-
Nezha: Deployable and High-Performance Consensus Using Synchronized Clocks
Authors:
**kun Geng,
Anirudh Sivaraman,
Balaji Prabhakar,
Mendel Rosenblum
Abstract:
This paper presents a high-performance consensus protocol, Nezha, which can be deployed by cloud tenants without any support from their cloud provider. Nezha bridges the gap between protocols such as Multi-Paxos and Raft, which can be readily deployed and protocols such as NOPaxos and Speculative Paxos, that provide better performance, but require access to technologies such as programmable switch…
▽ More
This paper presents a high-performance consensus protocol, Nezha, which can be deployed by cloud tenants without any support from their cloud provider. Nezha bridges the gap between protocols such as Multi-Paxos and Raft, which can be readily deployed and protocols such as NOPaxos and Speculative Paxos, that provide better performance, but require access to technologies such as programmable switches and in-network prioritization, which cloud tenants do not have. Nezha uses a new multicast primitive called deadline-ordered multicast (DOM). DOM uses high-accuracy software clock synchronization to synchronize sender and receiver clocks. Senders tag messages with deadlines in synchronized time; receivers process messages in deadline order, on or after their deadline.
We compare Nezha with Multi-Paxos, Fast Paxos, Raft, a NOPaxos version we optimized for the cloud, and 2 recent protocols, Domino and TOQ-EPaxos, that use synchronized clocks. In throughput, Nezha outperforms all baselines by a median of 5.4x (range: 1.9-20.9x). In latency, Nezha outperforms five baselines by a median of 2.3x (range: 1.3-4.0x), with one exception: it sacrifices 33% latency compared with our optimized NOPaxos in one test. We also prototype two applications, a key-value store and a fair-access stock exchange, on top of Nezha to show that Nezha only modestly reduces their performance relative to an unreplicated system. Nezha is available at https://github.com/Steamgjk/Nezha.
△ Less
Submitted 24 March, 2023; v1 submitted 3 June, 2022;
originally announced June 2022.
-
$λ$-NIC: Interactive Serverless Compute on Programmable SmartNICs
Authors:
Sean Choi,
Muhammad Shahbaz,
Balaji Prabhakar,
Mendel Rosenblum
Abstract:
There is a growing interest in serverless compute, a cloud computing model that automates infrastructure resource-allocation and management while billing customers only for the resources they use. Workloads like stream processing benefit from high elasticity and fine-grain pricing of these serverless frameworks. However, so far, limited concurrency and high latency of server CPUs prohibit many int…
▽ More
There is a growing interest in serverless compute, a cloud computing model that automates infrastructure resource-allocation and management while billing customers only for the resources they use. Workloads like stream processing benefit from high elasticity and fine-grain pricing of these serverless frameworks. However, so far, limited concurrency and high latency of server CPUs prohibit many interactive workloads (e.g., web servers and database clients) from taking advantage of serverless compute to achieve high performance.
In this paper, we argue that server CPUs are ill-suited to run serverless workloads (i.e., lambdas) and present $λ$-NIC, an open-source framework, that runs interactive workloads directly on a SmartNIC; more specifically an ASIC-based NIC that consists of a dense grid of Network Processing Unit (NPU) cores. $λ$-NIC leverages SmartNIC's proximity to the network and a vast array of NPU cores to simultaneously run thousands of lambdas on a single NIC with strict tail-latency guarantees. To ease development and deployment of lambdas, $λ$-NIC exposes an event-based programming abstraction, Match+Lambda, and a machine model that allows developers to compose and execute lambdas on SmartNICs easily. Our evaluation shows that $λ$-NIC achieves up to 880x and 736x improvements in workloads' response latency and throughput, respectively, while significantly reducing host CPU and memory usage.
△ Less
Submitted 26 September, 2019;
originally announced September 2019.
-
The Global Anchor Method for Quantifying Linguistic Shifts and Domain Adaptation
Authors:
Zi Yin,
Vin Sachidananda,
Balaji Prabhakar
Abstract:
Language is dynamic, constantly evolving and adapting with respect to time, domain or topic. The adaptability of language is an active research area, where researchers discover social, cultural and domain-specific changes in language using distributional tools such as word embeddings. In this paper, we introduce the global anchor method for detecting corpus-level language shifts. We show both theo…
▽ More
Language is dynamic, constantly evolving and adapting with respect to time, domain or topic. The adaptability of language is an active research area, where researchers discover social, cultural and domain-specific changes in language using distributional tools such as word embeddings. In this paper, we introduce the global anchor method for detecting corpus-level language shifts. We show both theoretically and empirically that the global anchor method is equivalent to the alignment method, a widely-used method for comparing word embeddings, in terms of detecting corpus-level language shifts. Despite their equivalence in terms of detection abilities, we demonstrate that the global anchor method is superior in terms of applicability as it can compare embeddings of different dimensionalities. Furthermore, the global anchor method has implementation and parallelization advantages. We show that the global anchor method reveals fine structures in the evolution of language and domain adaptation. When combined with the graph Laplacian technique, the global anchor method recovers the evolution trajectory and domain clustering of disparate text corpora.
