Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.

Slides:



Advertisements
Similar presentations
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
Advertisements

1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Structuring Unstructured Peer-to-Peer Networks Stefan Schmid Roger Wattenhofer Distributed Computing Group HiPC 2007 Goa, India.
Dynamics of Learning VQ and Neural Gas Aree Witoelar, Michael Biehl Mathematics and Computing Science University of Groningen, Netherlands in collaboration.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Niloy Ganguly Complex Networks Research Group Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Collaborators.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Expediting Searching Processes via Long Paths in P2P Systems 05/30 IDEA Lab.
Ad-Hoc Networks Beyond Unit Disk Graphs
Small-world Overlay P2P Network
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Efficient and Robust Computation of Resource Clusters in the Internet Efficient and Robust Computation of Resource Clusters in the Internet Chuang Liu,
UNIVERSITY OF JYVÄSKYLÄ Topology Management in Unstructured P2P Networks Using Neural Networks Presentation for IEEE Congress on Evolutionary Computing.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (II) 11th Week
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery Using NeuroSearch Presentation for the Agora Center InBCT-seminar Mikko Vapa, researcher InBCT 3.2.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
A Randomized Approach to Robot Path Planning Based on Lazy Evaluation Robert Bohlin, Lydia E. Kavraki (2001) Presented by: Robbie Paolini.
The Zone Routing Protocol (ZRP)
1 Constant Following Distance Simulations CS547 Final Project December 6, 1999 Jeremy Elson.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
1 Performance Evaluation of Computer Networks: Part II Objectives r Simulation Modeling r Classification of Simulation Modeling r Discrete-Event Simulation.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
Generalized Minimum Bias Models
Probabilistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces (1996) L. Kavraki, P. Švestka, J.-C. Latombe, M. Overmars.
The Particle Swarm Optimization Algorithm Nebojša Trpković 10 th Dec 2010.
Complexity of Algorithms
Self Regulated Search in Unstructured Peer-to-Peer Networks Niloy Ganguly Department of Computer Science and Engineering IIT Kharagpur.
Classification and Analysis of Distributed Event Filtering Algorithms Sven Bittner Dr. Annika Hinze University of Waikato New Zealand Presentation at CoopIS.
Introduction 1. Similarity 1.1. Mechanism and mathematical description 1.2. Generalized variables 1.3. Qualitative analysis 1.4. Generalized individual.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
NYMAN On the advantage of multi-hop extensions to IEEE infrastructure mode Sathya Narayanan Panasonic Pei Liu Shivendra Panwar Polytechnic.
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Diffusion in Disordered Media Nicholas Senno PHYS /12/2013.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
1 Gossip-Based Ad Hoc Routing Zygmunt J. Haas, Joseph Halpern, LiLi Cornell University Presented By Charuka Silva.
Seminar on random walks on graphs Lecture No. 2 Mille Gandelsman,
Project funded by the Future and Emerging Technologies arm of the IST Programme Are Proliferation Techniques more efficient than Random Walk with respect.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
1 6. Mean, Variance, Moments and Characteristic Functions For a r.v X, its p.d.f represents complete information about it, and for any Borel set B on the.
Chapter 18 - Part 2 Sampling Distribution Models for.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Design of a Robust Search Algorithm for P2P Networks
Project funded by the Future and Emerging Technologies arm of the IST Programme Search in Unstructured Networks Niloy Ganguly, Andreas Deutsch Center for.
Copyright © Cengage Learning. All rights reserved. 5 Joint Probability Distributions and Random Samples.
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms Daniele Miorandi &
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
The accuracy of averages We learned how to make inference from the sample to the population: Counting the percentages. Here we begin to learn how to make.
1 “Hybrid Search Schemes for Unstructured Peer- to-Peer Networks” “Random Walks in Peer-to-Peer Networks” Christos Gkantsidis, Milena Mihail, Amin Saberi.
Analysis on Performance Controllability under Process Variability: A Step Towards Grid-Based Analog Circuit Optimizers Seobin Jung, Sangho Youn, Jaeha.
Introduction to Wireless Sensor Networks
Chapter 7: Sampling Distributions
Niloy Ganguly, Andreas Deutsch Center for High Performance Computing
Area Coverage Problem Optimization by (local) Search
Generating Random Variates
Presentation transcript:

Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance Computing Technical University Dresden, Germany

Jan 18, Talk Overview Experimental Results Report of the updated version Theoretical Insights

Jan 18, Unstructured Networks Unstructured Network Searching in unstructured networks – Non-deterministic Algorithms Flooding, random walk Our algorithms – packet proliferation and mutation ( dropped for the time being, although we have some ideas ) a c b f g d e

Jan 18, Model Definition Topology (Uniform random, powerlaw topology) Data and query distribution(realistic) Algorithms Metrics (updated)

Jan 18, Forwarding Algorithms Proliferation/Mutation Algorithms Simple Proliferation Algorithm (P) Restricted Proliferation Algorithm (RP) Random Walk Algorithms Simple Random Walk Algorithm (RW) Restricted Random Walk Algorithm (RRW) High Degree Restricted Random Walk Algorithm ( HDRRW )

Jan 18, Proliferation Algorithms Simple Proliferation Algorithm (P) Produce N messages from the single message. Spread them to the neighboring nodes a c b f g d e N = 3

Jan 18, Restricted Proliferation Algorithm (RP) Produce N messages from the single message. Spread them to the neighboring nodes if free a c b f g d e N = 3 Proliferation Algorithms

Jan 18, Proliferation Controlling Function Proliferate more when content and query packets are similar Affinity-driven proliferation

Jan 18, Metrics 1.Network coverage efficiency No of time steps required to cover the entire network 2.Average Cost No of message packets (average over each time step) needed to cover a network 3.Cost per item composite (new) No of message packets + no of lookahead needed to cover a network Follow Fairness criteria - All processes work with same average number of packets.

