-
Resource location based on precomputed partial random walks in dynamic networks
Authors:
Víctor M. López Millán,
Vicent Cholvi,
Antonio Fernández Anta,
Luis López
Abstract:
The problem of finding a resource residing in a network node (the \emph{resource location problem}) is a challenge in complex networks due to aspects as network size, unknown network topology, and network dynamics. The problem is especially difficult if no requirements on the resource placement strategy or the network structure are to be imposed, assuming of course that kee** centralized resourc…
▽ More
The problem of finding a resource residing in a network node (the \emph{resource location problem}) is a challenge in complex networks due to aspects as network size, unknown network topology, and network dynamics. The problem is especially difficult if no requirements on the resource placement strategy or the network structure are to be imposed, assuming of course that kee** centralized resource information is not feasible or appropriate. Under these conditions, random algorithms are useful to search the network. A possible strategy for static networks, proposed in previous work, uses short random walks precomputed at each network node as partial walks to construct longer random walks with associated resource information. In this work, we adapt the previous mechanisms to dynamic networks, where resource instances may appear in, and disappear from, network nodes, and the nodes themselves may leave and join the network, resembling realistic scenarios. We analyze the resulting resource location mechanisms, providing expressions that accurately predict average search lengths, which are validated using simulation experiments. Reduction of average search lengths compared to simple random walk searches are found to be very large, even in the face of high network volatility. We also study the cost of the mechanisms, focusing on the overhead implied by the periodic recomputation of partial walks to refresh the information on resources, concluding that the proposed mechanisms behave efficiently and robustly in dynamic networks.
△ Less
Submitted 13 March, 2016; v1 submitted 30 July, 2015;
originally announced July 2015.
-
A Mechanism for Fair Distribution of Resources without Payments
Authors:
Evgenia Christoforou,
Antonio Fernández Anta,
Agustín Santos
Abstract:
We design a mechanism for Fair and Efficient Distribution of Resources (FEDoR) in the presence of strategic agents. We consider a multiple-instances, Bayesian setting, where in each round the preference of an agent over the set of resources is a private information. We assume that in each of r rounds n agents are competing for k non-identical indivisible goods, (n > k). In each round the strategic…
▽ More
We design a mechanism for Fair and Efficient Distribution of Resources (FEDoR) in the presence of strategic agents. We consider a multiple-instances, Bayesian setting, where in each round the preference of an agent over the set of resources is a private information. We assume that in each of r rounds n agents are competing for k non-identical indivisible goods, (n > k). In each round the strategic agents declare how much they value receiving any of the goods in the specific round. The agent declaring the highest valuation receives the good with the highest value, the agent with the second highest valuation receives the second highest valued good, etc. Hence we assume a decision function that assigns goods to agents based on their valuations. The novelty of the mechanism is that no payment scheme is required to achieve truthfulness in a setting with rational/strategic agents. The FEDoR mechanism takes advantage of the repeated nature of the framework, and through a statistical test is able to punish the misreporting agents and be fair, truthful, and socially efficient. FEDoR is fair in the sense that, in expectation over the course of the rounds, all agents will receive the same good the same amount of times. FEDoR is an eligible candidate for applications that require fair distribution of resources over time. For example, equal share of bandwidth for nodes through the same point of access. But further on, FEDoR can be applied in less trivial settings like sponsored search, where payment is necessary and can be given in the form of a flat participation fee. To this extent we perform a comparison with traditional mechanisms applied to sponsored search, presenting the advantage of FEDoR.
△ Less
Submitted 27 April, 2016; v1 submitted 11 February, 2015;
originally announced February 2015.
-
Multi-resource Energy-efficient Routing in Cloud Data Centers with Networks-as-a-Service
Authors:
Lin Wang,
Antonio Fernández Anta,
Fa Zhang,
Jie Wu,
Zhiyong Liu
Abstract:
With the rapid development of software defined networking and network function virtualization, researchers have proposed a new cloud networking model called Network-as-a-Service (NaaS) which enables both in-network packet processing and application-specific network control. In this paper, we revisit the problem of achieving network energy efficiency in data centers and identify some new optimizati…
▽ More
With the rapid development of software defined networking and network function virtualization, researchers have proposed a new cloud networking model called Network-as-a-Service (NaaS) which enables both in-network packet processing and application-specific network control. In this paper, we revisit the problem of achieving network energy efficiency in data centers and identify some new optimization challenges under the NaaS model. Particularly, we extend the energy-efficient routing optimization from single-resource to multi-resource settings. We characterize the problem through a detailed model and provide a formal problem definition. Due to the high complexity of direct solutions, we propose a greedy routing scheme to approximate the optimum, where flows are selected progressively to exhaust residual capacities of active nodes, and routing paths are assigned based on the distributions of both node residual capacities and flow demands. By leveraging the structural regularity of data center networks, we also provide a fast topology-aware heuristic method based on hierarchically solving a series of vector bin packing instances. Our simulations show that the proposed routing scheme can achieve significant gain on energy savings and the topology-aware heuristic can produce comparably good results while reducing the computation time to a large extent.
△ Less
Submitted 12 March, 2016; v1 submitted 21 January, 2015;
originally announced January 2015.
