Multiprocess Synchronization Algorithms (20225241) Lecturer: Danny Hendler Global Computation.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Impossibility of Distributed Consensus with One Faulty Process
Lecture 8: Asynchronous Network Algorithms
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
Chapter 15 Basic Asynchronous Network Algorithms
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty.
CS 603 Handling Failure in Commit February 20, 2002.
Distributed Algorithms – 2g1513 Lecture 10 – by Ali Ghodsi Fault-Tolerance in Asynchronous Networks.
Lecture 7: Synchronous Network Algorithms
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Complexity of Network Synchronization Raeda Naamnieh.
CPSC 668Set 4: Asynchronous Lower Bound for LE in Rings1 CPSC 668 Distributed Algorithms and Systems Fall 2009 Prof. Jennifer Welch.
1 Minimum Spanning Trees Gallagher-Humblet-Spira (GHS) Algorithm.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Distributed Algorithms (22903) Lecturer: Danny Hendler Global Computation in the presence of Link Failures.
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Lecture 8 : Arrangements and Duality Computational Geometry Prof. Dr. Th. Ottmann 1 Duality and Arrangements Duality between lines and points Computing.
Distributed Algorithms (22903) Lecturer: Danny Hendler Leader election in rings This presentation is based on the book “Distributed Computing” by Hagit.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
 Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 6: Impossibility.
Systems of Distributed systems Module 2 - Distributed algorithms Teaching unit 2 – Properties of distributed algorithms Ernesto Damiani University of Bozen.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Broadcast & Convergecast Downcast & Upcast
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
Consensus and Its Impossibility in Asynchronous Systems.
Distributed Computing 3. Leader Election – lower bound for ring networks Shmuel Zaks ©
Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Flow Algorithms Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Analysis of Algorithms Week 9, Lecture 2.
Lecture #14 Distributed Algorithms (II) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Leader Election (if we ignore the failure detection part)
Student: Fan Bai Instructor: Dr. Sushil Prasad CSc8530.
Impossibility of Distributed Consensus with One Faulty Process By, Michael J.Fischer Nancy A. Lynch Michael S.Paterson.
Chapter 7 May 3 Ford-Fulkerson algorithm Step-by-step walk through of an example Worst-case number of augmentations Edmunds-Karp modification Time complexity.
Hwajung Lee. Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.   i,j  V  i,j are non-faulty ::
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
Alternating Bit Protocol S R ABP is a link layer protocol. Works on FIFO channels only. Guarantees reliable message delivery with a 1-bit sequence number.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
1 Fault-Tolerant Consensus. 2 Communication Model Complete graph Synchronous, network.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Distributed Algorithms (22903) Lecturer: Danny Hendler Leader election in rings This presentation is based on the book “Distributed Computing” by Hagit.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Trees.
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty ::
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Distributed Algorithms (22903)
Lecture 9: Asynchronous Network Algorithms
Leader Election (if we ignore the failure detection part)
Alternating Bit Protocol
Distributed Consensus
TexPoint fonts used in EMF.
Edmonds-Karp Algorithm
Richard Anderson Lecture 21 Network Flow
Consensus in Synchronous Systems: Byzantine Generals Problem
Distributed Algorithms (22903)
EE5900 Advanced Embedded System For Smart Infrastructure
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Advanced Graph Homer Lee 2013/10/31.
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Presentation transcript:

Multiprocess Synchronization Algorithms ( ) Lecturer: Danny Hendler Global Computation

2 Model P0: 4P0: 4 Processes are represented by graph nodes, each node stores an input value Bi-directional communication links Asynchronous Links may fail-stop but connectivity is assured (safe network) Failures cannot be detected. We let n, m respectively denote the number of nodes and links. P 1 : 17 P 2 : -6 P 3 : 46

3 Global computation We need to compute a global sensitive function of process inputs P0: 4P0: 4 P 1 : 17 P 2 : -6 P 3 : 46 Definition An n-variate function F is global sensitive, if there is an n-tuple, v 1, …, v n, such that the following holds:  i  {1,…. n}  u i : F(v 1,…, v i,…v n ) ≠ F(v 1,…, u i,…v n ) To compute a global sensitive function, we need to see ALL inputs.

