Concurrent Broadcast for Information Dissemination

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Data and Computer Communications
Traveling Salesperson Problem
Computer Networking A Top-Down Approach Chapter 4.7.
What is a network? A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs) , exchange.
Self Stabilizing Algorithms for Topology Management Presentation: Deniz Çokuslu.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Complexity of Network Synchronization Raeda Naamnieh.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
1 Dijkstra’s Shortest Path Algorithm Gordon College.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
TCOM 501: Networking Theory & Fundamentals
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Data Flow Analysis Compiler Design Nov. 8, 2005.
Chapter 2 Network Models.
The Zone Routing Protocol (ZRP)
Broadcast & Convergecast Downcast & Upcast
Routing in Communication Networks Routing: Network layer protocol that guides information units to correct destinations. A complex collection of decision.
Controller and Estimator for Dynamic Networks Amos Korman Shay Kutten Technion.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Coordination and Agreement. Topics Distributed Mutual Exclusion Leader Election.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Termination Detection
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
2/14/2016  A. Orda, A. Segall, 1 Queueing Networks M nodes external arrival rate (Poisson) service rate in each node (exponential) upon service completion.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Chapter 20: Graphs. Objectives In this chapter, you will: – Learn about graphs – Become familiar with the basic terminology of graph theory – Discover.
Fundamentals of Computer Networks ECE 478/578
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
IP tutorial - #2 Routing KAIST Dept. of CS NC Lab.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
William Stallings Data and Computer Communications
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
Dynamic Routing Protocols II OSPF
CONNECTED-COMPONENTS ALGORITHMS FOR MESH-CONNECTED PARALLEL COMPUTERS
Introduction to Wireless Sensor Networks
Dijkstra’s shortest path Algorithm
Factor Graphs and the Sum-Product Algorithm
Mathematical Structures for Computer Science Chapter 6
Multi-Node Broadcasting in Hypercube and Star Graphs
Routing: Distance Vector Algorithm
Routing.
Temporally-Ordered Routing Algorithm (TORA)
Butterfly Network A butterfly network consists of (K+1)2^k nodes divided into K+1 Rows, or Ranks. Let node (i,j) refer to the jth node in the ith Rank.
Dynamic Routing Protocols II OSPF
Routing in Packet Networks Shortest Path Routing
Modeling and Simulation NETW 707
Graphs Chapter 11 Objectives Upon completion you will be able to:
The Network Layer Network Layer Design Issues:
PRESENTATION COMPUTER NETWORKS
Artificial Intelligence Lecture No. 28
On-line Routing of Real-Time Messages on Computer Networks
Chapter 6 Network Flow Models.
Distributed Databases Recovery
A network problem is one that can be represented by...
Brad Karp UCL Computer Science
Dynamic Routing Protocols part3 B
Circuit Switched Network
Routing.
Data Communication: Routing algorithms
Presentation transcript:

Concurrent Broadcast for Information Dissemination Riccardo rubei Deepak Krishna 1

Agenda Introduction Flooding Non Redundant Flooding All-to-all Broadcast in a Tree Conclusion 2

INTRODUCTION Concurrent Broadcast involves the dissemination of information in a database that is initially distributed among the nodes of a network. Some set of messages initially resides at each of the various nodes and these messages are trasmitted in the network, with each message contending with the others for available links, so that a copy of each message eventually resides at each node. One application of concurrent broadcast arises in the context of adaptive routing in a communication network. Each node collects local network status information in a message and the messages are disseminated so that each node receives a copy of a message from each other node. The collection of messages from all nodes gives each node global network status information, and this global information is input for a shortest path algorithm at each node to determine the node's routing decisions. 3

Some Notations We consider a network with n nodes and e links. If there is a link between nodes i and j, then i and j are adjacent, adjacent nodes are neighbors. A(i): for each node i, A(i) is the set of neighbors of i. M(i): for each node i,M(i) gives the identities of those messages wich initially reside at i at time 0. Any message can traverse any link in T units of time. This assumption is applicable only for networks where transmission errors are not a significant issue. The time complexity of a procedure for concurrent broadcast is the time until each message reside at node. The communication complexity of a concurrent broadcast procedure is the sum, over both directions of all links, of the time each direction of the link is used by the procedure. Each link is duplex, means that trasmission can occur simultaneously in both directions 4

A Small Example Consider any all-to-all broadcast procedure. If any node i has |A(i)|=1 then n-1 messages must enter i on the one link incident to i, so(n-1)T is a lower bound for the wors- case time complexity. Each message must reach the n-1 nodes other than its originating node by traversing at least n-1 links, so n(n-1)T is a lower bound for the communication complexity. 5

Flooding With flooding, whenever there is notrasmission out of a node on a particular link and there exists a message residing at the node which has not yet been trasmitted on the link in either direction,then some such message is trasmitted from that node on that link. Consider these notations: X(i,j): for each node i and j ∈ A(i), i mantains a set of identities of those messages which were trasmitted or are in the process of being trasmitted in either direction on the link between i and j. R(i): i mantains a set of those messages which have been fully received at i. 6