-
A Measurement-based Analysis of the Energy Consumption of Data Center Servers
Authors:
Jordi Arjona,
Angelos Chatzipapas,
Antonio Fernandez Anta,
Vincenzo Mancuso
Abstract:
Energy consumption is a growing issue in data centers, impacting their economic viability and their public image. In this work we empirically characterize the power and energy consumed by different types of servers. In particular, in order to understand the behavior of their energy and power consumption, we perform measurements in different servers. In each of them, we exhaustively measure the pow…
▽ More
Energy consumption is a growing issue in data centers, impacting their economic viability and their public image. In this work we empirically characterize the power and energy consumed by different types of servers. In particular, in order to understand the behavior of their energy and power consumption, we perform measurements in different servers. In each of them, we exhaustively measure the power consumed by the CPU, the disk, and the network interface under different configurations, identifying the optimal operational levels. One interesting conclusion of our study is that the curve that defines the minimal CPU power as a function of the load is neither linear nor purely convex as has been previously assumed. Moreover, we find that the efficiency of the various server components can be maximized by tuning the CPU frequency and the number of active cores as a function of the system and network load, while the block size of I/O operations should be always maximized by applications. We also show how to estimate the energy consumed by an application as a function of some simple parameters, like the CPU load, and the disk and network activity. We validate the proposed approach by accurately estimating the energy of a map-reduce computation in a Hadoop platform.
△ Less
Submitted 4 February, 2014;
originally announced February 2014.
-
The structure of warm dense matter modeled with an average atom model with ion-ion correlations
Authors:
D. Saumon,
C. E. Starrett,
J. A. Anta,
W. Daughton,
G. Chabrier
Abstract:
We present a new model of warm dense matter that represents an intermediate approach between the relative simplicity of ''one-ion'' average atom models and the more realistic but computationally expensive ab initio simulation methods. Physical realism is achieved primarily by including the correlations in the plasma that surrounds a central ion. The plasma is described with the Ornstein-Zernike in…
▽ More
We present a new model of warm dense matter that represents an intermediate approach between the relative simplicity of ''one-ion'' average atom models and the more realistic but computationally expensive ab initio simulation methods. Physical realism is achieved primarily by including the correlations in the plasma that surrounds a central ion. The plasma is described with the Ornstein-Zernike integral equations theory of fluids, which is coupled to an average atom model for the central ion. In this contribution we emphasize the key elements and approximations and how they relate to and expand upon a typical average atom model. Besides being relatively inexpensive computationally, this approach offers several advantages over ab initio simulations but also has a number of limitations. The model is validated by comparisons with numerical solutions for the pair distribution function of the ions from ab initio simulations for several elements and a wide range of plasma conditions. Simulations results are reproduced remarkably well and simpler limiting theories are recovered as well. This model has many potential applications to calculation of the properties of warm dense matter such as the equation of state and conductivities for a wide range of temperatures and densities.
△ Less
Submitted 15 November, 2013;
originally announced November 2013.
-
Co** with Unreliable Workers in Internet-based Computing: An Evaluation of Reputation Mechanisms
Authors:
Evgenia Christoforou,
Antonio Fernandez Anta,
Chryssis Georgiou,
Miguel A. Mosteiro,
Angel Sanchez
Abstract:
We present reputation-based mechanisms for building reliable task computing systems over the Internet. The most characteristic examples of such systems are the volunteer computing and the crowdsourcing platforms. In both examples end users are offering over the Internet their computing power or their human intelligence to solve tasks either voluntarily or under payment. While the main advantage of…
▽ More
We present reputation-based mechanisms for building reliable task computing systems over the Internet. The most characteristic examples of such systems are the volunteer computing and the crowdsourcing platforms. In both examples end users are offering over the Internet their computing power or their human intelligence to solve tasks either voluntarily or under payment. While the main advantage of these systems is the inexpensive computational power provided, the main drawback is the untrustworthy nature of the end users. Generally, this type of systems are modeled under the "master-worker" setting. A "master" has a set of tasks to compute and instead of computing them locally she sends these tasks to available "workers" that compute and report back the task results. We categorize these workers in three generic types: altruistic, malicious and rational. Altruistic workers that always return the correct result, malicious workers that always return an incorrect result, and rational workers that decide to reply or not truthfully depending on what increases their benefit. We design a reinforcement learning mechanism to induce a correct behavior to rational workers, while the mechanism is complemented by four reputation schemes that cope with malice. The goal of the mechanism is to reach a state of eventual correctness, that is, a stable state of the system in which the master always obtains the correct task results. Analysis of the system gives provable guarantees under which truthful behavior can be ensured. Finally, we observe the behavior of the mechanism through simulations that use realistic system parameters values. Simulations not only agree with the analysis but also reveal interesting trade-offs between various metrics and parameters. Finally, the four reputation schemes are assessed against the tolerance to cheaters.
△ Less
Submitted 19 March, 2018; v1 submitted 10 July, 2013;
originally announced July 2013.
-
Algorithmic Mechanisms for Reliable Internet-based Computing under Collusion
Authors:
Antonio Fernandez Anta,
Chryssis Georgiou,
Miguel A. Mosteiro
Abstract:
In this work, using a game-theoretic approach, cost-sensitive mechanisms that lead to reliable Internet-based computing are designed. In particular, we consider Internet-based master-worker computations, where a master processor assigns, across the Internet, a computational task to a set of potentially untrusted worker processors and collects their responses. Workers may collude in order to increa…
▽ More
In this work, using a game-theoretic approach, cost-sensitive mechanisms that lead to reliable Internet-based computing are designed. In particular, we consider Internet-based master-worker computations, where a master processor assigns, across the Internet, a computational task to a set of potentially untrusted worker processors and collects their responses. Workers may collude in order to increase their benefit. Several game-theoretic models that capture the nature of the problem are analyzed, and algorithmic mechanisms that, for each given set of cost and system parameters, achieve high reliability are designed. Additionally, two specific realistic system scenarios are studied. These scenarios are a system of volunteer computing like SETI, and a company that buys computing cycles from Internet computers and sells them to its customers in the form of a task- computation service. Notably, under certain conditions, non redundant allocation yields the best trade-off between cost and reliability.
