Knowledge (XXG)

Gossip protocol

Source 📝

372:. These compute a network-wide aggregate by sampling information at the nodes in the network and combining the values to arrive at a system-wide value – the largest value for some measurement nodes are making, smallest, etc. The key requirement is that the aggregate must be computable by fixed-size pairwise information exchanges; these typically terminate after a number of rounds of information exchange logarithmic in the system size, by which time an all-to-all information flow pattern will have been established. As a side effect of aggregation, it is possible to solve other kinds of problems using gossip; for example, there are gossip protocols that can arrange the nodes in a gossip overlay into a list sorted by node-id (or some other attribute) in logarithmic time using aggregation-style exchanges of information. Similarly, there are gossip algorithms that arrange nodes into a tree and compute aggregates such as "sum" or "count" by gossiping in a pattern biased to match the tree structure. 286:
that he believes that Charlie dyes his mustache. At the next meeting, Bob tells Alice, while Dave repeats the idea to Eve. After each water cooler rendezvous, the number of individuals who have heard the rumor roughly doubles (though this doesn't account for gossiping twice to the same person; perhaps Dave tries to tell the story to Frank, only to find that Frank already heard it from Alice). Computer systems typically implement this type of protocol with a form of random "peer selection": with a given frequency, each machine picks another machine at random and shares any rumors.
66: 136: 381:
support any classic protocol or implement any classical distributed service. However, such a broadly inclusive interpretation is rarely intended. More typically gossip protocols are those that specifically run in a regular, periodic, relatively lazy, symmetric and decentralized manner; the high degree of symmetry among nodes is particularly characteristic. Thus, while one could run a
25: 183: 428:
It follows that within logarithmic time in the size of the network (the number of agents), any new search string will have reached all agents. Within an additional delay of the same approximate length, every agent will learn where the best match can be found. In particular, the agent that started the
414:
Periodically, at some rate (let's say ten times per second, for simplicity), each agent picks some other agent at random, and gossips with it. Search strings known to A will now also be known to B, and vice versa. In the next "round" of gossip A and B will pick additional random peers, maybe C and D.
380:
often use gossip-like information exchanges. A gossip substrate can be used to implement a standard routed network: nodes "gossip" about traditional point-to-point messages, effectively pushing traffic through the gossip layer. Bandwidth permitting, this implies that a gossip system can potentially
285:
can be illustrated by the analogy of office workers spreading rumors. Let's say each hour the office workers congregate around the water cooler. Each employee pairs off with another, chosen at random, and shares the latest gossip. At the start of the day, Dave starts a new rumor: he comments to Bob
432:
For example, in a network with 25,000 machines, we can find the best match after about 30 rounds of gossip: 15 to spread the search string and 15 more to discover the best match. A gossip exchange could occur as often as once every tenth of a second without imposing undue load, hence this form of
392:
is sometimes used to describe protocols that achieve exponentially rapid spread of information. For this purpose, a protocol must propagate any new information to all nodes that will be affected by the information within time logarithmic in the size of the system (the "mixing time" must be
459:
Gossip protocols can be used to propagate information in a manner rather similar to the way that a viral infection spreads in a biological population. Indeed, the mathematics of epidemics are often used to model the mathematics of gossip communication. The term
363:
continuously gossip about information associated with the participating nodes. Typically, propagation latency isn't a concern, perhaps because the information in question changes slowly or there is no significant penalty for acting upon slightly stale
496:
algorithm, instead of talking to random nodes, information is spread by talking only to neighbouring nodes. There are a number of algorithms that use similar ideas. A key requirement when designing such protocols is that the neighbor set trace out an
410:
To start the search, a user would ask the local agent to begin to gossip about the search string. (We're assuming that agents either start with a known list of peers, or retrieve this information from some kind of a shared
401:
Suppose that we want to find the object that most closely matches some search pattern, within a network of unknown size, but where the computers are linked to one another and where each machine is running a small
446:
or with other types of data in consistent states, counting the number of nodes in a network of unknown size, spreading news robustly, organizing nodes according to some structuring policy, building so-called
421:
Agents also gossip about the best match, to date. Thus, if A gossips with B, after the interaction, A will know of the best matches known to B, and vice versa. Best matches will "spread" through the network.
