University of Iowa1 Self-stabilization. The University of Iowa2 Man vs. machine: fact 1 An average household in the developed countries has 50+ processors.

Slides:



Advertisements
Similar presentations
Chapter 6 - Convergence in the Presence of Faults1-1 Chapter 6 Self-Stabilization Self-Stabilization Shlomi Dolev MIT Press, 2000 Shlomi Dolev, All Rights.
Advertisements

Chapter 7 - Local Stabilization1 Chapter 7: roadmap 7.1 Super stabilization 7.2 Self-Stabilizing Fault-Containing Algorithms 7.3 Error-Detection Codes.
1 Discrete Structures & Algorithms Graphs and Trees: III EECE 320.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Self Stabilizing Algorithms for Topology Management Presentation: Deniz Çokuslu.
Self-stabilizing Distributed Systems Sukumar Ghosh Professor, Department of Computer Science University of Iowa.
Self-Stabilization in Distributed Systems Barath Raghavan Vikas Motwani Debashis Panigrahi.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Self Stabilization 1.
UBE529 Distributed Algorithms Self Stabilization.
From Self- to Snap- Stabilization Alain Cournier, Stéphane Devismes, and Vincent Villain SSS’2006, November 17-19, Dallas (USA)
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
LSRP: Local Stabilization in Shortest Path Routing Hongwei Zhang and Anish Arora Presented by Aviv Zohar.
Tracking Murat Demirbas SUNY Buffalo. A Pursuer-Evader Game for Sensor Networks Murat Demirbas Anish Arora Mohamed Gouda.
Peer-to-Peer Spatial Queries in Sensor Networks Murat Demirbas Hakan Ferhatosmanoglu The Ohio State University.
CPSC 668Self Stabilization1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
LSRP: Local Stabilization in Shortest Path Routing Anish Arora Hongwei Zhang.
CS294, YelickSelf Stabilizing, p1 CS Self-Stabilizing Systems
Outline Max Flow Algorithm Model of Computation Proposed Algorithm Self Stabilization Contribution 1 A self-stabilizing algorithm for the maximum flow.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Self-Stabilization An Introduction Aly Farahat Ph.D. Student Automatic Software Design Lab Computer Science Department Michigan Technological University.
Localized Self- healing using Expanders Gopal Pandurangan Nanyang Technological University, Singapore Amitabh Trehan Technion - Israel Institute of Technology,
Self Stabilization Classical Results and Beyond… Elad Schiller CTI (Grece)
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
Chapter 7 - Local Stabilization1 Chapter 7 – Local Stabilization Self-Stabilization Shlomi Dolev MIT Press, 2000 Draft of January 2004 Shlomi Dolev, All.
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
Broadcast & Convergecast Downcast & Upcast
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Selected topics in distributed computing Shmuel Zaks
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Fault-containment in Weakly Stabilizing Systems Anurag Dasgupta Sukumar Ghosh Xin Xiao University of Iowa.
Graph Theory in Computer Science
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
1 Self-stabilizing Algorithms and Frequency Assignment Problems.
Defining Programs, Specifications, fault-tolerance, etc.
