Distributed Information Processing

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
CS542 Topics in Distributed Systems Diganta Goswami.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Security Issues in Ant Routing Weilin Zhong. Outline Swarm Intelligence AntNet Routing Algorithm Security Issues in AntNet Possible Solutions.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
UNIVERSITY OF JYVÄSKYLÄ Building NeuroSearch – Intelligent Evolutionary Search Algorithm For Peer-to-Peer Environment Master’s Thesis by Joni Töyrylä
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Distributed Message Passing for Large Scale Graphical Models Alexander Schwing Tamir Hazan Marc Pollefeys Raquel Urtasun CVPR2011.
1 Distributed Computing Algorithms CSCI Distributed Computing: everything not centralized many processors.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Natural Computation and Applications Xin Yao Natural Computation Group School of Computer Science The University of Birmingham.
Distributed Systems Distributed Algorithms 1 Brendan Tangney Distributed Systems (Distributed Algorithms – A Problem Based Learning Approach)
May 14, Organization Design and Dynamic Resources Huzaifa Zafar Computer Science Department University of Massachusetts, Amherst.
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ants-based Routing Marc Heissenbüttel University of Berne
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Ashish Gupta (98130) Ashish Gupta (98131) Under guidance of Prof. B. N. Jain.
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
Machine Learning and Optimization For Traffic and Emergency Resource Management. Milos Hauskrecht Department of Computer Science University of Pittsburgh.
EAIT, February 2006 A Pragmatic Approach towards the Improvement of Performance of Ad Hoc Routing ProtocolsOptimizations To Multipath Routing Protocols.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
The Computer Communication Lab (236340) Winter Resilient Packet Ring GUI Simulator Developed By: Anton Spirkov Slava
1 Next Few Classes Networking basics Protection & Security.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
1 Self-stabilizing Algorithms and Frequency Assignment Problems.
Example: Sorting on Distributed Computing Environment Apr 20,
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
C. Savarese, J. Beutel, J. Rabaey; UC BerkeleyICASSP Locationing in Distributed Ad-hoc Wireless Sensor Networks Chris Savarese, Jan Beutel, Jan Rabaey.
Dr.Abeer Mahmoud ARTIFICIAL INTELLIGENCE (CS 461D) Dr. Abeer Mahmoud Computer science Department Princess Nora University Faculty of Computer & Information.
A Dynamic Query-tree Energy Balancing Protocol for Sensor Networks H. Yang, F. Ye, and B. Sikdar Department of Electrical, Computer and systems Engineering.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua.
SPIN: Sensor Protocols for Information via Negotiation
William Stallings Data and Computer Communications
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
A Taxonomy of Mechanisms for Multi-Access
Coordination and Agreement
Unit 1:Frame Relay.
Chapter 16 – Networking Outline 16.1 Introduction
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Internet Hardware.
Artificial Intelligence (CS 370D)
Replication Middleware for Cloud Based Storage Service
TexPoint fonts used in EMF.
Chapter 20 Network Layer: Internet Protocol
Distributed Systems, Consensus and Replicated State Machines
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Process-to-Process Delivery:
Student: Fang Hui Supervisor: Teo Yong Meng
CDA 6505 Network Architecture and Client/Server Computing
Hemant Kr Rath1, Anirudha Sahoo2, Abhay Karandikar1
Distributed Computing:
Gengbin Zheng, Esteban Meneses, Abhinav Bhatele and Laxmikant V. Kale
Process-to-Process Delivery: UDP, TCP
Information Sciences and Systems Lab
Distributed Systems and Algorithms
Presentation transcript:

Distributed Information Processing in Biological and Computational Systems

Why this article Studies the similarities between computation and biological systems Explores algorithms used in both systems Highlights strengths and weaknesses in both systems Interest in Machine Learning which is required to solve the distributed problem

The Problem “Biological Systems… are distributed and in most cases operate without central control. Such systems must solve information processing problems that are often very similar to problems faced by computational systems, including coordinated decision making, leader election, routing, navigation, and more.” This article explores problems and how each system approaches a solution.

Paper Outline Communication constraints Runtime vs robustness and adaptability Strategies employed by both systems

Communication Models Most distributed models are based on message passing Beeping Model Maximal Independent Set (MIS) problem in computing Sensory Organ Precursor (SOP) selection in biological systems Population Protocols TCP in networking Ant foraging Beeping Model: a unary signal can be sent (beeping or not, where only communication happening with a beep) solves interval coloring, neighboring nodes have disjoint resources, O(logn) solves Maximal Independent Set (MIS) 1. Every node is either an MIS node or connected to one. 2. no two MIS nodes are connected to each other Fruit Flies brain develops a subset of cell which become sensory bristles in which every cell must be a sensory bristle or connected to one and no to SOP can be next to eachother Population Protocols TCP - determines available bandwidth while routing packets Ants - determine amount of food in environment and location based on speed of interactions

Speed vs Robustness Biological systems are designed to be adaptive and robust Tolerate faults Recover from failures or adapt to another solution Mutation, protein misfolding, targeted virus attacks Computational Systems are designed to optimize runtime Complete an algorithm quickly Employ failure detection, not correction Cryptography, checksums, etc.

Distributed Algorithm Strategies Stochastic decision making breaks symmetry overcome noise ensure survival in changing environments Positive and negative feedback Unique Identifiers biological systems do not use identifiers to label sender/receiver Major/weighted voting

Critique Completeness Discussion of what is to come Cautionary note Defined each algorithm Presented examples in both computational and biological systems Discussion of what is to come Expressed a need for further research in the field New models are needed for dynamic communication Cautionary note Some biological systems do not guarantee optimality Completeness - The authors did an impressive job of defining each algorithm and presenting examples in both computational and biological systems

Questions Literature: Distributed Information Processing in Biological and Computational Systems by Saket Navlakha and Ziv Bar-Joseph (Jan 2015)