357:. They report events, but the gossip occurs periodically and events don't actually trigger the gossip. One concern here is the potentially high latency from when the event occurs until it is delivered. 985:
Active and Passive Techniques for Group Size Estimation in Large-Scale and Dynamic Distributed Systems. Dionysios Kostoulas, Dimitrios Psaltoulis, Indranil Gupta, Ken Birman, Al Demers. Elsevier
436:
In this scenario, searches might automatically age out of the network after, say, 10 seconds. By then, the initiator knows the answer and there is no point in further gossip about that search.
993: 746:
Gupta, Indranil; Birman, Ken; Linga, Prakash; Demers, Al; Van Renesse, Robbert (2003). "Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead".
415:
This round-by-round doubling phenomenon makes the protocol very robust, even if some messages get lost, or some of the selected peers are the same or already know about the search string.
965: 961:
Proximity-aware superpeer overlay topologies. Gian Paolo Jesi, Alberto Montresor, and Ozalp Babaoglu. IEEE Transactions on Network and Service Management, 4(2):74–83, September 2007.
347:(or rumor-mongering protocols). These use gossip to spread information; they basically work by flooding agents in the network, but in a manner that produces bounded worst-case loads: 425:
If the messages might get large (for example, if many searches are active all at the same time), a size limit should be introduced. Also, searches should "age out" of the network.
1052:
Van Renesse, Robbert; Birman, Kenneth P.; Vogels, Werner (May 2003). "Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining".
489:. Each class contains tens or even hundreds of protocols, differing in their details and performance properties but similar at the level of the guarantees offered to users. 95: 1000: 772:
Systematic Design of P2P Technologies for Distributed Systems. Indranil Gupta, Global Data Management, eds: R. Baldoni, G. Cortese, F. Davide and A. Melpignano, 2006.
294:
There are probably hundreds of variants of specific gossip-like protocols because each use-scenario is likely to be customized to the organization's specific needs.
992:
Build One, Get One Free: Leveraging the Coexistence of Multiple P2P Overlay Networks. Balasubramaneyam Maniymaran, Marin Bertier and Anne-Marie Kermarrec. Proc.
999:
Peer counting and sampling in overlay networks: random walk methods. Laurent Massoulié, Erwan Le Merrer, Anne-Marie Kermarrec, Ayalvadi Ganesh. Proc. 25th ACM
1045: 1006:
Chord on Demand. Alberto Montresor, Márk Jelasity, and Ozalp Babaoglu. Proc. 5th Conference on Peer-to-Peer Computing (P2P), Konstanz, Germany, August 2005.
979: 964:
X-BOT: A Protocol for Resilient Optimization of Unstructured Overlays. João Leitão, João Marques, José Pereira, Luís Rodrigues. Proc. 28th IEEE
1011: 823:
Gupta, I.; Kermarrec, A.-M.; Ganesh, A.J. (July 2006). "Efficient and adaptive epidemic-style protocols for reliable and scalable multicast".
1174: 905: 805: 763: 649: 603: 547: 1081:
Voulgaris, S.; Kermarrec, A.-M.; Massoulie, L.; Van Steen, M. (2004). "Exploiting semantic proximity in peer-to-peer content searching".
376:
Many protocols that predate the earliest use of the term "gossip" fall within this rather inclusive definition. For example, Internet
530:
Demers, Alan; Greene, Dan; Hauser, Carl; Irish, Wes; Larson, John (1987). "Epidemic algorithms for replicated database maintenance".
1108: 320:
There is some form of randomness in the peer selection. Peers might be selected from the full set of nodes or from a smaller set of
240: 222: 117: 52: 1126:
Gupta, Ruchir; Singh, Yatindra Nath (2015). "Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm".
38: 464:
is sometimes employed when describing a software system in which this kind of gossip-based information propagation is employed.
986: 273:
have no central registry and the only way to spread common data is to rely on each member to pass it along to their neighbors.
1199: 1194: 317:
The frequency of the interactions is low compared to typical message latencies so that the protocol costs are negligible.
