SlideShare a Scribd company logo
A G A L Danushka
South Eastern University of Sri Lanka
If we are using one process as a coordinator for a shared
resource …
…how do we select that one process?
Solution – an Election
Election Algorithms
• All processes currently involved get together to
choose a coordinator
• If the coordinator crashes or becomes isolated,
elect a new coordinator
• If a previously crashed or isolated process, comes
on line, a new election may have to be held
2
 Wired systems
• Bully algorithm
• Ring algorithm
 Wireless systems
 Very large-scale systems
Election Algorithms
3
Traditional election algorithms are generally based on
assumptions that are not realistic in wireless
environments.
PROBLEM IN TRADITIONAL ALGORITHMS
For example, they assume that message
passing is reliable and that the topology of
the network does not change. These
assumptions are false in most wireless
environments, especially those for mobile
ad hoc networks.
4
Vasudevan et al. (2004) propose a solution that can
handle failing nodes and partitioning networks. An
important property of their solution is that the best leader
can be elected rather than just a random.
SOLUTION
5
• When modeling an ad hoc environment as an undirected graph
that changes over time as nodes move.
• The vertices in the graph correspond to mobile nodes and an
edge between a pair of nodes represents the fact that the two
nodes are within each other's transmission and, hence, can
directly communicate with one another.
IN WIRELESS ENVIRONMENT
• The graph can become disconnected if the
network is partitioned due to node
movement.
6
Ensure that after a finite number of topology
changes, eventually each node i has a leader which
is the most-valued-node from among all nodes in
the connected component to which i belongs.
OBJECTIVE
7
1) Node Value: Each node has a value associated with it. The value of a node indicates
desirability as a leader of the network and can be any performance related attribute such
as the node's battery power, computational capabilities etc.
2) Unique and Ordered Node IDs: All nodes have unique identifiers. They are used to
identify participants during the election process. Node IDs are used to break ties among
nodes which have the same value.
3) Links: Links are bidirectional and FIFO, i.e. messages are delivered in order over a link
between two neighbors.
4) Node Behavior: Node mobility may result in arbitrary topology changes including
network partitioning and merging. Furthermore, nodes can crash arbitrarily at any
time and can come back up again at any time.
ASSUMPTION
5) Node-to-Node Communications: A message delivery is
guaranteed only when the sender and the receiver remain
connected (not partitioned) for the entire duration
of message transfer.
6) Buffer Size: Each node has a sufficiently large receive buffer
to avoid buffer overflow at any point in its lifetime.
8
Under the assumption that nodes and links never fail. The algorithm
operates by first growing and then shrinking a spanning tree rooted
at the node that initiates the election algorithm.
We refer to this computation-initiating node as the source node. As
we will see, after the spanning tree shrinks completely, the source
node will have adequate information to determine the most-valued-
node and will then broadcast its identity to the rest of the nodes in
the network
Selecting Best Leader
9
Messages Used in Algorithm
10
Variables Used in Algorithm
11
node A is a source node that starts a
diffusing computation by sending out
Election messages (denoted as “E” in the
figure) to its immediate neighbors, viz.
nodes B and C, shown in Figure
Example
12
Example Cont..
13
• As indicated in Figure ,nodes B and C set
their parent pointers to point to node A
and in turn propagate an Election
message to all their neighbors except
their parent nodes.
• Hence B and C send Election messages
to one another. These Election messages
are immediately acknowledged since
nodes B and C have already received
Election messages from their respective
parents.
Example
14
• In Figure c , a complete spanning tree is built.
• In Figure d, the spanning tree starts shrinking as
nodes D and F send their pending Ack messages
(denoted by “A”)
• to their respective parent nodes in the spanning
tree. Each of these Ack messages contains the
identity of the most-valued node (and its actual
value) downstream to nodes D and F, in this case
the nodes themselves, since they are the leaves
of the tree.
• Eventually, the source A hears pending
acknowledgments from both B and C in Figure e
and then broadcasts the identity of the leader, D,
via the Leader message (denoted by “L” shown in
Figure f.)
Bootstrapping the Election Process
15
• Each node starts execution by initializing the different
variables of the leader election algorithm.
• After the initialization, the algorithm in each node loops
forever, and on each iteration, checks if any of the
actions in the algorithm specification are enabled,
executing at least one enabled action on every loop
iteration.
Handling Multiple, Concurrent Computations
16
The leader of a connected component periodically
sends heartbeat messages to other nodes. The absence
of a heartbeat message from its leader for a predefined
timeout period triggers a fresh leader election process
at a node.
Handling Node Partitions
17
Once node i joins an election, it must receive Ack messages from
all nodes in list Si before it can report an Ack message to its
parent node.
However, because of node mobility, it may happen that node j,
which has yet to report an Ack message, gets disconnected from
nodei.
Node i must detect this event, since otherwise it will never
report an Ack message to its parent and, therefore, no leader
will be announced.
Handling Partition Merges
18
Involves two connected components, each with a unique leader,
merging together by the formation of a new link between nodes
Nodes then exchange their leader identities over the newly
formed link. Since one node has a higher-identity-leader than
another, then broadcasts the new leader to the rest of the
nodes in its component.
Summary
19
• At each stage the “most eligible” or “best” node will be passed
along from child to parent.
• Once the source node has received all the replies, it is in
position to choose the new coordinator.
• When the selection is made, it is broadcast to all nodes in the
network. • If more than one election is called (multiple
source nodes), a node should participate in only
one.
• Election messages are tagged with a process
id.
• If a node has chosen a parent but gets an
election message from a higher numbered node,
it drops out of the current election and adopts
the high numbered node as its parent. This
ensures only one election makes a choice.
References
• Design and Analysis of a Leader Election Algorithm for Mobile Ad
Hoc Networks by Sudarshan Vasudevan, Jim Kurose, Don Towsley
20
Thank You
21

