Fluid Limits for Gossip Processes Vahideh Manshadi and Ramesh Johari DARPA ITMANET Meeting March 5-6, 2009 TexPoint fonts used in EMF. Read the TexPoint.

Slides:



Advertisements
Similar presentations
Cooperative Transmit Power Estimation under Wireless Fading Murtaza Zafer (IBM US), Bongjun Ko (IBM US), Ivan W. Ho (Imperial College, UK) and Chatschik.
Advertisements

Bayesian Belief Propagation
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.
Secure connectivity of wireless sensor networks Ayalvadi Ganesh University of Bristol Joint work with Santhana Krishnan and D. Manjunath.
Algorithmic and Economic Aspects of Networks Nicole Immorlica.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
School of Information University of Michigan Network resilience Lecture 20.
Carnegie Mellon Distributed Inference: High Dimensional Consensus TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
1 List Coloring and Euclidean Ramsey Theory TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A Noga Alon, Tel Aviv.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Discovering Affine Equalities Using Random Interpretation Sumit Gulwani George Necula EECS Department University of California, Berkeley.
Graph Sparsifiers by Edge-Connectivity and Random Spanning Trees Nick Harvey U. Waterloo C&O Joint work with Isaac Fung TexPoint fonts used in EMF. Read.
Fast Distributed Algorithm for Convergecast in Ad Hoc Geometric Radio Networks Alex Kesselman, Darek Kowalski MPI Informatik.
1 Learning Entity Specific Models Stefan Niculescu Carnegie Mellon University November, 2003.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Message Passing Algorithms for Optimization
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 17th Lecture Christian Schindelhauer.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Range Queries in Distributed Networks Jie Gao Stony Brook University Dagstuhl Seminar, March 14 th,
The Role of Specialization in LDPC Codes Jeremy Thorpe Pizza Meeting Talk 2/12/03.
CMPE 252A: Computer Networks Review Set:
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Domain decomposition in parallel computing Ashok Srinivasan Florida State University COT 5410 – Spring 2004.
C&O 355 Lecture 2 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
The Best Algorithms are Randomized Algorithms N. Harvey C&O Dept TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAAA.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Random Sampling, Point Estimation and Maximum Likelihood.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
An Algorithmic Proof of the Lopsided Lovasz Local Lemma Nick Harvey University of British Columbia Jan Vondrak IBM Almaden TexPoint fonts used in EMF.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
Graph Sparsifiers Nick Harvey Joint work with Isaac Fung TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Discrete Probability Distributions. Random Variable Random variable is a variable whose value is subject to variations due to chance. A random variable.
Challenges and Opportunities Posed by Power Laws in Network Analysis Bruno Ribeiro UMass Amherst MURI REVIEW MEETING Berkeley, 26 th Oct 2011.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
Learning With Bayesian Networks Markus Kalisch ETH Zürich.
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan and Kee-Chaing Chua National University of.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
C&O 355 Mathematical Programming Fall 2010 Lecture 16 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Online Social Networks and Media
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Approximate Inference: Decomposition Methods with Applications to Computer Vision Kyomin Jung ( KAIST ) Joint work with Pushmeet Kohli (Microsoft Research)
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
C&O 355 Lecture 24 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A.
Asymptotic behaviour of blinking (stochastically switched) dynamical systems Vladimir Belykh Mathematics Department Volga State Academy Nizhny Novgorod.
Probability and Moment Approximations using Limit Theorems.
Stochastic Optimization for Markov Modulated Networks with Application to Delay Constrained Wireless Scheduling Michael J. Neely University of Southern.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Global Clock Synchronization in Sensor Networks Qun Li, Member, IEEE, and Daniela Rus, Member, IEEE IEEE Transactions on Computers 2006 Chien-Ku Lai.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Asymptotic Analysis for Large Scale Dynamic Stochastic Games Sachin Adlakha, Ramesh Johari, Gabriel Weintraub and Andrea Goldsmith DARPA ITMANET Meeting.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Review Law of averages, expected value and standard error, normal approximation, surveys and sampling.
Theory of Computational Complexity M1 Takao Inoshita Iwama & Ito Lab Graduate School of Informatics, Kyoto University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project A Distributed Newton Method for Network Optimization Ali Jadbabaie and Asu Ozdaglar.
Theory of Capital Markets
Complexity of Expander-Based Reasoning and the Power of Monotone Proofs Sam Buss (UCSD), Valentine Kabanets (SFU), Antonina Kolokolova.
Presentation transcript:

Fluid Limits for Gossip Processes Vahideh Manshadi and Ramesh Johari DARPA ITMANET Meeting March 5-6, 2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AA A AAA A  A AA A