△ Less
Submitted 5 July, 2013;
originally announced July 2013.
-
Online Parallel Scheduling of Non-uniform Tasks: Trading Failures for Energy
Authors:
Antonio Fernández Anta,
Chryssis Georgiou,
Dariusz R. Kowalski,
Elli Zavou
Abstract:
Consider a system in which tasks of different execution times arrive continuously and have to be executed by a set of processors that are prone to crashes and restarts. In this paper we model and study the impact of parallelism and failures on the competitiveness of such an online system. In a fault-free environment, a simple Longest-in-System scheduling policy, enhanced by a redundancy-avoidance…
▽ More
Consider a system in which tasks of different execution times arrive continuously and have to be executed by a set of processors that are prone to crashes and restarts. In this paper we model and study the impact of parallelism and failures on the competitiveness of such an online system. In a fault-free environment, a simple Longest-in-System scheduling policy, enhanced by a redundancy-avoidance mechanism, guarantees optimality in a long-term execution. In the presence of failures though, scheduling becomes a much more challenging task. In particular, no parallel deterministic algorithm can be competitive against an offline optimal solution, even with one single processor and tasks of only two different execution times. We find that when additional energy is provided to the system in the form of processor speedup, the situation changes. Specifically, we identify thresholds on the speedup under which such competitiveness cannot be achieved by any deterministic algorithm, and above which competitive algorithms exist. Finally, we propose algorithms that achieve small bounded competitive ratios when the speedup is over the threshold.
△ Less
Submitted 7 June, 2013;
originally announced June 2013.
-
Measuring the Impact of Adversarial Errors on Packet Scheduling Strategies
Authors:
Antonio Fernández Anta,
Chryssis Georgiou,
Dariusz R. Kowalski,
Joerg Widmer,
Elli Zavou
Abstract:
In this paper we explore the problem of achieving efficient packet transmission over unreliable links with worst case occurrence of errors. In such a setup, even an omniscient offline scheduling strategy cannot achieve stability of the packet queue, nor is it able to use up all the available bandwidth. Hence, an important first step is to identify an appropriate metric for measuring the efficiency…
▽ More
In this paper we explore the problem of achieving efficient packet transmission over unreliable links with worst case occurrence of errors. In such a setup, even an omniscient offline scheduling strategy cannot achieve stability of the packet queue, nor is it able to use up all the available bandwidth. Hence, an important first step is to identify an appropriate metric for measuring the efficiency of scheduling strategies in such a setting. To this end, we propose a relative throughput metric which corresponds to the long term competitive ratio of the algorithm with respect to the optimal. We then explore the impact of the error detection mechanism and feedback delay on our measure. We compare instantaneous error feedback with deferred error feedback, that requires a faulty packet to be fully received in order to detect the error. We propose algorithms for worst-case adversarial and stochastic packet arrival models, and formally analyze their performance. The relative throughput achieved by these algorithms is shown to be close to optimal by deriving lower bounds on the relative throughput of the algorithms and almost matching upper bounds for any algorithm in the considered settings. Our collection of results demonstrate the potential of using instantaneous feedback to improve the performance of communication systems in adverse environments.
△ Less
Submitted 7 June, 2013;
originally announced June 2013.
-
Power-efficient Assignment of Virtual Machines to Physical Machines
Authors:
Jordi Arjona Aroca,
Antonio Fernandez Anta,
Miguel A. Mosteiro,
Christopher Thraves,
Lin Wang
Abstract:
Motivated by current trends in cloud computing, we study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency, we say that a set of virtual machines (VMs) is assigned to a set of physical machines (PMs). The optimization criteria is to minimize the power consumed by all the PMs. We term…
▽ More
Motivated by current trends in cloud computing, we study a version of the generalized assignment problem where a set of virtual processors has to be implemented by a set of identical processors. For literature consistency, we say that a set of virtual machines (VMs) is assigned to a set of physical machines (PMs). The optimization criteria is to minimize the power consumed by all the PMs. We term the problem Virtual Machine Assignment (VMA). Crucial differences with previous work include a variable number of PMs, that each VM must be assigned to exactly one PM (i.e., VMs cannot be implemented fractionally), and a minimum power consumption for each active PM. Such infrastructure may be strictly constrained in the number of PMs or in the PMs' capacity, depending on how costly (in terms of power consumption) is to add a new PM to the system or to heavily load some of the existing PMs. Low usage or ample budget yields models where PM capacity and/or the number of PMs may be assumed unbounded for all practical purposes. We study 4 VMA problems depending on whether the capacity or the number of PMs is bounded or not. Specifically, we study hardness and online competitiveness for a variety of cases. To the best of our knowledge, this is the first comprehensive study of the VMA problem for this cost function.
△ Less
Submitted 10 June, 2014; v1 submitted 26 April, 2013;
originally announced April 2013.
-
Improving Resource Location with Locally Precomputed Partial Random Walks
Authors:
Víctor M. López Millán,
Vicent Cholvi,
Luis López,
Antonio Fernández Anta
Abstract:
Random walks can be used to search complex networks for a desired resource. To reduce search lengths, we propose a mechanism based on building random walks connecting together partial walks (PW) previously computed at each network node. Resources found in each PW are registered. Searches can then jump over PWs where the resource is not located. However, we assume that perfect recording of resource…
▽ More
Random walks can be used to search complex networks for a desired resource. To reduce search lengths, we propose a mechanism based on building random walks connecting together partial walks (PW) previously computed at each network node. Resources found in each PW are registered. Searches can then jump over PWs where the resource is not located. However, we assume that perfect recording of resources may be costly, and hence, probabilistic structures like Bloom filters are used. Then, unnecessary hops may come from false positives at the Bloom filters. Two variations of this mechanism have been considered, depending on whether we first choose a PW in the current node and then check it for the resource, or we first check all PWs and then choose one. In addition, PWs can be either simple random walks or self-avoiding random walks. Analytical models are provided to predict expected search lengths and other magnitudes of the resulting four mechanisms. Simulation experiments validate these predictions and allow us to compare these techniques with simple random walk searches, finding very large reductions of expected search lengths.
