SlideShare a Scribd company logo
05-01-2013 3rd BCGL Conference 1/22
Resilience in Transaction-Oriented
Networks
Dmitry Zinoviev*, Hamid Benbrahim,
Greta Meszoely+
, Dan Stefanescu*
*Mathematics and Computer Science Department
+
Sawyer School of Management
Suffolk University, Boston
05-01-2013 3rd BCGL Conference 2/22
Outline
 Transaction­oriented networks
 Network model and its interpretations
 Simulation results:
 Dense and sparse networks
 Throughput amplification
 Equivalence of excessive traffic and faulty nodes
 Network as a four­phase matter
 Conclusion and future work
05-01-2013 3rd BCGL Conference 3/22
Transaction-Oriented Networks
 Used to execute distributed transactions (compound operations that succeed or fail 
atomically)
 Interpretations:
 Distributed database transactions (original, HPC­related interpretation)
 Financial transactions (e.g., loans)
 Transportation (e.g., multi­leg flights)
 How resilient are these networks to externally and internally induced failures?
05-01-2013 3rd BCGL Conference 4/22
Transactions and Network
Network
Incoming
transactions
Committed transactions
Aborted
transactions
05-01-2013 3rd BCGL Conference 5/22
Network Model Overview
 Random Erdös–Rényi network, N=1,600 identical nodes representing network 
hosts, density d.
 Each node can simultaneously execute up to C almost independent 
subtransactions. Each subtransaction takes constant time 
0
 to complete. The 
network is simulated for the duration of S
0
.
 Each node can be used for injecting transactions into the network and for 
terminating transactions. Transactions are injected uniformly across the network. 
The delays between subsequent transactions are drawn from the exponential 
distribution E(1/r).
 Each transaction has L=N(10,4) subtransactions.
05-01-2013 3rd BCGL Conference 6/22
Opportunistic Routing
 The node for the next subtransaction is chosen uniformly at random from all 
neighbors of the current node.
 If the next node is disabled, then another neighbor is chosen.
 If all neighbors are disabled, the subtransaction is aborted, and the master 
transaction rolls back.
 If a transaction is aborted, all other transactions that crossed path with it in the past 
T time units (T=100
), are also aborted with probability p0
=.01.
 We observed very little dependence of the simulated network measures on p0
.
05-01-2013 3rd BCGL Conference 7/22
Node Shutdown
 When a node is overloaded (load > C), it shuts down.
 A node may fail randomly after an initial delay drawn from the exponential 
distribution E(Tf
).
 Once disabled, a node is not restarted. All subtransactions currently executed at a 
disabled node are aborted.
05-01-2013 3rd BCGL Conference 8/22
Simulation Framework
 Custom­built network simulator in C++
 In each experiment, the network has been simulated for a variety of combinations 
of node capacities and densities (C, d):
 d  {0.01, 0.011, 0.015, 0.025, 0.04, 0.055, 0.075, 0.1, 0.2, 0.3, 0.5, 0.6, 
0.75, 0.85, 0.99}
 C  {2, 3, 4, ... 22}
 Red color indicates sparse networks (they behave diferently from the dense 
networks)
05-01-2013 3rd BCGL Conference 9/22
Failing by Overloading
 Start with a fully functional network.
 Gradually increase the injection rate from 
0 to r0
 until at least 10­6
 of all 
transactions abort (superconductive 
mode ⇒ resistive mode).
 The fraction of aborted transactions 
monotonically increases, until at some 
rate r1
  the network chokes (resistive 
mode ⇒ dielectric mode). 
 Define 0 
= r0 
/ r1
.
 r0
 and r1
 slightly depend on the simulation 
running time. Our results have been 
obtained for S=84,6000
 (“one day”).
05-01-2013 3rd BCGL Conference 10/22
Phase Transition Injection Rates
r1
, smaller d
r0
, smaller d
dense
05-01-2013 3rd BCGL Conference 11/22
Quadratic Amplification
 Both r0
(C) and r1
(C) can be approximated by a power function:
 The exponents i
 for the dense networks are ~1.7 and ~2.1, respectively. Both i
's 
tend to 1 as d tends to 0.
 The mantissas Ai
 for the dense networks are ~0.7 and ~2.8, respectively. Both Ai
 
