L EADER E LECTION Yu Meng 09-25-2013 1. O UTLINE Basic knowledge Overview of Leader Election Complete Topology Logical Ring Topology Three Topology Latest.

Slides:



Advertisements
Similar presentations
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Advertisements

Chapter 5: Tree Constructions
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
CS 542: Topics in Distributed Systems Diganta Goswami.
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
Lecture 8: Asynchronous Network Algorithms
Token-Dased DMX Algorithms n LeLann’s token ring n Suzuki-Kasami’s broadcast n Raymond’s tree.
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Minimum Spanning Trees
Leader Election Bismita Srichandan. Leader Election What is Leader Election Why Leader election is needed Different design topologies Algorithms used.
Università degli Studi dell’Aquila Academic Year 2009/2010 Course: Algorithms for Distributed Systems Instructor: Prof. Guido Proietti Time: Monday:
1 Complexity of Network Synchronization Raeda Naamnieh.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
1 Distributed Computing Algorithms CSCI Distributed Computing: everything not centralized many processors.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – basic techniques Ernesto Damiani University of Bozen Lesson 1 – Introduction.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
A Distributed Algorithm for Minimum-Weight Spanning Trees by R. G. Gallager, P.A. Humblet, and P. M. Spira ACM, Transactions on Programming Language and.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Power saving technique for multi-hop ad hoc wireless networks.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Election Algorithms and Distributed Processing Section 6.5.
Election Algorithms. Topics r Issues r Detecting Failures r Bully algorithm r Ring algorithm.
L EADER E LECTION Advanced Operating Systems (CSC 8320) Fall 2011 Shagun Kariwala.
Vinay Kumar Madhadi 09/23/2009 CSC Outline  Part 1 : Leader Election?  Part 2 : Different Design Topologies Algorithms Used-Bully, Ring, Invitation.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Distributed Algorithms 2014 Igor Zarivach A Distributed Algorithm for Minimum Weight Spanning Trees By Gallager, Humblet,Spira (GHS)
Distributed Computing 5. Synchronization Shmuel Zaks ©
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved Chapter 6 Synchronization.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
4.5 DISTRIBUTED MUTUAL EXCLUSION MOSES RENTAPALLI.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta NCA’03 speaker : Chi-Chih.
Locating Mobile Agents in Distributed Computing Environment.
Synchronization CSCI 4780/6780. Mutual Exclusion Concurrency and collaboration are fundamental to distributed systems Simultaneous access to resources.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 February 10, 2005 Session 9.
ADITH KRISHNA SRINIVASAN
Random Graph Generator University of CS 8910 – Final Research Project Presentation Professor: Dr. Zhu Presented: December 8, 2010 By: Hanh Tran.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
6.5 Election Algorithms -Avinash Madineni.
S. K. S. Gupta, Arizona State Univ On Maximizing Lifetime of Multicast Trees in Wireless Ad hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science.
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
Self-stabilizing energy-efficient multicast for MANETs.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Page 1 Mutual Exclusion & Election Algorithms Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
CIS 825 Review session. P1: Assume that processes are arranged in a ring topology. Consider the following modification of the Lamport’s mutual exclusion.
Bin Wang, Arizona State Univ S-REMiT: A Distributed Algorithm for Source-based Energy Efficient Multicasting in Wireless Ad Hoc Networks Bin Wang and Sandeep.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
CSE 486/586 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
CSC 8420 Advanced Operating Systems Georgia State University Yi Pan Transactions are communications with ACID property: Atomicity: all or nothing Consistency:
Distributed Systems Lecture 9 Leader election 1. Previous lecture Middleware RPC and RMI – Marshalling 2.
CIS 825 Lecture 8. Leader Election Aim is to elect exactly one node as the leader.
Coordination and Agreement
CSE 486/586 Distributed Systems Leader Election
A Distributed Algorithm for Minimum-Weight Spanning Trees
Distributed Processing Election Algorithm
CS60002: Distributed Systems
CSE 486/586 Distributed Systems Leader Election
Leader Election Bernard Chen.
Chapter 15.5 from “Distributed Algorithms” by Nancy A. Lynch
CSE 486/586 Distributed Systems Leader Election
Presentation transcript:

L EADER E LECTION Yu Meng

O UTLINE Basic knowledge Overview of Leader Election Complete Topology Logical Ring Topology Three Topology Latest relevant knowledge Future works References 2

B ASIC KNOWLEDGE 3

L EADER ELECTION Centralized Controller greatly simplifies process synchronization A simple point failure can limit service availability A new controller (the leader) can be chose upon failure of the existing controller Known to all other processes in the group The initial of the system or a existing leader failed The detection of failure is based on a time-out 4

E LECTION C RITERIA Extrema Finding Based on a global priority Preference-based leader election algorithm Processes in the group can vote for a leader based on a personal-preference More general than Extrema Finding Resulting in more complex decision-making outcome 5

L EADER ELECTION VS. M UTUAL E XCLUSION 6 Both try to reach an agreement for identifying a unique process Differences: A mutual exclusion must ensure that no process is starved, while a leader election is more concerned with the fast and successful termination of the election process Leader election need to be announced to all processes

