# Skip Graph

date post

07-Mar-2016Category

## Documents

view

3download

0

Embed Size (px)

description

### Transcript of Skip Graph

SKIP LIST & SKIP GRAPHJames AspnesGauri Shah

Many slides have been taken from the original presentation by the authors

*Definition of Skip ListA skip list for a set L of distinct (key, element) items is a series of linked lists L0, L1 , , Lh such that

Each list Li contains the special keys + and -List L0 contains the keys of L in non-decreasing order Each list is a subsequence of the previous one, i.e., L0 L1 Lh

List Lh contains only the two special keys + and -

*Skip List(Idea due to Pugh 90, CACM paper)Dictionary based on a probabilistic data structure.Allows efficient search, insert, and delete operations.Each element in the dictionary typically stores additionaluseful information beside its search key. Example:

[for University of Iowa][for Daily Iowan]

Probabilistic alternative to a balanced tree.

*Skip ListAGJMRWHEADTAILEach node linked at higher level with probability 1/2.Level 0-+

*Another example+31-64+3134-23L0L1L2Each element of Li appears in L.i+1 with probability p.Higher levels denote express lanes.

*Searching in Skip ListSearch for a key x in a skip:

Start at the first position of the top list At the current position P, compare x with y key after P

x = y -> return element (after (P))x > y -> scan forward x < y -> drop down

If we move past the bottom list, then no such key exists

*Example of search for 78L1L2L3+31-64+3134-23566478+313444-122326L0At L1 P is 64, the next element + is bigger than 78, we drop downAt L0, 78 = 78, so the search is over.

*InsertionThe insert algorithm uses randomization to decide in how many levels the new item should be added to the skip list. After inserting the new item at the bottom level flip a coin. If it returns tail, insertion is complete. Otherwise, move to next higher level and insert in this level at the appropriate position, and repeat the coin flip.

*Insertion Example+-1036+-2323+-L0L1L2L0L1L2L3p0p1p2Suppose we want to insert 15Do a search, and find the spot between 10 and 23Suppose the coin come up head three times

*DeletionSearch for the given key . If a position with key is not found, then no such key exists. Otherwise, if a position with key is found (it will be definitely found on the bottom level), then we remove all occurrences of from every level. If the uppermost level is empty, remove it.

*Deletion Example1) Suppose we want to delete 342) Do a search, find the spot between 23 and 453) Remove all occurrences of the key-+4512-+2323-+L0L1L2L0L1L2-+45122334-+34-+2334p0p1p2

*O(1) pointers per nodeAverage number of pointers per node = O(1)

Total number of pointers

= 2.n + 2. n/2 + 2. n/4 + 2. n/8 + = 4.n

So, the average number of pointers per node = 4

*Number of levelsPr[a given element x is above level c log n] = 1/2c log n = 1/nc

Pr[any element is above level c log n] = n. 1/nc = 1/nc-1

So the number of levels = O(log n) with high probability

The number of levels = O(log n) w.h.p

*Search timeConsider a skiplist with two levels L0 and L1. To search a key, first search L1 and then search L0.

Cost (i.e. search time) = length (L1) + n / length (L1) Minimum when length (L1) = n / length (L1).

Thus length(L1) = (n) 1/2, and cost = 2. (n) 1/2(Three lists) minimum cost = 3. (n)1/3(Log n lists) minimum cost = log n. (n) 1/log n = 2.log n

*Skip lists for P2P? Heavily loaded top-level nodes. Easily susceptible to failures. Lacks redundancy.DisadvantagesAdvantages O(log n) expected search time. Retains locality. Dynamic node additions/deletions.

*A Skip GraphA001J001M011G100W101R110Level 1GRWAJM000001011101110100Level 2AGJMRW001001011100110101Level 0Membership vectorsLink at level i to nodes with matching prefix of length i.Think of a tree of skip lists that share lower layers.

*Properties of skip graphsEfficient Searching.Efficient node insertions & deletions.Independence from system size.Locality and range queries.

*Searching: avg. O (log n)Same performance as DHTs.AJMGWRLevel 1GRWAJMLevel 2AGJMRWLevel 0Restricting to the lists containing the starting element of the search, we get a skip list.

*Node Insertion 1A001M011G100W101R110Level 1GRWAM000011101110100Level 2AGMRW001011100110101Level 0Starting at buddy node, find nearest key at level 0.Takes O(log n) time on average.buddynew node

*Node Insertion - 2At each level i, find nearest node with matching prefix of membership vector of length i.A001M011G100W101R110Level 1GRWAM000011101110100Level 2AGMRW001011100110101Level 0Total time for insertion: O(log n)DHTs take: O(log2n)

*Independent of system sizeNo need to know size of keyspace or number of nodes.EZ10EZLevel 0Level 1Old nodes extend membership vector as required with arrivals.DHTs require knowledge of keyspace size initially.