492:
Some gossip protocols replace the random peer selection mechanism with a more deterministic scheme. For example, in the
321: 148: 78: 634:
Proceedings of the twenty-fourth annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing - PODC '05
200: 193: 88: 82: 74: 978:
Gossip-Based Computation of Aggregate Information. David Kempe, Alin Dobra, Johannes Gehrke. Proc. 44th Annual IEEE
1084:
Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004
382: 99: 328: 1082: 632:
Allavena, André; Demers, Alan; Hopcroft, John E. (2005). "Correctness of a gossip based membership protocol".
418:
On receipt of a search string for the first time, each agent checks its local machine for matching documents.
270: 711: 385:
over a gossip substrate, doing so would be at odds with the spirit, if not the wording, of the definition.
266: 958:
Ordered slicing of very large overlay networks. Márk Jelasity and Anne-Marie Kermarrec. IEEE P2P, 2006.
710:
Eugster, P. Th.; Guerraoui, R.; Handurukande, S. B.; Kouznetsov, P.; Kermarrec, A.-M. (November 2003).
675:
Birman, Kenneth P.; Hayden, Mark; Ozkasap, Oznur; Xiao, Zhen; Budiu, Mihai; Minsky, Yaron (May 1999).
486: 440: 157: 44: 1030: 1153: 1135: 1114: 1069: 1022: 972: 947: 911: 840: 811: 734: 698: 663: 609: 561: 532:
Proceedings of the sixth annual ACM Symposium on Principles of distributed computing - PODC '87
1170: 1104: 924: 901: 801: 759: 655: 645: 599: 553: 543: 474: 308: 1145: 1096: 1088: 1061: 939: 893: 885: 868: 832: 793: 785: 751: 726: 688: 637: 591: 535: 377: 269:
use peer-to-peer gossip to ensure that data is disseminated to all members of a group. Some
853: 782:
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)
482: 448: 261:
is a procedure or process of computer peer-to-peer communication that is based on the way
971:
Spatial gossip and resource location protocols. David Kempe, Jon Kleinberg, Alan Demers.
580: 473:
Gossip protocols are just one class among many classes of networking protocols. See also
493: 135: 586:. In Serugendo, Giovanna Di Marzo; Gleizes, Marie-Pierre; Karageorgos, Anthony (eds.). 498: 204: 1188: 702: 613: 478: 311:
interact, the state of at least one agent changes to reflect the state of the other.
1118: 1073: 1026: 951: 915: 844: 815: 738: 667: 565: 1157: 882:
2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)
880:
Leitao, Joao; Pereira, Jose; Rodrigues, Luis (2007). "Epidemic Broadcast Trees".
872: 755: 301:
The core of the protocol involves periodic, pairwise, inter-process interactions.
595: 443: 199:
The references used may be made clearer with a different or consistent style of
1092: 451:, computing aggregates, sorting the nodes in a network, electing leaders, etc. 1149: 659: 557: 1041: 943: 641: 354: 1065: 730: 693: 676: 590:. Natural Computing Series. Springer Berlin Heidelberg. pp. 139–162. 889: 836: 262: 789: 539: 750:. Lecture Notes in Computer Science. Vol. 2735. pp. 160–169. 509: 504: 304:
The information exchanged during these interactions is of bounded size.
1100: 897: 797: 433:
network search could search a big data center in about three seconds.
340:
It is useful to distinguish two prevailing styles of gossip protocol:
923:
Jelasity, Márk; Montresor, Alberto; Babaoglu, Ozalp (August 2005).
852:
Jelasity, Márk; Montresor, Alberto; Babaoglu, Ozalp (August 2009).