increase and possibly diverge as d tends to 0.
 Doubling node capacity almost quadruples the throughput.
r0,1C ≈A0,1C−2
0,1
05-01-2013 3rd BCGL Conference 12/22
Failing by Internal Faults
 Start with a fully functional network.
 Gradually increase the injection rate 
from 0 to r0
.
 At the fixed injection rate, fail 
random nodes after random delays. 
 Let m0
 be the smallest fraction of 
failed nodes that causes the network 
to choke.
05-01-2013 3rd BCGL Conference 13/22
Phase Transition Fault Rate
smaller d
dense
05-01-2013 3rd BCGL Conference 14/22
Faulty Nodes Effect
 Estimation of m0
:
 For the dense networks, A tends to [0...0.23]
 That is, it takes no more 23% of internally faulty nodes to choke a dense network 
with infinite buffer space in the presence of the highest superconductive injection 
rate.
m0C≈
 A−1erf logC−2/− A1
2
05-01-2013 3rd BCGL Conference 15/22
Failing by Overloading and Internal
Faults
 Start with a fully functional network.
 Gradually increase the injection rate 
from 0 to r () and simultaneously 
fail random nodes after random 
delays, until the network chokes.
05-01-2013 3rd BCGL Conference 16/22
Phase Space Summary (C=4, d=.2)
dielectric
resistive
superconductive
05-01-2013 3rd BCGL Conference 17/22
Equivalence of Excessive Traffic and
Node Failures
dense
05-01-2013 3rd BCGL Conference 18/22
Equivalence of Excessive Traffic and
Node Failures
 To a first approximation, the relationship between the network resilience 
parameters 0
 and m0
 is almost linear, with the slope of ­1
 Tolerating additional superconductive traffic 0
is equivalent to disabling extra 
network nodes m0
 due to internal faults:
≈−m0
05-01-2013 3rd BCGL Conference 19/22
A Closer Look at the Resistive Phase
r1
r0
???
05-01-2013 3rd BCGL Conference 20/22
What Happens around the “knee”?
 The “knee” is visible only in sparse networks
 Network state at the end of the simulation run: red circles correspond to faulty 
nodes, cyan circles—to healthy nodes
05-01-2013 3rd BCGL Conference 21/22
How Many Nodes Are in the GC?
 Percentage of faulty (red) 
and healthy (blue) nodes 
in the respective giant 
component for various r's
 The phase transition 
happens when all faulty 
nodes join the giant 
component
 Two “resistive” phases: 
“resistive­A” (truly 
“resistive”) and 
“resistive­B” (“resistive­
dielectric”)
0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5
0%
20%
40%
60%
80%
100%
r
All faulty nodes join 
the giant component!
05-01-2013 3rd BCGL Conference 22/22
Conclusion
 Random transactional networks can stay in four phases of interest: 
“superconductive” (no transactions fail), “resistive­A and ­B'' (some transactions 
fail), and “dielectric” (all transactions fail)
 Injection rates associated with the phase transitions, scale almost quadratically with 
respect to the node capacity
 At the resistive­to­dielectric phase transition, the effects of excessive network load 
and internal, spontaneous, and irreparable node faults are equivalent and almost 
perfectly anticorrelated
 The phase transition between two “resistive” phases can be attributed to the 
evolution of the giant component of faulty nodes

More Related Content

Similar to Resilience in Transactional Networks

A02120201010
A02120201010A02120201010
A02120201010
theijes
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
ijujournal
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
IJAEMSJORNAL
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Saad Bare
 
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesDelay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
ProjectENhANCE
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
inventionjournals
 
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWSECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
ijmnct
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
IAESIJEECS
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
IJCNCJournal
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
International Journal of Science and Research (IJSR)
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
Rebecca Buono
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection Network
IJMTST Journal
 
Best-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptxBest-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptx
BelayAmareB
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
Sreekrishna Das
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...
IJECEIAES
 
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
IJCSEIT Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
IJCNCJournal
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ijwmn
 

Similar to Resilience in Transactional Networks (20)

A02120201010
A02120201010A02120201010
A02120201010
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesDelay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWSECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection Network
 
50120130406027
5012013040602750120130406027
50120130406027
 
Best-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptxBest-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptx
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...
 