C OMPLETE TOPOLOGY Each process in the group can reach any other process in one message hop Assumptions: All process ids are unique and known to other process Communication network is reliable and only the process may fail A failure is reliable detected Each process as a global priority and the highest- priority is elected leader 7

BULLY ALGORITHM Extrema-finding algorithm Process with the highest-priority process as the leader Bully Algorithm: Process P starts a leader election if it suspects the failure of existing leader P sends inquiry message to nodes with higher priority If any response then, P gives up the election and waits for higher priority node to elect itself leader If no response then P becomes a leader 8

B ULLY A LGORITHM Process 4 detected leader failure and request an election Process 5 and 6 response, then 4 stop Process 5 and 6 each hold a election 9

B ULLY ALGORITHM Process 6 take the response and act as the leader 10

L OGICAL RING TOPOLOGY Easy to construct Message initiated by node will return to itself Indicating completion of a round of operation without the need for acknowledge Two phases: Initiation: One process send an election message to its successors with its ID then each process add its own ID in the forwarding message Leader election: Message come back to initiator then the initiator announce itself as leader and broadcast to others 11

L OGICAL RING TOPOLOGY 12 Phase 1: Initiator Phase 2: Leader election

T REE TOPOLOGIES A tree used for representing topological structure Each node is considered as an autonomous entity to exchange message with adjacent nodes A minimum-weight spanning tree (MST) are employed 13

T REE TOPOLOGY Gallager, Humbelt, and Spira’s algorithm is based on searching and combining Starting from each node and attaching level by level till it ends up with the MST The last node that merges and yields to the final MST becomes the leader 14

L ATEST RELEVANT KNOWLEDGE 15

R ELEVANT RESEARCH In a distribution computing system or mobile network, leader election is a very important issue. They propose a consensus- based leader election algorithm. By analyzing the mathematic analysis and algorithm simulation results, we notice that, when a new leader is elected, the proposed algorithm guarantees a consensus be reached while at the same time reducing the number of message passing. (Chi-Chun Lo et. al., 2012) Leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among all nodes and prolong the lifetime of an MANET, nodes with the most remaining resources should be elected as the leaders. They justify the effectiveness of the proposed schemes through extensive experiments. (Prabir Bhattacharya et. al., 2009) 16

R ELEVANT RESEARCH The space complexity: The necessary or sufficient number of bits on processors to execute a leader election algorithm. Only one bit memory is sufficient for a leader election algorithm which is specific to a fixed n. A lower bound Omega(log n) on the space complexity, that is, it is impossible to construct a leader election algorithm if only log n bits are available for a processor. (Masafumi Yamashita et. al., 2008) 17

F UTURE WORKS 18

F UTURE WORKS Apply the algorithm to cloud computing problem Dynamic consolidation of virtual machine with performance and energy trade-off Virtual machine live migration with detecting failure of physical host Possible application to detect the failure nodes under service level agreements 19

R EFERENCES 1. Chow, Randy, et. al.,Distributed Operating Systems & Algorithms, Addison Wesley, March 18, R. G. Gallager, P. A. Humblet, and P. M. Spira. "A Distributed Algorithm for Minimum-Weight Spanning Trees". ACM Transactions on Programming Languages and Systems 5 (1): 66–77 3. Ephraim Korach, Shay Kutten, Shlomo Moran. "A Modular Technique for the Design of Efficient Distributed Leader Finding Algorithms".ACM Transactions on Programming Languages and Systems 12 (1): 84– DALAL, Y. Broadcast protocols in packet switched computer networks. Tech. Rep. 128, Dep. of Electrical Engineering, Stanford Univ., Apr Mohammed, N. ; Otrok, H. ; Lingyu Wang ; Debbabi, M. ; Bhattacharya, P.,Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET.Dependable and Secure Computing, IEEE Transactions on, 2011, HUMBLET, P.A. A distributed algorithm for minimum weight directed spanning trees. Rep LIDS-P-1149, Laboratory for Information and Decision Systems, Massachusetts Inst. of Technology, Cambridge, Mass., Sept

R EFERENCES 7. Hsu-Chia Cahng ; Chi-Chun Lo, "A Consensus-Based Leader Election Algorithm for Wireless Ad Hoc Networks" Computer, Consumer and Control (IS3C), 2012 International Symposium, 2012, LAWLER, E. Combinatorial Optimization-Networks and Matroids. Holt, Rinehart & Winston, New York, LIU, C.L. Introduction to Combinatorial Mathematics. McGraw Hill, New York, PRIM, R.C. Shortest connection networks and some generalizations. Bell Syst. Tech. J. 36 (1957), YAO, A.C.C. An O(E log log V) algorithm for finding minimum spanning trees. Inf. Process. Lett. 4 (1975), Andot, E. ; Ono, H. ; Sadakane, K. ; Yamashita, M. “The space complexity of the leader election in anonymous networks” Parallel and Distributed Processing, 2008,

22