Flooding How it works For each node i and j ∈ A(i), i mantains a representation for the set X(i,j) of identities of those messages were trasmitted or are in process of being trasmitted in either direction on the link between i and j. At time 0, each R(i) = M(i) and X(i,j) = 0. Whenever R(i)\X(i,j) is nonempty and i is not presently trasmitting a message to j,i picks any k ∈R(i)\X(i,j), trasmits message k to j, and adds k to X(i,j). The choice of such a k ∈ R(i)\X(i,j) is entirely arbitrary. When some message k begins to be trasmitted to i from j, k is added to X(i,j). And when some message k is fully received at i, k is added to R(i). This procedure must eventually terminate with R(i) = X(i,j) = M for each node i and j ∈A(i). 7

Flooding Complexities Time complexity: For n>=3, the time complexity of the flooding procedure for concurrent broadcast never exceeds (n + m – 2)T. Communication Complexity: Each of the m messages must traverse each of the e links at least once, and possibily twice if a message traverse a link in both directions in the same period. Thereforem the communication complexity is at least meT and at most 2meT. 8

Non Redundant Flooding This procedure eliminates unnecessary (redundant) message receipts from the flooding process by signaling between neighboros. With this procedure, there is a sequence of iterations between each pair of adjacent nodes. Each iterations is composed of two subiterations, first a signal subiterations and then a transmission subiteration. In the signal subiterations, i and j exchange information on which messages they have received since their last signal subiteration. In the trasmission subiteration, i and j transmit one message to each other if such transmission is called for. 9

NON REDUNDANT FLOODING Additional Notations R(i): For each i, the sets of identities of messages that have fully received at i. S(i): The set of identities of messages that are in the process of being trasmitted to i from some neighbor. P(i,j): For each node i and j ∈ A(i), is the set of identities that i knows to be in R(j). L(i,j): The set of identities of those messages trasmitted to i from each neighbor other than j since the last signal subiteration between i and j. 10

NON REDUNDANT FLOODING How it works k i J S(i) +k R(i) L(i) P(i,j) 11

NON REDUNDANT FLOODING How it works k i J S(i) R(i) +{k} L(i) P(i,j) 12

NON REDUNDANT FLOODING How it works k i J S(i) R(i) +{k} L(i) P(i,j) 13

NON REDUNDANT FLOODING Subiterartions k i J Exchange L(i,j) between nodes Add the l(i,j) to p(j,i) k from set P(i, j)\(R(i) U S(i)) 14

NON REDUNDANT FLOODING Time Complexity Cannot be greater than (n + m - 2) T I.e.. In simple terms it will take at least U >= I L(i, j)I + 1 15

NON REDUNDANT FLOODING Communication Complexity I The signaling complexity and the trasmission complexity are the sums, over both direction so all links, of the time each direction of the link is used for signaling and message trasmission, respectively, in completing concurrent broadcast. Each message arrives exactly once at each of n-1 nodes at which it does not reside at time 0. The trasmission complexity is therefore (n-1)nB/r. Each node i sends exactly n-1 signals to request the trasmission of messages already residing at some neighbor. For each of n-1 messages that each node receives, the node sends a signal to each neighbor other than the one from which it received the message. 16

NON REDUNDANT FLOODING Communication Complexity II Each node signals its own identity to each neghbor in the first subiteration. Therefore, each node i sends exaclty signals, and the total number of signal is Each message arrives exactly once at each of the n- 1 nodes at which it does not reside at time 0. The transmission complexity is therefore (n - 1) nB/r. Each node i sends exactly n- 1 signals to request the transmission of messages already residing at some neighbour. For each of the nI- messages that each node receives, the node sends a signal to each neighbour other than the one from which it received the message. And each node signals its own identity to each neighbour in the first sub iteration. 17

ALL-TO-ALL BROADCAST IN A TREE How it works Here, there is a unique path between any two nodes and e = n – 1. The flooding procedure and the nonreduntant flooding procedure both transmit each message exactly once across each link of the tree network, and the signaling in the latter procedure is superfluous. So we will consider the normale flooding. By the Theorem 1, the time complexity of the procedure does not exceed (2n – 2)T. But in a tree some node must exactly have one neighbor, so the time complexity of any procedure for all-to-all broadcast must be at least (n-1)T. 18

Conclusion Flooding is a simple and robust procedure for the dissemination of a distributed database by concurrent broadcasting. A need for such information dissemination arises in the context of adapting routing in communications network. Non REDUNDANT FLOODING ELIMINATES REDUNDANT MESSAGE RECEIPTS FROM THE FLOODING PROCESS BY REAL-TIME SIGNALING BETWEEN NEIGHBORS CONCERNING MESSAGES The relative RESIDING AT EACH. The relative advantage of this procedure over the flooding procedure in terms of communication complexity is greater for networks that are denser and have longer messages.

Conclusion All-to-all broadcast in a tree is shown to be attractive in terms of its time complexity, its communication complexity, and its giving each node the ability to recognize when it has received all the messages without knowing the number of nodes.

References http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber =1701926