△ Less
Submitted 18 April, 2013;
originally announced April 2013.
-
Routing for Energy Minimization with Discrete Cost Functions
Authors:
Lin Wang,
Antonio Fernández Anta,
Fa Zhang,
Chenying Hou,
Zhiyong Liu
Abstract:
Energy saving is becoming an important issue in the design and use of computer networks. In this work we propose a problem that considers the use of rate adaptation as the energy saving strategy in networks. The problem is modeled as an integral demand-routing problem in a network with discrete cost functions at the links. The discreteness of the cost function comes from the different states (band…
▽ More
Energy saving is becoming an important issue in the design and use of computer networks. In this work we propose a problem that considers the use of rate adaptation as the energy saving strategy in networks. The problem is modeled as an integral demand-routing problem in a network with discrete cost functions at the links. The discreteness of the cost function comes from the different states (bandwidths) at which links can operate and, in particular, from the energy consumed at each state. This in its turn leads to the non-convexity of the cost function, and thus adds complexity to solve this problem. We formulate this routing problem as an integer program, and we show that the general case of this problem is NP-hard, and even hard to approximate. For the special case when the step ratio of the cost function is bounded, we show that effective approximations can be obtained. Our main algorithm executes two processes in sequence: relaxation and rounding. The relaxation process eliminates the non-convexity of the cost function, so that the problem is transformed into a fractional convex program solvable in polynomial time. After that, a randomized rounding process is used to get a feasible solution for the original problem. This algorithm provides a constant approximation ratio for uniform demands and an approximation ratio of $O(\log^{β-1} d)$ for non-uniform demands, where $β$ is a constant and $d$ is the largest demand.
△ Less
Submitted 1 February, 2013;
originally announced February 2013.
-
Quid Pro Quo: A Mechanism for Fair Collaboration in Networked Systems
Authors:
Agustín Santos Méndez,
Antonio Fernández Anta,
Luis López Fernández
Abstract:
Collaboration may be understood as the execution of coordinated tasks (in the most general sense) by groups of users, who cooperate for achieving a common goal. Collaboration is a fundamental assumption and requirement for the correct operation of many communication systems. The main challenge when creating collaborative systems in a decentralized manner is dealing with the fact that users may beh…
▽ More
Collaboration may be understood as the execution of coordinated tasks (in the most general sense) by groups of users, who cooperate for achieving a common goal. Collaboration is a fundamental assumption and requirement for the correct operation of many communication systems. The main challenge when creating collaborative systems in a decentralized manner is dealing with the fact that users may behave in selfish ways, trying to obtain the benefits of the tasks but without participating in their execution. In this context, Game Theory has been instrumental to model collaborative systems and the task allocation problem, and to design mechanisms for optimal allocation of tasks. In this paper, we revise the classical assumptions and propose a new approach to this problem. First, we establish a system model based on heterogenous nodes (users, players), and propose a basic distributed mechanism so that, when a new task appears, it is assigned to the most suitable node. The classical technique for compensating a node that executes a task is the use of payments (which in most networks are hard or impossible to implement). Instead, we propose a distributed mechanism for the optimal allocation of tasks without payments. We prove this mechanism to be robust event in the presence of independent selfish or rationally limited players. Additionally, our model is based on very weak assumptions, which makes the proposed mechanisms susceptible to be implemented in networked systems (e.g., the Internet).
△ Less
Submitted 25 July, 2012;
originally announced July 2012.
-
Bisection (Band)Width of Product Networks with Application to Data Centers
Authors:
Jordi Arjona Aroca,
Antonio Fernández Anta
Abstract:
The bisection width of interconnection networks has always been important in parallel computing, since it bounds the amount of information that can be moved from one side of a network to another, i.e., the bisection bandwidth. Finding its exact value has proven to be challenging for some network families. For instance, the problem of finding the exact bisection width of the multidimensional torus…
▽ More
The bisection width of interconnection networks has always been important in parallel computing, since it bounds the amount of information that can be moved from one side of a network to another, i.e., the bisection bandwidth. Finding its exact value has proven to be challenging for some network families. For instance, the problem of finding the exact bisection width of the multidimensional torus was posed by Leighton and has remained open for almost 20 years. In this paper we provide the exact value of the bisection width of the torus, as well as of several d-dimensional classical parallel topologies that can be obtained by the application of the Cartesian product of graphs. To do so, we first provide two general results that allow to obtain upper and lower bounds on the bisection width of a product graph as a function of some properties of its factor graphs. We also apply these results to obtain bounds for the bisection bandwidth of a d-dimensional BCube network, a recently proposed topology for data centers.
△ Less
Submitted 28 February, 2012;
originally announced February 2012.
-
Greening File Distribution: Centralized or Distributed?