△ Less
Submitted 11 December, 2018;
originally announced December 2018.
-
Stable Matchings in Metric Spaces: Modeling Real-World Preferences using Proximity
Authors:
Hossein Karkeh Abadi,
Balaji Prabhakar
Abstract:
Suppose each of $n$ men and $n$ women is located at a point in a metric space. A woman ranks the men in order of their distance to her from closest to farthest, breaking ties at random. The men rank the women similarly. An interesting problem is to use these ranking lists and find a stable matching in the sense of Gale and Shapley. This problem formulation naturally models preferences in several r…
▽ More
Suppose each of $n$ men and $n$ women is located at a point in a metric space. A woman ranks the men in order of their distance to her from closest to farthest, breaking ties at random. The men rank the women similarly. An interesting problem is to use these ranking lists and find a stable matching in the sense of Gale and Shapley. This problem formulation naturally models preferences in several real world applications; for example, dating sites, room renting/letting, ride hailing and labor markets. Two key questions that arise in this setting are: (a) When is the stable matching unique without resorting to tie breaks? (b) If $X$ is the distance between a randomly chosen stable pair, what is the distribution of $X$ and what is $E(X)$?
We study dating sites and ride hailing as prototypical examples of stable matchings in discrete and continuous metric spaces, respectively. In the dating site model, each person is assigned to a point on the $k$-dimensional hypercube based on their answers to a set of binary $k$ questions. We consider two different metrics on the hypercube: Hamming and Weighted Hamming. Under both metrics, there are exponentially many stable matchings when $k = \lfloor\log n\rfloor$. There is a unique stable matching, with high probability, under the Hamming distance when $k = Ω(n^6)$, and under the Weighted Hamming distance when $k > (2+ε) \log n$ for some $ε>0$. In the ride hailing model, passengers and cabs are modeled as points on the line and matched based on Euclidean distance. Assuming the locations of the passengers and cabs are independent Poisson processes of different intensities, we derive bounds on the distribution of $X$ in terms of busy periods at a last-come-first-served preemptive-resume (LCFS-PR) queue.
△ Less
Submitted 14 October, 2017;
originally announced October 2017.
-
Dimensionality Reduction of Affine Variational Inequalities Using Random Projections
Authors:
Bharat Prabhakar,
Ankur A. Kulkarni
Abstract:
We present a method for dimensionality reduction of an affine variational inequality (AVI) defined over a compact feasible region. Centered around the Johnson Lindenstrauss lemma, our method is a randomized algorithm that produces with high probability an approximate solution for the given AVI by solving a lower-dimensional AVI. The algorithm allows the lower dimension to be chosen based on the qu…
▽ More
We present a method for dimensionality reduction of an affine variational inequality (AVI) defined over a compact feasible region. Centered around the Johnson Lindenstrauss lemma, our method is a randomized algorithm that produces with high probability an approximate solution for the given AVI by solving a lower-dimensional AVI. The algorithm allows the lower dimension to be chosen based on the quality of approximation desired. The algorithm can also be used as a subroutine in an exact algorithm for generating an initial point close to the solution. The lower-dimensional AVI is obtained by appropriately projecting the original AVI on a randomly chosen subspace. The lower-dimensional AVI is solved using standard solvers and from this solution an approximate solution to the original AVI is recovered through an inexpensive process. Our numerical experiments corroborate the theoretical results and validate that the algorithm provides a good approximation at low dimensions and substantial savings in time for an exact solution.
△ Less
Submitted 8 November, 2014; v1 submitted 20 August, 2014;
originally announced August 2014.
-
Decay of tails at equilibrium for FIFO join the shortest queue networks
Authors:
Maury Bramson,
Yi Lu,
Balaji Prabhakar
Abstract:
In join the shortest queue networks, incoming jobs are assigned to the shortest queue from among a randomly chosen subset of $D$ queues, in a system of $N$ queues; after completion of service at its queue, a job leaves the network. We also assume that jobs arrive into the system according to a rate-$αN$ Poisson process, $α<1$, with rate-1 service at each queue. When the service at queues is expone…
▽ More
In join the shortest queue networks, incoming jobs are assigned to the shortest queue from among a randomly chosen subset of $D$ queues, in a system of $N$ queues; after completion of service at its queue, a job leaves the network. We also assume that jobs arrive into the system according to a rate-$αN$ Poisson process, $α<1$, with rate-1 service at each queue. When the service at queues is exponentially distributed, it was shown in Vvedenskaya et al. [Probl. Inf. Transm. 32 (1996) 15-29] that the tail of the equilibrium queue size decays doubly exponentially in the limit as $N\rightarrow\infty$. This is a substantial improvement over the case D=1, where the queue size decays exponentially. The reasoning in [Probl. Inf. Transm. 32 (1996) 15-29] does not easily generalize to jobs with nonexponential service time distributions. A modularized program for treating general service time distributions was introduced in Bramson et al. [In Proc. ACM SIGMETRICS (2010) 275-286]. The program relies on an ansatz that asserts, in equilibrium, any fixed number of queues become independent of one another as $N\rightarrow\infty$. This ansatz was demonstrated in several settings in Bramson et al. [Queueing Syst. 71 (2012) 247-292], including for networks where the service discipline is FIFO and the service time distribution has a decreasing hazard rate. In this article, we investigate the limiting behavior, as $N\rightarrow \infty$, of the equilibrium at a queue when the service discipline is FIFO and the service time distribution has a power law with a given exponent $-β$, for $β>1$. We show under the above ansatz that, as $N\rightarrow\infty$, the tail of the equilibrium queue size exhibits a wide range of behavior depending on the relationship between $β$ and $D$. In particular, if $β>D/(D-1)$, the tail is doubly exponential and, if $β<D/(D-1)$, the tail has a power law. When $β=D/(D-1)$, the tail is exponentially distributed.
