Distributed Algorithms (22903) Lecturer: Danny Hendler Global Computation in the presence of Link Failures.

Slides:



Advertisements
Similar presentations
Impossibility of Distributed Consensus with One Faulty Process
Advertisements

Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
Lecture 8: Asynchronous Network Algorithms
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
Lecture 24 Time and Space of NTM. Time For a NDM M and an input x, Time M (x) = the minimum # of moves leading to accepting x if x ε L(M) = infinity if.
Chapter 15 Basic Asynchronous Network Algorithms
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty.
CS223 Advanced Data Structures and Algorithms 1 Greedy Algorithms Neil Tang 4/8/2010.
CS 603 Handling Failure in Commit February 20, 2002.
Distributed Algorithms – 2g1513 Lecture 10 – by Ali Ghodsi Fault-Tolerance in Asynchronous Networks.
Lecture 7: Synchronous Network Algorithms
Byzantine Generals Problem: Solution using signed messages.
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Data Structures, Spring 2004 © L. Joskowicz 1 Data Structures – LECTURE 14 Strongly connected components Definition and motivation Algorithm Chapter 22.5.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Complexity of Network Synchronization Raeda Naamnieh.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21st Lecture Christian Schindelhauer.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
CPSC 668Set 16: Distributed Shared Memory1 CPSC 668 Distributed Algorithms and Systems Fall 2006 Prof. Jennifer Welch.
CSE621/JKim Lec4.1 9/20/99 CSE621 Parallel Algorithms Lecture 4 Matrix Operation September 20, 1999.
CPSC 668Set 10: Consensus with Byzantine Failures1 CPSC 668 Distributed Algorithms and Systems Fall 2006 Prof. Jennifer Welch.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 5: Synchronous Uniform.
Lecture 12 Minimum Spanning Tree. Motivating Example: Point to Multipoint Communication Single source, Multiple Destinations Broadcast – All nodes in.
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Lecture 8 : Arrangements and Duality Computational Geometry Prof. Dr. Th. Ottmann 1 Duality and Arrangements Duality between lines and points Computing.
Distributed Algorithms (22903) Lecturer: Danny Hendler Leader election in rings This presentation is based on the book “Distributed Computing” by Hagit.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 4 – Consensus and reliable.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Systems of Distributed systems Module 2 - Distributed algorithms Teaching unit 2 – Properties of distributed algorithms Ernesto Damiani University of Bozen.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Broadcast & Convergecast Downcast & Upcast
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
Equality Function Computation (How to make simple things complicated) Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Guanfeng.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
UNC Chapel Hill Lin/Foskey/Manocha Minimum Spanning Trees Problem: Connect a set of nodes by a network of minimal total length Some applications: –Communication.
Minimum Spanning Trees and Kruskal’s Algorithm CLRS 23.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
1 © R. Guerraoui Regular register algorithms R. Guerraoui Distributed Programming Laboratory lpdwww.epfl.ch.
Lower Bound for Sparse Euclidean Spanners Presented by- Deepak Kumar Gupta(Y6154), Nandan Kumar Dubey(Y6279), Vishal Agrawal(Y6541)
Lecture #14 Distributed Algorithms (II) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Multiprocess Synchronization Algorithms ( ) Lecturer: Danny Hendler Global Computation.
Leader Election (if we ignore the failure detection part)
Student: Fan Bai Instructor: Dr. Sushil Prasad CSc8530.
Hwajung Lee. Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.   i,j  V  i,j are non-faulty ::
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Set 16: Distributed Shared Memory 1.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Distributed Algorithms (22903) Lecturer: Danny Hendler Leader election in rings This presentation is based on the book “Distributed Computing” by Hagit.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Randomized Algorithms for Distributed Agreement Problems Peter Robinson.
Leader Election Let G = (V,E) define the network topology. Each process i has a variable L(i) that defines the leader.  i,j  V  i,j are non-faulty ::
Distributed Algorithms (22903)
Lecture 16 Bipartite Matching
Lecture 9: Asynchronous Network Algorithms
MST in Log-Star Rounds of Congested Clique
Distributed Consensus
Agreement Protocols CS60002: Distributed Systems
Network Flow 2016/04/12.
Introduction Wireless Ad-Hoc Network
Topological Sort (an application of DFS)
Discrete Mathematics and its Applications Lecture 5 – Random graphs
Minimum Spanning Trees
Presentation transcript:

Distributed Algorithms (22903) Lecturer: Danny Hendler Global Computation in the presence of Link Failures

2 Model P0: 4P0: 4 Processes are represented by graph nodes, each node stores an input value Bi-directional communication links Asynchronous Links may fail-stop but connectivity is assured (safe network) Failures cannot be detected. We let n, m respectively denote the number of nodes and links. P 1 : 17 P 2 : -6 P 3 : 46

3 Global computation p2p2 We need to compute a global sensitive function of process inputs P0: 4P0: 4 P 1 : 17 P 2 : -6 P 3 : 46 Definition An n-variate function F is global sensitive, if there is an n-tuple, v 1, …, v n, such that the following holds:  i  {1,…. n}  u i : F(v 1,…, v i,…v n ) ≠ F(v 1,…, u i,…v n ) To compute a global sensitive function, we need to see ALL inputs.

4 Global computation We need to compute a global sensitive function of process inputs Definition An n-variate function F is global sensitive, if there is an n-tuple, v 1, …, v n, such that the following holds:  i  {1,…. n}  u i : F(v 1,…, v i,…v n ) ≠ F(v 1,…, u i,…v n ) Examples: Max, sum, xor, …

5 Global computation algorithm Every process broadcasts its input to all other processes. Worst-case message complexity: Ω(mn) Can we do better (in all networks)?

6 Lower Bound on Uniform Algorithms Theorem For every n, m  O(n 2 ), there exists a safe network with θ(n) nodes and θ(m) links, on which the worst-case message complexity of any global computation is Ω(m log n).

7 Lower Bound Proofs on Global Computation

8 The graph G(n,m) p1p1 p2p2 p3p3 p4p4 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k br 1 br 2 br 3 br k k= √ m Cut L Cut R Path e1e1 e2e2 e3e3 e n-1

9 Phase 0 p1p1 p2p2 P n-1 PnPn p0p0 bl 1 bl 2 bl 3 bl k tl 1 tl 2 tl 3 tl k br 1 br 2 br 3 br k br 1 br 2 br 3 br k k= √ m Cut L Cut R e1e1 e n-1 p n/4 p n/4+1 p 3n/4 p 3n/4+1 e n/4 e 3n/4 BP 0 UV 0

10 elel emem erer BP i ={e l, e r } UV i elel emem Bp i+1 ={e l, e m } emem erer Bp i+1 ={e m, e r } Phase evolution