Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Lecture 8: Asynchronous Network Algorithms
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Self-Stabilization in Distributed Systems Barath Raghavan Vikas Motwani Debashis Panigrahi.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
TORA! TORA! TORA! By Jansen Cohoon. Developing TORA TORA was funded by the Army Research Laboratory. TORA is presently being transitioned into the commercial.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Max-Min D-Cluster Formation in Wireless Ad Hoc Networks - Alan Amis, Ravi Prakash, Thai Vuong, Dung Huynh Presenter: Nirav Shah.
Byzantine Generals Problem: Solution using signed messages.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Complexity of Network Synchronization Raeda Naamnieh.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 IMPROVING RESPONSIVENESS BY LOCALITY IN DISTRIBUTED VIRTUAL ENVIRONMENTS Luca Genovali, Laura Ricci, Fabrizio Baiardi Lucca Institute for Advanced Studies.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
WSN Simulation Template for OMNeT++
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Prioritized h-out of-k Resource Allocation for Mobile Ad Hoc Networks and Distributed Systems Jehn-Ruey Jiang Hsuan Chuang University HsinChu, Taiwan.
An Energy Efficient Leaser Election Algorithm for Mobile Ad Hoc Networks Paolo Cemim, Vinicius De Antoni Instituto de Informatica Universidade Federal.
Self Stabilization Classical Results and Beyond… Elad Schiller CTI (Grece)
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.
Election Algorithms and Distributed Processing Section 6.5.
Ad Hoc Wireless Routing COS 461: Computer Networks
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Lecture 6: Introduction to Distributed Computing.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 February 10, 2005 Session 9.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Costas Busch (RPI) Srikanth Surapaneni (RPI) Srikanta Tirthapura (Iowa State University)
DISTRIBUTED SYSTEMS II A POLYNOMIAL LOCAL SOLUTION TO MUTUAL EXCLUSION Prof Philippas Tsigas Distributed Computing and Systems Research Group.
A Method for Distributed Computation of Semi-Optimal Multicast Tree in MANET Eiichi Takashima, Yoshihiro Murata, Naoki Shibata*, Keiichi Yasumoto, and.
CIS825 Lecture 2. Model Processors Communication medium.
UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
Self-stabilizing energy-efficient multicast for MANETs.
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Mark Buising, Douglas Chow, Nazeni Mkrtchyan, Jesus Rodriguez, Jennifer Webb.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Computer Science Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Network Presented by Jennifer.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Vineet Mittal Should more be added here Committee Members:
Distributed Processing Election Algorithm
Lecture 9: Asynchronous Network Algorithms
Analysis of Link Reversal Routing Algorithms
Temporally-Ordered Routing Algorithm (TORA)
Introduction to Self-Stabilization
Presentation transcript:

Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing devices. Communication through wireless medium. Typically no fixed infrastructure. When nodes move, communication topology can change. Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing devices. Communication through wireless medium. Typically no fixed infrastructure. When nodes move, communication topology can change. Leader Election: Goal is to select a unique processor among many in a distributed system. Used as a primitive in other distributed algorithms. Some applications include: - primary-backup approach to replication-based fault-tolerance. - group communication systems. - video conferencing. - multi-player games. Leader Election: Goal is to select a unique processor among many in a distributed system. Used as a primitive in other distributed algorithms. Some applications include: - primary-backup approach to replication-based fault-tolerance. - group communication systems. - video conferencing. - multi-player games. Algorithm Presented by Ingram et al. - Guarantees that after topology changes cease, all DAGs will have a unique leader within a finite amount of time. - Works for arbitrarily changing network topologies. - Handles multiple concurrent topology changes. - Works with asynchronous message delays. - Uses one type of message. - Uses a 7-tuple as height: (Tau, Oid, Refl, Delta, Lts, Lid, ID). Algorithm Presented by Ingram et al. - Guarantees that after topology changes cease, all DAGs will have a unique leader within a finite amount of time. - Works for arbitrarily changing network topologies. - Handles multiple concurrent topology changes. - Works with asynchronous message delays. - Uses one type of message. - Uses a 7-tuple as height: (Tau, Oid, Refl, Delta, Lts, Lid, ID). Algorithm Presented by Derhab and Badache - A DAG converges to a state with just one leader within a finite amount of time even if topological changes occur during the convergence time. - Handles multiple concurrent topology changes. - Uses 5 types of messages. - Based on a time-interval computation. - Uses a 9-tuple as height: (Certain, Ts, Lid, Tb, Te, Oid, Refl, Delta, ID). Algorithm Presented by Derhab and Badache - A DAG converges to a state with just one leader within a finite amount of time even if topological changes occur during the convergence time. - Handles multiple concurrent topology changes. - Uses 5 types of messages. - Based on a time-interval computation. - Uses a 9-tuple as height: (Certain, Ts, Lid, Tb, Te, Oid, Refl, Delta, ID). Simulator: A discrete event simulator written in java. Simulator models node mobility, dynamic topology and synchronous or asynchronous message delays. Displays the topology. Records topology changes and can replay same topology record with different leader election algorithms. Simulator: A discrete event simulator written in java. Simulator models node mobility, dynamic topology and synchronous or asynchronous message delays. Displays the topology. Records topology changes and can replay same topology record with different leader election algorithms. Completed Work: Established