Gossiping with IOIMCs Pepijn Crouzen Saarland University.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
March 8, Dynamic Fault Tree analysis using Input/Output Interactive Markov Chains Hichem Boudali, Pepijn Crouzen, and Mariëlle Stoelinga. Formal.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Distributed Leader Election Algorithms in Synchronous Ring Networks
Impossibility of Distributed Consensus with One Faulty Process
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
epiC: an Extensible and Scalable System for Processing Big Data
Marković Miljan 3139/2011
Chapter 15 Basic Asynchronous Network Algorithms
Data Mining Classification: Alternative Techniques
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Mikhail Nesterenko Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Probabilistic Analysis of Message Forwarding Louise Moser and Michael Melliar-Smith University of California, Santa Barbara.
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
Coral: a tool for Compositional Reliability and Availability analysis † Hichem Boudali 1, Pepijn Crouzen 2, and Mari ë lle Stoelinga 1. 1 Formal Methods.
May 9, 2008IPA Lentedagen, Rhenen1 Dynamic Fault Tree analysis using Input/Output Interactive Markov Chains Hichem Boudali 1, Pepijn Crouzen 2, and Mariëlle.
GS 540 week 6. HMM basics Given a sequence, and state parameters: – Each possible path through the states has a certain probability of emitting the sequence.
CSE 3504: Probabilistic Analysis of Computer Systems Topics covered: Continuous time Markov chains (Sec )
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Fault-tolerant Routing in Peer-to-Peer Systems James Aspnes Zoë Diamadi Gauri Shah Yale University PODC 2002.
Communication operations Efficient Parallel Algorithms COMP308.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
Model-based Testing.
Branching Bisimulation Congruence for Probabilistic Transition Systems
Belief Propagation, Junction Trees, and Factor Graphs
DEVS and DEVS Model Dr. Feng Gu. Cellular automata with fitness.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
COMPUTER NETWORKS LAB 3: HUBS AND SWITCHES
Sort-Last Parallel Rendering for Viewing Extremely Large Data Sets on Tile Displays Paper by Kenneth Moreland, Brian Wylie, and Constantine Pavlakos Presented.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models Pei’en LUO.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Factor Graphs Young Ki Baik Computer Vision Lab. Seoul National University.
Communication (II) Chapter 4
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 8: Modelling Interactions and Behaviour.
VLAN Trunking Protocol (VTP)
Network Parts. Network Interface Card (NIC) 2 This used to be a separate card as shown. As many computers these days need access to a network, the technology.
Modeling Process CSCE 668Set 14: Simulations 2 May be several algorithms (processes) runs on each processor to simulate the desired communication system.
Enhancing TCP Fairness in Ad Hoc Wireless Networks Using Neighborhood RED Kaixin Xu, Mario Gerla University of California, Los Angeles {xkx,
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Managerial Decision Making and Problem Solving
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Chapter Overview Bridging Switching Routing.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Parameterized Models for Distributed Java Objects Tomás Barros & Rabéa Boulifa OASIS Project INRIA Sophia Antipolis April 2004.
P2P Group Meeting (ICS/FORTH) Monday, 28 March, 2005 A Scalable Content-Addressable Network Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp,
Internet Control Message Protocol (ICMP) Chapter 7.
Hwajung Lee.  Models are simple abstractions that help understand the variability -- abstractions that preserve the essential features, but hide the.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
2 April, 2008AADL/UML workshop - Belfast1 Arcade: A formal, extensible, model-based dependability evaluation framework Hichem Boudali 1, Pepijn Crouzen.
John Lafferty Andrew McCallum Fernando Pereira
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
18-WAN Technologies and Dynamic routing Dr. John P. Abraham Professor UTPA.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Optimally Modifying Software for Safety and Functionality Sampath Kannan U.Penn (with Arvind Easwaran & Insup Lee)
The Echo Server Problem. Contents  Basic Networking Concepts  The Echo Server Problem.
Dynamic connection system
Net 435: Wireless sensor network (WSN)
18-WAN Technologies and Dynamic routing
A Scalable content-addressable network
Communication operations
Information Sciences and Systems Lab
Presentation transcript:

Gossiping with IOIMCs Pepijn Crouzen Saarland University

Gossiping models: the basics Networks consist of simple nodes. Broadcasts are forwarded to a (small) number of neighbors. A node does not have to know the entire network. A node does not have to know who has received which messages.

What did we model? Constant, but arbitrary, number of nodes, Constant, but arbitrary, interconnections, Multiple messages from multiple sources, Individual message reception, Delayed, probabilistic message forwarding, Resulting model: labeled CTMC, Scalable model generation with CADP. Goal: stochastic validation on message reception times. Focus: Scalable model generation + Information spread

What did we leave out? Dynamics: – New nodes appearing, – Nodes dying, – Interconnections changing. Message buffers, Message content.

How did we model gossiping? Using Input/Output Interactive Markov Chains: Each node is modeled by an I/O-IMC, Messages are sent through output signals and received through input signals. New messages are received through system-inputs and message reception is signaled using system- outputs. Network model is constructed through composition of the node models.

Simple node model A B C M(B)? M(C)? REC(A)! M(A)! p.λ (1-p).λ Waiting rate = λ, Sending probability = p, Messages are identified by sending node, While waiting to send, incoming messages are ignored Node also waits when not sending! START(A)?

Scalability: Adding links M(B)? ADD(A)? REC(A)! M(A)! p.λ (1-p).λ ADD(A)! M(C)? |[ADD(A)]| hide ADD(A) in ADD2(A)? rename ADD2(A) -> ADD(A) in

Scalability: Adding links, result M(B)? M(C)? REC(A)! M(A)! p.λ (1-p).λ ADD(A)? Now we can generate any gossiping network using: – Composition – Abstraction – Minimization – Renaming On: – Node model (0 links) – Add-neighbor model

Case study 15 node network, Each node has 3 neighbors, Convert each node to an I/O-IMC, Compute the total network model using compositional aggregation, Compose the network model with a message generation model and a message reception models, Compute probability that an incoming message reaches all nodes after some time period using resulting labeled CTMC.

Message generation and reception START(NODE1)!REC(NODE2)? Node 2 has received the message Network START signals REC signals Hide the START and REC signals, Weak bisimulation minimization Labeled CTMC x15

Case study: results Generation time: +/- 2 hours Largest appearing model: states, transitions CTMC size (anonymous reception): 233 states Analysis time: <1 second And now the probability that all nodes receive a message with send-rate 0.01 and send-probability 70%

Conclusion Scalable complete state space generation for gossiping networks is possible using very simple base models, but: We run into the state space explosion fairly early, Advanced maximal progress cutting is needed to make it feasible, No dynamics!