Authors:
Kshitiz Verma,
Gianluca Rizzo,
Antonio Fernández Anta,
Rubén Cuevas Rumín,
Arturo Azcorra
Abstract:
Despite file-distribution applications are responsible for a major portion of the current Internet traffic, so far little effort has been dedicated to study file distribution from the point of view of energy efficiency. In this paper, we present a first approach at the problem of energy efficiency for file distribution. Specifically, we first demonstrate that the general problem of minimizing ener…
▽ More
Despite file-distribution applications are responsible for a major portion of the current Internet traffic, so far little effort has been dedicated to study file distribution from the point of view of energy efficiency. In this paper, we present a first approach at the problem of energy efficiency for file distribution. Specifically, we first demonstrate that the general problem of minimizing energy consumption in file distribution in heterogeneous settings is NP-hard. For homogeneous settings, we derive tight lower bounds on energy consumption, and we design a family of algorithms that achieve these bounds. Our results prove that collaborative p2p schemes achieve up to 50% energy savings with respect to the best available centralized file distribution scheme. Through simulation, we demonstrate that in more realistic cases (e.g., considering network congestion, and link variability across hosts) we validate this observation, since our collaborative algorithms always achieve significant energy savings with respect to the power consumption of centralized file distribution systems.
△ Less
Submitted 18 November, 2011;
originally announced November 2011.
-
Failure Detectors in Homonymous Distributed Systems (with an Application to Consensus)
Authors:
Sergio Arévalo,
Antonio Fernández Anta,
Damien Imbs,
Ernesto Jiménez,
Michel Raynal
Abstract:
This paper addresses the consensus problem in homonymous distributed systems where processes are prone to crash failures and have no initial knowledge of the system membership ("homonymous" means that several processes may have the same identifier). New classes of failure detectors suited to these systems are first defined. Among them, the classes HΩ and HΣ are introduced that are the homonymous c…
▽ More
This paper addresses the consensus problem in homonymous distributed systems where processes are prone to crash failures and have no initial knowledge of the system membership ("homonymous" means that several processes may have the same identifier). New classes of failure detectors suited to these systems are first defined. Among them, the classes HΩ and HΣ are introduced that are the homonymous counterparts of the classes Ω and Σ, respectively. (Recall that the pair <Ω,Σ> defines the weakest failure detector to solve consensus.) Then, the paper shows how HΩ and HΣ can be implemented in homonymous systems without membership knowledge (under different synchrony requirements). Finally, two algorithms are presented that use these failure detectors to solve consensus in homonymous asynchronous systems where there is no initial knowledge of the membership. One algorithm solves consensus with <HΩ,HΣ>, while the other uses only HΩ, but needs a majority of correct processes.
Observe that the systems with unique identifiers and anonymous systems are extreme cases of homonymous systems from which follows that all these results also apply to these systems. Interestingly, the new failure detector class HΩ can be implemented with partial synchrony, while the analogous class AΩ defined for anonymous systems can not be implemented (even in synchronous systems). Hence, the paper provides us with the first proof showing that consensus can be solved in anonymous systems with only partial synchrony (and a majority of correct processes).
△ Less
Submitted 27 November, 2011; v1 submitted 9 October, 2011;
originally announced October 2011.
-
Event-triggered and self-triggered stabilization of distributed networked control systems
Authors:
Romain Postoyan,
Paulo Tabuada,
Dragan Nesic,
Adolfo Anta
Abstract:
Event-triggered and self-triggered control have recently been proposed as implementation strategies that considerably reduce the resources required for control. Although most of the work so far has focused on closing a single control loop, some researchers have started to investigate how these new implementation strategies can be applied when closing multiple-feedback loops in the presence of phys…
▽ More
Event-triggered and self-triggered control have recently been proposed as implementation strategies that considerably reduce the resources required for control. Although most of the work so far has focused on closing a single control loop, some researchers have started to investigate how these new implementation strategies can be applied when closing multiple-feedback loops in the presence of physically distributed sensors and actuators. In this paper, we consider a scenario where the distributed sensors, actuators, and controllers communicate via a shared wired channel. We use our recent prescriptive framework for the event-triggered control of nonlinear systems to develop novel policies suitable for the considered distributed scenario. Afterwards, we explain how self-triggering rules can be deduced from the developed event-triggered strategies.
△ Less
Submitted 28 August, 2011;
originally announced August 2011.
-
A unifying Lyapunov-based framework for the event-triggered control of nonlinear systems
Authors:
Romain Postoyan,
Adolfo Anta,
Dragan Nesic,
Paulo Tabuada
Abstract:
We present a prescriptive framework for the event-triggered control of nonlinear systems. Rather than closing the loop periodically, as traditionally done in digital control, in event-triggered implementations the loop is closed according to a state-dependent criterion. Event-triggered control is especially well suited for embedded systems and networked control systems since it reduces the amount…
▽ More
We present a prescriptive framework for the event-triggered control of nonlinear systems. Rather than closing the loop periodically, as traditionally done in digital control, in event-triggered implementations the loop is closed according to a state-dependent criterion. Event-triggered control is especially well suited for embedded systems and networked control systems since it reduces the amount of resources needed for control such as communication bandwidth. By modeling the event-triggered implementations as hybrid systems, we provide Lyapunov-based conditions to guarantee the stability of the resulting closed-loop system and explain how they can be utilized to synthesize event-triggering rules. We illustrate the generality of the approach by showing how it encompasses several existing event-triggering policies and by develo** new strategies which further reduce the resources needed for control.
△ Less
Submitted 28 August, 2011;
originally announced August 2011.