More Related Content

What's hot

Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
Pritom Saha Akash
 
NETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingNETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical Addressing
Pankaj Debbarma
 
Distributed System Management
Distributed System ManagementDistributed System Management
Distributed System Management
Ibrahim Amer
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
Heman Pathak
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
Dilum Bandara
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
قصي نسور
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
Nita Dalla
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
Madhuri Badgujar
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
Vajira Thambawita
 
Polygon filling
Polygon fillingPolygon filling
Liang barsky Line Clipping Algorithm
Liang barsky Line Clipping AlgorithmLiang barsky Line Clipping Algorithm
Liang barsky Line Clipping Algorithm
Arvind Kumar
 
Distributed System ppt
Distributed System pptDistributed System ppt
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
ishapadhy
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
Prasenjit Dey
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
Ali A Jalil
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
Kamal Acharya
 

What's hot (20)

Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Transport layer
Transport layerTransport layer
Transport layer
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 
NETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical AddressingNETWORK LAYER - Logical Addressing
NETWORK LAYER - Logical Addressing
 
Distributed System Management
Distributed System ManagementDistributed System Management
Distributed System Management
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Signals and Antennas in mobile computing
Signals and Antennas in mobile computingSignals and Antennas in mobile computing
Signals and Antennas in mobile computing
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 
Polygon filling
Polygon fillingPolygon filling
Polygon filling
 
Liang barsky Line Clipping Algorithm
Liang barsky Line Clipping AlgorithmLiang barsky Line Clipping Algorithm
Liang barsky Line Clipping Algorithm
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
System models in distributed system
System models in distributed systemSystem models in distributed system
System models in distributed system
 
Dynamic interconnection networks
Dynamic interconnection networksDynamic interconnection networks
Dynamic interconnection networks
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
 

Similar to Election in Wireless Environment

Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
HarishKumar2054
 
1834902595 md. jiarul islam(1st note cn)
1834902595 md. jiarul islam(1st note cn)1834902595 md. jiarul islam(1st note cn)
1834902595 md. jiarul islam(1st note cn)
MdJiarulIslam
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
Anushiya Ram
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].ppt
Ramya Nellutla
 
Computer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptxComputer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptx
sakshamsharma7257
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
BharatiPatelPhDStude
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answers
Raja Madhuvanthi
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
Nitesh Singh
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
MosesOkumu4
 
Network
NetworkNetwork
Network
Daksh Bapna
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
Network Topology
Network Topology Network Topology
Network Topology
Md.Al-amin Hossen
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
Hossam El-Deen Osama
 
