Jersey (2003)

    Google Scholar 

  6. Ramamurthy, S., et al.: Survivable WDM Mesh Networks. IEEE/OSA Journal of Lightwave Technology 21(4), 870–883 (2003)

    Article  Google Scholar 

  7. Pióro, M., Medhi, D.: Routing, Flow and Capacity Design in Communication and Computer Networks. Morgan Kaufmann (2004)

    Google Scholar 

  8. Molisz, W., Rak, J.: Region Protection/Restoration Scheme in Survivable Networks. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 442–447. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Ramamurthy, S., Mukherjee, B.: Survivable WDM Mesh Networks, Part I – Protection. In: Proc. IEEE INFOCOM 1999, vol. 17(2), pp. 43–48 (1999)

    Google Scholar 

  10. Develder, C., et al.: Survivable Optical Grid Dimensioning: Anycast Routing with Server and Network Failure Protection. In: Proc. of IEEE ICC 2011, pp. 1–5 (2011)

    Google Scholar 

  11. Thysebaert, P., et al.: Scalable Dimensioning of Resilient Lambda Grids. Future Generation Computer Systems 24(6), 549–560 (2008)

    Article  Google Scholar 

  12. Buysse, J., De Leenheer, M., Dhoedt, B., Develder, C.: Providing Resiliency for Optical Grids by Exploiting Relocation: A Dimensioning Study Based on ILP. Computer Communications 34(12), 1389–1398 (2011)

    Article  Google Scholar 

  13. Jaumard, B., Shaikh, A.: Maximizing Access to IT Services on Resilient Optical Grids. In: Proc. of 3rd International Workshop on Reliable Networks Design and Modeling, RNDM 2011, pp. 151–156 (2011)

    Google Scholar 

  14. Rak, J.: Fast Service Recovery under Shared Protection in WDM Networks. IEEE/OSA Journal of Lightwave Technology 30(1), 84–95 (2012)

    Article  Google Scholar 

  15. Vasseur, J.P., Pickavet, M., Demeester, P.: Network Recovery. Elsevier (2004)

    Google Scholar 

  16. Luo, H., Li, L., Yu, H.: Insights for Segment Protection in Survivable WDM Mesh Networks with SRLG Constraints. In: Proc. IEEE GLOBECOM 2008, pp. 1–5 (2006)

    Google Scholar 

  17. Tapolcai, J., Ho, P.-H., Verchere, D., Cinkler, T., Haque, A.: A New Shared Segment Protection Method for Survivable Networks with Guaranteed Recovery Time. IEEE Transactions on Reliability 57(2), 272–282 (2008)

    Article  Google Scholar 

  18. Rak, J.: Capacity Efficient Shared Protection and Fast Restoration Scheme in Self-Configured Optical Networks. In: Keller, A., Martin-Flatin, J.-P. (eds.) SelfMan 2006. LNCS, vol. 3996, pp. 142–156. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. Song, L., Mukherjee, B.: Accumulated-Downtime-Oriented Restoration Strategy With Service Differentiation in Survivable WDM Mesh Networks. IEEE/OSA Journal of Optical Communications and Networking 1(1), 113–124 (2009)

    Article  Google Scholar 

  20. Guo, L., Li, L.: A Novel Survivable Routing Algorithm With Partial Shared-Risk Link Groups (SRLG)-Disjoint Protection Based on Differentiated Reliability Constraints in WDM Optical Mesh Networks. IEEE/OSA Journal of Lightwave Technology 25(6), 1410–1415 (2007)

    Article  Google Scholar 

  21. Kacprzak, T., Walkowiak, K., Woźniak, M.: Optimization of Overlay Distributed Computing Systems for Multiple Classifier System – Heuristic Approach. Logic Jnl IGPL (2011), doi:10.1093/jigpal/jzr020

    Google Scholar 

  22. Shen, X., Yu, H., Buford, J., Akon, M. (eds.): Handbook of Peer-to-Peer Networking. Springer (2009)

    Google Scholar 

  23. Anderson, D.: BOINC: A System for Public-Resource Computing and Storage. In: Proc. of the Fifth IEEE/ACM International Workshop on Grid Computing, pp. 4–10 (2004)

    Google Scholar 

  24. Akbari, B., Rabiee, H.R., Ghanbari, M.: An Optimal Discrete Rate Allocation for Overlay Video Multicasting. Computer Communications 31(3), 551–562 (2008)

    Article  Google Scholar 

  25. Zhu, Y., Li, B.: Overlay Networks with Linear Capacity Constraints. IEEE Transactions on Parallel and Distributed Systems 19(2), 159–173 (2008)

    Article  Google Scholar 

  26. ILOG AMPL/CPLEX software, http://www.ilog.com/products/cplex/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Walkowiak, K., Rak, J. (2012). 1+1 Protection of Overlay Distributed Computing Systems: Modeling and Optimization. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2012. ICCSA 2012. Lecture Notes in Computer Science, vol 7336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31128-4_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31128-4_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31127-7

  • Online ISBN: 978-3-642-31128-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics