Student: Fang Hui Supervisor: Teo Yong Meng

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Chapter 5: Tree Constructions
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
CS3771 Today: deadlock detection and election algorithms  Previous class Event ordering in distributed systems Various approaches for Mutual Exclusion.
Self-Stabilization in Distributed Systems Barath Raghavan Vikas Motwani Debashis Panigrahi.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
1 Complexity of Network Synchronization Raeda Naamnieh.
LSRP: Local Stabilization in Shortest Path Routing Hongwei Zhang and Anish Arora Presented by Aviv Zohar.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Outline Max Flow Algorithm Model of Computation Proposed Algorithm Self Stabilization Contribution 1 A self-stabilizing algorithm for the maximum flow.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Analysis of RIP, OSPF, and EIGRP Routing Protocols using OPNET Group 5: Kiavash Mirzahossein Michael Nguyen Sarah Elmasry
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
DISTRIBUTED SYSTEMS II A POLYNOMIAL LOCAL SOLUTION TO MUTUAL EXCLUSION Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
CS 542: Topics in Distributed Systems Self-Stabilization.
1 Fault tolerance in distributed systems n Motivation n robust and stabilizing algorithms n failure models n robust algorithms u decision problems u impossibility.
Suppose G = (V, E) is a directed network. Each edge (i,j) in E has an associated ‘length’ c ij (cost, time, distance, …). Determine a path of shortest.
Superstabilizing Protocols for Dynamic Distributed Systems Authors: Shlomi Dolev, Ted Herman Presented by: Vikas Motwani CSE 291: Wireless Sensor Networks.
Abstract 1/2 Wireless Sensor Networks (WSNs) having limited power resource report sensed data to the Base Station (BS) that requires high energy usage.
The Cost of Inconsistency in Chord Shelley Zhuang, Ion Stoica, Randy Katz OASIS/i3 Retreat, January 2005.
Computer Science 425/ECE 428/CSE 424 Distributed Systems (Fall 2009) Lecture 20 Self-Stabilization Reading: Chapter from Prof. Gosh’s book Klara Nahrstedt.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Formal verification of distance vector routing protocols.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Instructor Materials Chapter 5: Dynamic Routing
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
CONNECTED-COMPONENTS ALGORITHMS FOR MESH-CONNECTED PARALLEL COMPUTERS
DSDV Highly Dynamic Destination-Sequenced Distance-Vector Routing
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Introduction to Wireless Sensor Networks
Evaluating and Optimizing Stabilizing Dining Philosophers
Controlling the Cost of Reliability in Peer-to-Peer Overlays
COS 461: Computer Networks
What is a router? A router is a device that connects multiple computers together. Not to be confused with a switch Routers transmit packets of data across.
Net 435: Wireless sensor network (WSN)
Routing: Distance Vector Algorithm
Chapter 5: Dynamic Routing
Analysis of Link Reversal Routing Algorithms
Data Mining Cluster Analysis: Advanced Concepts and Algorithms
DHT Routing Geometries and Chord
Paraskevi Raftopoulou, Euripides G.M. Petrakis
Kevin Lee & Adam Piechowicz 10/10/2009
Distributed Systems CS
Abstraction.
Deterministic and Semantically Organized Network Topology
ECE 753: FAULT-TOLERANT COMPUTING
COS 461: Computer Networks
Combinatorial Optimization of Multicast Key Management
Brad Karp UCL Computer Science
Protocols.
Corona Robust Low Atomicity Peer-To-Peer Systems
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing.
Protocols.
Distributed Systems CS
Presentation transcript:

Student: Fang Hui Supervisor: Teo Yong Meng A Control Theory Approach to Self-Stabilizing in Large Distributed System Student: Fang Hui Supervisor: Teo Yong Meng sma5510-research methodology

sma5510-research methodology Outline Objective Measurement model Dynamical analysis Algorithm based on parameters Conclusion sma5510-research methodology

sma5510-research methodology Objective Find a way to describe the distributed system stability, and how to measure stability Analyze the stability bound and finite convergence. sma5510-research methodology

Stability of Distributed System The conception of self-stabilizing distributed computation was first proposed and explored by Dijkstra in 1974. A distributed system is self-stabilizing if, when started from an arbitrary initial state, it is guaranteed to reach a legitimate state. Once in a legal state, the system does not switch to an illegal state in the absence of failures. sma5510-research methodology

sma5510-research methodology Assumptions Node can only communicate with neighbors whose pointer contained in its routing table The links and node both may fail and recover during normal operation The recovery should be without global intervention, but system will consider the stability in global state sense Each node will keep some extent stability sma5510-research methodology

sma5510-research methodology Measurement Global stability is accumulated by each node’s stability. The node stability is derived from its connectivity knowledge. sma5510-research methodology

sma5510-research methodology Measurement (contd) Divides the system stability into two types: vertex stability (considering node failure/leave) , edge stability (considering routing information) G= (V, E), where | V | = n is network size Stability distribution matrix: (D : link, w :node) sma5510-research methodology

Node & Global Stability The value of node-i stability Global stability sma5510-research methodology

sma5510-research methodology Stability examples Graph Stability Graph with n node connected in a line S = ( 2/n + 3/n * (n-2) + 2/n) /n = (3n -2)/n2 Chord where each node contains log2n size finger table S = log2n/ n Graph with n node full connected S = 1 sma5510-research methodology

Model of Dynamical System Consider routing inconsistency An incoming message updates or adds new routing entries (new pointer to other node). This can also be caused by node’s periodically maintanence messages besides query messages. The extra message will consume bandwidth to some extent. The node flushes the outdated entries in its routing table, in terms of out-going message timeout or other possible way. sma5510-research methodology

sma5510-research methodology Two parameters (p,q) p: model the factor contributing to improving stability. q: model the factor contributing to decreasing stability. sma5510-research methodology

Profile of node stability tendency Max: p/(p+q) Node stability sma5510-research methodology

sma5510-research methodology When (p,q) vary Now we consider the p and q the functions of abstract time t. where p(t), q(t) in [0,1] sma5510-research methodology

sma5510-research methodology Proved Property 2 sma5510-research methodology

sma5510-research methodology (p,q)-feedback Based on above, design a feed-back system and algorithm by dynamically adjusting factor p(t) and q(t) in each step. Node stability can be maintained in certain level efficiently. sma5510-research methodology

Algorithm 1: achieve node stability x* in finite time sma5510-research methodology

Algorithm 2: achieve global stability in finite time sma5510-research methodology

The advantage of algorithm No explicit node coordination after global stability requirement sent out. Termination-detection unnecessary due to finite time. sma5510-research methodology

sma5510-research methodology Conclusion Analyze the node behavior of distributed system and give a practical evaluation on the global stability, local stability and expected convergence time. Sort out the parameters which impact the stability dynamically, by disseminating the global stability requirement and each node reach/maintain local stability in finite time. sma5510-research methodology

sma5510-research methodology Open issues Introduce more advanced parameters to describe the global stability of system in control theory perspective. A predefined threshold value of stability may not enough. More accuracy on the global stability also depends on the network topology, or stability distribution (specified in previous section). Assume the stability Matrix D as a kind of stability distribution. In some areas (sub-matrix) the density of stability may be higher, while other areas with lower stability. In particular case, a sparse stability distribution may have lower fault tolerance. Some nodes with locality may also comprise of super-node. Hence we will consider the stability of local nets and the stability between two local areas. sma5510-research methodology