439:
Gossip protocols have also been used for achieving and maintaining
1140: 1040:
Building low-diameter P2P networks. G. Pandurangan, P. Raghavan,
297:
For example, a gossip protocol might employ some of these ideas:
780:: A Membership Protocol for Reliable Gossip-Based Broadcast". 176: 129: 59: 18: 776:
Leitao, Joao; Pereira, Jose; Rodrigues, Luis (2007). "HyPar
854:"T-Man: Gossip-based fast overlay topology construction" 966:
International Symposium on Reliable Distributed Systems
512:, BitTorrent peer-to-peer client using gossip protocol. 153: 825:
IEEE Transactions on Parallel and Distributed Systems
925:"Gossip-based aggregation in large dynamic networks" 1128:
IEEE Transactions on Knowledge and Data Engineering
87:but its sources remain unclear because it lacks 8: 1046:Symposium on Foundations of Computer Science 980:Symposium on Foundations of Computer Science 327:Due to the replication there is an implicit 406:program that implements a gossip protocol. 53:Learn how and when to remove these messages 1139: 692: 241:Learn how and when to remove this message 223:Learn how and when to remove this message 118:Learn how and when to remove this message 522: 429:search will have found the best match. 361:Background data dissemination protocols 314:Reliable communication is not assumed. 712:"Lightweight probabilistic broadcast" 7: 1167:The Mathematical Theory of Epidemics 1054:ACM Transactions on Computer Systems 932:ACM Transactions on Computer Systems 719:ACM Transactions on Computer Systems 681:ACM Transactions on Computer Systems 14: 1012:"Introduction to expander graphs" 370:Protocols that compute aggregates 147:to comply with Knowledge (XXG)'s 34:This article has multiple issues. 181: 134: 64: 23: 987:Journal of Systems and Software 42:or discuss these issues on the 1: 1165:Bailey, Norman T. J. (1957). 1044:. In Proceedings of the 42nd 579:Jelasity, Márk (2011-01-01). 393:logarithmic in system size). 351:Event dissemination protocols 331:of the delivered information. 1010:Nielsen, Michael A. (2005). 873:10.1016/j.comnet.2009.03.013 756:10.1007/978-3-540-45172-3_15 596:10.1007/978-3-642-17348-6_7 1218: 1093:10.1109/FTDCS.2004.1316622 1150:10.1109/TKDE.2015.2427793 975:(JACM) 51: 6 (Nov 2004). 588:Self-organising Software 353:use gossip to carry out 160:may contain suggestions. 145:may need to be rewritten 73:This article includes a 944:10.1145/1082469.1082470 748:Peer-to-Peer Systems II 642:10.1145/1073814.1073871 390:convergently consistent 383:2-phase commit protocol 345:Dissemination protocols 102:more precise citations. 1200:Distributed computing 1066:10.1145/762483.762485 731:10.1145/945506.945507 694:10.1145/312203.312207 1195:Network architecture 1087:. pp. 238–243. 890:10.1109/SRDS.2007.27 884:. pp. 301–310. 837:10.1109/TPDS.2006.85 784:. pp. 419–429. 441:distributed database 283:gossip communication 16:Concept in computing 790:10.1109/DSN.2007.56 677:"Bimodal multicast" 540:10.1145/41840.41841 455:Epidemic algorithms 290:Variants and styles 267:distributed systems 973:Journal of the ACM 462:epidemic algorithm 75:list of references 1176:978-0-85264-113-2 1134:(10): 2812–2823. 907:978-0-7695-2995-0 867:(13): 2321–2339. 861:Computer Networks 807:978-0-7695-2855-7 765:978-3-540-40724-9 651:978-1-58113-994-5 605:978-3-642-17347-9 549:978-0-89791-239-6 534:. pp. 1–12. 