-
Conauto-2.0: Fast Isomorphism Testing and Automorphism Group Computation
Authors:
José Luis López-Presa,
Antonio Fernández Anta,
Luis Núñez Chiroque
Abstract:
In this paper we present an algorithm, called conauto-2.0, that can efficiently compute a set of generators of the automorphism group of a graph, and test whether two graphs are isomorphic, finding an isomorphism if they are. This algorithm uses the basic individualization/refinement technique, and is an improved version of the algorithm conauto, which has been shown to be very fast for random gra…
▽ More
In this paper we present an algorithm, called conauto-2.0, that can efficiently compute a set of generators of the automorphism group of a graph, and test whether two graphs are isomorphic, finding an isomorphism if they are. This algorithm uses the basic individualization/refinement technique, and is an improved version of the algorithm conauto, which has been shown to be very fast for random graphs and several families of hard graphs. In this paper, it is proved that, under some circumstances, it is not only possible to prune the search space (using already found generators of the automorphism group), but also to infer new generators without the need of explicitly finding an automorphism of the graph. This result is especially suited for graphs with regularly connected components, and can be applied in any isomorphism testing and canonical labeling algorithm (that use the individualization/refinement technique) to significantly improve its performance. Additionally, a dynamic target cell selection function is used to adapt to different graphs. The resulting algorithm preserves all the nice features of conauto, but reduces the time for testing graphs with regularly connected components and other hard graph families. We run extensive experiments, which show that the most popular algorithms (namely, nauty, bliss, Traces, and saucy) are slower than conauto-2.0, among others, for the graph families based on components.
△ Less
Submitted 4 August, 2011;
originally announced August 2011.
-
Reducing Search Lengths with Locally Precomputed Partial Random Walks
Authors:
Víctor López Millán,
Vicent Cholvi,
Luis López,
Antonio Fernández Anta
Abstract:
Random walks can be used to search a complex networks for a desired resource. To reduce the number of hops necessary to find the resource, we propose a search mechanism based on building random walks connecting together partial walks that have been precomputed at each network node in an initial stage. The resources found in each partial walk are registered in its associated Bloom filter. Searches…
▽ More
Random walks can be used to search a complex networks for a desired resource. To reduce the number of hops necessary to find the resource, we propose a search mechanism based on building random walks connecting together partial walks that have been precomputed at each network node in an initial stage. The resources found in each partial walk are registered in its associated Bloom filter. Searches can then jump over partial nodes in which the resource is not located, significantly reducing search length. However, additional unnecessary hops come from false positives at the Bloom filters. The analytic model provided predicts the expected search length of this mechanism, the optimal size of the partial walks and the corresponding optimal (shortest) expected search length. Simulation experiments are used to validate these predictions and to assess the impact of the number of partial walks precomputed in each node.
△ Less
Submitted 18 April, 2013; v1 submitted 23 July, 2011;
originally announced July 2011.
-
Node Sampling using Random Centrifugal Walks
Authors:
Andrés Sevilla,
Alberto Mozo,
Antonio Fernández Anta
Abstract:
Sampling a network with a given probability distribution has been identified as a useful operation. In this paper we propose distributed algorithms for sampling networks, so that nodes are selected by a special node, called the \emph{source}, with a given probability distribution. All these algorithms are based on a new class of random walks, that we call Random Centrifugal Walks (RCW). A RCW is a…
▽ More
Sampling a network with a given probability distribution has been identified as a useful operation. In this paper we propose distributed algorithms for sampling networks, so that nodes are selected by a special node, called the \emph{source}, with a given probability distribution. All these algorithms are based on a new class of random walks, that we call Random Centrifugal Walks (RCW). A RCW is a random walk that starts at the source and always moves away from it.
Firstly, an algorithm to sample any connected network using RCW is proposed. The algorithm assumes that each node has a weight, so that the sampling process must select a node with a probability proportional to its weight. This algorithm requires a preprocessing phase before the sampling of nodes. In particular, a minimum diameter spanning tree (MDST) is created in the network, and then nodes' weights are efficiently aggregated using the tree. The good news are that the preprocessing is done only once, regardless of the number of sources and the number of samples taken from the network. After that, every sample is done with a RCW whose length is bounded by the network diameter.
Secondly, RCW algorithms that do not require preprocessing are proposed for grids and networks with regular concentric connectivity, for the case when the probability of selecting a node is a function of its distance to the source.
The key features of the RCW algorithms (unlike previous Markovian approaches) are that (1) they do not need to warm-up (stabilize), (2) the sampling always finishes in a number of hops bounded by the network diameter, and (3) it selects a node with the exact probability distribution.
△ Less
Submitted 27 September, 2012; v1 submitted 6 July, 2011;
originally announced July 2011.
-
Unbounded Contention Resolution in Multiple-Access Channels
Authors:
Antonio Fernández Anta,
Miguel A. Mosteiro,
Jorge Ramón Muñoz
Abstract:
A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad of settings such as radio communication networks or databases. For the case where the number of users is unknown, recen…
▽ More
A frequent problem in settings where a unique resource must be shared among users is how to resolve the contention that arises when all of them must use it, but the resource allows only for one user each time. The application of efficient solutions for this problem spans a myriad of settings such as radio communication networks or databases. For the case where the number of users is unknown, recent work has yielded fruitful results for local area networks and radio networks, although either a (possibly loose) upper bound on the number of users needs to be known, or the solution is suboptimal, or it is only implicit or embedded in other problems, with bounds proved only asymptotically. In this paper, under the assumption that collision detection or information on the number of contenders is not available, we present a novel protocol for contention resolution in radio networks, and we recreate a protocol previously used for other problems, tailoring the constants for our needs. In contrast with previous work, both protocols are proved to be optimal up to a small constant factor and with high probability for big enough number of contenders. Additionally, the protocols are evaluated and contrasted with the previous work by extensive simulations. The evaluation shows that the complexity bounds obtained by the analysis are rather tight, and that both protocols proposed have small and predictable complexity for many system sizes (unlike previous proposals).
△ Less
Submitted 1 July, 2011;
originally announced July 2011.
