A random walk based clustering with local re-computations for mobile - - PowerPoint PPT Presentation

a random walk based clustering with local re computations
SMART_READER_LITE
LIVE PREVIEW

A random walk based clustering with local re-computations for mobile - - PowerPoint PPT Presentation

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives A random walk based clustering with local re-computations for mobile ad hoc networks Kudireti ABDURUSUL Alain BUI


slide-1
SLIDE 1

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

A random walk based clustering with local re-computations for mobile ad hoc networks

Kudireti ABDURUSUL ⋆ Alain BUI† Devan SOHIER†

⋆SysCom, CReSTIC Université de Reims Champagne-Ardenne, France †PRiSM (UMR CNRS 8144) Université de Versailles St-Quentin-en-Yvelines

Kudireti Abdurusul (CReSTIC) RWCMA 1 / 23

slide-2
SLIDE 2

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Plan

1

Introduction

2

Algorithm

3

Example execution of the algorithm

4

Properties

5

Simulation results

6

Conclusion and perspectives

Kudireti Abdurusul (CReSTIC) RWCMA 2 / 23

slide-3
SLIDE 3

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Context and Related Works

MANETs

Decentralized wireless networks. Arbitrary Movement .

Motivation

Large computer networks : dividing them into several disjoint connected parts. Managed separately and be coordinated.

Kudireti Abdurusul (CReSTIC) RWCMA 3 / 23

slide-4
SLIDE 4

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Context and Related Works

Related Works

1-hop : each node in the network is the neighbor of its clusterhead. (eg. LCA (LCA2), DMAC, GDMAC). K-hop : any node in any cluster is at most k hops away from its clusterhead (eg. Max-min D-hop-cluster, hierarchical clustering)

Model and hypotheses

Model : an asynchronous message-passing model Hypotheses

Connected network Unique identifier Link bidirectional Detection of Link failure

Kudireti Abdurusul (CReSTIC) RWCMA 4 / 23

slide-5
SLIDE 5

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Context and Related Works

Random walk based distributed algorithm

An algorithm involving a particular message, the token, that circulates according to a random walk scheme At each step, a node possesses the token Transmission: choose one neighbor at random, and send the token to it Properties of random walks: Hitting Meeting

Random walks scheme

1/3 1/3 1/3

Kudireti Abdurusul (CReSTIC) RWCMA 5 / 23

slide-6
SLIDE 6

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Context and Related Works

Random walk based distributed algorithm

An algorithm involving a particular message, the token, that circulates according to a random walk scheme At each step, a node possesses the token Transmission: choose one neighbor at random, and send the token to it Properties of random walks: Hitting Meeting

Random walks scheme

1/4 1/4 1/4 1/4

Kudireti Abdurusul (CReSTIC) RWCMA 5 / 23

slide-7
SLIDE 7

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Context and Related Works

Random walk based distributed algorithm

An algorithm involving a particular message, the token, that circulates according to a random walk scheme At each step, a node possesses the token Transmission: choose one neighbor at random, and send the token to it Properties of random walks: Hitting Meeting

Random walks scheme

1/3 1/3 1/3

Kudireti Abdurusul (CReSTIC) RWCMA 5 / 23

slide-8
SLIDE 8

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Principle

Our cluster

Cluster core Ordinary nodes

A distributed clustering algorithm based on random walks

Core Construction Core neighbors MaxCoreSize Complete cluster and Incomplete cluster

Kudireti Abdurusul (CReSTIC) RWCMA 6 / 23

slide-9
SLIDE 9

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Token message

1 3 2 4

On reception of Token message

Join procedure Transmit the token Send the Token back

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

slide-10
SLIDE 10

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Token message

1 3 2 4

IDdes = 2

On reception of Token message

Join procedure Transmit the token Send the Token back

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

slide-11
SLIDE 11

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Token message

1 3 2 4

Node 1 timer expired send out the token

On reception of Token message

Join procedure Transmit the token Send the Token back

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

slide-12
SLIDE 12

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Token message

1 3 2 4

Pgreen < Pblue

On reception of Token message

Join procedure Transmit the token Send the Token back

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 7 / 23

slide-13
SLIDE 13

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Token message Delete message

1 3 2 4

On reception of Delete message

if Pr = Pe then Broadcast Delete(Pr, Or) message, isCore = false, reset timer

Kudireti Abdurusul (CReSTIC) RWCMA 8 / 23

slide-14
SLIDE 14

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Token message Delete message

