Introduction to computer networking Distributed Algorithms Class Recitation.

Slides:



Advertisements
Similar presentations
Chapter 13 Leader Election. Breaking the symmetry in system Similar to distributed mutual exclusion problems, the first process to enter the CS can be.
Advertisements

Distributed Constraint Optimization Problems M OHSEN A FSHARCHI.
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems Reliable Multicast Steve Ko Computer Sciences and Engineering University at Buffalo.
Program correctness The State-transition model A global state S  s 0 x s 1 x … x s m {s k = local state of process k} S0  S1  S2  … Each state transition.
Uncoordinated Checkpointing The Global State Recording Algorithm.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
Uncoordinated Checkpointing The Global State Recording Algorithm Cristian Solano.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 7 Instructor: Haifeng YU.
1 Complexity of Network Synchronization Raeda Naamnieh.
Distributed Network Control for Optical Networks Presented by, Sree Rama Nomula
Chapter 5 Routing Algorithm in Networks. How are message routed from origin to destination? 1) Circuit-Switching → telephone net. Dedicated bandwidth.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 3 – Distributed Systems.
CPSC 668Set 16: Distributed Shared Memory1 CPSC 668 Distributed Algorithms and Systems Fall 2006 Prof. Jennifer Welch.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Termination Detection Presented by: Yonni Edelist.
Computer Science Lecture 11, page 1 CS677: Distributed OS Last Class: Clock Synchronization Logical clocks Vector clocks Global state.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
A Local Facility Location Algorithm Supervisor: Assaf Schuster Denis Krivitski Technion – Israel Institute of Technology.
Distributed Mutual Exclusion Béat Hirsbrunner References G. Coulouris, J. Dollimore and T. Kindberg "Distributed Systems: Concepts and Design", Ed. 4,
Chapter 14 Synchronizers. Synchronizers : Introduction Simulate a synchronous network over an asynchronous underlying network Possible in the absence.
Election Algorithms and Distributed Processing Section 6.5.
Broadcast & Convergecast Downcast & Upcast
Distributed Computing 5. Synchronization Shmuel Zaks ©
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Diffusing Computation. Using Spanning Tree Construction for Solving Leader Election Root is the leader In the presence of faults, –There may be multiple.
DISTRIBUTED ALGORITHMS By Nancy.A.Lynch Chapter 18 LOGICAL TIME By Sudha Elavarti.
Page 1 Distributed Systems Election Algorithms* *referred to slides by Prof. Hugh C. Lauer at Worcester Polytechnic Institute.
Association Rule Mining in Peer-to-Peer Systems Ran Wolff Assaf Shcuster Department of Computer Science Technion I.I.T. Haifa 32000,Isreal.
Presenter: Long Ma Advisor: Dr. Zhang 4.5 DISTRIBUTED MUTUAL EXCLUSION.
1 Broadcast. 2 3 Use a spanning tree Root 4 synchronous It takes the same time at link to send a message It takes the same time at each node to process.
Termination Detection
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Program correctness The State-transition model The set of global states = so x s1 x … x sm {sk is the set of local states of process k} S0 ---> S1 --->
Program correctness The State-transition model A global states S  s 0 x s 1 x … x s m {s k = set of local states of process k} S0  S1  S2  Each state.
Hwajung Lee. The State-transition model The set of global states = s 0 x s 1 x … x s m {s k is the set of local states of process k} S0  S1  S2  Each.
Diffusing Computation. Using Spanning Tree Construction for Solving Leader Election Root is the leader In the presence of faults, –There may be multiple.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Feb 15, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Page 1 Mutual Exclusion & Election Algorithms Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Set 16: Distributed Shared Memory 1.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Lecture 7- 1 CS 425/ECE 428/CSE424 Distributed Systems (Fall 2009) Lecture 7 Distributed Mutual Exclusion Section 12.2 Klara Nahrstedt.
Hwajung Lee. Some applications - computing network topology - termination detection - deadlock detection Chandy Lamport algorithm does a partial job.
1 Chapter 11 Global Properties (Distributed Termination)
Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski Center for Pervasive Computing and Networking and Department of Computer Science Rensselaer Polytechnic.
CIS 825 Lecture 9. Minimum Spanning tree construction Each node is a subtree/fragment by itself. Select the minimum outgoing edge of the fragment Send.
CIS 825 Lecture 8. Leader Election Aim is to elect exactly one node as the leader.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
CSE 486/586 Distributed Systems Reliable Multicast --- 1
Termination detection
Lecture 3: State, Detection
Distributed voting application for handheld devices
The Echo Algorithm The echo algorithm can be used to collect and disperse information in a distributed system It was originally designed for learning network.
Election algorithm Who wins? God knows.
Distributed Processing Election Algorithm
ITEC452 Distributed Computing Lecture 9 Global State Collection
Wave and Traversal Algorithms
Formal Models of Distributed Systems
Quick Accounts Walkthrough.
Global state collection
Distributed Snapshot Distributed Systems.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Systems of Linear Equations: An Introduction
Introduction to High Performance Computing Lecture 16
Introduction to High Performance Computing Lecture 17
Data Communication: Routing algorithms
CSE 486/586 Distributed Systems Reliable Multicast --- 1
Presentation transcript:

Introduction to computer networking Distributed Algorithms Class Recitation

Ex. 1 - PIF Revisited Given the PIF algorithm: Init:  l N(l)  0; m  0; p  0 Upon receipt of MSG s (l) N(l)  1 if m=0 then p  1 send MSG s to all l  N-{l} m  1 if  l’ holds N(l’)=1 then send MSG s to p m  0  l’ N(l’)  0 Is it possible that a node i will send messages to all its neighbors except its parent, p, before node p has? Is it possible for node i to send a message to its parent p before node j has finished sending messages to its neighbors?

T=0

T=3

T=4

T=5

T=6

T=7

T=8

T=11

Ex. 2 Given the PIFD algorithm, which is similar to the PIF algorithm, albeit with a second (other than the source) unique node D which behaves differently from the other nodes. For each of the following claims, determine whether the claim is true or false:

The Claims All the nodes will receive the message after a finite time period and all will have m=1 eventually. The algorithm ends. i.e. there is a finite time after which no more messages are transferred. The source node knows when the algorithm has finished When the source node finishes the algorithm, the algorithm has ended.

PIFD Algorithm For Node D: Init: Init:  l N(l)  0; m  0; p  0 Upon receipt of MSG s (l) N(l)  1 if m=0 then p  1 send MSG s to all neighbours m  1

The Claims Revisited All the nodes will receive the message after a finite time period and all will have m=1 eventually. The algorithm ends. i.e. there is a finite time after which no more messages are transferred. The source node knows when the algorithm has finished When the source node finishes the algorithm, the algorithm has ended.