cs/ee/ids 143 Communication Networks
|
|
- Derick Reynolds
- 5 years ago
- Views:
Transcription
1 cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech
2 Warning These notes are not self-contained, probably not understandable, unless you also were in the lecture They are supplement to not replacement for class attendance
3 Agenda Inter-domain routing n BGP Intra-domain routing n Shortest path algortihms Coding n FEC, network coding
4 Putting it all together Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected
5 What is routing? Choose red or blue? Internet A B
6 How to route? Two layers of routing: 1. Choose which AS? - BGP 2. How to route inside an AS? - OSPF A Internet Autonomy system (AS) e.g., AT&T, Verizon, MIT. B
7 Why two layers? o Different objectives n Choose AS: special policies n Inside AS: minimize delay, # hops o Simplify routing n Choose AS: ignore details inside AS n Inside AS: only details inside AS
8 Inter-domain routing: BGP Peering relation: A-B, B-C A, B, C carry each other s traffic free of charge B only advertises B to A and to C A does not know how to reach C through this. A must have transit relation with anther ISP (not shown here) that carries its traffic to C. Transit relation: A-B, B-C Customer-provider relation, e.g., B is provider for A and for C. A (C) pays B for carrying to/from A (C). B advertises {B,C} to A and {A, B} to C so that all ISP s know how to reach all destinations.
9 Inter-domain routing: BGP A typical configuration
10 Inter-domain routing: BGP BGP is policy-based routing o Generally not shortest-path o Other factors are generally more important in determining an AS-path than performance n Peering agreement n Pricing (revenue/cost) with next hop n Reliability, security, political reasons o Can lead to oscillation and bad performance
11 Inter-domain routing: BGP Example BGP policy at Berkeley: 1. If possible, avoid AT&T 2. Choose path with smallest #hops 3. Alphabetical Berkeley decision: use path Sprint-Verizon-MIT to reach MIT
12 Border Gateway Protocol (BGP) Every AS keeps a list of (Destination, Path) pairs & policies. How to reach MIT? Verizon AT&T Sprint Berkeley (MIT, Verizon---MIT) (MIT, AT&T---MIT) (MIT, NA) (MIT, NA)
13 Border Gateway Protocol (BGP) Every AS keeps a list of (Destination, Path) pairs & policies. How to reach MIT? Berkeley policy: avoid AT&T if possible Verizon AT&T Sprint Berkeley (MIT, Verizon---MIT) (MIT, AT&T---MIT) (MIT, Sprint---Verizon---MIT) (MIT, Berkeley---AT&T---MIT) (MIT, Verizon---AT&T---MIT) (MIT, AT&T---Verizon---MIT) (MIT, Sprint---AT&T---MIT)
14 Border Gateway Protocol (BGP) Every AS keeps a list of (Destination, Path) pairs & policies. How to reach MIT? Berkeley policy: avoid AT&T if possible Verizon AT&T Sprint Berkeley (MIT, Verizon---MIT) (MIT, AT&T---MIT) (MIT, Sprint---Verizon---MIT) (MIT, Berkeley---AT&T---MIT) (MIT, Berkeley---Sprint---Verizon---MIT)
15 Border Gateway Protocol (BGP) In BGP, each AS o Announces itself to other ASes and which ASes it can reach o Obtains ASes reachability info from neighboring ASes o Propagate reachability info to all routers internal to the AS o Determine good routes to ASes based on reachability info and AS policy
16 BGP: potential oscillation Example BGP policy to reach D: 1. Prefer 2-hop path to 1-hop 2. Avoid 3-hop paths Oscillation: Every node will alternate between choosing an 1-hop path and 2-hop path
17 Some questions Q1: Why not 3-level, or N-level, routing? Q2: How can a source ensure that its packets follow the inter-domain path it wants? Q3: In BGP, can one prevent a domain from lying and funneling all traffic through itself in order eavesdrop?
18 Agenda Inter-domain routing n BGP Intra-domain routing n Shortest path algortihms Coding n FEC, network coding
19 Shortest-path algorithm Input: graph G = ( V, E), link costs d ij ( d ij = if ( i, j) E) Execution: algorithm run at each node Output: n n Dijkstra: shortest-path tree rooted at the node Bellman-Ford: next hop to all destinations from the node (entries in forwarding table) Notation: n D x (i) : min cost to reach node i from x n pred x (i) : parent node of i (for Dijkstra) n next x (i) : next hop to i from x (for Bellman-Ford)
20 Init: Dijkstra algorithm Each node x sends d xi to all other nodes i while { D i * = R for all do { if ( j) > D ( i * ) + d then }for }while ( i) = d, D ( x) = 0, R { x}, x xi x = R V argmin R { i R }if D x ( i) j N( i * ) \ x { i * } x R D * D ( j) D ( i ) d * x pred(j) = x * i i j * + i pred x (i) = null Run at each source node x j Which step requires non-local info?