Jan 18, Experiment Experiment Coverage – Calculate time taken to cover the entire network after initiation of a search from a randomly selected initial node. Repeated for 500 such searches.

Jan 18, Performance of Different Schemes Percentage of Network Covered Time P RP RRW RW

Jan 18, Percentage of Network Covered Time P RP RP – Composite Cost RRW RRW – Composite Cost #Cost Cost Incurred By Different Schemes

Jan 18, Theoretical Insights Theoretical reasoning Objectives 1. Explain experimental results 2.Optimize design parameters Two approaches 1.Continuous models 2.Discrete models

Jan 18, Explain the result of the graph through continuous model Percentage of Network Covered Time P RP RRW RW

Jan 18, Modeling Random Walk and Proliferation Representing them by continuous models Random Walk = Diffusion Proliferation = Reaction-Diffusion System (Diffusion + Addition of New Materials) (We don’t consider restricted random walk for our analysis)

Jan 18, Diffusion Random Walk = Diffusion

Jan 18, Reaction-Diffusion Proliferation = Reaction-Diffusion System (Diffusion + Addition of New Materials)

Jan 18, Calculate Speed of the processes Assumption : If we can calculate the speed in which the concentration is spreading, we can directly relate it with the network coverage time. coverage = speed x time

Jan 18, Calculating Speed of Diffusion Calculate Speed of a finite density  Diffusion Equation pdf of a concentration u Speed (c) of a concentration 

Jan 18, Calculating Speed of Reaction-Diffusion Proliferation – Each time  fraction of concentration is added to the system Reaction- Diffusion Equation:

Jan 18, Calculating Speed of Reaction-Diffusion Restricted Proliferation – Follows logistic population growth model. F(u) = .u(1-u) Reaction- Diffusion Equation:

Jan 18, Percentage of Network Covered Time P RP RRW RW Conclusion derived from analysis coverage = speed x time For Diffusion Coverage become difficult with time. For Proliferation c = const Coverage rate is const over time

Jan 18, Conclusion derived from analysis This analysis helps to explain the results of our experiment. However, doesn’t help us to improve our design. We don’t get any insights regarding improvement of our design

Jan 18, Fast coverage of nodes. Minimum usage of message packets. Our Design Objective Can we quantify Fast and Minimum (what exactly does it mean?) or At least can we express it qualitatively in terms of message movement

Jan 18, A Simple Experiment Objective – To measure coverage speed of different algorithms Random walk of packets all starting from the same nodes Proliferation of packets after starting from a central node Random walk of packets starting from different nodes

Jan 18, A Simple Experiment Objective – To measure coverage speed of different algorithms SlowestFastest Least Collision, each individual particle has its own zone to explore

Jan 18, Desired output Have proliferation in such a way, so that each individual packets have just enough place to explore without overlapping with others Minimum – Use as few packets as possible so that each packet has individual area to explore without colliding with other packets. Fast -Fastest possible under the above restriction of minimum.

Jan 18, N-Random Walkers (All starting from same point) Three Periods Period 1 : At the start, when all the walkers are close to each other, they demonstrate a flooding behavior. Period 2 : (Intermediate state) There is still considerable collision, however each packet has some place to explore. Period 3 : All the random walkers are far away from each other and the system behave as if comprising of N independent random walkers

Jan 18, N-Random Walkers – No. of nodes covered 3-dimensional lattice No of nodes covered Lasts till Period 1t d t = log N Period 2t d/2 t = N 2 Period 3N.t (t – nodes covered by a single random walker)

Jan 18, Time No of nodes covered ---- Period Period 3 N = 10 Phase Transformation between Period 2 and Period 3 The n random walkers cover nodes according to the formula of Period 2 or Period 3, whichever is smaller. Period 2= t d/2 Period 3 =  N.t

Jan 18, Time No of nodes covered ---- Period Period 3 N = 10 Phase Transformation between Period 2 and Period 3 Phase Transformation between Period 2 and Period 3 occurs, when t d/2 > N.t So, N determines the phase transformation Let d = 3 N = t 3/2 /t = t 1/2 i.e. t transform = N 2

Jan 18, Time No of nodes covered ---- Period Period 3 N = 10 Optimum Point and our aim Our Aim Can we keep our proliferation scheme always at optimum point Optimum Point Collision Unexplored area

Jan 18, Equation for Proliferation in Period 2 and Period Time Period 3 Period  =  =  = 1.01 Period 2= t d/2 Period 3 =  (  +1) t. N proli.t N Let (1+  ) =  be constant And N proli = 1, Then how should the system behave?

Jan 18, Optimum value of  Time Value of  Optimum value of  such that the system always stays at the conjuction between Period 2 and Period 3 Period 2= t d/2 Period 3 =  (  +1) t. N proli.t t 3/2 =  t. N proli.t  = (t/ N proli 2 ) (1/2t)  tends to 1, exponential growth of packet is restricted.

Jan 18, The theoretical limit of fast is defined. The coverage time for proliferation The coverage time for random walk Fairness redefined Spreading as much as you can as long as there is no collision Awaiting Simulation verification Conclusion

Jan 18, Summary Extensive experiments done to test the robustness of our proposition Theoretical work undertaken to find the reason behind the robustness Theoretical work is pointing towards newer direction of research.

Jan 18, Thank you Special Thanks to the Bios group for many hours of discussions