*Locality and range queries Find key < F, > F. Find largest key < x. Find least key > x.

Find all keys in interval [D..O].

Initial node insertion at level 0. D F A I D F A I L O S

*Applications of localitynews:02/13e.g. find latest news from yesterday. find largest key < news: 02/13.news:02/11news:02/12news:02/10news:02/09Level 0DHTs cannot do this easily as hashing destroys locality.e.g. find any copy of some Britney Spears song.britney05britney03britney04britney02britney01Level 0Data ReplicationVersion Control

*So far... Decentralization. Locality properties. O(log n) space per node. O(log n) search, insert, and delete time. Independent of system size.

- *Load balancingInterested in average load on a node u.i.e. the number of searches from source s to destination t that use node u.Theorem: Let dist (u, t) = d. Then the probability that a search from s to t passes through u is < 2/(d+1).where V = {nodes v: u
*ObservationLevel 0Level 1Level 2Node u is on the search path from s to t only if it is inthe skip list formed from the lists of s at each level.s

*Tallest nodesNode u is on the search path from s to t only if it isin T = the set of k tallest nodes in [u..t].uutsu is not on path.u is on path.Heights independent of position, so distances are symmetric.

*Load on node uStart with n nodes. Each node goes to next set with prob. 1/2.We want expected size of T = last non-empty set.Average load on a node is inversely proportional to the distance from the destination.We show that: E[|T|] < 2.Asymptotically: E[|T|] = 1/(ln 2) 2x10-5 1.4427 [Trie analysis]

*Node locationLoad on nodeExperimental result

*Fault toleranceHow do node failures affect skip graph performance?Random failures: Randomly chosen nodes fail. Experimental results.

Adversarial failures: Adversary carefully chooses nodes that fail. Bound on expansion ratio.

*Random faults131072 nodes

cc

1

1

1

1

1

1

1

1

0.999974

1

0.999863

0.999899

0.999371

0.998481

0.995744

0.987674

0.962244

0.883254

0.63556

0.004096

Probability of node failure

Size

Size of largest connected componentas fraction of live nodes

Sheet1

0.001.000000

0.051.000000

0.101.000000

0.151.000000

0.201.000000

0.251.000000

0.301.000000

0.351.000000

0.400.999974

0.451.000000

0.500.999863

0.550.999899

0.600.999371

0.650.998481

0.700.995744

0.750.987674

0.800.962244

0.850.883254

0.900.635560

0.950.004096

Sheet2

Sheet3

*Searches with random failures131072 nodes10000 messages

fail-skip

0

0.01218

0.02967

0.05516

0.09133

0.14379

0.23338

Probability of node failure

Failed searches

Fraction of failed searches

Sheet1

0.00.00000

0.10.01218

0.20.02967

0.30.05516

0.40.09133

0.50.14379

0.60.23338

Sheet2

Sheet3

*Adversarial faultsTheorem: A skip graph with n nodes has expansion ratio = (1/log n).AdAdA = nodes adjacent to A but not in A. To disconnect A all nodes in dA must be removed

Expansion ratio = min |dA|/|A|, 1

*Need for repair mechanismAJMGWRLevel 1GRWAJMLevel 2AGJMRWLevel 0Node failures can leave skip graph in inconsistent state.

*Ideal skip graphLet xRi (xLi) be the right (left) neighbor of x at level i.xLi < x < xRi.xLiRi = xRiLi = x.InvariantIf xLi, xRi exist:

*Basic repairIf a node detects a missing neighbor, it tries to patch the link using other levels.33Also relink at other lower levels.Successor constraints may be violated by node arrivals or failures.

*Constraint violationNeighbor at level i not present at level (i-1).xxLevel i-1Level i..00....01....01....01....00....01....01....01..

*Conclusions Decentralization.

O(log n) space at each node.

O(log n) search time.

Load balancing properties.

Tolerant of random faults.

Similarities with DHTs

*Differences

PropertyDHTsSkip GraphsInsert/Delete timeO(log2n)O(log n)Locality NoYesRepair mechanism?PartialTolerance ofadversarial faults?YesKeyspace sizeReqd.Not reqd.

*Open Problems Evaluate performance in practice. Incorporate geographical proximity. Study multi-dimensional skip graph