Niloy Ganguly, Andreas Deutsch Center for High Performance Computing

Slides:



Advertisements
Similar presentations
Peer-to-Peer and Social Networks An overview of Gnutella.
Advertisements

Peer to Peer and Distributed Hash Tables
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
CS 678 –Boltzmann Machines1 Boltzmann Machine Relaxation net with visible and hidden units Learning algorithm Avoids local minima (and speeds up learning)
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Niloy Ganguly Complex Networks Research Group Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Collaborators.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Small-world Overlay P2P Network
Technion –Israel Institute of Technology Software Systems Laboratory A Comparison of Peer-to-Peer systems by Gomon Dmitri and Kritsmer Ilya under Roi Melamed.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
P-Grid Presentation by Thierry Lopez P-Grid: A Self-organizing Structured P2P System Karl Aberer, Philippe Cudré-Mauroux, Anwitaman Datta, Zoran Despotovic,
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Localized Asynchronous Packet Scheduling for Buffered Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York Stony Brook.
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
P2P Architecture Case Study: Gnutella Network
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
Zentrum für Hochleistungsrechnen (ZHR) – A Bios Group Presentation Niloy Ganguly Immune System and Search Technology Designing a Fast Search Algorithm.
Full-Text Search in P2P Networks Christof Leng Databases and Distributed Systems Group TU Darmstadt.
Niloy Ganguly (Zentrum für Hochleistungsrechnen (ZHR) – TU Dresden) Project funded by the Future and Emerging Technologies arm of the IST Programme Immune.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Implicit group messaging in peer-to-peer networks Daniel Cutting, 28th April 2006 Advanced Networks Research Group.
Self Regulated Search in Unstructured Peer-to-Peer Networks Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur.
Cellular Automata based Edge Detection. Cellular Automata Definition A discrete mathematical system characterized by local interaction and an inherently.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
A Peer-to-Peer Approach to Resource Discovery in Grid Environments (in HPDC’02, by U of Chicago) Gisik Kwon Nov. 18, 2002.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
1 Simulation of Immune System Answering Questions on the Natural Immune System Behavior by Simulations.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Peer to Peer Network Design Discovery and Routing algorithms
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Design of a Robust Search Algorithm for P2P Networks
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
Self-Organizing Network Model (SOM) Session 11
Classifier Representation in LCS
Better Algorithms for Better Computers
OBJECT LOCATION IN UNSTRUCTURED P2P NETWORKS USING RANDOM WALK
Wireless LANs Wireless proliferating rapidly.
Text Based Information Retrieval
On Growth of Limited Scale-free Overlay Network Topologies
CONGESTION CONTROL.
Turnstile Streaming Algorithms Might as Well Be Linear Sketches
A Scalable content-addressable network
A Fault-Tolerant Routing Strategy for Fibonacci-Class Cubes
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Research Scopes in Complex Network
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Department of Computer Science University of York
Effective Replica Allocation
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Lecture 2: Complex Networks
Hierarchical Search on DisCSPs
Data-Centric Networking
Hierarchical Search on DisCSPs
A Semantic Peer-to-Peer Overlay for Web Services Discovery
On Constructing k-Connected k-Dominating Set in Wireless Networks
Complexity as Fitness for Evolved Cellular Automata Update Rules
Presentation transcript:

A Cellular Automaton Model for an Immune System Derived Search Algorithm Niloy Ganguly, Andreas Deutsch Center for High Performance Computing Technical University Dresden, Germany

Talk Overview Problem Definition Cellular Automata Design Experimental Results Theoretical Explanation

Talk Overview Problem Definition Search in p2p Network Immune Inspiration Cellular Automata Design Experimental Results Theoretical Explanation

Unstructured Peer to Peer Networks Each Network consists of peers (a, b, c, ..). Peers host data (1, 2, 3, …) a c b f g d e 5 4 2 1 3 7 6 a c b f g d e 1 2 3 6 4 7 5 Structured Network Unstructured Network

Unstructured Networks Searching in unstructured networks – Non-deterministic Algorithms Flooding, random walk a c b f g d e 5 4 2 1 3 7 6 6? 6!!! 6? 6? Our algorithms – Immune System inspired concept of packet proliferation 6? 6? 6? Unstructured Network

Immune Inspiration Affinity-governed proliferation based search algorithm Message proliferation Similarity (message, searched item) Interaction between message and searched item P2p Network Query Message Searched Item Human Body Antibody Antigen