4 Global computation We need to compute a global sensitive function of process inputs Definition An n-variate function F is global sensitive, if there is an n-tuple, v 1, …, v n, such that the following holds:  i  {1,…. n}  u i : F(v 1,…, v i,…v n ) ≠ F(v 1,…, u i,…v n ) Examples: Max, sum, xor, …

5 Global computation algorithm Every process broadcasts its input to all other processes. Worst-case message complexity: Ω(mn) Can we do better (in all networks)?

6 A lower bound for a ring Theorem The worst-case message complexity of any non-uniform global computation algorithm on a safe ring is Ω(n log n).

77 Global Computation in a ring p1p1 p2p2 p3p3 p4p4 P n-1 PnPn p0p0 e1e1 e2e2 e3e3 e n-1 Computation starts here

88 Global Computation in a ring (cont'd) p0p0 Computation starts here p1p1 p2p2 P n-1 PnPn e1e1 e n-1 p n/4 p n/4+1 p 3n/4 p 3n/4+1 e n/4 e 3n/4 BP 1 UV 1

99 elel emem erer BP i ={e l, e r } UV i elel emem Bp i+1 ={e l, e m } emem erer Bp i+1 ={e m, e r } Execution Evolution

10 Proof of Lemma 3 p0p0 p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer BP i emem Execution E r involves these processes only Execution E l involves these processes only

11 Proof of Lemma 3 (cont'd) p0p0 p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer BP i emem Execution E l E r results when we connect both e l and e r and block e m By failing e m we prove the algorithm incorrect.

12 Generalizing to networks other than rings Theorem For every n, m  O(n 2 ), there exists a safe network with θ(n) nodes and θ(m) links, on which the worst-case message complexity of any global computation is Ω(m log n).

13 The graph G(n,m) p1p1 p2p2 p3p3 p4p4 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k tr 1 tr 2 tr 3 tr k k= √ m Cut L Cut R Path e1e1 e2e2 e3e3 e n-1

14 Phase 0 p1p1 p2p2 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k tr 1 tr 2 tr 3 tr k k= √ m Cut L Cut R e1e1 e n-1 p n/4 p n/4+1 p 3n/4 p 3n/4+1 e n/4 e 3n/4 BP 1 UV 0

15 Messages delay rule p1p1 p2p2 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k tr 1 tr 2 tr 3 tr k k= √ m Cut L Cut R e1e1 e n-1 p n/4 p n/4+1 p 3n/4 p 3n/4+1 e n/4 e 3n/4 BP 1 UV 0 Disable communication between p 0 and path until either CUT L or CUT R is saturated

16 Messages delay rule (cont’d) p1p1 p2p2 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k tr 1 tr 2 tr 3 tr k k= √ m Cut L Cut R e1e1 e n-1 p n/4 p n/4+1 p 3n/4 p 3n/4+1 e n/4 e 3n/4 BP 1 UV 0 Disable communication between p 0 and path until either CUT L or CUT R is saturated

17 Messages delay rule (cont’d) p1p1 p2p2 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k tr 1 tr 2 tr 3 tr k k= √ m Cut L Cut R e1e1 e n-1 p n/4 p n/4+1 p 3n/4 p 3n/4+1 e n/4 e 3n/4 BP 1 UV 0 Then unblock all edges except for BPi

18 A lower bound for uniform global computation on a ring Theorem The worst-case message complexity of any uniform global computation algorithm on a safe ring is Ω(n 2 ).

19 Key Argument of Lemma 7: Since n is unknown, can’t distinguish between these p0p0 p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer p1p1 p2p2 P n-1 PnPn e1e1 e n-1 plpl p l+1 prpr p r+1 elel erer