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
 

More from Dmitry Zinoviev

Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)
Dmitry Zinoviev
 
WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?
Dmitry Zinoviev
 
The “Musk” Effect at Twitter
The “Musk” Effect at TwitterThe “Musk” Effect at Twitter
The “Musk” Effect at Twitter
Dmitry Zinoviev
 
Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?
Dmitry Zinoviev
 
Using Complex Network Analysis for Periodization
Using Complex Network Analysis for PeriodizationUsing Complex Network Analysis for Periodization
Using Complex Network Analysis for Periodization
Dmitry Zinoviev
 
Algorithms
AlgorithmsAlgorithms
Algorithms
Dmitry Zinoviev
 
Text analysis of The Book Club Play
Text analysis of The Book Club PlayText analysis of The Book Club Play
Text analysis of The Book Club Play
Dmitry Zinoviev
 
Exploring the History of Mental Stigma
Exploring the History of Mental StigmaExploring the History of Mental Stigma
Exploring the History of Mental Stigma
Dmitry Zinoviev
 
Roles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction NetworkRoles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction Network
Dmitry Zinoviev
 
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
Dmitry Zinoviev
 
Network analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweetsNetwork analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweets
Dmitry Zinoviev
 
Network Analysis of The Shining
Network Analysis of The ShiningNetwork Analysis of The Shining
Network Analysis of The Shining
Dmitry Zinoviev
 
The Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network AnalysisThe Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network Analysis
Dmitry Zinoviev
 
Pickling and CSV
Pickling and CSVPickling and CSV
Pickling and CSV
Dmitry Zinoviev
 
Python overview
Python overviewPython overview
Python overview
Dmitry Zinoviev
 
Welcome to CS310!
Welcome to CS310!Welcome to CS310!
Welcome to CS310!
Dmitry Zinoviev
 
Programming languages
Programming languagesProgramming languages
Programming languages
Dmitry Zinoviev
 
The P4 of Networkacy
The P4 of NetworkacyThe P4 of Networkacy
The P4 of Networkacy
Dmitry Zinoviev
 
DaVinci Code. Network Analysis
DaVinci Code. Network AnalysisDaVinci Code. Network Analysis
DaVinci Code. Network Analysis
Dmitry Zinoviev
 
Soviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success PredictorsSoviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success Predictors
Dmitry Zinoviev
 

More from Dmitry Zinoviev (20)

Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)
 
WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?
 
The “Musk” Effect at Twitter
The “Musk” Effect at TwitterThe “Musk” Effect at Twitter
The “Musk” Effect at Twitter
 
Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?
 
Using Complex Network Analysis for Periodization
Using Complex Network Analysis for PeriodizationUsing Complex Network Analysis for Periodization
Using Complex Network Analysis for Periodization
 
Algorithms
AlgorithmsAlgorithms
Algorithms
 
Text analysis of The Book Club Play
Text analysis of The Book Club PlayText analysis of The Book Club Play
Text analysis of The Book Club Play
 
Exploring the History of Mental Stigma
Exploring the History of Mental StigmaExploring the History of Mental Stigma
Exploring the History of Mental Stigma
 
Roles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction NetworkRoles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction Network
 
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
 
Network analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweetsNetwork analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweets
 
Network Analysis of The Shining
Network Analysis of The ShiningNetwork Analysis of The Shining
Network Analysis of The Shining
 
The Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network AnalysisThe Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network Analysis
 