21 Init: Dijkstra algorithm Each node x sends d xi to all other nodes i while { D i * = R for all do { if ( j) > D ( i * ) + d then }for }while ( i) = d, D ( x) = 0, R { x}, x xi x = R V argmin R { i R }if D x ( i) j N( i * ) \ x { i * } x R D * D ( j) D ( i ) d * x pred(j) = x * i i j * + i pred x (i) = null Run at each source node x j Which step requires non-local info?
22 Dijkstra algorithm B A F C E D P(1) 1 B A F C E D P(2) 1 B A F C E D P(3) 1 2 B A F C E D P(4) B A F C E D P(5) B A F C E D P(6): Final
23 Init: Bellman-Ford algorithm D ( i) = d, D ( x) = 0, R { x}, x xi x = Each node x sends distance vector neighbors whenever ( i), i V pred x (i) = null ( D x ( i), i V ) ( ) changes D x to all its do (execute when link cost changes or on receipt of a DV from neighbor) { } for all destination nodes i { }for until no change D x (i) := min next x (i) = j N (x) ( d xj + D j (i)) j * := argmin j N (i) ( d xj + D j (i)) Run at each source node x
24 Bellman-Ford algorithm A 1 4 B 1 1 F 3 1 C E D Consider the calculations at all nodes to reach node D Every node has access to distance estimates from neighbors to D Assume synchronous operation P(1) iteration D A (D) next A (D) D B (D) next B (D) D C (D) next C (D) D E (D) next E (D) D F (D) next F (D) 0 Inf - Inf - 2 D 4 D Inf - 1 Inf - 5 C 2 D 3 C 5 E 2 6 B 4 E 2 D 3 C 4 E 3 5 B 4 E 2 D 3 C 4 E 4 5 B 4 E 2 D 3 C 4 E
25 Compare Dijsktra & BF o Message exchange n n Dijkstra: every node sends only its incident link costs to all other nodes. This requires O( V E ) messages. BF: every node sends only to its neighbors least-cost estimates from itself to all other nodes o Speed of convergence n n Disjstra: above implementation takes O( V 2 ); can be reduced using heap BF: can converge slowly and have routing loops during transient; count-to-infinity problem (can be solved using poisoned reverse) o No clear winner n n n Both are used on Internet RIP: distance-vector protocol OSPF: link-state protocol (meant to be successor to RIP)
26 Count-to-infinity problem Example Link between B & C fails A and B will not realize it, a routing update is created and their cost estimate to C keeps going up A solution: poisoned reverse: instead of telling B its true cost (2) to reach C, A tells B that its cost to reach C is infinity because A uses B to reach C.
27 Compare Dijsktra & BF o Dijkstra algorithm n Needs global information (link-state alg) n Each node broadcasts link-state packets to all other nodes in network n Each node executes Dijkstra alg to calculate shortest paths to all other nodes n After k iteration, shortest paths to k destinations are known (and they are the k shortest paths among the shortest paths to all nodes) n Terminates after N-1 iterations (N = #nodes)
28 Compare Dijsktra & BF o Bellman-Ford algorithm n Only needs local information (distance-vector alg) n Each node exchanges with neighbors the vector of distances from itself to all other nodes n Each node then updates the next hop and associated distance to all other nodes using Bellman-Ford (DP) equation n Decentralized, asynchronous, distributed
29 Other questions o How can routers trust each other? o How to deal with non-convergence in DV protocol? How often is oscillation encountered in practice? o Router R1 can route a pkt to host A through R2 or R3; R2 can route through R4 or R5 and has chosen R4. But R1 prefers R5 to R2 to R4. What happens?
30 Other questions o What is timescale for routing update? o What are major impediments to making significant changes to routing architecture? Would a bio-inspired routing system feasible? o Can network coding & FEC be combined?
