Leader Election Bernard Chen.

Slides:



Advertisements
Similar presentations
Leader Election Breaking the symmetry in a system.
Advertisements

CS542 Topics in Distributed Systems Diganta Goswami.
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
Token-Dased DMX Algorithms n LeLann’s token ring n Suzuki-Kasami’s broadcast n Raymond’s tree.
Synchronization Chapter clock synchronization * 5.2 logical clocks * 5.3 global state * 5.4 election algorithm * 5.5 mutual exclusion * 5.6 distributed.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Page 1 Mutual Exclusion* Distributed Systems *referred to slides by Prof. Paul Krzyzanowski at Rutgers University and Prof. Mary Ellen Weisskopf at University.
Leader Election Bismita Srichandan. Leader Election What is Leader Election Why Leader election is needed Different design topologies Algorithms used.
1 Complexity of Network Synchronization Raeda Naamnieh.
Distributed Systems Spring 2009
LEADER ELECTION CS Election Algorithms Many distributed algorithms need one process to act as coordinator – Doesn’t matter which process does the.
Computer Science Lecture 11, page 1 CS677: Distributed OS Last Class: Clock Synchronization Logical clocks Vector clocks Global state.
EEC-681/781 Distributed Computing Systems Lecture 11 Wenbing Zhao Cleveland State University.
EEC-681/781 Distributed Computing Systems Lecture 11 Wenbing Zhao Cleveland State University.
Distributed Systems CS Programming Models- Part I Lecture 13, Oct 13, 2014 Mohammad Hammoud 1.
Computer Science Lecture 12, page 1 CS677: Distributed OS Last Class Vector timestamps Global state –Distributed Snapshot Election algorithms.
Election Algorithms and Distributed Processing Section 6.5.
Election Algorithms. Topics r Issues r Detecting Failures r Bully algorithm r Ring algorithm.
L EADER E LECTION Advanced Operating Systems (CSC 8320) Fall 2011 Shagun Kariwala.
Vinay Kumar Madhadi 09/23/2009 CSC Outline  Part 1 : Leader Election?  Part 2 : Different Design Topologies Algorithms Used-Bully, Ring, Invitation.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 6 Synchronization.
Mutual exclusion Concurrent access of processes to a shared resource or data is executed in mutually exclusive manner Distributed mutual exclusion can.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
4.5 DISTRIBUTED MUTUAL EXCLUSION MOSES RENTAPALLI.
Centralized mutual exclusion Problem : What if the coordinator fails? Solution : Elect a new one.
Lecture 5: Sun: 1/5/ Distributed Algorithms - Distributed Databases Lecturer/ Kawther Abas CS- 492 : Distributed system &
Computer Science Lecture 12, page 1 CS677: Distributed OS Last Class Vector timestamps Global state –Distributed Snapshot Election algorithms –Bully algorithm.
L EADER E LECTION Yu Meng O UTLINE Basic knowledge Overview of Leader Election Complete Topology Logical Ring Topology Three Topology Latest.
Page 1 Distributed Systems Election Algorithms* *referred to slides by Prof. Hugh C. Lauer at Worcester Polytechnic Institute.
Global State (1) a)A consistent cut b)An inconsistent cut.
Synchronization CSCI 4780/6780. Mutual Exclusion Concurrency and collaboration are fundamental to distributed systems Simultaneous access to resources.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
ADITH KRISHNA SRINIVASAN
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
A Membership Management Protocol for Mobile P2P Networks Mohamed Karim SBAI, Emna SALHI, Chadi BARAKAT.
CLOCK SYNCHRONIZATION SUSMITHA KOTA 21- SEP-2015.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
6.5 Election Algorithms -Avinash Madineni.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
Page 1 Mutual Exclusion & Election Algorithms Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content.
CIS 825 Review session. P1: Assume that processes are arranged in a ring topology. Consider the following modification of the Lamport’s mutual exclusion.
Distributed Mutual Exclusion Synchronization in Distributed Systems Synchronization in distributed systems are often more difficult compared to synchronization.
Mutual Exclusion Algorithms. Topics r Defining mutual exclusion r A centralized approach r A distributed approach r An approach assuming an organization.
CSE 486/586 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
CSC 8420 Advanced Operating Systems Georgia State University Yi Pan Transactions are communications with ACID property: Atomicity: all or nothing Consistency:
Lecture 11: Coordination and Agreement Central server for mutual exclusion Election – getting a number of processes to agree which is “in charge” CDK4:
Distributed Systems 31. Theoretical Foundations of Distributed Systems - Coordination Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano.
Coordination and Agreement
CSE 486/586 Distributed Systems Leader Election
Simon Razniewski Faculty of Computer Science
Chapter 11 Coordination Election Algorithms
MOBILE AD-HOC NETWORKS
Advanced Topics in Concurrency and Reactive Programming: Time and State Majeed Kassis.
Distributed Processing Election Algorithm
Introduction to Wireless Sensor Networks
Chapter 6.3 Mutual Exclusion
CS60002: Distributed Systems
DARPA Proposer’s Day for
Distributed Mutual Exclusion
CSE 486/586 Distributed Systems Leader Election
Improving Routing & Network Performances using Quality of Nodes
Lecture 10: Coordination and Agreement
Chapter 5 (through section 5.4)
Prof. Leonardo Mostarda University of Camerino
Lecture 11: Coordination and Agreement
CSE 486/586 Distributed Systems Leader Election
Presentation transcript:

Leader Election Bernard Chen

Outlines Introduction to leader election Complete Topology Logical Ring Topology Tree Topology Secure Extrema Finding Algorithm (SEFA) References

What is leader selection? The existence of a centralized controller greatly simplifies process synchronization However, if the central controller breaks down, the service availability can be limited The problem can be alleviated if a new controller (leader) can be chosen

When do we need leader election? 1. The initiation of a system of processes 2. When an existing leader fails (The detection of failures is normally based on a time-out mechanism)

Two Types of Election Criteria 1. a leader election can be based on a global priority. This type of election is called extrema finding. (Every node has a fixed evaluation value) 2. processes in the group can vote for a leader based on a node’s preference, it’s called a preference-based leader election algorithm.

Leader Election vs. Mutual Exclusion In many aspects, leader election and mutual exclusion are the same; they both try to reach an agreement for identifying a unique process However, there are some differences

Leader Election vs. Mutual Exclusion The two major differences are: A mutual exclusion must ensure that no process is starved, while a leader election is more concerned with the fast and successful termination of the election process Another distinction is that the result for leader election need to be announced to all processes

Outlines Introduction to leader election Complete Topology Logical Ring Topology Tree Topology Secure Extrema Finding Algorithm (SEFA) References

Complete Topology In a complete topology, each process in the group can reach any other process in the same group in one message hop. Each process as a global priority, and the highest-priority is elected leader

The Bully Algorithm It’s a extrema-finding algorithm A process starts a leader election if it suspects that the coordinator has failed. If a process Pheavy receives an election message from a lighter process Plight, it sends a take-over message to Plight. Plight is out of the race. If a process doesn’t get a take-over message back, it wins, and sends a victory message to all other processes.

The Bully Algorithm The bully election algorithm Process 4 holds an election Process 5 and 6 respond, telling 4 to stop Now 5 and 6 each hold an election

The Bully Algorithm Process 6 tells 5 to stop Process 6 wins and tells everyone

Outlines Introduction to leader election Complete Topology Logical Ring Topology Tree Topology Secure Extrema Finding Algorithm (SEFA) References

Logical Ring Topology A logical ring is easy to construct and offers the unique property that a message initiated by any node will return to the node, indicating completion of a round of broadcast

Leader Election Initiation: Leader Election: A process sends an ELECTION message to its successor (or next alive process) with its ID Each process adds its own ID and forwards the ELECTION message Leader Election: Message comes back to initiator Initiator announces the winner by sending another message around the ring

Ring Algorithm: Initiation

Ring Algorithm - Election

Outlines Introduction to leader election Complete Topology Logical Ring Topology Tree Topology References

Tree Topology To construct a logical ring structure is easy if the underlying network supports broadcast facilities However, in Ad Hoc networks, user mobility may results in frequent leader election, making the process a critical component of system operation

Leader election in Ad Hoc networks Most of the leader election algorithms for mobile ad hoc networks elect a “random” leader and hence are not extrema-finding SEFA (Vasudevan S., 2003) is a round-based hierarchy-building approach which also considered secure problem Good reviews can be found in [3](G. Tel. 2000) and [4](N.Lynch 1996)

Secure Extrema Finding Algorithm (SEFA) SEFA is an extrema-finding algorithm in which all nodes use a Common Election Algorithm (CEA) to determine their rank Decision factors might include node identity, battery lifes, or level of trust…etc Larger the CEA value, the more “desirable” the node is a leader

Algorithm Example

Algorithm Example

Outlines Introduction to leader election Complete Topology Logical Ring Topology Tree Topology Secure Extrema Finding Algorithm (SEFA) References

References Chow, Randy, et. al.,Distributed Operating Systems & Algorithms, Addison Wesley, March 18, 1997 Vasudevan, S.; DeCleene, B.; Immerman, N.; Kurose, J.; Towsley, D.; “Leader election algorithms for wireless ad hoc networks”, DARPA Information Survivability Conference and Exposition, 2003. Proceedings G. Tel. Introduction to Distributed Algorithms. Second Edition, 2000. Cambridge University Press N.Lynch Distributed Algorithms. 1996, Morgan Kaufmann Publications V. Park and M. Corson. A Highly adaptive Distributed Routing Algorithm for mobile Wireless Networks. In proceediing of IEEE INFOCOM, April 1997

Thank You Questions??