Pickling and CSV
Pickling and CSVPickling and CSV
Pickling and CSV
 
Python overview
Python overviewPython overview
Python overview
 
Welcome to CS310!
Welcome to CS310!Welcome to CS310!
Welcome to CS310!
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
The P4 of Networkacy
The P4 of NetworkacyThe P4 of Networkacy
The P4 of Networkacy
 
DaVinci Code. Network Analysis
DaVinci Code. Network AnalysisDaVinci Code. Network Analysis
DaVinci Code. Network Analysis
 
Soviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success PredictorsSoviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success Predictors
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Resilience in Transactional Networks

  • 1. 05-01-2013 3rd BCGL Conference 1/22 Resilience in Transaction-Oriented Networks Dmitry Zinoviev*, Hamid Benbrahim, Greta Meszoely+ , Dan Stefanescu* *Mathematics and Computer Science Department + Sawyer School of Management Suffolk University, Boston
  • 2. 05-01-2013 3rd BCGL Conference 2/22 Outline  Transaction­oriented networks  Network model and its interpretations  Simulation results:  Dense and sparse networks  Throughput amplification  Equivalence of excessive traffic and faulty nodes  Network as a four­phase matter  Conclusion and future work
  • 3. 05-01-2013 3rd BCGL Conference 3/22 Transaction-Oriented Networks  Used to execute distributed transactions (compound operations that succeed or fail  atomically)  Interpretations:  Distributed database transactions (original, HPC­related interpretation)  Financial transactions (e.g., loans)  Transportation (e.g., multi­leg flights)  How resilient are these networks to externally and internally induced failures?
  • 4. 05-01-2013 3rd BCGL Conference 4/22 Transactions and Network Network Incoming transactions Committed transactions Aborted transactions
  • 5. 05-01-2013 3rd BCGL Conference 5/22 Network Model Overview  Random Erdös–Rényi network, N=1,600 identical nodes representing network  hosts, density d.  Each node can simultaneously execute up to C almost independent  subtransactions. Each subtransaction takes constant time  0  to complete. The  network is simulated for the duration of S 0 .  Each node can be used for injecting transactions into the network and for  terminating transactions. Transactions are injected uniformly across the network.  The delays between subsequent transactions are drawn from the exponential  distribution E(1/r).  Each transaction has L=N(10,4) subtransactions.
  • 6. 05-01-2013 3rd BCGL Conference 6/22 Opportunistic Routing  The node for the next subtransaction is chosen uniformly at random from all  neighbors of the current node.  If the next node is disabled, then another neighbor is chosen.  If all neighbors are disabled, the subtransaction is aborted, and the master  transaction rolls back.  If a transaction is aborted, all other transactions that crossed path with it in the past  T time units (T=100 ), are also aborted with probability p0 =.01.  We observed very little dependence of the simulated network measures on p0 .
  • 7. 05-01-2013 3rd BCGL Conference 7/22 Node Shutdown  When a node is overloaded (load > C), it shuts down.  A node may fail randomly after an initial delay drawn from the exponential  distribution E(Tf ).  Once disabled, a node is not restarted. All subtransactions currently executed at a  disabled node are aborted.
  • 8. 05-01-2013 3rd BCGL Conference 8/22 Simulation Framework  Custom­built network simulator in C++  In each experiment, the network has been simulated for a variety of combinations  of node capacities and densities (C, d):  d  {0.01, 0.011, 0.015, 0.025, 0.04, 0.055, 0.075, 0.1, 0.2, 0.3, 0.5, 0.6,  0.75, 0.85, 0.99}  C  {2, 3, 4, ... 22}  Red color indicates sparse networks (they behave diferently from the dense  networks)