1 3 2 4

On reception of Delete message

if Pr = Pe then Broadcast Delete(Pr, Or) message, isCore = false, reset timer

Kudireti Abdurusul (CReSTIC) RWCMA 8 / 23

slide-15
SLIDE 15

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Link failure

1 3 2 4

On detecting a link (i, j) ∈ E failure on node i

if (i, j) ∈ Core ∧ isCorei = true then Delete procedure re-initialization if isCorei = false re-initialization

Kudireti Abdurusul (CReSTIC) RWCMA 9 / 23

slide-16
SLIDE 16

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Algorithm and Messages

Link failure

1 3 2 4

On detecting a link (i, j) ∈ E failure on node i

if (i, j) ∈ Core ∧ isCorei = true then Delete procedure re-initialization if isCorei = false re-initialization

Kudireti Abdurusul (CReSTIC) RWCMA 9 / 23

slide-17
SLIDE 17

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Ad-hoc network with 11 nodes

2 4 5 6 7 8 11 10 3 9 1

Kudireti Abdurusul (CReSTIC) RWCMA 10 / 23

slide-18
SLIDE 18

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

The modeling of this ad hoc network of (MaxCoreSize = 3)

2 4 5 6 7 8 11 10 3 9 1

Kudireti Abdurusul (CReSTIC) RWCMA 10 / 23

slide-19
SLIDE 19

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Second state

2 4 5 6 7 8 11 10 3 9 1

Timer Expiration Timer Expiration

Token to Destination node Ordinary nodes Core nodes

P=1, K=1 P=7, K=1

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 11 / 23

slide-20
SLIDE 20

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Second state

2 4 5 6 7 8 11 10 3 9 1

Token to Destination node Ordinary nodes Core nodes

P=7, K=2 P=1, K=2

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 11 / 23

slide-21
SLIDE 21

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Third state

2 4 5 6 7 8 11 10 3 9 1

Token to Destination node Ordinary nodes Core nodes

P=1 < P=7 Delete Procedure in the red cluster

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 12 / 23

slide-22
SLIDE 22

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Fourth state

2 4 5 6 7 8 11 10 3 9 1

Token to Destination node Ordinary nodes Core nodes

Timer Expiration

Detecting Link Failure

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 13 / 23

slide-23
SLIDE 23

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Fifth state

2 4 5 6 7 8 11 10 3 9 1

Token to Destination node Ordinary nodes Core nodes

Delete Procedure in the green cluster

Delete message

Kudireti Abdurusul (CReSTIC) RWCMA 14 / 23

slide-24
SLIDE 24

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Example execution of the algorithm

Steady state

2 4 5 6 7 8 10 3 9 1

Token to Destination node Ordinary nodes Core nodes

11

Local Re−clustering

Delete message

Result

2 clusters with MaxCoreSize = 3

Kudireti Abdurusul (CReSTIC) RWCMA 15 / 23

slide-25
SLIDE 25

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Convergence

The clusters will eventually stabilize.

Correctness

Each node eventually belongs to a cluster. The cluster is connected in the steady state.

Important properties

Kudireti Abdurusul (CReSTIC) RWCMA 16 / 23

slide-26
SLIDE 26

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Convergence Correctness Important properties

The core size of any cluster in [2,MaxCoreSize]. Two adjacent clusters can not both be incomplete in the steady state. An incomplete cluster contain only core nodes in the steady state.

Kudireti Abdurusul (CReSTIC) RWCMA 16 / 23

slide-27
SLIDE 27

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Local re-clustering

Allows the scalability of algorithm Ensure that the bounded number of nodes have to recompute their cluster Avoid the "chain reaction"

Kudireti Abdurusul (CReSTIC) RWCMA 17 / 23

slide-28
SLIDE 28

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Local re-clustering

Using 2 important properties Effect the deleted cluster In the worst case, effect the adjacent clusters.

Different cases

2 4 5 6 7 8 11 10 3 9 1

Cluster Incomplet Complet Cluster Complet Cluster Complet Cluster

Kudireti Abdurusul (CReSTIC) RWCMA 18 / 23

slide-29
SLIDE 29

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Local re-clustering

Using 2 important properties Effect the deleted cluster In the worst case, effect the adjacent clusters.

Different cases

2 4 5 6 7 8 11 10 3 9 1

Complet Cluster Complet Cluster Complet Cluster

Kudireti Abdurusul (CReSTIC) RWCMA 18 / 23

slide-30
SLIDE 30

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Local re-clustering

Using 2 important properties Effect the deleted cluster In the worst case, effect the adjacent clusters.