475:virtual synchrony 378:routing protocols 259:epidemic protocol 251: 250: 243: 233: 232: 225: 175: 174: 149:quality standards 128: 127: 120: 57: 1207: 1180: 1161: 1143: 1122: 1077: 1037: 1035: 1029:. Archived from 1016: 955: 929: 919: 876: 858: 848: 819: 769: 742: 716: 706: 696: 671: 618: 617: 585: 576: 570: 569: 527: 449:overlay networks 246: 239: 228: 221: 217: 214: 208: 185: 184: 177: 170: 167: 161: 138: 130: 123: 116: 112: 109: 103: 98:this article by 89:inline citations 68: 67: 60: 49: 27: 26: 19: 1217: 1216: 1210: 1209: 1208: 1206: 1205: 1204: 1185: 1184: 1183: 1177: 1164: 1125: 1111: 1080: 1051: 1033: 1019:Michael Nielsen 1014: 1009: 1003:. Denver, 2006. 927: 922: 908: 879: 856: 851: 822: 808: 775: 766: 745: 714: 709: 674: 652: 636:. p. 292. 631: 627: 625:Further reading 622: 621: 606: 583: 578: 577: 573: 550: 529: 528: 524: 519: 483:Paxos algorithm 470: 457: 399: 338: 292: 281:The concept of 279: 271:ad-hoc networks 255:gossip protocol 247: 236: 235: 234: 229: 218: 212: 209: 198: 192:has an unclear 186: 182: 171: 165: 162: 152: 139: 124: 113: 107: 104: 93: 79:related reading 69: 65: 28: 24: 17: 12: 11: 5: 1215: 1214: 1211: 1203: 1202: 1197: 1187: 1186: 1182: 1181: 1175: 1162: 1123: 1109: 1078: 1060:(2): 164–206. 1049: 1048:(FOCS), 2001. 1038: 1036:on 2011-07-15. 1007: 1004: 997: 990: 983: 976: 969: 962: 959: 956: 938:(3): 219–252. 920: 906: 877: 849: 831:(7): 593–605. 820: 806: 773: 770: 764: 743: 725:(4): 341–374. 707: 672: 650: 628: 626: 623: 620: 619: 604: 571: 548: 521: 520: 518: 515: 514: 513: 507: 502: 499:expander graph 490: 479:state machines 477:, distributed 469: 466: 456: 453: 423: 422: 419: 416: 412: 398: 395: 374: 373: 367: 366: 365: 358: 337: 336:Protocol types 334: 333: 332: 325: 318: 315: 312: 305: 302: 291: 288: 278: 275: 249: 248: 231: 230: 194:citation style 189: 187: 180: 173: 172: 142: 140: 133: 126: 125: 83:external links 72: 70: 63: 58: 32: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1213: 1212: 1201: 1198: 1196: 1193: 1192: 1190: 1178: 1172: 1168: 1163: 1159: 1155: 1151: 1147: 1142: 1137: 1133: 1129: 1124: 1120: 1116: 1112: 1110:0-7695-2118-5 1106: 1102: 1098: 1094: 1090: 1086: 1085: 1079: 1075: 1071: 1067: 1063: 1059: 1055: 1050: 1047: 1043: 1039: 1032: 1028: 1024: 1020: 1013: 1008: 1005: 1002: 998: 995: 991: 988: 984: 982:(FOCS). 2003. 981: 977: 974: 970: 967: 963: 960: 957: 953: 949: 945: 941: 937: 933: 926: 921: 917: 913: 909: 903: 899: 895: 891: 887: 883: 878: 874: 870: 866: 862: 855: 850: 846: 842: 838: 834: 830: 826: 821: 817: 813: 809: 803: 799: 795: 791: 787: 783: 779: 774: 771: 767: 761: 757: 753: 749: 744: 740: 736: 732: 728: 724: 720: 713: 708: 704: 700: 695: 690: 686: 682: 678: 673: 669: 665: 661: 657: 653: 647: 643: 639: 635: 630: 629: 624: 615: 611: 607: 601: 597: 593: 589: 582: 575: 572: 567: 563: 559: 555: 551: 545: 541: 537: 533: 526: 523: 516: 511: 508: 506: 503: 500: 495: 494:NeighbourCast 491: 488: 484: 480: 476: 472: 471: 467: 465: 463: 454: 452: 450: 445: 442: 437: 434: 430: 426: 420: 417: 413: 409: 408: 407: 405: 396: 394: 391: 386: 384: 379: 371: 368: 362: 359: 356: 352: 349: 348: 346: 343: 342: 341: 335: 330: 326: 323: 319: 316: 313: 310: 306: 303: 300: 299: 298: 295: 289: 287: 284: 277:Communication 276: 274: 272: 268: 265:spread. Some 264: 260: 256: 245: 242: 227: 224: 216: 213:November 2015 206: 202: 196: 195: 190:This article 188: 179: 178: 169: 159: 155: 150: 146: 143:This article 141: 137: 132: 131: 122: 119: 111: 101: 97: 91: 90: 84: 80: 76: 71: 62: 61: 56: 54: 47: 46: 41: 40: 35: 30: 21: 20: 1166: 1131: 1127: 1083: 1057: 1053: 1031:the original 1018: 996:, June 2007. 