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETA Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
IJNSA Journal
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
Ecet375 1 a - basic networking concepts
Ecet375   1 a - basic networking conceptsEcet375   1 a - basic networking concepts
Ecet375 1 a - basic networking concepts
Ralph Ambuehl
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting system
Quang Do
 

Similar to Election in Wireless Environment (20)

Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
1834902595 md. jiarul islam(1st note cn)
1834902595 md. jiarul islam(1st note cn)1834902595 md. jiarul islam(1st note cn)
1834902595 md. jiarul islam(1st note cn)
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].ppt
 
Computer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptxComputer Networks basics Unit 1 ppt.pptx
Computer Networks basics Unit 1 ppt.pptx
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answers
 
Osi(1)
Osi(1)Osi(1)
Osi(1)
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Network
NetworkNetwork
Network
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Network Topology
Network Topology Network Topology
Network Topology
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANETA Novel Energy Efficient and Administrator Based Secured Routing in MANET
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Ecet375 1 a - basic networking concepts
Ecet375   1 a - basic networking conceptsEcet375   1 a - basic networking concepts
Ecet375 1 a - basic networking concepts
 
Networks
Networks   Networks
Networks
 
Outdoor lighting system
Outdoor lighting systemOutdoor lighting system
Outdoor lighting system
 

More from Lahiru Danushka

Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygonsLiang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Lahiru Danushka
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
Lahiru Danushka
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
Lahiru Danushka
 
Formalization Machines and Sastes
Formalization Machines and SastesFormalization Machines and Sastes
Formalization Machines and Sastes
Lahiru Danushka
 
Dining Philosopher Problem and Solution
Dining Philosopher Problem and SolutionDining Philosopher Problem and Solution
Dining Philosopher Problem and Solution
Lahiru Danushka
 
My Sql Work Bench
My Sql Work BenchMy Sql Work Bench
My Sql Work Bench
Lahiru Danushka
 
Shuffle exchange networks
Shuffle exchange networksShuffle exchange networks
Shuffle exchange networks
Lahiru Danushka
 

More from Lahiru Danushka (7)

Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygonsLiang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
Liang- Barsky Algorithm, Polygon clipping & pipeline clipping of polygons
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
 
Human Computer Interaction (HCI)
Human Computer Interaction (HCI)Human Computer Interaction (HCI)
Human Computer Interaction (HCI)
 
Formalization Machines and Sastes
Formalization Machines and SastesFormalization Machines and Sastes
Formalization Machines and Sastes
 
Dining Philosopher Problem and Solution
Dining Philosopher Problem and SolutionDining Philosopher Problem and Solution
Dining Philosopher Problem and Solution
 
My Sql Work Bench
My Sql Work BenchMy Sql Work Bench
My Sql Work Bench
 
Shuffle exchange networks
Shuffle exchange networksShuffle exchange networks
Shuffle exchange networks
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Election in Wireless Environment