31 Putting it all together Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected
32 Putting it all together Thenetworkaddressesofnodesaregivenby<AS>.<Network>.0.<node>, e.g., node A has the address AS1.E1.0.A, The bridge IDs satisfy B1 < B2 < B3, HisnotconnectedtoAS2.E5forpart(a), TheBGPSpeakersusetheleast-next-hop-costpolicyforrouting(i.e.,amongalternative paths to the destination AS, choose the one that has the least cost on the first hop), and The network topology shown has been stable for a long enough time to allow all the routing algorithms to converge and all the bridges to learn where to forward each packet. Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
33 Putting it all together 1. How to route G à A? 2. As soon as H is added, D tries to send a packet to H. What happens? 3. If AS2.R2 goes down, what will be the routing changes? later goes down Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected
34 1. compute spanning tree Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
35 2. compute intra-as routing Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
36 3. compute inter-as routing 1. How to route G à A? Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
37 3. compute inter-as routing 1. How to route G à A? Does A à G follow the same path? Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
38 4. Address resolution protocol 1. How to route G à A? 2. As soon as H is added, D tries to send a packet to H. What happens? 3. If AS2.R2 goes down, what will be the routing changes? Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected
39 4. Address resolution protocol Packets from D can be delivered to subnet AS2.B1 based on IP address of H AS2.B1 does not know H AS2.B1 uses ARP to find H s MAC address Use STP to forward pkts to H Figure 5.19: Figure for Routing Problem 3. [W&P 2010] initially unconnected
40 Example: H1 wants to send packet to H2 Network Link [all, gateway e1, who is IP2?] Ethernet switch Link layer on H1 broadcasts a message (ARP query) on its layer 2 network asking for the MAC address corresponding to IP2
41 Example: H1 wants to send packet to H2 Network Link [all, gateway e1, who is IP2?] Ethernet switch Network Link [e1, e2, I am IP2] Link layer on H2 responds to the ARP query with its MAC address
42 Example: H1 wants to send packet to H2 Network Link [e2, gateway e1,[ip1, IP2, X]] Ethernet switch Network Link Once the link layer on H1 knows e2, it can now send the original message
43 Example: H1 wants to send packet to H2 Network Link [e2, gateway e1,[ip1, IP2, X]] Ethernet switch Network Link [IP1, IP2, X] [e2, e1,[ip1, IP2, X]] Link layer on H2 delivers the packet to the network layer on H2
44 5. re-compute routing table 1. How to route G à A? 2. As soon as H is added, D tries to send a packet to H. What happens? 3. If AS2.R2 goes down, what will be the routing changes? goes down Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
45 5. re-compute routing tables Failure detected by AS2.R1 and AS2.R3; update routing tables (intra-as) Failure detected by border gateway in AS5 BGP re-computes The path between AS2 and AS5 will be changed goes down Figure 5.19: Figure for Routing Problem 3. [W&P 2010]
46 Agenda Inter-domain routing n BGP Intra-domain routing n Shortest path algortihms Coding n FEC, network coding
47 FEC: packet erasure code Recover from packet loss Coding n Input: n packets n Output: m packets o C k P 1,, P n C 1,,C m, m > n { } = bit-by-bit XOR of a random subset of C k := P i1 P i2 P ij k P 1,, P n o Header of C k specifies the subset used to generate C k
48 FEC: packet erasure code Decoding n If C j = P i for some i, then C k := C k P i for all pkts C k that contains P i n Remove C j from the collection of rec d pkts n Repeat until all P 1,, P n have been decoded n If at one step, there is no C j { P 1,, P n } then decoding fails
49 FEC: example P1 P2 P3 P4 C1 C2 C3 C4 C5 C6 C7 Decoding: received pkts C = { C 1,C 3,C 5,C 6 } C = { C 1,C 3,C 5,C 6 } P = { } : received pkt C 1 = P 1 C 3 = P 1 P 2 P 3 C 5 = P 4 C 6 = P 3 P 4 C 3 C 3 C 1 = P 2 P 3 C = { C 3,C 5,C 6 } P { P 1 }
50 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 1,C 3,C 5,C 6 } P = { } C 1 = P 1 C 3 = P 1 P 2 P 3 C 5 = P 4 C 6 = P 3 P 4 C 3 C 3 C 1 = P 2 P 3 C = { C 3,C 5,C 6 } P { P 1 }
51 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 1,C 3,C 5,C 6 } P = { } C 1 = P 1 C 3 = P 1 P 2 P 3 C 5 = P 4 C 6 = P 3 P 4 C 3 C 3 C 1 = P 2 P 3 C = { C 3,C 5,C 6 } P { P 1 }
52 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 5,C 6 } C 3 = P 2 P 3 P = { P 1 } C 5 = P 4 C 6 = P 3 P 4 C = { C 3,C 6 } P { P 1, P 4 } C 6 C 6 C 5 = P 3
53 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 5,C 6 } C 3 = P 2 P 3 P = { P 1 } C 5 = P 4 C 6 = P 3 P 4 C = { C 3,C 6 } P { P 1, P 4 } C 6 C 6 C 5 = P 3
54 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 5,C 6 } C 3 = P 2 P 3 P = { P 1 } C 5 = P 4 C 6 = P 3 P 4 C = { C 3,C 6 } P { P 1, P 4 } C 6 C 6 C 5 = P 3
