Dobrev, S., Flocchini, P., Prencipe, G., & Santoro, N. (2007). Mobile Search for a Black Hole in an Anonymous Ring. Mengfei Peng.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Problem solving with graph search
Leader Election Breaking the symmetry in a system.
PERMUTATION CIRCUITS Presented by Wooyoung Kim, 1/28/2009 CSc 8530 Parallel Algorithms, Spring 2009 Dr. Sushil K. Prasad.
Lecture 8: Asynchronous Network Algorithms
Chapter 15 Basic Asynchronous Network Algorithms
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty.
Understanding Operating Systems Fifth Edition
1 Dynamic Programming Week #4. 2 Introduction Dynamic Programming (DP) –refers to a collection of algorithms –has a high computational complexity –assumes.
Lecture 7: Synchronous Network Algorithms
Artificial Intelligence Adversarial search Fall 2008 professor: Luigi Ceccaroni.
One of the most important problems is Computational Geometry is to find an efficient way to decide, given a subdivision of E n and a point P, in which.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Stéphane Devismes VERIMAG UMR 5104 Univ. Joseph Fourier Grenoble, France Optimal Exploration of Small Rings Talk by Franck Petit, Univ. Pierre et Marie.
Using Scattered Mobile Agents to Locate a Black Hole in an Un-oriented Ring with Tokens Stefan Dobrev, Nicola Santoro, Wei Shi Mengfei Peng.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Information Dissemination in Highly Dynamic Graphs Regina O’Dell Roger Wattenhofer.
Università degli Studi dell’Aquila Academic Year 2009/2010 Course: Algorithms for Distributed Systems Instructor: Prof. Guido Proietti Time: Monday:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Complexity of Network Synchronization Raeda Naamnieh.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley Copyright © George Coulouris, Jean Dollimore, Tim.
1 Brief Announcement: Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg: Open University of Israel Moshe Schwartz:
Leader Election in Rings
Distributed Algorithms (22903) Lecturer: Danny Hendler Leader election in rings This presentation is based on the book “Distributed Computing” by Hagit.
Branch and Bound Algorithm for Solving Integer Linear Programming
Data Flow Analysis Compiler Design Nov. 8, 2005.
Advanced Topics in Algorithms and Data Structures 1 Two parallel list ranking algorithms An O (log n ) time and O ( n log n ) work list ranking algorithm.
Distributed Computing 5. Synchronization Shmuel Zaks ©
Written by Wei Shi, Joaquin Garcia-Alfaro, Jean-Pierre Corriveau Mengfei Peng Searching for a Black Hole in Interconnected Networks using Mobile Agents.
Complexity of algorithms Algorithms can be classified by the amount of time they need to complete compared to their input size. There is a wide variety:
Representing and Using Graphs
Franck Petit INRIA, LIP Lab. Univ. / ENS of Lyon France Optimal Probabilistic Ring Exploration by Semi-Synchronous Oblivious Robots Joint work with Stéphane.
Byzantine fault-tolerance COMP 413 Fall Overview Models –Synchronous vs. asynchronous systems –Byzantine failure model Secure storage with self-certifying.
The Power of Tokens: Rendezvous and Symmetry Detection for two Mobile Agents in a Ring J. Czyzovicz, Stefan Dobrev, E. Kranakis, D. Krizanc.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
KLASING, R., MARKOU, E. & RADZIK, T. (2007). HARDNESS AND APPROXIMATION RESULTS FOR BLACK HOLE SEARCH IN ARBITRARY NETWORKS. THEOR. COMPUT. SCI., 384 (2-3),
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Lecture #14 Distributed Algorithms (II) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Multiprocess Synchronization Algorithms ( ) Lecturer: Danny Hendler Global Computation.
Leader Election (if we ignore the failure detection part)
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
Asynchronous Exclusive Selection Bogdan Chlebus, U. Colorado Darek Kowalski, U. Liverpool.
Hwajung Lee. Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.   i,j  V  i,j are non-faulty ::
Adversarial Search. Game playing u Multi-agent competitive environment u The most common games are deterministic, turn- taking, two-player, zero-sum game.
Searching Topics Sequential Search Binary Search.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Mobile Agent Rendezvous Problem in a Ring Roberta Capuano,Vikas Kumar Jha.
Parallelizing Functional Tests for Computer Systems Using Distributed Graph Exploration Alexey Demakov, Alexander Kamkin, and Alexander Sortov
Distributed Algorithms (22903) Lecturer: Danny Hendler Leader election in rings This presentation is based on the book “Distributed Computing” by Hagit.
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty ::
Solving problems by searching
Internet Protocol Version 6
Introduction to complexity
Computing Connected Components on Parallel Computers
Michael Langberg: Open University of Israel
Leader Election Chapter 3 Observations Election in the Ring
ECE 448 Lecture 4: Search Intro
The Model & Basic Computations
Election in the Complete Graph
Lecture 9: Asynchronous Network Algorithms
Leader Election (if we ignore the failure detection part)
Parallel and Distributed Algorithms
Koorde: A simple degree optimal DHT
Constructing Connected Dominating Sets in Mobile Ad Hoc Networks
Lecture 8: Synchronous Network Algorithms
Leader Election Ch. 3, 4.1, 15.1, 15.2 Chien-Liang Fok 4/29/2019
More Graphs Lecture 19 CS2110 – Fall 2009.
Presentation transcript:

Dobrev, S., Flocchini, P., Prencipe, G., & Santoro, N. (2007). Mobile Search for a Black Hole in an Anonymous Ring. Mengfei Peng

Network: Ring: a loop network of identical nodes, Whiteboard: Each node has a bounded amount of storage(whiteboard), agents can write or read information from the whiteboard, O(log n) bits are sufficient. n is known (where n is the size of the ring) Nodes are anonymous: no special marks on any node.

Agents: computing capability; bound of storage; obey the same protocol; Asynchronous; Identical;

Result: co-located agents two agents are necessary and sufficient to locate the black hole Moves: O (n log n) moves and it is optimal Time complexity: 2n-4 units of time using n- 1 agents If the ring is oriented, two dispersed agents are still necessary and sufficient. Moves: (θ (n log n)). If the ring is un-oriented, three agents are necessary and sufficient; Moves: (θ (n log n)). Result: dispersed agents

Algorithm: measure of complexity: Size: the number of agents; Cost: the number of moves; Time: the amount of time elapsed until termination ----ideal time (i.e., assuming synchronous execution where a move can be made in one time unit)----\time" complexity is “ideal time" complexity. Cautious Walk

Co-located: 2 agents time complexity of Algorithm Divide is also 2n log n + O(n).

n-1 agents to locate BH Algorithm Optimal Time lets n -1 co-located agents find the black hole in 2n -4time. Why 2n-4: if n-1 is BH, a agent must come to n-2, and come back to 0, so 2(n-2)

Dispersed agents: initially there is at most one agent at any given location If k is known, cost in oriented rings: Ω(n log(n-k)). If k of agents is unknown, cost in oriented rings: Ω (n log n). Dispersed, oriental ring, k ≥ 2 Three phases: pairing, elimination, and resolution. Algorithm:

K is known When arriving at a node already visited by another agent, it proceeds to the right via the safe port. If there is no safe port, it tests how many agents are at this node; if the number of agents at the node is k- 1, the algorithm terminates.

K is unknown

A:status:alone

D:status:paired-left

C sees D’s “jion me” mark and terminates. status:paired-right

Questions: 1, How (n-1) co-located agents explored the ring?

Questions: 2, How k dispersed agents explored the ring while k is known?

Questions: 3, How k dispersed agents explored the ring while k is unknown?