-
Probabilistic Bounds on the Length of a Longest Edge in Delaunay Graphs of Random Points in d-Dimensions
Authors:
Esther M. Arkin,
Antonio Fernandez Anta,
Joseph S. B. Mitchell,
Miguel A. Mosteiro
Abstract:
Motivated by low energy consumption in geographic routing in wireless networks, there has been recent interest in determining bounds on the length of edges in the Delaunay graph of randomly distributed points. Asymptotic results are known for random networks in planar domains. In this paper, we obtain upper and lower bounds that hold with parametric probability in any dimension, for points distrib…
▽ More
Motivated by low energy consumption in geographic routing in wireless networks, there has been recent interest in determining bounds on the length of edges in the Delaunay graph of randomly distributed points. Asymptotic results are known for random networks in planar domains. In this paper, we obtain upper and lower bounds that hold with parametric probability in any dimension, for points distributed uniformly at random in domains with and without boundary. The results obtained are asymptotically tight for all relevant values of such probability and constant number of dimensions, and show that the overhead produced by boundary nodes in the plane holds also for higher dimensions. To our knowledge, this is the first comprehensive study on the lengths of long edges in Delaunay graphs
△ Less
Submitted 22 August, 2011; v1 submitted 24 June, 2011;
originally announced June 2011.
-
Fast Isomorphism Testing of Graphs with Regularly-Connected Components
Authors:
Jose Luis Lopez-Presa,
Antonio Fernandez Anta
Abstract:
The Graph Isomorphism problem has both theoretical and practical interest. In this paper we present an algorithm, called conauto-1.2, that efficiently tests whether two graphs are isomorphic, and finds an isomorphism if they are. This algorithm is an improved version of the algorithm conauto, which has been shown to be very fast for random graphs and several families of hard graphs. In this paper…
▽ More
The Graph Isomorphism problem has both theoretical and practical interest. In this paper we present an algorithm, called conauto-1.2, that efficiently tests whether two graphs are isomorphic, and finds an isomorphism if they are. This algorithm is an improved version of the algorithm conauto, which has been shown to be very fast for random graphs and several families of hard graphs. In this paper we establish a new theorem that allows, at very low cost, the easy discovery of many automorphisms. This result is especially suited for graphs with regularly connected components, and can be applied in any isomorphism testing and canonical labeling algorithm to drastically improve its performance. In particular, algorithm conauto-1.2 is obtained by the application of this result to conauto. The resulting algorithm preserves all the nice features of conauto, but drastically improves the testing of graphs with regularly connected components. We run extensive experiments, which show that the most popular algorithms (namely, nauty and bliss) can not compete with conauto-1.2 for these graph families.
△ Less
Submitted 22 June, 2011;
originally announced June 2011.
-
Opportunistic Information Dissemination in Mobile Ad-hoc Networks: adaptiveness vs. obliviousness and randomization vs. determinism
Authors:
Martin Farach-Colton,
Antonio Fernandez Anta,
Alessia Milani,
Miguel A. Mosteiro,
Shmuel Zaks
Abstract:
In this paper the problem of information dissemination in Mobile Ad-hoc Networks (MANET) is studied. The problem is to disseminate a piece of information, initially held by a distinguished source node, to all nodes in a set defined by some predicate. We use a model of MANETs that is well suited for dynamic networks and opportunistic communication. In this model nodes are placed in a plane, in whic…
▽ More
In this paper the problem of information dissemination in Mobile Ad-hoc Networks (MANET) is studied. The problem is to disseminate a piece of information, initially held by a distinguished source node, to all nodes in a set defined by some predicate. We use a model of MANETs that is well suited for dynamic networks and opportunistic communication. In this model nodes are placed in a plane, in which they can move with bounded speed, and communication between nodes occurs over a collision-prone single channel. In this setup informed and uninformed nodes can be disconnected for some time (bounded by a parameter alpha), but eventually some uninformed node must become neighbor of an informed node and remain so for some time (bounded by a parameter beta). In addition, nodes can start at different times, and they can crash and recover. Under the above framework, we show negative and positive results for different types of randomized protocols, and we put those results in perspective with respect to previous deterministic results.
△ Less
Submitted 30 May, 2011;
originally announced May 2011.
-
Exploiting isochrony in self-triggered control
Authors:
Adolfo Anta,
Paulo Tabuada
Abstract:
Event-triggered control and self-triggered control have been recently proposed as new implementation paradigms that reduce resource usage for control systems. In self-triggered control, the controller is augmented with the computation of the next time instant at which the feedback control law is to be recomputed. Since these execution instants are obtained as a function of the plant state, we effe…
▽ More
Event-triggered control and self-triggered control have been recently proposed as new implementation paradigms that reduce resource usage for control systems. In self-triggered control, the controller is augmented with the computation of the next time instant at which the feedback control law is to be recomputed. Since these execution instants are obtained as a function of the plant state, we effectively close the loop only when it is required to maintain the desired performance, thereby greatly reducing the resources required for control. In this paper we present a new technique for the computation of the execution instants by exploiting the concept of isochronous manifolds, also introduced in this paper. While our previous results showed how homogeneity can be used to compute the execution instants along some directions in the state space, the concept of isochrony allows us to compute the executions instants along every direction in the state space. Moreover, we also show in this paper how to homogenize smooth control systems thus making our results applicable to any smooth control system. The benefits of the proposed approach with respect to existing techniques are analyzed in two examples.
△ Less
Submitted 26 April, 2011; v1 submitted 27 September, 2010;
originally announced September 2010.