55 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 6 } P = { P 1, P 4 } C 3 = P 2 P 3 C 6 = P 3 C 3 C 3 C 6 = P 2 C = { C 6 } P { P 1, P 3, P } 4
56 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 6 } P = { P 1, P 4 } C 3 = P 2 P 3 C 6 = P 3 C 3 C 3 C 6 = P 2 C = { C 6 } P { P 1, P 3, P } 4
57 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3,C 6 } P = { P 1, P 4 } C 3 = P 2 P 3 C 6 = P 3 C 3 C 3 C 6 = P 2 C = { C 3 } P { P 1, P 3, P } 4
58 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3 } P = { P 1, P 2, P 4 } C 3 = P 3 C = { } P { P 1, P 2, P 3, P 4 }
59 FEC: example P1 P2 P3 P4 : received pkt C1 C2 C3 C4 C5 C6 C7 Decoding: C = { C 3 } P = { P 1, P 2, P 4 } C 3 = P 3 C = { } P { P 1, P 2, P 3, P 4 }
60 Network coding: example link rate = R on every link multicast to both Y & Z T Y S b 1 b 2 b 1 b 2 W X U b 1 b b 1 2 b 21 b 1 Z throughput = 1.5R T b 1 b 1 b 2 Y S b 1 b 2 b 1 b 2 W X b 1 b 2 b 1 b 2 U Z throughput = 2R b 2
61 Network coding: example X and Y want to exchange A & B (1) (2) A B X Z Y A B (3) A B Without network coding, needs 4 pkt xmissions With network coding, needs 3 pkt xmissions
Chapter 6. Dynamic Programming. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 6 Dynamic Programming Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 6.8 Shortest Paths Shortest Paths Shortest path problem. Given a directed graph G = (V,
More information6. DYNAMIC PROGRAMMING II. sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph
6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph Shortest paths Shortest path problem. Given a digraph G = (V, E),
More informationRouting. Topics: 6.976/ESD.937 1
Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution
More informationWhat Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol?
What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? Timothy G. Griffin Computer Laboratory University of Cambridge, UK timothy.griffin@cl.cam.ac.uk Advanced Networks
More information6. DYNAMIC PROGRAMMING II
6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford algorithm distance vector protocols negative cycles in a digraph Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison
More informationData Structures and Algorithms CMPSC 465
ata Structures and Algorithms MPS LTUR ellman-ford Shortest Paths Algorithm etecting Negative ost ycles Adam Smith // A. Smith; based on slides by K. Wayne,. Leiserson,. emaine L. Negative Weight dges
More informationAn algebraic framework for a unified view of route-vector protocols
An algebraic framework for a unified view of route-vector protocols João Luís Sobrinho Instituto Superior Técnico, Universidade de Lisboa Instituto de Telecomunicações Portugal 1 Outline 1. ontext for
More informationActive Measurement for Multiple Link Failures Diagnosis in IP Networks
Active Measurement for Multiple Link Failures Diagnosis in IP Networks Hung X. Nguyen and Patrick Thiran EPFL CH-1015 Lausanne, Switzerland Abstract. Simultaneous link failures are common in IP networks
More informationCS 4407 Algorithms Lecture: Shortest Path Algorithms
CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford
More informationDistributed Systems Principles and Paradigms. Chapter 06: Synchronization
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter
More informationRouting Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur
Routing Algorithms CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Main Features Table Computation The routing tables must be computed
More informationCMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing
CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, 2010 1 Overview In this lecture, we cover BGP (Borer Gateway Protocol)
More information7600 Series Routers Adjacency Allocation Method
7600 Series Routers Adjacency Allocation Method Document ID: 118393 Contributed by Amit Goyal and Ruchir Jain, Cisco TAC Engineers. Nov 06, 2014 Contents Introduction Background Information Adjacency Entry
More informationDistributed Algorithmic Mechanism Design: Recent Results and Future Directions
Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Joan Feigenbaum Yale Scott Shenker ICSI Slides: http://www.cs.yale.edu/~jf/dialm02.{ppt,pdf} Paper: http://www.cs.yale.edu/~jf/fs.{ps,pdf}
More informationDistributed Optimization. Song Chong EE, KAIST
Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links
More informationPrivate and Verifiable Interdomain Routing Decisions. Proofs of Correctness
Technical Report MS-CIS-12-10 Private and Verifiable Interdomain Routing Decisions Proofs of Correctness Mingchen Zhao University of Pennsylvania Andreas Haeberlen University of Pennsylvania Wenchao Zhou
More informationSlides for Chapter 14: Time and Global States
Slides for Chapter 14: Time and Global States From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, Addison-Wesley 2012 Overview of Chapter Introduction Clocks,