  • 1. A G A L Danushka South Eastern University of Sri Lanka
  • 2. If we are using one process as a coordinator for a shared resource … …how do we select that one process? Solution – an Election Election Algorithms • All processes currently involved get together to choose a coordinator • If the coordinator crashes or becomes isolated, elect a new coordinator • If a previously crashed or isolated process, comes on line, a new election may have to be held 2
  • 3.  Wired systems • Bully algorithm • Ring algorithm  Wireless systems  Very large-scale systems Election Algorithms 3
  • 4. Traditional election algorithms are generally based on assumptions that are not realistic in wireless environments. PROBLEM IN TRADITIONAL ALGORITHMS For example, they assume that message passing is reliable and that the topology of the network does not change. These assumptions are false in most wireless environments, especially those for mobile ad hoc networks. 4
  • 5. Vasudevan et al. (2004) propose a solution that can handle failing nodes and partitioning networks. An important property of their solution is that the best leader can be elected rather than just a random. SOLUTION 5
  • 6. • When modeling an ad hoc environment as an undirected graph that changes over time as nodes move. • The vertices in the graph correspond to mobile nodes and an edge between a pair of nodes represents the fact that the two nodes are within each other's transmission and, hence, can directly communicate with one another. IN WIRELESS ENVIRONMENT • The graph can become disconnected if the network is partitioned due to node movement. 6
  • 7. Ensure that after a finite number of topology changes, eventually each node i has a leader which is the most-valued-node from among all nodes in the connected component to which i belongs. OBJECTIVE 7
  • 8. 1) Node Value: Each node has a value associated with it. The value of a node indicates desirability as a leader of the network and can be any performance related attribute such as the node's battery power, computational capabilities etc. 2) Unique and Ordered Node IDs: All nodes have unique identifiers. They are used to identify participants during the election process. Node IDs are used to break ties among nodes which have the same value. 3) Links: Links are bidirectional and FIFO, i.e. messages are delivered in order over a link between two neighbors. 4) Node Behavior: Node mobility may result in arbitrary topology changes including network partitioning and merging. Furthermore, nodes can crash arbitrarily at any time and can come back up again at any time. ASSUMPTION 5) Node-to-Node Communications: A message delivery is guaranteed only when the sender and the receiver remain connected (not partitioned) for the entire duration of message transfer. 6) Buffer Size: Each node has a sufficiently large receive buffer to avoid buffer overflow at any point in its lifetime. 8
  • 9. Under the assumption that nodes and links never fail. The algorithm operates by first growing and then shrinking a spanning tree rooted at the node that initiates the election algorithm. We refer to this computation-initiating node as the source node. As we will see, after the spanning tree shrinks completely, the source node will have adequate information to determine the most-valued- node and will then broadcast its identity to the rest of the nodes in the network Selecting Best Leader 9
  • 10. Messages Used in Algorithm 10
  • 11. Variables Used in Algorithm 11
  • 12. node A is a source node that starts a diffusing computation by sending out Election messages (denoted as “E” in the figure) to its immediate neighbors, viz. nodes B and C, shown in Figure Example 12
  • 13. Example Cont.. 13 • As indicated in Figure ,nodes B and C set their parent pointers to point to node A and in turn propagate an Election message to all their neighbors except their parent nodes. • Hence B and C send Election messages to one another. These Election messages are immediately acknowledged since nodes B and C have already received Election messages from their respective parents.
  • 14. Example 14 • In Figure c , a complete spanning tree is built. • In Figure d, the spanning tree starts shrinking as nodes D and F send their pending Ack messages (denoted by “A”) • to their respective parent nodes in the spanning tree. Each of these Ack messages contains the identity of the most-valued node (and its actual value) downstream to nodes D and F, in this case the nodes themselves, since they are the leaves of the tree. • Eventually, the source A hears pending acknowledgments from both B and C in Figure e and then broadcasts the identity of the leader, D, via the Leader message (denoted by “L” shown in Figure f.)
  • 15. Bootstrapping the Election Process 15 • Each node starts execution by initializing the different variables of the leader election algorithm. • After the initialization, the algorithm in each node loops forever, and on each iteration, checks if any of the actions in the algorithm specification are enabled, executing at least one enabled action on every loop iteration.
  • 16. Handling Multiple, Concurrent Computations 16 The leader of a connected component periodically sends heartbeat messages to other nodes. The absence of a heartbeat message from its leader for a predefined timeout period triggers a fresh leader election process at a node.
  • 17. Handling Node Partitions 17 Once node i joins an election, it must receive Ack messages from all nodes in list Si before it can report an Ack message to its parent node. However, because of node mobility, it may happen that node j, which has yet to report an Ack message, gets disconnected from nodei. Node i must detect this event, since otherwise it will never report an Ack message to its parent and, therefore, no leader will be announced.
  • 18. Handling Partition Merges 18 Involves two connected components, each with a unique leader, merging together by the formation of a new link between nodes Nodes then exchange their leader identities over the newly formed link. Since one node has a higher-identity-leader than another, then broadcasts the new leader to the rest of the nodes in its component.
  • 19. Summary 19 • At each stage the “most eligible” or “best” node will be passed along from child to parent. • Once the source node has received all the replies, it is in position to choose the new coordinator. • When the selection is made, it is broadcast to all nodes in the network. • If more than one election is called (multiple source nodes), a node should participate in only one. • Election messages are tagged with a process id. • If a node has chosen a parent but gets an election message from a higher numbered node, it drops out of the current election and adopts the high numbered node as its parent. This ensures only one election makes a choice.
  • 20. References • Design and Analysis of a Leader Election Algorithm for Mobile Ad Hoc Networks by Sudarshan Vasudevan, Jim Kurose, Don Towsley 20