Different cases

2 4 5 6 7 8 11 10 3 9 1

Complet Cluster Complet Cluster Complet Cluster Incomplet Cluster

Kudireti Abdurusul (CReSTIC) RWCMA 18 / 23

slide-31
SLIDE 31

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Properties

Local re-clustering

Using 2 important properties Effect the deleted cluster In the worst case, effect the adjacent clusters.

Different cases

2 4 5 6 7 8 11 10 3 9 1

Complet Cluster Complet Cluster

Kudireti Abdurusul (CReSTIC) RWCMA 18 / 23

slide-32
SLIDE 32

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Simulation

DASOR: a C++ library for discrete event simulation of distributed algorithms "Romeo": the high performance computing center of the University

  • f Reims Champagne-Ardenne

Simulation steps : simulate without any connection or disconnection

  • f nodes

starting from the configuration results, adding a node crash-and-restart

Kudireti Abdurusul (CReSTIC) RWCMA 19 / 23

slide-33
SLIDE 33

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Simulation

DASOR: a C++ library for discrete event simulation of distributed algorithms "Romeo": the high performance computing center of the University

  • f Reims Champagne-Ardenne

Simulation steps : simulate without any connection or disconnection

  • f nodes

starting from the configuration results, adding a node crash-and-restart

Kudireti Abdurusul (CReSTIC) RWCMA 19 / 23

slide-34
SLIDE 34

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Simulation

DASOR: a C++ library for discrete event simulation of distributed algorithms "Romeo": the high performance computing center of the University

  • f Reims Champagne-Ardenne

Simulation steps : simulate without any connection or disconnection

  • f nodes

starting from the configuration results, adding a node crash-and-restart

Kudireti Abdurusul (CReSTIC) RWCMA 19 / 23

slide-35
SLIDE 35

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Simulation results analyse

Cluster sizes

few incomplete clusters: 2.56% for Random graph, 0.82% for caveman graphs.

few deletion. Message complexity increases with the parameter MaxCoreSize CaveMan graph:

NBclusters = NBcaves. 98.2% − 99.5% nodes in each cave belong to one cluster.

Kudireti Abdurusul (CReSTIC) RWCMA 20 / 23

slide-36
SLIDE 36

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Experiment results of re-clustering (managing link failure)

20 40 60 80 100 50 100 150 200 250 300 350 400 450 Number of message Number of node MsgToken MsgDelete MsgTotal 10 20 30 40 50 60 50 100 150 200 250 300 350 400 450 Number of Cluster Number of node NbCluster NbClusterComplete NbClusterDeleted 50 100 150 200 250 200 400 600 800 1000 Number of message Number of node MsgToken MsgDelete MsgTotal 20 40 60 80 100 120 140 200 400 600 800 1000 Number of Cluster Number of node NbCluster NbClusterComplet NbClusterDeleted

Re-clustering

re-clustering is much faster than the initial clustering number of message grows slowly with the size of the network re-clustering takes a bounded (average) number of messages

Kudireti Abdurusul (CReSTIC) RWCMA 21 / 23

slide-37
SLIDE 37

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Experiment results of re-clustering (managing link failure)

Random graph MaxCoreSize = 6

20 40 60 80 100 50 100 150 200 250 300 350 400 450 Number of message Number of node MsgToken MsgDelete MsgTotal 10 20 30 40 50 60 50 100 150 200 250 300 350 400 450 Number of Cluster Number of node NbCluster NbClusterComplete NbClusterDeleted

Kudireti Abdurusul (CReSTIC) RWCMA 21 / 23

slide-38
SLIDE 38

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Experiment results of re-clustering (managing link failure)

Grid graph MaxCoreSize = 6

50 100 150 200 250 200 400 600 800 1000 Number of message Number of node MsgToken MsgDelete MsgTotal 20 40 60 80 100 120 140 200 400 600 800 1000 Number of Cluster Number of node NbCluster NbClusterComplet NbClusterDeleted

Kudireti Abdurusul (CReSTIC) RWCMA 21 / 23

slide-39
SLIDE 39

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Conclusion and perspectives

Conclusion

Original algorithm based on random walks Requires no assumption on the network topology Local re-clustering "Mobility adaptive" Simulation of performance of algorithm

Perspectives

Improvement of adaptability Inter cluster management Self-stabilization

Kudireti Abdurusul (CReSTIC) RWCMA 22 / 23

slide-40
SLIDE 40

Introduction Algorithm Example execution of the algorithm Properties Simulation results Conclusion and perspectives

Questions?

Thanks for your attention !

Kudireti Abdurusul (CReSTIC) RWCMA 23 / 23