1,885 research outputs found
Stochastic Analysis of a Churn-Tolerant Structured Peer-to-Peer Scheme
We present and analyze a simple and general scheme to build a churn
(fault)-tolerant structured Peer-to-Peer (P2P) network. Our scheme shows how to
"convert" a static network into a dynamic distributed hash table(DHT)-based P2P
network such that all the good properties of the static network are guaranteed
with high probability (w.h.p). Applying our scheme to a cube-connected cycles
network, for example, yields a degree connected network, in which
every search succeeds in hops w.h.p., using messages,
where is the expected stable network size. Our scheme has an constant
storage overhead (the number of nodes responsible for servicing a data item)
and an overhead (messages and time) per insertion and essentially
no overhead for deletions. All these bounds are essentially optimal. While DHT
schemes with similar guarantees are already known in the literature, this work
is new in the following aspects:
(1) It presents a rigorous mathematical analysis of the scheme under a
general stochastic model of churn and shows the above guarantees;
(2) The theoretical analysis is complemented by a simulation-based analysis
that validates the asymptotic bounds even in moderately sized networks and also
studies performance under changing stable network size;
(3) The presented scheme seems especially suitable for maintaining dynamic
structures under churn efficiently. In particular, we show that a spanning tree
of low diameter can be efficiently maintained in constant time and logarithmic
number of messages per insertion or deletion w.h.p.
Keywords: P2P Network, DHT Scheme, Churn, Dynamic Spanning Tree, Stochastic
Analysis
Recursive cubes of rings as models for interconnection networks
We study recursive cubes of rings as models for interconnection networks. We
first redefine each of them as a Cayley graph on the semidirect product of an
elementary abelian group by a cyclic group in order to facilitate the study of
them by using algebraic tools. We give an algorithm for computing shortest
paths and the distance between any two vertices in recursive cubes of rings,
and obtain the exact value of their diameters. We obtain sharp bounds on the
Wiener index, vertex-forwarding index, edge-forwarding index and bisection
width of recursive cubes of rings. The cube-connected cycles and cube-of-rings
are special recursive cubes of rings, and hence all results obtained in the
paper apply to these well-known networks
Some Results On Convex Greedy Embedding Conjecture for 3-Connected Planar Graphs
A greedy embedding of a graph into a metric space is a
function such that in the embedding for every pair of
non-adjacent vertices there exists another vertex adjacent
to which is closer to than . This notion of greedy
embedding was defined by Papadimitriou and Ratajczak (Theor. Comput. Sci.
2005), where authors conjectured that every 3-connected planar graph has a
greedy embedding (possibly planar and convex) in the Euclidean plane. Recently,
greedy embedding conjecture has been proved by Leighton and Moitra (FOCS 2008).
However, their algorithm do not result in a drawing that is planar and convex
for all 3-connected planar graph in the Euclidean plane. In this work we
consider the planar convex greedy embedding conjecture and make some progress.
We derive a new characterization of planar convex greedy embedding that given a
3-connected planar graph , an embedding x: V \to \bbbr^2 of is
a planar convex greedy embedding if and only if, in the embedding , weight
of the maximum weight spanning tree () and weight of the minimum weight
spanning tree (\func{MST}) satisfies \WT(T)/\WT(\func{MST}) \leq
(\card{V}-1)^{1 - \delta}, for some .Comment: 19 pages, A short version of this paper has been accepted for
presentation in FCT 2009 - 17th International Symposium on Fundamentals of
Computation Theor
CLEX: Yet Another Supercomputer Architecture?
We propose the CLEX supercomputer topology and routing scheme. We prove that
CLEX can utilize a constant fraction of the total bandwidth for point-to-point
communication, at delays proportional to the sum of the number of intermediate
hops and the maximum physical distance between any two nodes. Moreover, %
applying an asymmetric bandwidth assignment to the links, all-to-all
communication can be realized -optimally both with regard to
bandwidth and delays. This is achieved at node degrees of ,
for an arbitrary small constant . In contrast, these
results are impossible in any network featuring constant or polylogarithmic
node degrees. Through simulation, we assess the benefits of an implementation
of the proposed communication strategy. Our results indicate that, for a
million processors, CLEX can increase bandwidth utilization and reduce average
routing path length by at least factors respectively in comparison to
a torus network. Furthermore, the CLEX communication scheme features several
other properties, such as deadlock-freedom, inherent fault-tolerance, and
canonical partition into smaller subsystems
Algebraic Methods in the Congested Clique
In this work, we use algebraic methods for studying distance computation and
subgraph detection tasks in the congested clique model. Specifically, we adapt
parallel matrix multiplication implementations to the congested clique,
obtaining an round matrix multiplication algorithm, where
is the exponent of matrix multiplication. In conjunction
with known techniques from centralised algorithmics, this gives significant
improvements over previous best upper bounds in the congested clique model. The
highlight results include:
-- triangle and 4-cycle counting in rounds, improving upon the
triangle detection algorithm of Dolev et al. [DISC 2012],
-- a -approximation of all-pairs shortest paths in
rounds, improving upon the -round -approximation algorithm of Nanongkai [STOC 2014], and
-- computing the girth in rounds, which is the first
non-trivial solution in this model.
In addition, we present a novel constant-round combinatorial algorithm for
detecting 4-cycles.Comment: This is work is a merger of arxiv:1412.2109 and arxiv:1412.266
Symmetric Interconnection Networks from Cubic Crystal Lattices
Torus networks of moderate degree have been widely used in the supercomputer
industry. Tori are superb when used for executing applications that require
near-neighbor communications. Nevertheless, they are not so good when dealing
with global communications. Hence, typical 3D implementations have evolved to
5D networks, among other reasons, to reduce network distances. Most of these
big systems are mixed-radix tori which are not the best option for minimizing
distances and efficiently using network resources. This paper is focused on
improving the topological properties of these networks.
By using integral matrices to deal with Cayley graphs over Abelian groups, we
have been able to propose and analyze a family of high-dimensional grid-based
interconnection networks. As they are built over -dimensional grids that
induce a regular tiling of the space, these topologies have been denoted
\textsl{lattice graphs}. We will focus on cubic crystal lattices for modeling
symmetric 3D networks. Other higher dimensional networks can be composed over
these graphs, as illustrated in this research. Easy network partitioning can
also take advantage of this network composition operation. Minimal routing
algorithms are also provided for these new topologies. Finally, some practical
issues such as implementability and preliminary performance evaluations have
been addressed
- …