performance parameters: - number of messages generated. - number of leaders elected. - time for stabilizing after last link change. Improved Simulator Functionality: - added additional GUI elements. - improved visual output of the simulator. - extended support for more versatile system model. - created a recording system to store and replay topological changes. Checked the correctness of implementation of Ingram’s algorithm. Completed Work: Established performance parameters: - number of messages generated. - number of leaders elected. - time for stabilizing after last link change. Improved Simulator Functionality: - added additional GUI elements. - improved visual output of the simulator. - extended support for more versatile system model. - created a recording system to store and replay topological changes. Checked the correctness of implementation of Ingram’s algorithm. Future Work: Implementing correctly the algorithm presented by Derhab and Badache. Generate topology records with different network configurations: - different number of nodes; - different communication delays; - different node maximum speeds. Run both algorithms on same topology records to compare their performance. Draw conclusions about the functionality and correctness of the two algorithms. Future Work: Implementing correctly the algorithm presented by Derhab and Badache. Generate topology records with different network configurations: - different number of nodes; - different communication delays; - different node maximum speeds. Run both algorithms on same topology records to compare their performance. Draw conclusions about the functionality and correctness of the two algorithms. Tentative Conclusions: We have a hypothesis that the algorithm by Derhab and Badache cannot tolerate variable message delays. Complexity for that algorithm appears to be overwhelming when number of nodes is high or the network is very dense. Tentative Conclusions: We have a hypothesis that the algorithm by Derhab and Badache cannot tolerate variable message delays. Complexity for that algorithm appears to be overwhelming when number of nodes is high or the network is very dense. This material is based upon work supported by the National Science Foundation under Grant No This material is based upon work supported by the National Science Foundation under Grant No Plamen Ivanov Faculty Mentor: Jennifer Walter Department of Computer Science, Vassar College Plamen Ivanov Faculty Mentor: Jennifer Walter Department of Computer Science, Vassar College Leader Oriented Directed Acyclic Graph (DAG): Graphs use heights to orient links. Heights are parameters determined by the leader election algorithm. DAG is used as a representation of the topology of a network. Leader Oriented Directed Acyclic Graph (DAG): Graphs use heights to orient links. Heights are parameters determined by the leader election algorithm. DAG is used as a representation of the topology of a network. Project Goals: Expand the simulator to better model the system assumptions. Establish performance parameters and compare the two algorithms based on those parameters. Experimentally validate the claims made by Derhab and Badache for their algorithm. Project Goals: Expand the simulator to better model the system assumptions. Establish performance parameters and compare the two algorithms based on those parameters. Experimentally validate the claims made by Derhab and Badache for their algorithm. References: An Asynchronous Leader Election Algorithm for Dynamic Networks by Ingram et al. A self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks by Derhab and Badache. References: An Asynchronous Leader Election Algorithm for Dynamic Networks by Ingram et al. A self-Stabilizing Leader Election Algorithm in Highly Dynamic Ad Hoc Mobile Networks by Derhab and Badache. System Assumptions: - There are N nodes. - Nodes have perfect clocks. - Nodes communicate through message passing. - Messages are only lost if they are in transit on a link that goes down. - Messages are delivered in sending order over each link. - Message delays are asynchronous or synchronous. - Nodes move at a random constant speed in random directions. - All movement stops at some point in time. System Assumptions: - There are N nodes. - Nodes have perfect clocks. - Nodes communicate through message passing. - Messages are only lost if they are in transit on a link that goes down. - Messages are delivered in sending order over each link. - Message delays are asynchronous or synchronous. - Nodes move at a random constant speed in random directions. - All movement stops at some point in time. Existing Algorithms: Use heights ( n-tuples ) associated to each node to maintain the leader oriented DAG and guarantee that each connected component of the graph has a leader. Links between nodes are oriented from higher to lower heights. Heights are compared lexicographically. The algorithms use link reversal as a response to changes in the topology and the heights of the nodes. Existing Algorithms: Use heights ( n-tuples ) associated to each node to maintain the leader oriented DAG and guarantee that each connected component of the graph has a leader. Links between nodes are oriented from higher to lower heights. Heights are compared lexicographically. The algorithms use link reversal as a response to changes in the topology and the heights of the nodes. Certain – 1 if node has a path to leader, 0 otherwise. Ts – time at which the leader has started the creation of its DAG. Lid – the identifier of the node considered to be the leader. Tb – beginning of the Reference Level Interval. Te – end of the Reference Level Interval. Oid – 0 or the ID of the node that started this reference level. Refl – 0 for initiated, 1 for reflected reference level. Delta – distance from leader. ID – the identifier of a node. Tau – 0 or the time when this reference level was initiated. Oid– 0 or the id of the node that started this reference level Refl – 0 for initiated, 1 for reflected reference level. Delta – distance from leader. Lts– the negative of the time when the current leader was elected. Lid – the identifier of the node considered to be the leader. ID – the identifier of a node.