Fault-containment in Weakly Stabilizing Systems Anurag Dasgupta Sukumar Ghosh Xin Xiao University of Iowa.
By J. Burns and J. Pachl Based on a presentation by Irina Shapira and Julia Mosin Uniform Self-Stabilization 1 P0P0 P1P1 P2P2 P3P3 P4P4 P5P5.
Dissecting Self-* Properties Andrew Berns & Sukumar Ghosh University of Iowa.
Autonomic distributed systems. 2 Think about this Human population x10 9 computer population.
Self-Stabilizing K-out-of-L Exclusion on Tree Networks Stéphane Devismes, VERIMAG Joint work with: – Ajoy K. Datta (Univ. Of Nevada) – Florian Horn (LIAFA)
Self-Stabilizing K-out-of-L Exclusion on Tree Networks Stéphane Devismes, VERIMAG Joint work with: – Ajoy K. Datta (Univ. Of Nevada) – Florian Horn (LIAFA)
Program correctness The State-transition model A global states S  s 0 x s 1 x … x s m {s k = set of local states of process k} S0  S1  S2  Each state.
Stabilization Presented by Xiaozhou David Zhu. Contents What-is Motivation 3 Definitions An Example Refinements Reference.
Fault Management in Mobile Ad-Hoc Networks by Tridib Mukherjee.
Several sets of slides by Prof. Jennifer Welch will be used in this course. The slides are mostly identical to her slides, with some minor changes. Set.
Self-stabilization. What is Self-stabilization? Technique for spontaneous healing after transient failure or perturbation. Non-masking tolerance (Forward.
Graph Theory Trees. WHAT YOU WILL LEARN Trees, spanning trees, and minimum-cost spanning trees.
CS 542: Topics in Distributed Systems Self-Stabilization.
Trees Thm 2.1. (Cayley 1889) There are nn-2 different labeled trees
Self-stabilizing energy-efficient multicast for MANETs.
Self-stabilization. Technique for spontaneous healing after transient failure or perturbation. Non-masking tolerance (Forward error recovery). Guarantees.
Hwajung Lee.  Technique for spontaneous healing.  Forward error recovery.  Guarantees eventual safety following failures. Feasibility demonstrated.
Superstabilizing Protocols for Dynamic Distributed Systems Authors: Shlomi Dolev, Ted Herman Presented by: Vikas Motwani CSE 291: Wireless Sensor Networks.
ITEC452 Distributed Computing Lecture 15 Self-stabilization Hwajung Lee.
Snap-Stabilizing Depth-First Search on Arbitrary Networks Alain Cournier, Stéphane Devismes, Franck Petit, and Vincent Villain OPODIS 2004, December
CSE-591: Term Project Self-stabilizing Network Algorithms by Tridib Mukherjee ASU ID :
Computer Science 425/ECE 428/CSE 424 Distributed Systems (Fall 2009) Lecture 20 Self-Stabilization Reading: Chapter from Prof. Gosh’s book Klara Nahrstedt.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Tirgul 12 Solving T4 Q. 3,4 Rehearsal about MST and Union-Find
CONNECTED-COMPONENTS ALGORITHMS FOR MESH-CONNECTED PARALLEL COMPUTERS
Distributed Maintenance of Spanning Tree using Labeled Tree Encoding
第1部: 自己安定の緩和 すてふぁん どぅゔぃむ ポスドク パリ第11大学 LRI CNRS あどばいざ: せばすちゃ てぃくそい
Vineet Mittal Should more be added here Committee Members:
Estimation of the Number of Min-Cut Sets in a Network
Self-stabilization.
Student: Fang Hui Supervisor: Teo Yong Meng
CS60002: Distributed Systems
4-4 Graph Theory Trees.
Presentation transcript:

University of Iowa1 Self-stabilization

The University of Iowa2 Man vs. machine: fact 1 An average household in the developed countries has 50+ processors. Most are embedded or special purpose in nature.

The University of Iowa3 A checklist BMW 7 series car55+ Washing and drying machines2 Mobile phone1 Digital TV1 Camera1 CD / DVD / MP3 player1 Kitchen gadgets3 + PC / laptop/ accessories2-3

The University of Iowa4 Man vs. machine fact 2 The number of processors in the world is increasing at a faster pace than the number of human beings. We are being outnumbered by the processors.

The University of Iowa5 Man vs. machine: fact 3 As computing becomes ubiquitous, failures and perturbations become expected events. Systems must adapt to such events. There will not be enough human beings to fix the systems!

The University of Iowa6 So What? Future systems should be able to take care of themselves. These include the ability to self- organize, self-heal, self-optimize etc. IBM proclaimed autonomic computing as their vision of the future of computing systems. Such systems will be able to self-heal, self-organize, self-optimize and self-protect.

The University of Iowa7 Self-stabilization The earliest concept in the self -* category Coined by Dijkstra (CACM 74) illustrating three mutual exclusion systems that recover to a legal configurations (i.e. exactly one process in its critical section) from ANY initial configuration.

The University of Iowa8 Self-stabilizing systems Recover from any initial configuration to a legitimate configuration in a bounded number of steps as long as the codes are in tact. {true} SSS {Legal} Pre-conditionpost-condition self-stabilizing system

The University of Iowa9 Self-stabilizing systems State space legal Transient failures perturb the global state. The ability to spontaneously recover from any initial state implies that no initialization is ever required

The University of Iowa10 Self-stabilizing systems Self-stabilizing systems exhibits non-masking fault- tolerance. It satisfies the following two criteria fault 1. Convergence 2. Closure Not Legal Legal convergence closure

University of Iowa11 Example: Spanning tree construction Given a connected graph G=(V,E) and a root r, design an algorithm for maintaining a spanning tree in presence of transient failures that may corrupt the local states of processes. Nodes are numbered 0, 1, 2,.., n-1 n = |V|

University of Iowa12 Definitions Each process i has two variables: L = level, its distance from the root r via tree edges P = parent N(i) denotes the neighbors of i By definition L(r) = 0, and P(r) is undefined. In a legal state  i  V: i ≠ r, L(i) ≠ n and P(i) ≠ n, and L(i) = L(P(i))+1.

University of Iowa13 Sample case

University of Iowa14 The algorithm Repeat (R1).If (L(i)≠ n)  (L(i) ≠ L(P(i)) +1)  (L(P) ≠ n) → L(i) :=L(P(i))+1 (R2). if (L(i)  n)  (L(P(i))=n) → L(i):=n (R3) if (L(i)=n)  (  k  N(i):L(k) < n-1) → L(i) :=L(k)+1; P(i):= k od

The University of Iowa15 A spanning tree example L=0 L=1L=2 L=3 L=4 L=5 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=6

The University of Iowa16 A spanning tree example L=0L=1 L=5L=3 L=4L=5 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=6

The University of Iowa17 A spanning tree example L=0L=1L=5L=6 L=4L=5 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent.. root L=6

The University of Iowa18 A spanning tree example L=0 L=1L=5 L=6 L=7 L=5 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=6

The University of Iowa19 A spanning tree example L=0L=1 L=5L=6 L=5 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=6

The University of Iowa20 A spanning tree example L=0L=1 L=5 L=6 L=7 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent.. root L=6

The University of Iowa21 A spanning tree example L=0 L=1 L=5L=6 L=2 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=3

The University of Iowa22 A spanning tree example L=0 L=1L=4 L=6 L=3 L=2 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=3

The University of Iowa23 A spanning tree example L=0L=1 L=4 L=5 L=3 L=2 L(i) = L (P(i)) + 1 When L becomes > n-1, a node looks for a new parent. root L=3

University of Iowa24 Proof of stabilization Define an edge from i to P(i) to be well-formed, when L(i) ≠ n, L(P(i) ≠ n and L(i) = L(P(i))+1. In any configuration, the well-formed edges form a spanning forest. Delete all edges that are not well-formed. Designate each tree T(k) in the forest by the lowest value of L in it.

University of Iowa25 Example In the sample graph shown earlier. T(0) = {0, 1} T(2) = {2, 3, 4, 5} Let F(k) denote the number of T(k) in the forest. Define a tuple F= (F(0), F(1), F(2) …, F(n)). For the sample graph, F = (1, 0, 1, 0, 0, 0) after node 2 underwent a transient failure.

University of Iowa26 Skeleton of the proof Minimum F = (1,0,0,0,0,0) {legal configuration} Maximum F = (1, n-1, 0, 0, 0, 0). With each action of the algorithm, F decreases lexicographically. Verify the claim! This proves that eventually F becomes (1,0,0,0,0,0) and the spanning tree stabilizes.

The University of Iowa27 Pursuer Evader Games In a disaster zone, rescuers (pursuers) can track hot spots (evaders) using sensor networks. (Arora, Demirbas 2003)

The University of Iowa28 Pursuer Evader Games A spanning tree (DFS) is constructed on-the-fly with the evader as the root. How fast can the pursuer “catch” the evader?

The University of Iowa29 Conclusion Applications are growing. New techniques for convergence by studying the behavior of biological elements. Relationship between game theory and stabilization is worth studying