935: 931: 881: 864: 860: 828: 824: 781: 777: 747: 722: 718: 687:(2): 41–88. 684: 680: 633: 587: 574: 531: 525: 487:transactions 461: 458: 438: 435: 431: 427: 424: 403: 400: 389: 387: 375: 369: 360: 350: 344: 339: 296: 293: 282: 280: 258: 254: 252: 237: 219: 210: 191: 166:October 2021 163: 154:You can help 144: 114: 105: 94:Please help 86: 50: 43: 37: 36:Please help 33: 485:, database 444:consistency 100:introducing 1189:Categories 1169:. Hafner. 1101:1871/12832 968:(SRDS'09). 898:1822/38894 798:1822/38895 660:8876665695 558:8876960204 517:References 355:multicasts 329:redundancy 205:footnoting 108:March 2009 39:improve it 1141:1210.4301 1042:Eli Upfal 703:207744063 614:214970849 388:The term 322:neighbors 263:epidemics 158:talk page 45:talk page 581:"Gossip" 468:See also 397:Examples 201:citation 1119:9464168 1074:6204358 1027:3045708 989:, 2007. 952:2608879 916:7210467 845:1148979 816:9060122 739:6875620 668:9378092 566:1889203 510:Tribler 505:Routing 411:store.) 96:improve 1173:  1158:650473 1156:  1117:  1107:  1072:  1025:  950:  914:  904:  843:  814:  804:  762:  737:  701:  666:  658:  648:  612:  602:  564:  556:  546:  309:agents 156:. The 1154:S2CID 1136:arXiv 1115:S2CID 1070:S2CID 1034:(PDF) 1023:S2CID 1015:(PDF) 994:ICDCS 948:S2CID 928:(PDF) 912:S2CID 857:(PDF) 841:S2CID 812:S2CID 735:S2CID 715:(PDF) 699:S2CID 664:S2CID 610:S2CID 584:(PDF) 562:S2CID 404:agent 364:data. 307:When 81:, or 1171:ISBN 1105:ISBN 1001:PODC 902:ISBN 802:ISBN 778:View 760:ISBN 656:OCLC 646:ISBN 600:ISBN 554:OCLC 544:ISBN 203:and 1146:doi 1097:hdl 1089:doi 1062:doi 940:doi 894:hdl 886:doi 869:doi 833:doi 794:hdl 786:doi 752:doi 727:doi 689:doi 638:doi 592:doi 536:doi 257:or 1191:: 1152:. 1144:. 1132:27 1130:. 1113:. 1103:. 1095:. 1068:. 1058:21 1056:. 1021:. 1017:. 946:. 936:23 934:. 930:. 910:. 900:. 892:. 865:53 863:. 859:. 839:. 829:17 827:. 810:. 800:. 792:. 758:. 733:. 723:21 721:. 717:. 697:. 685:17 683:. 679:. 662:. 654:. 644:. 608:. 598:. 560:. 552:. 542:. 481:, 253:A 85:, 77:, 48:. 1179:. 1160:. 1148:: 1138:: 1121:. 1099:: 1091:: 1076:. 1064:: 954:. 942:: 918:. 896:: 888:: 875:. 871:: 847:. 835:: 818:. 796:: 788:: 768:. 754:: 741:. 729:: 705:. 691:: 670:. 640:: 616:. 594:: 568:. 538:: 501:. 324:. 244:) 238:( 226:) 220:( 215:) 211:( 207:. 197:. 168:) 164:( 151:. 121:) 115:( 110:) 106:( 92:. 55:) 51:(

Index

improve it
talk page
Learn how and when to remove these messages
list of references
related reading
external links
inline citations
improve
introducing
Learn how and when to remove this message

quality standards
You can help
talk page
citation style
citation
footnoting
Learn how and when to remove this message
Learn how and when to remove this message
epidemics
distributed systems
ad-hoc networks
agents
neighbors
redundancy
multicasts
routing protocols
2-phase commit protocol
distributed database
consistency

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.