Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D-70569 Stuttgart Voronoi Overlay Networks Pavel Skvortsov.

Slides:



Advertisements
Similar presentations
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Evaluation of Partition-Aware MANET.
Advertisements

Scalable Content-Addressable Network Lintao Liu
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Hypergossiping: A Generalized Broadcast.
A Unified View to Greedy Routing Algorithms in Ad-Hoc Networks
Spherical Representation & Polyhedron Routing for Load Balancing in Wireless Sensor Networks Xiaokang Yu Xiaomeng Ban Wei Zeng Rik Sarkar Xianfeng David.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
PDPTA03, Las Vegas, June S-Chord: Using Symmetry to Improve Lookup Efficiency in Chord Valentin Mesaros 1, Bruno Carton 2, and Peter Van Roy 1 1.
Ruslana Mys Delaunay Triangulation Delaunay Triangulation (DT)  Introduction  Delaunay-Voronoi based method  Algorithms to compute the convex hull 
By Groysman Maxim. Let S be a set of sites in the plane. Each point in the plane is influenced by each point of S. We would like to decompose the plane.
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Delaunay Triangulation Computational Geometry, WS 2006/07 Lecture 11 Prof. Dr. Thomas Ottmann Algorithmen & Datenstrukturen, Institut für Informatik Fakultät.
A Scalable Content Addressable Network (CAN)
Delaunay Triangulation on the GPU Dan Maljovec. CPU Delaunay Triangulation Randomized Incremental Algorithm 1.Construct Bounding triangle 2.Choose point.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network (CAN) ACIRI U.C.Berkeley Tahoe Networks.
Multi-level Proximity Routing and its applications for Networking Tomer Tankel Dept. of Electrical Eng. – Systems.
Lecture 10 : Delaunay Triangulation Computational Geometry Prof. Dr. Th. Ottmann 1 Overview Motivation. Triangulation of Planar Point Sets. Definition.
Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas Guibas, John Hershberger, Li Zhang, An Zhu.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Computer Science Approximately Uniform Random Sampling in Sensor Networks Boulat A. Bash, John W. Byers and Jeffrey Considine.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
AOI cast Based Compass Routing in Distributed Virtual Environments Michele Albano, Luca Genovali Antonio Quartulli, Laura Ricci AOI CAST TOLERANCE BASED.
Problem proposed by StereoCarto, S.L.
CS CS 175 – Week 3 Triangulating Point Clouds VD, DT, MA, MAT, Crust.
UNC Chapel Hill M. C. Lin Overview of Last Lecture About Final Course Project –presentation, demo, write-up More geometric data structures –Binary Space.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
Computing the Delaunay Triangulation By Nacha Chavez Math 870 Computational Geometry; Ch.9; de Berg, van Kreveld, Overmars, Schwarzkopf By Nacha Chavez.
1 University of Denver Department of Mathematics Department of Computer Science.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Symmetric Replication in Structured Peer-to-Peer Systems Ali Ghodsi, Luc Onana Alima, Seif Haridi.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
A Delaunay Triangulation Architecture Supporting Churn and User Mobility in MMVEs Mohsen Ghaffari, Behnoosh Hariri and Shervin Shirmohammadi Advanced Communications.
Mehdi Kargar Aijun An York University, Toronto, Canada Discovering Top-k Teams of Experts with/without a Leader in Social Networks.
Algorithms for Triangulations of a 3D Point Set Géza Kós Computer and Automation Research Institute Hungarian Academy of Sciences Budapest, Kende u
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Scalable Processing of Trajectory-Based.
Positioning in Ad-Hoc Networks - Directions and Results Jan Beutel Computer Engineering and Networks Lab Swiss Federal Institute of Technology Zurich August.
Resource Addressable Network (RAN) An Adaptive Peer-to-Peer Substrate for Internet-Scale Service Platforms RAN Concept & Design  Adaptive, self-organizing,
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Contact-Based Mobility Metrics for Delay-
On Graphs Supporting Greedy Forwarding for Directional Wireless Networks W. Si, B. Scholz, G. Mao, R. Boreli, et al. University of Western Sydney National.
DIST: A Distributed Spatio-temporal Index Structure for Sensor Networks Anand Meka and Ambuj Singh UCSB, 2005.
RF network in SoC1 SoC Test Architecture with RF/Wireless Connectivity 1. D. Zhao, S. Upadhyaya, M. Margala, “A new SoC test architecture with RF/wireless.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Ad Hoc Mobility Management With Uniform Quorum Systems Zygmunt J. Haas, Senior Member, IEEE and Ben Liang, Student Member, IEEE Networking, IEEE/ACM Transactions.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Monitoring k-NN Queries over Moving Objects Xiaohui Yu University of Toronto Joint work with Ken Pu and Nick Koudas.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
A New Voronoi-based Reconstruction Algorithm
1 30 November 2006 An Efficient Nearest Neighbor (NN) Algorithm for Peer-to-Peer (P2P) Settings Ahmed Sabbir Arif Graduate Student, York University.
Delaunay Triangulation on the GPU
An Optimal Broadcast Algorithm for Content-Addressable Networks Ludovic Henrio Fabrice Huet Justine Rochas 1 18/12/ OPODIS (Nice)
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
UNC Chapel Hill M. C. Lin Delaunay Triangulations Reading: Chapter 9 of the Textbook Driving Applications –Height Interpolation –Constrained Triangulation.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Submitted by: Sounak Paul Computer Science & Engineering 4 th Year, 7 th semester Roll No:
Zero Skew Clock Routing ECE 556 Project Proposal John Thompson Kurt Ting Simon Wong.
June 23, Variational tetrahedral meshing of mechanical models for FEA Matthijs Sypkens Smit Willem F. Bronsvoort CAD ’08 Conference, Orlando, Florida.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Vineet Mittal Should more be added here Committee Members:
Object Location Problem: Find a close copy of an object in a large network Solution should: Find object if it exists Find a close copy of the object (no.
A Scalable Content Addressable Network
Presentation transcript:

Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Voronoi Overlay Networks Pavel Skvortsov 21th August 2007

Universität Stuttgart IPVS Research Group Distributed Systems 2 Overview Motivation Voronoi & Delaunay conditions Distributed Voronoi algorithms ◦ Routing ◦ Node insertion ◦ Node removal ◦ Credit method ◦ Conflicting insertions Live simulation Related work Conclusion

Universität Stuttgart IPVS Research Group Distributed Systems 3 Motivation: Problems in CAN Content Addressable Network (CAN) Ratnasamy et al, 2001 ◦ Hierarchic partitioning of service area ◦ Assumes uniform data distribution  Results in approximately regular grid Problems with non-uniform distributions (non-regular grid) ◦ High varying number of neighbours ◦ Data load on node insertions and removals refers to one other node only Nodes without sibling can not be removed in one step

Universität Stuttgart IPVS Research Group Distributed Systems 4 Motivation: Advantages of Voronoi Overlay Network-related advantages ◦ The number of neighbours of a node depends not on the size of network and equals 6 at the average ◦ Insertion and removal algorithms are uniform for any node ◦ The size of network is geometrically unbounded Data-related advantages ◦ The data distributing firstly depends on the distance to node ◦ Data load on node insertions and removals distributes between neighbours uniformly

Universität Stuttgart IPVS Research Group Distributed Systems 5 Voronoi & Delaunay Conditions Voronoi Minimum Distance condition: ◦ Each point belongs to closest node Delaunay Circumcircle condition: ◦ Empty circle around each triangle of nodes

Universität Stuttgart IPVS Research Group Distributed Systems 6 Distributed Voronoi Algorithms: Routing Destination node Initiator node “route!” Compass routing

Universität Stuttgart IPVS Research Group Distributed Systems 7 Distributed Voronoi Algorithms: Node Insertion (1) Boot node 1st neighbour 2nd neighbour 3rd neighbour New node 4th neighbour 5th neighbour “find triangle!” “find neighbour!” “add me!” The number of messages: M ins = r + (2n – 1)

Universität Stuttgart IPVS Research Group Distributed Systems 8 Distributed Voronoi Algorithms: Node Insertion (2) The number of messages: M ins = r + (2n – 1)

Universität Stuttgart IPVS Research Group Distributed Systems 9 Distributed Voronoi Algorithms: Node Removal (1) Node to remove “Remove me!” The number of messages: M rem = n

Universität Stuttgart IPVS Research Group Distributed Systems 10 Distributed Voronoi Algorithms: Node Removal (2) The number of messages: M rem = n

Universität Stuttgart IPVS Research Group Distributed Systems 11 Distributed Voronoi Algorithms: Conflict Example “find triangle!” New node 1 New node 2 Idea: To protect insertion process by distributed transaction ◦ Mark involved in previous insertion process nodes as “busy” ◦ Problem: How can involved nodes recognize the end of previous insertion process? ?

Universität Stuttgart IPVS Research Group Distributed Systems 12 Distributed Voronoi Algorithms: Credit Method (1) Boot node busy New node busy “find triangle!” “find triangle!” [c = 3] “find neighbour!” [c = 1] “find neighbour!” [c = 1] “find neighbour!” [c = 0.5] “add me!” c= =3 Solution: Recognize end by credit method (Kreditverfahren) ◦ Invariant: c = 3

Universität Stuttgart IPVS Research Group Distributed Systems 13 Distributed Voronoi Algorithms: Credit Method (2) “You are free” “You are free!” New node busy

Universität Stuttgart IPVS Research Group Distributed Systems 14 Distributed Voronoi Algorithms: Conflict (1) “find neighbour!” busy “roll back!” “back up!” New node 1 New node 2 busy

Universität Stuttgart IPVS Research Group Distributed Systems 15 Distributed Voronoi Algorithms: Conflict (2)

Universität Stuttgart IPVS Research Group Distributed Systems 16 Live Simulation

Universität Stuttgart IPVS Research Group Distributed Systems 17 Related Work Liebeherr et al, 2001: Application-Layer Multicasting with Delaunay Triangulation Overlays Compass routing o No distributed transaction but stabilization by periodic messages Kang et al, 2005: P2P Spatial Query Processing by Delaunay Triangulation Basics of node insertion algorithm o Non-uniform insertion algorithm o Conflicts during insertion are not considered Ohnishi et al, 2005: Incremental Construction of Delaunay Overlaid Network for Virtual Collaborative Space Approach of distributed transactions o Node insertion algorithm requires knowledge on all nodes of the overlay

Universität Stuttgart IPVS Research Group Distributed Systems 18 Conclusion Voronoi Overlay ◦ Voronoi Overlay Network has significant advantages in comparison with Context Addressable Network ◦ Compass method has been chosen because of convex hull exclusive situations ◦ With developed node insertion algorithm the optimal messages’ number has been achieved: N ins = r + (2n – 1) ◦ The represented node removal algorithm requires only the package of one-way directed messages during one time step ◦ Identification and reaction to conflict situation allows parallel execution of the represented algorithm Open questions ◦ Appearance of a new node right on the side of triangle ◦ Node failures and communication failures ◦ Many parallel node insertions and/or long message delays