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)
More informationTime. Today. l Physical clocks l Logical clocks
Time Today l Physical clocks l Logical clocks Events, process states and clocks " A distributed system a collection P of N singlethreaded processes without shared memory Each process p i has a state s
More informationDesign and Analysis of Algorithms
Design and Analysis of Algorithms CSE 5311 Lecture 21 Single-Source Shortest Paths Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1 Single-Source
More informationTheoretical Computer Science. Partially dynamic efficient algorithms for distributed shortest paths
Theoretical Computer Science 411 (2010) 1013 1037 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Partially dynamic efficient algorithms
More informationDecision making, Markov decision processes
Decision making, Markov decision processes Solved tasks Collected by: Jiří Kléma, klema@fel.cvut.cz Spring 2017 The main goal: The text presents solved tasks to support labs in the A4B33ZUI course. 1 Simple
More informationIn the Stone Age. Stephan Holzer. Yuval Emek - Technion Roger Wattenhofer - ETH Zürich
The Power of a Leader In the Stone Age - MIT Yuval Emek - Technion Roger Wattenhofer - ETH Zürich 2nd Workshop on Biological Distributed Algorithms, October 11-12, 2014 in Austin, Texas USA The Power of
More informationFault-Tolerant Consensus
Fault-Tolerant Consensus CS556 - Panagiota Fatourou 1 Assumptions Consensus Denote by f the maximum number of processes that may fail. We call the system f-resilient Description of the Problem Each process
More informationClocks in Asynchronous Systems
Clocks in Asynchronous Systems The Internet Network Time Protocol (NTP) 8 Goals provide the ability to externally synchronize clients across internet to UTC provide reliable service tolerating lengthy
More informationUndirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11
Undirected Graphs Undirected graph. G = (V, E) V = nodes. E = edges between pairs of nodes. Captures pairwise relationship between objects. Graph size parameters: n = V, m = E. V = {, 2, 3,,,, 7, 8 } E
More information6.852: Distributed Algorithms Fall, Class 10
6.852: Distributed Algorithms Fall, 2009 Class 10 Today s plan Simulating synchronous algorithms in asynchronous networks Synchronizers Lower bound for global synchronization Reading: Chapter 16 Next:
More informationInternet Topology Characterization on AS Level
Internet Topology Characterization on AS Level SARA ANISSEH Master s Degree Project Stockholm, Sweden XR-EE-LCN 2012:013 KTH Electrical Engineering THE INTERNET TOPOLOGY CHARACTERIZATION ON AS LEVEL SARA
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationDiscrete Optimization 2010 Lecture 2 Matroids & Shortest Paths
Matroids Shortest Paths Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths Marc Uetz University of Twente m.uetz@utwente.nl Lecture 2: sheet 1 / 25 Marc Uetz Discrete Optimization Matroids
More informationClock Synchronization
Today: Canonical Problems in Distributed Systems Time ordering and clock synchronization Leader election Mutual exclusion Distributed transactions Deadlock detection Lecture 11, page 7 Clock Synchronization
More informationDistributed Systems Fundamentals
February 17, 2000 ECS 251 Winter 2000 Page 1 Distributed Systems Fundamentals 1. Distributed system? a. What is it? b. Why use it? 2. System Architectures a. minicomputer mode b. workstation model c. processor
More informationDistributed Systems Gossip Algorithms
Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information
More informationAnalysis of Algorithms. Outline. Single Source Shortest Path. Andres Mendez-Vazquez. November 9, Notes. Notes
Analysis of Algorithms Single Source Shortest Path Andres Mendez-Vazquez November 9, 01 1 / 108 Outline 1 Introduction Introduction and Similar Problems General Results Optimal Substructure Properties
More informationL11: Algebraic Path Problems with applications to Internet Routing Lectures 7 and 8
L: Algebraic Path Problems with applications to Internet Routing Lectures 7 and 8 Timothy G. Grifn timothy.grifn@cl.cam.ac.uk Computer Laboratory University of Cambridge, UK Michaelmas Term, 27 tgg22 (cl.cam.ac.uk)
More informationSteps towards Decentralized Deterministic Network Coding
Steps towards Decentralized Deterministic Network Coding BY Oana Graur o.graur@jacobs-university.de Ph.D. Proposal in Electrical Engineering Ph.D Proposal Committee: Prof. Dr.-Ing. Werner Henkel, Dr. Mathias
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths
More informationLinear Programming Duality
Summer 2011 Optimization I Lecture 8 1 Duality recap Linear Programming Duality We motivated the dual of a linear program by thinking about the best possible lower bound on the optimal value we can achieve
More informationCoordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.