Fluid limits for gossip processes V. Manshadi and R. Johari Several goals: (1)Extend fluid analysis to include heterogeneous random graphs. (2)Get finer understanding of behavior when initial number of informed nodes is constant as N ! infinity. (3)Extend the model to include link failures. The simplicity of macroscopic models for information gossip can be combined with the accuracy of microscopic stochastic models MAIN RESULT: We consider a random graph model where each node has d neighbors, and we consider a limit where the number of nodes N approaches infinity. We prove that the (random) sample path of the micro model converges to the (deterministic) path of the corresponding macro model. HOW IT WORKS: We approximately characterize how information flows in the micro model between the sets of informed and uninformed nodes. This approximation is exact as N ! infinity. ASSUMPTIONS AND LIMITATIONS: Our results currently only apply under specific topological assumptions. Gossip is a simple model for communication between nodes: at random times, each node contacts a neighbor and relays its information. Prior work has studied the time until all nodes acquire the information. Two versions of this model: a “micro” model and a “macro” model. I(t) Time t “Macro” I(t) Time t “Micro” The micro model tracks exactly which nodes have the information. The macro model is a mean field limit: what fraction of nodes have learned the information? We connect these two models. … … … … … Nodes that currently have the info Nodes that currently do not have the info Micro and macro models of gossip processes have been available for several decades. Unifying these will allow us to translate macro-level control insights to micro-level system designs. IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION STATUS QUO NEW INSIGHTS

Problem Definition  N sensors form a network G  Initially, set I 0 of nodes receive a piece of information.  At the timepoints of a Poisson process of rate, each informed sensor contacts a neighbor selected uniformly at random If uninformed, that neighbor switches to informed with prob. p  Key questions: How long does it take to inform all the sensors? How does the network structure and connectivity affect the time until all nodes (or a fraction of nodes) acquire the information? How does the size of I 0 change the required time?

Related Work  Application of gossip protocols in sensor networks  GCP (Gossip-based Code Propagation) for mobile wireless sensor networks [Yann, Bertier, Fleury & Kermarrec 07].  Geographic Gossip: Efficient Averaging for Sensor Networks [Dimakis, Sarwate & Wainright 08].  Microscopic model: preserve the combinatorial and probabilistic nature of the process.  It takes O(log(n)) to make O(n) (all) nodes informed [R. Karp, C. Schindelhauer, S. Shenker, & B. Vocking 00].  The constant factor depends on the network structure [Mosk-Aoyama & Shah 06].  Macroscopic model: treat the process as continuous and deterministic  A first order differential equation reasonably models the evolution [Bass 69].  S-shaped curve for the diffusion has been observed in several experiments  Model also studied extensively in epidemiology (SI model)

Our Work Our work rigorously connects the microscopic and macroscopic models using fluid limits. Main result: We show that as number of nodes N ! 1, the microscopic model approaches the macroscopic model. We prove this result in the case of a complete graph (including error terms) and random K -regular graphs. I(t) Time t “Macro” I(t) Time t “Micro”

 For simplicity: assume a fully connected network  Let I ( t ) = # of informed sensors at time t  In a small period d t, approximately I ( t ) d t of informed nodes contact a random neighbor. This neighbor is uninformed with probability ( N - I ( t ))/ N. So:  The solution is the logistic function. We formally justify this heuristic argument (and an analog in the case of random regular graphs). Heuristic Argument

Basic Approach  Directly studying the sample paths of the discrete stochastic model is not straightforward.  Instead we consider T ( x, y ): total time until y nodes are informed, given | I 0 | = x.  Convenient simplification: T ( x, y ) is a sum of independent exponential random variables.  We employ laws of large numbers to study the behavior of T ( x, y ) as N grows large. Time t T(x,y)T(x,y) x y

Results: Complete graph Theorem 1: For complete graph with n nodes and 0 < ® 1, ® 2 <1/2, This result can be inverted to show that the sample path of the fraction of nodes that are informed converges to the discrete continuous model. We can also provide a more refined analysis of T N, to reveal that if the initial set I 0 stays constant of size x as N ! 1, then:

Results: Random Regular Graph We now assume the network is a (uniformly) random K -regular graph. This result matches the result for the complete graph. Key insight in the proof: We are able to precisely analyze the number of edges present from nodes that are interested to nodes that are uninterested. Theorem 2: For G k and 0 < ® 1, ® 2 <1/2,

Future Work  Our goal: a stronger connection between macroscopic and microscopic models (for control, for analysis, etc.)  What about infinite graphs with specific degree distributions?  x i fraction of sensors have d i links; Nodes with high degrees are more probable to be informed earlier.  Idea: analyze the degree distributions in the set of informed (uninformed) nodes and compute information flow (the size of the cut) between two sets.  What about other classes of random graphs?  Sensors are scattered uniformly at random, the probability that any two nodes share a link is p; this is the Random Geometric Graph model  Site (bond) percolated graphs model the scenarios where some of the nodes (links) in the network fail Idea: Couple the link failure process to an equivalent contact failure in the original graph.