  • 9. 05-01-2013 3rd BCGL Conference 9/22 Failing by Overloading  Start with a fully functional network.  Gradually increase the injection rate from  0 to r0  until at least 10­6  of all  transactions abort (superconductive  mode ⇒ resistive mode).  The fraction of aborted transactions  monotonically increases, until at some  rate r1   the network chokes (resistive  mode ⇒ dielectric mode).   Define 0  = r0  / r1 .  r0  and r1  slightly depend on the simulation  running time. Our results have been  obtained for S=84,6000  (“one day”).
  • 10. 05-01-2013 3rd BCGL Conference 10/22 Phase Transition Injection Rates r1 , smaller d r0 , smaller d dense
  • 11. 05-01-2013 3rd BCGL Conference 11/22 Quadratic Amplification  Both r0 (C) and r1 (C) can be approximated by a power function:  The exponents i  for the dense networks are ~1.7 and ~2.1, respectively. Both i 's  tend to 1 as d tends to 0.  The mantissas Ai  for the dense networks are ~0.7 and ~2.8, respectively. Both Ai   increase and possibly diverge as d tends to 0.  Doubling node capacity almost quadruples the throughput. r0,1C ≈A0,1C−2 0,1
  • 12. 05-01-2013 3rd BCGL Conference 12/22 Failing by Internal Faults  Start with a fully functional network.  Gradually increase the injection rate  from 0 to r0 .  At the fixed injection rate, fail  random nodes after random delays.   Let m0  be the smallest fraction of  failed nodes that causes the network  to choke.
  • 13. 05-01-2013 3rd BCGL Conference 13/22 Phase Transition Fault Rate smaller d dense
  • 14. 05-01-2013 3rd BCGL Conference 14/22 Faulty Nodes Effect  Estimation of m0 :  For the dense networks, A tends to [0...0.23]  That is, it takes no more 23% of internally faulty nodes to choke a dense network  with infinite buffer space in the presence of the highest superconductive injection  rate. m0C≈  A−1erf logC−2/− A1 2
  • 15. 05-01-2013 3rd BCGL Conference 15/22 Failing by Overloading and Internal Faults  Start with a fully functional network.  Gradually increase the injection rate  from 0 to r () and simultaneously  fail random nodes after random  delays, until the network chokes.
  • 16. 05-01-2013 3rd BCGL Conference 16/22 Phase Space Summary (C=4, d=.2) dielectric resistive superconductive
  • 17. 05-01-2013 3rd BCGL Conference 17/22 Equivalence of Excessive Traffic and Node Failures dense
  • 18. 05-01-2013 3rd BCGL Conference 18/22 Equivalence of Excessive Traffic and Node Failures  To a first approximation, the relationship between the network resilience  parameters 0  and m0  is almost linear, with the slope of ­1  Tolerating additional superconductive traffic 0 is equivalent to disabling extra  network nodes m0  due to internal faults: ≈−m0
  • 19. 05-01-2013 3rd BCGL Conference 19/22 A Closer Look at the Resistive Phase r1 r0 ???
  • 20. 05-01-2013 3rd BCGL Conference 20/22 What Happens around the “knee”?  The “knee” is visible only in sparse networks  Network state at the end of the simulation run: red circles correspond to faulty  nodes, cyan circles—to healthy nodes
  • 21. 05-01-2013 3rd BCGL Conference 21/22 How Many Nodes Are in the GC?  Percentage of faulty (red)  and healthy (blue) nodes  in the respective giant  component for various r's  The phase transition  happens when all faulty  nodes join the giant  component  Two “resistive” phases:  “resistive­A” (truly  “resistive”) and  “resistive­B” (“resistive­ dielectric”) 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 0% 20% 40% 60% 80% 100% r All faulty nodes join  the giant component!
  • 22. 05-01-2013 3rd BCGL Conference 22/22 Conclusion  Random transactional networks can stay in four phases of interest:  “superconductive” (no transactions fail), “resistive­A and ­B'' (some transactions  fail), and “dielectric” (all transactions fail)  Injection rates associated with the phase transitions, scale almost quadratically with  respect to the node capacity  At the resistive­to­dielectric phase transition, the effects of excessive network load  and internal, spontaneous, and irreparable node faults are equivalent and almost  perfectly anticorrelated  The phase transition between two “resistive” phases can be attributed to the  evolution of the giant component of faulty nodes