An Efficient Decentralized Algorithm for the Distributed Trigger Counting Problem (DTCP) Venkatesan Chakravarthy, IBM India Research Lab Anamitra R. Choudhury,

Slides:



Advertisements
Similar presentations
Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Advertisements

ON THE COMPLEXITY OF ASYNCHRONOUS GOSSIP Presented by: Tamar Aizikowitz, Spring 2009 C. Georgiou, S. Gilbert, R. Guerraoui, D. R. Kowalski.
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Chapter 13 Leader Election. Breaking the symmetry in system Similar to distributed mutual exclusion problems, the first process to enter the CS can be.
Leader Election Breaking the symmetry in a system.
Distributed Leader Election Algorithms in Synchronous Ring Networks
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Scalable Algorithms for Global Snapshots in Distributed Systems
Local L2-Thresholding Based Data Mining in Peer-to-Peer Systems Ran Wolff Kanishka Bhaduri Hillol Kargupta CSEE Dept, UMBC Presented by: Kanishka Bhaduri.
Lecture 8: Asynchronous Network Algorithms
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Gossip and its application Presented by Anna Kaplun.
CS 484. Discrete Optimization Problems A discrete optimization problem can be expressed as (S, f) S is the set of all feasible solutions f is the cost.
Delay bounded Routing in Vehicular Ad-hoc Networks Antonios Skordylis Niki Trigoni MobiHoc 2008 Slides by Alex Papadimitriou.
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
Lecture 7: Synchronous Network Algorithms
Online Distributed Sensor Selection Daniel Golovin, Matthew Faulkner, Andreas Krause theory and practice collide 1.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Tradeoffs between performance guarantee and complexity for distributed scheduling in wireless networks Saswati Sarkar University of Pennsylvania Communication.
Broadcasting Protocol for an Amorphous Computer Lukáš Petrů MFF UK, Prague Jiří Wiedermann ICS AS CR.
Università degli Studi dell’Aquila Academic Year 2009/2010 Course: Algorithms for Distributed Systems Instructor: Prof. Guido Proietti Time: Monday:
1 Complexity of Network Synchronization Raeda Naamnieh.
Conner Hansen Alex Summer Andreas Floeck Safe Message System.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
Matching Patterns Servers assemble sequences of notifications from smaller subsequences or from single notifications.This technique requires an advertisement.
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
1 Fault-Tolerant Consensus. 2 Failures in Distributed Systems Link failure: A link fails and remains inactive; the network may get partitioned Crash:
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Distributed Algorithms (22903) Lecturer: Danny Hendler Global Computation in the presence of Link Failures.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (III) 12th Week
Performance Comparison of Existing Leader Election Algorithms for Dynamic Networks Mobile Ad Hoc (Dynamic) Networks: Collection of potentially mobile computing.
Complexity 19-1 Parallel Computation Complexity Andrei Bulatov.
Distributed Combinatorial Optimization
1 Fault Tolerance in Collaborative Sensor Networks for Target Detection IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO. 3, MARCH 2004.
2a.1 Evaluating Parallel Programs Cluster Computing, UNC-Charlotte, B. Wilkinson.
Lecture 6: Introduction to Distributed Computing.
Distributed Algorithms on a Congested Clique Christoph Lenzen.
Broadcast & Convergecast Downcast & Upcast
Parallel and Distributed Simulation FDK Software.
Massively Distributed Database Systems - Distributed DBS Spring 2014 Ki-Joune Li Pusan National University.
Chapter 14 Asynchronous Network Model by Mikhail Nesterenko “Distributed Algorithms” by Nancy A. Lynch.
Foundations of Communication on Multiple-Access Channel Dariusz Kowalski.
An Efficient Decentralized Algorithm for the Distributed Trigger Counting (DTC) Problem Venkatesan T. Chakravarthy (IBM Research-India) Anamitra Roy Choudhury.
Plug-in for Singleton Service in Clustered environment and improving failure detection methodology Advisor:By: Dr. Chung-E-WangSrinivasa c Kodali Department.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Time This powerpoint presentation has been adapted from: 1) sApr20.ppt.
The Cost of Fault Tolerance in Multi-Party Communication Complexity Binbin Chen Advanced Digital Sciences Center Haifeng Yu National University of Singapore.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Chap 15. Agreement. Problem Processes need to agree on a single bit No link failures A process can fail by crashing (no malicious behavior) Messages take.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Dijkstra-Scholten and Shavit-Francez termination algorithms
DISTRIBUTED ALGORITHMS Spring 2014 Prof. Jennifer Welch Set 9: Fault Tolerant Consensus 1.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
1 Fault-Tolerant Consensus. 2 Communication Model Complete graph Synchronous, network.
CIS 825 Review session. P1: Assume that processes are arranged in a ring topology. Consider the following modification of the Lamport’s mutual exclusion.
Coefficient: a number multiplied by a variable.. Degree: the greatest exponent of its variable.
Randomized Algorithms for Distributed Agreement Problems Peter Robinson.
Byzantine Vector Consensus in Complete Graphs Nitin Vaidya University of Illinois at Urbana-Champaign Vijay Garg University of Texas at Austin.
Distributed Maintenance of Spanning Tree using Labeled Tree Encoding
Lecture 9: Asynchronous Network Algorithms
Outline Distributed Mutual Exclusion Distributed Deadlock Detection
Lecture 7: Introduction to Distributed Computing.
Agreement Protocols CS60002: Distributed Systems
Parallel and Distributed Algorithms
Introduction to locality sensitive approach to distributed systems
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Lecture 8: Synchronous Network Algorithms
Presentation transcript:

An Efficient Decentralized Algorithm for the Distributed Trigger Counting Problem (DTCP) Venkatesan Chakravarthy, IBM India Research Lab Anamitra R. Choudhury, IBM India Research Lab Vijay K. Garg, University of Texas at Austin Yogish Sabharwal, IBM India Research Lab Disc 2010

Distributed Trigger Counting Problem (DTCP) Distributed system with n processors Each processor receives some triggers from an external source Report to the user when the number of triggers received equals w.

Applications of DTCP  Distributed monitoring traffic volume : raise an alarm if #vehicles on a highway exceeds some threshold wildlife behavior: #sightings of a particular species in a wildlife region exceeds a value.  Global Snapshots : the distributed system must determine if all in-transit messages have been received to declare snapshot valid. This problem reduces to DTCP [Garg, Garg, Sabharwal 2006].

Assumptions: complete graph model, i.e., any processor can communicate with any other processor asynchronous model of computation and messages. reliable message delivery and no faults in the processors.

Objectives of the DTC Algorithm: Low message complexity Low MaxLoad, i.e., the maximum number of messages received by any processor in the system.

Main Result: LayeredRand, a decentralized randomized algorithm.  Theorem: For any trigger pattern, the message complexity of the LayeredRand algorithm is O(n log n log w). Also, there exists constants c,d > 1 such that Pr[MaxLoad > c log n log w] < 1/n d AlgorithmMessage Complexity MaxLoad Centralized [Garg et al] O(n log w) LayeredRandO(n log n log w)O(log n log w) OpenO(n log w)O(log n log w)

LayeredRand Algorithm  n = (2 L -1) processors arranged in L layers  l th layer has 2 l processors, l=0 to L-1  Algorithm proceeds in multiple rounds.  w’: initial value of a round (number of triggers yet to be received)  Threshold for l th layer defined as  C(x): sum of triggers received by x and some processors in layers below.

LayeredRand Algorithm (Contd.)  For non-root processor x at layer l If a trigger is received: C(x)++ ; If C(x)>= τ (l)  pick a processor y from level l-1 at random and send a coin to y.  C(x) := C(x) - τ (l); If a coin is received from level l+1: C(x) :=C(x)+ τ (l+1).  Root r  maintains C(r) just like others. If C(r) >, initiate end-of-round procedure  gets total number of triggers received in this round  broadcasts new value of w’ for next round.

Example  System does not stall in the middle of a round, when all the triggers have been delivered.  thresholds => message complexity to O(n log n log w)  Random selection of processors for sending coins bounds the MaxLoad to O(log n log w) w’ = 96 τ (1) = 4 τ (2) = End of round w’ for next round = = 43