Coordination Failures and Consensus If the solution to availability and scalability is to decentralize and replicate functions and data, how do we coordinate the nodes? data consistency update propagation
More informationDiscrete Wiskunde II. Lecture 5: Shortest Paths & Spanning Trees
, 2009 Lecture 5: Shortest Paths & Spanning Trees University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Shortest Path Problem "#$%&'%()*%"()$#+,&- Given directed "#$%&'()*+,%+('-*.#/'01234564'.*,'7+"-%/8',&'5"4'84%#3
More informationShortest Path Algorithms
Shortest Path Algorithms Andreas Klappenecker [based on slides by Prof. Welch] 1 Single Source Shortest Path 2 Single Source Shortest Path Given: a directed or undirected graph G = (V,E) a source node
More informationDiscrete Optimization 2010 Lecture 3 Maximum Flows
Remainder: Shortest Paths Maximum Flows Discrete Optimization 2010 Lecture 3 Maximum Flows Marc Uetz University of Twente m.uetz@utwente.nl Lecture 3: sheet 1 / 29 Marc Uetz Discrete Optimization Outline
More informationSingle Source Shortest Paths
CMPS 00 Fall 017 Single Source Shortest Paths Carola Wenk Slides courtesy of Charles Leiserson with changes and additions by Carola Wenk Paths in graphs Consider a digraph G = (V, E) with an edge-weight
More information6.867 Machine learning, lecture 23 (Jaakkola)
Lecture topics: Markov Random Fields Probabilistic inference Markov Random Fields We will briefly go over undirected graphical models or Markov Random Fields (MRFs) as they will be needed in the context
More informationFlowSpec. Frédéric Gabut-Deloraine. FRnOG - 2 décembre 2011 NEO TELECOMS
FlowSpec Frédéric Gabut-Deloraine NEO TELECOMS FRnOG - 2 décembre 2011 Introduction Dissemination of Flow Specification Rules D(D)oS filtering Regular use Easy to disseminate Agenda Background Forwarding
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Fall 205 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 7 October 22, 205 Chandra & Manoj (UIUC) CS374 Fall 205 / 54 Part I Shortest Paths with
More informationProblem set 1. (c) Is the Ford-Fulkerson algorithm guaranteed to produce an acyclic maximum flow?
CS261, Winter 2017. Instructor: Ashish Goel. Problem set 1 Electronic submission to Gradescope due 11:59pm Thursday 2/2. Form a group of 2-3 students that is, submit one homework with all of your names.
More informationDistributed systems Lecture 4: Clock synchronisation; logical clocks. Dr Robert N. M. Watson
Distributed systems Lecture 4: Clock synchronisation; logical clocks Dr Robert N. M. Watson 1 Last time Started to look at time in distributed systems Coordinating actions between processes Physical clocks
More informationWeek 4. (1) 0 f ij u ij.
Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known
More informationOur Problem. Model. Clock Synchronization. Global Predicate Detection and Event Ordering
Our Problem Global Predicate Detection and Event Ordering To compute predicates over the state of a distributed application Model Clock Synchronization Message passing No failures Two possible timing assumptions:
More information1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007
Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can
More informationDecentralized Detection In Wireless Sensor Networks
Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation
More informationConsistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong
Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,
More informationShortest Paths & Link Weight Structure in Networks
Shortest Paths & Link Weight Structure in etworks Piet Van Mieghem CAIDA WIT (May 2006) P. Van Mieghem 1 Outline Introduction The Art of Modeling Conclusions P. Van Mieghem 2 Telecommunication: e2e A ETWORK
More informationAgreement. Today. l Coordination and agreement in group communication. l Consensus
Agreement Today l Coordination and agreement in group communication l Consensus Events and process states " A distributed system a collection P of N singlethreaded processes w/o shared memory Each process
More informationMaximizable Routing Metrics
Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources
More information6.852: Distributed Algorithms Fall, Class 24
6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making
More informationExact and Approximate Equilibria for Optimal Group Network Formation
Exact and Approximate Equilibria for Optimal Group Network Formation Elliot Anshelevich and Bugra Caskurlu Computer Science Department, RPI, 110 8th Street, Troy, NY 12180 {eanshel,caskub}@cs.rpi.edu Abstract.
More informationFoundational Theory for Understanding Policy Routing Dynamics
Foundational Theory for Understanding Policy Routing Dynamics Karim Mattar Samuel Epstein Ibrahim Matta Computer Science, Boston University Email: {kmattar, samepst, matta}@cs.bu.edu Technical Report BUCS-TR-9-
More informationSFM-11:CONNECT Summer School, Bertinoro, June 2011
SFM-:CONNECT Summer School, Bertinoro, June 20 EU-FP7: CONNECT LSCITS/PSS VERIWARE Part 3 Markov decision processes Overview Lectures and 2: Introduction 2 Discrete-time Markov chains 3 Markov decision
More informationLecture 11. Single-Source Shortest Paths All-Pairs Shortest Paths
Lecture. Single-Source Shortest Paths All-Pairs Shortest Paths T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to, rd Edition, MIT Press, 009 Sungkyunkwan University Hyunseung Choo choo@skku.edu
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationThe Bloom Paradox: When not to Use a Bloom Filter
1 The Bloom Paradox: When not to Use a Bloom Filter Ori Rottenstreich and Isaac Keslassy Abstract In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, the Bloom filter is harmful and
More informationPart V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows
Matching Input: undirected graph G = (V, E). M E is a matching if each node appears in at most one Part V edge in M. Maximum Matching: find a matching of maximum cardinality Matchings Ernst Mayr, Harald
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationCMPS 6610 Fall 2018 Shortest Paths Carola Wenk
CMPS 6610 Fall 018 Shortest Paths Carola Wenk Slides courtesy of Charles Leiserson with changes and additions by Carola Wenk Paths in graphs Consider a digraph G = (V, E) with an edge-weight function w
More informationDijkstra s Single Source Shortest Path Algorithm. Andreas Klappenecker
Dijkstra s Single Source Shortest Path Algorithm Andreas Klappenecker Single Source Shortest Path Given: a directed or undirected graph G = (V,E) a source node s in V a weight function w: E -> R. Goal:
More informationThe Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing
ROMA TRE UNIVERSITÀ DEGLI STUDI Roma Tre University Ph.D. in Computer Science and Engineering The Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing Marco Chiesa The Role
More informationReliable Broadcast for Broadcast Busses
Reliable Broadcast for Broadcast Busses Ozalp Babaoglu and Rogerio Drummond. Streets of Byzantium: Network Architectures for Reliable Broadcast. IEEE Transactions on Software Engineering SE- 11(6):546-554,
More informationLecture 7: Shortest Paths in Graphs with Negative Arc Lengths. Reading: AM&O Chapter 5
Lecture 7: Shortest Paths in Graphs with Negative Arc Lengths Reading: AM&O Chapter Label Correcting Methods Assume the network G is allowed to have negative arc lengths but no directed negativelyweighted
More informationNetwork Design Problems Notation and Illustrations
B CHAPTER 2 Network Design Problems Notation and Illustrations In Chapter 1, we have presented basic ideas about communication and computer network design problems that a network provider is likely to
More informationWheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing
1 Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista Massimo Rimondini Stefano Vissicchio Dept. of Computer Science and Automation,