△ Less
Submitted 9 September, 2013; v1 submitted 22 June, 2011;
originally announced June 2011.
-
Detailed Network Measurements Using Sparse Graph Counters: The Theory
Authors:
Yi Lu,
Andrea Montanari,
Balaji Prabhakar
Abstract:
Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that many counters be updated at a very high speed; however, the large fast memories needed for storing the counters are prohibitively expensive. Therefore, current approaches aim to obtain approximate flow counts; that is, to det…
▽ More
Measuring network flow sizes is important for tasks like accounting/billing, network forensics and security. Per-flow accounting is considered hard because it requires that many counters be updated at a very high speed; however, the large fast memories needed for storing the counters are prohibitively expensive. Therefore, current approaches aim to obtain approximate flow counts; that is, to detect large elephant flows and then measure their sizes.
Recently the authors and their collaborators have developed [1] a novel method for per-flow traffic measurement that is fast, highly memory efficient and accurate. At the core of this method is a novel counter architecture called "counter braids.'' In this paper, we analyze the performance of the counter braid architecture under a Maximum Likelihood (ML) flow size estimation algorithm and show that it is optimal; that is, the number of bits needed to store the size of a flow matches the entropy lower bound. While the ML algorithm is optimal, it is too complex to implement. In [1] we have developed an easy-to-implement and efficient message passing algorithm for estimating flow sizes.
△ Less
Submitted 7 October, 2007; v1 submitted 2 October, 2007;
originally announced October 2007.
-
On entropy for mixtures of discrete and continuous variables
Authors:
Chandra Nair,
Balaji Prabhakar,
Devavrat Shah
Abstract:
Let $X$ be a discrete random variable with support $S$ and $f : S \to S^\prime$ be a bijection. Then it is well-known that the entropy of $X$ is the same as the entropy of $f(X)$. This entropy preservation property has been well-utilized to establish non-trivial properties of discrete stochastic processes, e.g. queuing process \cite{prg03}. Entropy as well as entropy preservation is well-defined…
▽ More
Let $X$ be a discrete random variable with support $S$ and $f : S \to S^\prime$ be a bijection. Then it is well-known that the entropy of $X$ is the same as the entropy of $f(X)$. This entropy preservation property has been well-utilized to establish non-trivial properties of discrete stochastic processes, e.g. queuing process \cite{prg03}. Entropy as well as entropy preservation is well-defined only in the context of purely discrete or continuous random variables. However for a mixture of discrete and continuous random variables, which arise in many interesting situations, the notions of entropy and entropy preservation have not been well understood.
In this paper, we extend the notion of entropy in a natural manner for a mixed-pair random variable, a pair of random variables with one discrete and the other continuous. Our extensions are consistent with the existing definitions of entropy in the sense that there exist natural injections from discrete or continuous random variables into mixed-pair random variables such that their entropy remains the same. This extension of entropy allows us to obtain sufficient conditions for entropy preservation in mixtures of discrete and continuous random variables under bijections.
The extended definition of entropy leads to an entropy rate for continuous time Markov chains. As an application, we recover a known probabilistic result related to Poisson process. We strongly believe that the frame-work developed in this paper can be useful in establishing probabilistic properties of complex processes, such as load balancing systems, queuing network, caching algorithms.
△ Less
Submitted 17 January, 2007; v1 submitted 14 July, 2006;
originally announced July 2006.
-
Belief Propagation Based Multi--User Detection
Authors:
Andrea Montanari,
Balaji Prabhakar,
David Tse
Abstract:
We apply belief propagation (BP) to multi--user detection in a spread spectrum system, under the assumption of Gaussian symbols. We prove that BP is both convergent and allows to estimate the correct conditional expectation of the input symbols. It is therefore an optimal --minimum mean square error-- detection algorithm. This suggests the possibility of designing BP detection algorithms for mor…
▽ More
We apply belief propagation (BP) to multi--user detection in a spread spectrum system, under the assumption of Gaussian symbols. We prove that BP is both convergent and allows to estimate the correct conditional expectation of the input symbols. It is therefore an optimal --minimum mean square error-- detection algorithm. This suggests the possibility of designing BP detection algorithms for more general systems. As a byproduct we rederive the Tse-Hanly formula for minimum mean square error without any recourse to random matrix theory.
△ Less
Submitted 22 May, 2006; v1 submitted 16 October, 2005;
originally announced October 2005.