-
Performance of Random Walks in One-Hop Replication Networks
Authors:
Luis Rodero-Merino,
Antonio Fernandez Anta,
Luis Lopez,
Vicent Chovi
Abstract:
Random walks are gaining much attention from the networks research community. They are the basis of many proposals aimed to solve a variety of network-related problems such as resource location, network construction, nodes sampling, etc. This interest on random walks is justified by their inherent properties. They are very simple to implement as nodes only require local information to take routi…
▽ More
Random walks are gaining much attention from the networks research community. They are the basis of many proposals aimed to solve a variety of network-related problems such as resource location, network construction, nodes sampling, etc. This interest on random walks is justified by their inherent properties. They are very simple to implement as nodes only require local information to take routing decisions. Also, random walks demand little processing power and bandwidth. Besides, they are very resilient to changes on the network topology.
Here, we quantify the effectiveness of random walks as a search mechanism in one-hop replication networks: networks where each node knows its neighbors' identity/resources, and so it can reply to queries on their behalf. Our model focuses on estimating the expected average search time of the random walk by applying network queuing theory. To do this, we must provide first the expected average search length. This is computed by means of estimations of the expected average coverage at each step of the random walk. This model takes into account the revisiting effect: the fact that, as the random walk progresses, the probability of arriving to nodes already visited increases, which impacts on how the network coverage evolves. That is, we do not model the coverage as a memoryless process. Furthermore, we conduct a series of simulations to evaluate, in practice, the above mentioned metrics. Our results show a very close correlation between the analytical and the experimental results.
△ Less
Submitted 5 August, 2009;
originally announced August 2009.
-
An ISS self-triggered implementation of linear controller
Authors:
Manuel Mazo Jr.,
Adolfo Anta,
Paulo Tabuada
Abstract:
Nowadays control systems are mostly implemented on digital platforms and, increasingly, over shared communication networks. Reducing resources (processor utilization, network bandwidth, etc.) in such implementations increases the potential to run more applications on the same hardware. We present a self-triggered implementation of linear controllers that reduces the amount of controller updates ne…
▽ More
Nowadays control systems are mostly implemented on digital platforms and, increasingly, over shared communication networks. Reducing resources (processor utilization, network bandwidth, etc.) in such implementations increases the potential to run more applications on the same hardware. We present a self-triggered implementation of linear controllers that reduces the amount of controller updates necessary to retain stability of the closed-loop system. Furthermore, we show that the proposed self-triggered implementation is robust against additive disturbances and provide explicit guarantees of performance. The proposed technique exhibits an inherent trade-off between computation and potential savings on actuation.
△ Less
Submitted 15 March, 2010; v1 submitted 19 June, 2009;
originally announced June 2009.
-
To sample or not to sample: Self-triggered control for nonlinear systems
Authors:
Adolfo Anta,
Paulo Tabuada
Abstract:
Feedback control laws have been traditionally implemented in a periodic fashion on digital hardware. Although periodicity simplifies the analysis of the mismatch between the control design and its digital implementation, it also leads to conservative usage of resources such as CPU utilization in the case of embedded control. We present a novel technique that abandons the periodicity assumption b…
▽ More
Feedback control laws have been traditionally implemented in a periodic fashion on digital hardware. Although periodicity simplifies the analysis of the mismatch between the control design and its digital implementation, it also leads to conservative usage of resources such as CPU utilization in the case of embedded control. We present a novel technique that abandons the periodicity assumption by using the current state of the plant to decide the next time instant in which the state should be measured, the control law computed, and the actuators updated. This technique, termed self-triggered control, is developed for two classes of nonlinear control systems, namely, state-dependent homogeneous systems and polynomial systems. The wide applicability of the proposed results is illustrated in two well known physical examples: a jet engine compressor and the rigid body.
△ Less
Submitted 4 June, 2008;
originally announced June 2008.
-
Combining quantum and classical density functional theory for ion-electron mixtures
Authors:
A. A. Louis,
H. Xu,
J. A. Anta
Abstract:
We combine techniques from quantum and from classical density functional theory (DFT) to describe electron-ion mixtures. For homogeneous systems, we show how to calculate ion-ion and ion-electron correlation functions within Chihara's quantum hypernetted chain approximation, which we derive within a DFT formulation. We also sketch out how to apply the DFT formulation to inhomogeneous electron-io…
▽ More
We combine techniques from quantum and from classical density functional theory (DFT) to describe electron-ion mixtures. For homogeneous systems, we show how to calculate ion-ion and ion-electron correlation functions within Chihara's quantum hypernetted chain approximation, which we derive within a DFT formulation. We also sketch out how to apply the DFT formulation to inhomogeneous electron-ion mixtures, and use this to study the electron distribution at the liquid-solid interface of Al.
△ Less
Submitted 18 October, 2001;
originally announced October 2001.
-
Probing Ion-Ion and Electron-Ion Correlations in Liquid Metals within the Quantum Hypernetted Chain Approximation
Authors:
J. A. Anta,
A. A. Louis
Abstract:
We use the Quantum Hypernetted Chain Approximation (QHNC) to calculate the ion-ion and electron-ion correlations for liquid metallic Li, Be, Na, Mg, Al, K, Ca, and Ga. We discuss trends in electron-ion structure factors and radial distribution functions, and also calculate the free-atom and metallic-atom form-factors, focusing on how bonding effects affect the interpretation of X-ray scattering…
▽ More
We use the Quantum Hypernetted Chain Approximation (QHNC) to calculate the ion-ion and electron-ion correlations for liquid metallic Li, Be, Na, Mg, Al, K, Ca, and Ga. We discuss trends in electron-ion structure factors and radial distribution functions, and also calculate the free-atom and metallic-atom form-factors, focusing on how bonding effects affect the interpretation of X-ray scattering experiments, especially experimental measurements of the ion-ion structure factor in the liquid metallic phase.
△ Less
Submitted 7 September, 1999;
originally announced September 1999.