More informationVLSI Signal Processing
VLSI Signal Processing Lecture 1 Pipelining & Retiming ADSP Lecture1 - Pipelining & Retiming (cwliu@twins.ee.nctu.edu.tw) 1-1 Introduction DSP System Real time requirement Data driven synchronized by data
More informationAsynchronous Convergence of Policy-Rich Distributed Bellman-Ford Routing Protocols
Asynchronous Convergence of Policy-Rich Distributed Bellman-Ford Routing Protocols SIGCOMM 2018 Matthew Daggitt 1 Alexander Gurney 2 Timothy Grin 1 21st of August 2018 1 University of Cambridge 2 Comcast
More informationLecture 2: Divide and conquer and Dynamic programming
Chapter 2 Lecture 2: Divide and conquer and Dynamic programming 2.1 Divide and Conquer Idea: - divide the problem into subproblems in linear time - solve subproblems recursively - combine the results in
More informationTime. To do. q Physical clocks q Logical clocks
Time To do q Physical clocks q Logical clocks Events, process states and clocks A distributed system A collection P of N single-threaded processes (p i, i = 1,, N) without shared memory The processes in
More informationThe Complexity of a Reliable Distributed System
The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number
More informationAGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:
AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)
More informationMaximum flow problem (part I)
Maximum flow problem (part I) Combinatorial Optimization Giovanni Righini Università degli Studi di Milano Definitions A flow network is a digraph D = (N,A) with two particular nodes s and t acting as
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationLecture on Sensor Networks
Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify
More informationCommon Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel
Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,
More informationUNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.
UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next
More informationDistributed Consensus
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationAsynchronous Models For Consensus
Distributed Systems 600.437 Asynchronous Models for Consensus Department of Computer Science The Johns Hopkins University 1 Asynchronous Models For Consensus Lecture 5 Further reading: Distributed Algorithms
More informationEventually consistent failure detectors
J. Parallel Distrib. Comput. 65 (2005) 361 373 www.elsevier.com/locate/jpdc Eventually consistent failure detectors Mikel Larrea a,, Antonio Fernández b, Sergio Arévalo b a Departamento de Arquitectura
More informationLecture 14 October 22
EE 2: Coding for Digital Communication & Beyond Fall 203 Lecture 4 October 22 Lecturer: Prof. Anant Sahai Scribe: Jingyan Wang This lecture covers: LT Code Ideal Soliton Distribution 4. Introduction So
More informationCS505: Distributed Systems
Department of Computer Science CS505: Distributed Systems Lecture 5: Time in Distributed Systems Overview Time and Synchronization Logical Clocks Vector Clocks Distributed Systems Asynchronous systems:
More informationDistributed Algorithms
Distributed Algorithms December 17, 2008 Gerard Tel Introduction to Distributed Algorithms (2 nd edition) Cambridge University Press, 2000 Set-Up of the Course 13 lectures: Wan Fokkink room U342 email:
More informationSignalling Analysis for Adaptive TCD Routing in ISL Networks *
COST 272 Packet-Oriented Service delivery via Satellite Signalling Analysis for Adaptive TCD Routing in ISL Networks * Ales Svigelj, Mihael Mohorcic, Gorazd Kandus Jozef Stefan Institute, Ljubljana, Slovenia
More informationShortest Paths. CS 320, Fall Dr. Geri Georg, Instructor 320 ShortestPaths 3
Shortest Paths CS 320, Fall 2017 Dr. Geri Georg, Instructor georg@colostate.edu 320 ShortestPaths 3 Preliminaries Weighted, directed graphs Weight function: maps edges to real numbers Shortest path weight:
More informationReinforcement Learning and Control
CS9 Lecture notes Andrew Ng Part XIII Reinforcement Learning and Control We now begin our study of reinforcement learning and adaptive control. In supervised learning, we saw algorithms that tried to make
More informationECEN 689 Special Topics in Data Science for Communications Networks
ECEN 689 Special Topics in Data Science for Communications Networks Nick Duffield Department of Electrical & Computer Engineering Texas A&M University Lecture 13 Measuring and Inferring Traffic Matrices
More informationBurst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks
Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University
More informationDominating Set. Chapter 26
Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationDominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET
294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It
More informationREVISION SHEET DECISION MATHS 2 DECISION ANALYSIS
REVISION SHEET DECISION MATHS 2 DECISION ANALYSIS The main ideas are covered in AQA Edexcel MEI OCR D2 Before the exam you should know The meaning of the different kinds of node. Be able to construct a
More informationDynamic resource sharing
J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus
More information