DOC PREVIEW
Berkeley ELENG 122 - Distributed Algorithms in Networks

This preview shows page 1-2-23-24 out of 24 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

   Department of Electrical Engineering and Computer SciencesUniversity of CaliforniaBerkeley ! "#$%&'( )*+ # Nodes are local processorsMessages are exchanged over various kinds of linksNodes contain sensors which sense local changesNodes control the network jointly Method for doing this is a distributed algorithm Example: RoutingTime taken to solve the problem has two components: Computation time taken for local processing Communication time for messages to be received over the links ! "#$%&"& ,-,, TCPExample 1TCP connections detect congestion after it has happenedMay cause packet drops from uncongested “well behaved flows”Non congested flows back offExample 2Two TCP flows sharing the same router get uneven bandwidths because one has a much smaller RTT than the otherRoutingOscillation and countless other pathologiesIt is very difficult to avoid these unintended effects ! "#$%&.'#Focus on the algorithms behind protocols How to move from Centralized to Distributed Alg.Synchronous and Asynchronous computation Why does the Asynchronous Bellman Ford converge?What are the effects of a changing topology on algorithm design?How can protocols be designed to protect against dishonest nodesVery High Level Coverage ! "#$%&/-+&   Examples:Minimum Spanning TreeShortest PathLeader ElectionTopology Broadcast Much easier to think in terms of centralized algorithmsCreativity needed to convert to the distributed case ! "#$%&0' ) Speed Dialup to terabit fiberReliability Hosts: Distributed Server farms to 486 PC Links: Noisy wireless to virtually error free fiberCongestionTrustworthinessWhat is a general enough model to cover all of this? ! "#$%&   -*A and B in a connection over an unreliable linkThey both want to terminate the connection only if they are certain that no more packets will arrive from the other userA BA won’t terminate unless it knows that B knows it is about to terminate.B won’t terminate unless it knows that A knows it is about to terminate ! "#$%&1   &Suppose B tells A it can terminate and A receives this message, say MA can terminate, but B will never know if A actually received M and so it can’t terminateA BA sends ACK(M) to B, but then A needs to makes sure that B received this message, so it must wait for ACK(ACK(M))…A never terminates. In fact, NO protocol exists to solve this problem!Worth convincing yourself of this fact. ! "#$%&2Error correctionAssume that errors can “eventually” correctedPropagation DelayFixedVariable but no more than dVariable with no upper boundOther components of delayQueueing DelayTransmission DelayPacket orderFIFOCan be delivered in arbitrary order ! "#$%& # -3  #  Synchronous algorithms can be described in terms of global iterations. The time taken for a given iteration is the time taken for the slowest processor to complete that iteration: time driven E.g. TDM or SONETAsynchronous algorithms execute at a processor based on received messages and internal state: event driven E.g. IP protocols which must run over heterogeneous systems ! "#$%&' Slotted system 1,2,…,3…All nodes agree on slot boundaries“Have access to a global clock” Helps to co-ordinate the nodesEvery node can run the same algorithm Proving correctness is generally tractable if the centralized algorithm is analyzableEasier to understand the sequence of communication between nodes ! "#$%&# 4567468Every node runs the same algorithmTime is slotted and in every tick each node sends its distance vector. At time h, node i has as an estimate of the shortest path to node j that has <= h+1 hopsDh+1(i,j) = minkN(i){Dh(k) + c(i,k)} 13462513 2351362514 241621413462514114123113462513 236 ! "#$%&"#9&#134625141142311 321 32         1 32


View Full Document

Berkeley ELENG 122 - Distributed Algorithms in Networks

Documents in this Course
Lecture 6

Lecture 6

22 pages

Wireless

Wireless

16 pages

Links

Links

21 pages

Ethernet

Ethernet

10 pages

routing

routing

11 pages

Links

Links

7 pages

Switches

Switches

30 pages

Multicast

Multicast

36 pages

Switches

Switches

18 pages

Security

Security

16 pages

Switches

Switches

18 pages

Lecture 1

Lecture 1

56 pages

OPNET

OPNET

5 pages

Lecture 4

Lecture 4

16 pages

Ethernet

Ethernet

65 pages

Models

Models

30 pages

TCP

TCP

16 pages

Wireless

Wireless

48 pages

Load more
Download Distributed Algorithms in Networks
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Distributed Algorithms in Networks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Distributed Algorithms in Networks 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?