Talk Overview Problem Definition Cellular Automata Design Representing network by a 2-dimensional CA Data and query distribution Update rules Experimental Results Theoretical Explanation

Mapping an unstructured network to a 2-dimensional CA Network = (peers, neighborhood) f a b c d g e 5 4 2 1 3 7 6 a c b f g d e 1 4 5 7 3 2 6 Peers host data Asynchronous update

Query and Data Distribution Query/Data – 10-bit strings – 1024 unique queries/data (tokens) – Distribution based on Zipf’s law power law - frequency of occurrence of a token T α 1/r, rank of the token eg. Most popular word = 1000 times 2nd most popular word = 500 times 3rd most popular word = 333 times f a b c d g e 1 4 5 7 3 2 6 1001001001 1001001001?

CA Rules 6? 6 ! f a b c d g e 1 4 5 7 3 2 6 QIR f a b c d g e 1 4 5 7 Query Initiation Rule (QIR) – Start a search by flooding k query message packets to the neighborhood Query Processing Rule (QPR) – Compare query message with data. Report a match if message = data. Query Forwarding Rule (QFR) – Forward the message to the neighbors f a b c d g e 1 4 5 7 3 2 6 6? QIR 6 ! f a b c d g e 1 4 5 7 3 2 6 QPR

Query Forwarding Rules (QFR) Proliferation Rules Simple Proliferation (P) Restricted Proliferation (RP) Random Walk Rules Simple Random Walk Rule (RW) Restricted Random Walk Rule (RRW)

Proliferation Rules 1 4 5 7 3 2 6 f a b c d g e Simple Proliferation (P) Produce N message copies of the single message. Spread the messages to the neighboring nodes 1 4 5 7 3 2 6 N = 3 f a b c d g e

Proliferation Rules 1 4 5 7 3 2 6 b a f c d g e Restricted Proliferation (RP) Produce N message copies of the single message. Spread the messages to the neighboring nodes if free 1 4 5 7 3 2 6 N = 3 b a f c d g e

Proliferation Controlling Function Production of message copies depends on a. Proliferation constant (ρ) b. Hamming distance between message and data a b

Random Walk Rules 1 4 5 7 3 2 6 f a b c d g e Simple Random Walk (RW) Forward the message to a randomly selected neighbor 1 4 5 7 3 2 6 f a b c d g e

Random Walk Rules 1 4 5 7 3 2 6 f a b c d g e Restricted Random Walk (RRW) Forward the message to a randomly selected free neighbor 1 4 5 7 3 2 6 f a b c d g e

Talk Overview Problem Definition Cellular Automata Design Experimental Results Experiment Coverage Experiment Search Theoretical Explanation

Experiment -1 Experiment Coverage – Calculate time taken to cover the entire network after initiation of a search from a randomly selected initial node. Repeated for 500 such searches.

Performance of Different Schemes Performance of restricted proliferation is best, followed by proliferation, restricted random walk and random walk.

Cost Incurred by Different Schemes Fairness of power – The average number of messages used is same for random walks and restricted proliferation.

Experiment - 2 Experiment Search - Calculate the number of search items found after 50 time steps from initiation of a search. Average the result over 100 searches (a generation).

Search Efficiency and Cost Regulation Spanning over 100 generations (1 generation = 100 searches) Search efficiency of RPM is 5 times better than RRW

Search Efficiency and Cost Regulation Excellent cost regulation, number of messages required by RP is virtually constant in spite of varying search output

Talk Overview Problem Definition Cellular Automata Design Experimental Results Theoretical Explanation Preliminary Ideas

√ Why? Random Walk = Diffusion Proliferation = Reaction-Diffusion System (Diffusion + Addition of New Materials) Calculate the frontal speed (c) of the particles Diffusion c α Reaction-Diffusion c = Const. √ 1 _ t

Summary Proliferation covers the network much faster than random walk A much higher search output is achieved through proliferation than random walk Restricted proliferation is better than simple proliferation Proliferation has a special cost regulatory function inbuilt Proliferation scheme is also scalable These results hold for other types of networks – random network, power-law network etc.

Dank U Thank you

Why? Random Walk = Diffusion Proliferation = Reaction-Diffusion System (Diffusion + Addition of New Materials) Random Walk = Diffusion

√ Why? c Calculate the frontal speed (c) of the particles Diffusion c α Diffusion +Proliferation c = Const. √ 1 _ t