SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
05-01-2013 3rd BCGL Conference 1/22
Resilience in Transaction-Oriented
Networks
Dmitry Zinoviev*, Hamid Benbrahim,
Greta Meszoely+
, Dan Stefanescu*
*Mathematics and Computer Science Department
+
Sawyer School of Management
Suffolk University, Boston
05-01-2013 3rd BCGL Conference 2/22
Outline
 Transaction­oriented networks
 Network model and its interpretations
 Simulation results:
 Dense and sparse networks
 Throughput amplification
 Equivalence of excessive traffic and faulty nodes
 Network as a four­phase matter
 Conclusion and future work
05-01-2013 3rd BCGL Conference 3/22
Transaction-Oriented Networks
 Used to execute distributed transactions (compound operations that succeed or fail 
atomically)
 Interpretations:
 Distributed database transactions (original, HPC­related interpretation)
 Financial transactions (e.g., loans)
 Transportation (e.g., multi­leg flights)
 How resilient are these networks to externally and internally induced failures?
05-01-2013 3rd BCGL Conference 4/22
Transactions and Network
Network
Incoming
transactions
Committed transactions
Aborted
transactions
05-01-2013 3rd BCGL Conference 5/22
Network Model Overview
 Random Erdös–Rényi network, N=1,600 identical nodes representing network 
hosts, density d.
 Each node can simultaneously execute up to C almost independent 
subtransactions. Each subtransaction takes constant time 
0
 to complete. The 
network is simulated for the duration of S
0
.
 Each node can be used for injecting transactions into the network and for 
terminating transactions. Transactions are injected uniformly across the network. 
The delays between subsequent transactions are drawn from the exponential 
distribution E(1/r).
 Each transaction has L=N(10,4) subtransactions.
05-01-2013 3rd BCGL Conference 6/22
Opportunistic Routing
 The node for the next subtransaction is chosen uniformly at random from all 
neighbors of the current node.
 If the next node is disabled, then another neighbor is chosen.
 If all neighbors are disabled, the subtransaction is aborted, and the master 
transaction rolls back.
 If a transaction is aborted, all other transactions that crossed path with it in the past 
T time units (T=100
), are also aborted with probability p0
=.01.
 We observed very little dependence of the simulated network measures on p0
.
05-01-2013 3rd BCGL Conference 7/22
Node Shutdown
 When a node is overloaded (load > C), it shuts down.
 A node may fail randomly after an initial delay drawn from the exponential 
distribution E(Tf
).
 Once disabled, a node is not restarted. All subtransactions currently executed at a 
disabled node are aborted.
05-01-2013 3rd BCGL Conference 8/22
Simulation Framework
 Custom­built network simulator in C++
 In each experiment, the network has been simulated for a variety of combinations 
of node capacities and densities (C, d):
 d  {0.01, 0.011, 0.015, 0.025, 0.04, 0.055, 0.075, 0.1, 0.2, 0.3, 0.5, 0.6, 
0.75, 0.85, 0.99}
 C  {2, 3, 4, ... 22}
 Red color indicates sparse networks (they behave diferently from the dense 
networks)
05-01-2013 3rd BCGL Conference 9/22
Failing by Overloading
 Start with a fully functional network.
 Gradually increase the injection rate from 
0 to r0
 until at least 10­6
 of all 
transactions abort (superconductive 
mode ⇒ resistive mode).
 The fraction of aborted transactions 
monotonically increases, until at some 
rate r1
  the network chokes (resistive 
mode ⇒ dielectric mode). 
 Define 0 
= r0 
/ r1
.
 r0
 and r1
 slightly depend on the simulation 
running time. Our results have been 
obtained for S=84,6000
 (“one day”).
05-01-2013 3rd BCGL Conference 10/22
Phase Transition Injection Rates
r1
, smaller d
r0
, smaller d
dense
05-01-2013 3rd BCGL Conference 11/22
Quadratic Amplification
 Both r0
(C) and r1
(C) can be approximated by a power function:
 The exponents i
 for the dense networks are ~1.7 and ~2.1, respectively. Both i
's 
tend to 1 as d tends to 0.
 The mantissas Ai
 for the dense networks are ~0.7 and ~2.8, respectively. Both Ai
 
increase and possibly diverge as d tends to 0.
 Doubling node capacity almost quadruples the throughput.
r0,1C ≈A0,1C−2
0,1
05-01-2013 3rd BCGL Conference 12/22
Failing by Internal Faults
 Start with a fully functional network.
 Gradually increase the injection rate 
from 0 to r0
.
 At the fixed injection rate, fail 
random nodes after random delays. 
 Let m0
 be the smallest fraction of 
failed nodes that causes the network 
to choke.
05-01-2013 3rd BCGL Conference 13/22
Phase Transition Fault Rate
smaller d
dense
05-01-2013 3rd BCGL Conference 14/22
Faulty Nodes Effect
 Estimation of m0
:
 For the dense networks, A tends to [0...0.23]
 That is, it takes no more 23% of internally faulty nodes to choke a dense network 
with infinite buffer space in the presence of the highest superconductive injection 
rate.
m0C≈
 A−1erf logC−2/− A1
2
05-01-2013 3rd BCGL Conference 15/22
Failing by Overloading and Internal
Faults
 Start with a fully functional network.
 Gradually increase the injection rate 
from 0 to r () and simultaneously 
fail random nodes after random 
delays, until the network chokes.
05-01-2013 3rd BCGL Conference 16/22
Phase Space Summary (C=4, d=.2)
dielectric
resistive
superconductive
05-01-2013 3rd BCGL Conference 17/22
Equivalence of Excessive Traffic and
Node Failures
dense
05-01-2013 3rd BCGL Conference 18/22
Equivalence of Excessive Traffic and
Node Failures
 To a first approximation, the relationship between the network resilience 
parameters 0
 and m0
 is almost linear, with the slope of ­1
 Tolerating additional superconductive traffic 0
is equivalent to disabling extra 
network nodes m0
 due to internal faults:
≈−m0
05-01-2013 3rd BCGL Conference 19/22
A Closer Look at the Resistive Phase
r1
r0
???
05-01-2013 3rd BCGL Conference 20/22
What Happens around the “knee”?
 The “knee” is visible only in sparse networks
 Network state at the end of the simulation run: red circles correspond to faulty 
nodes, cyan circles—to healthy nodes
05-01-2013 3rd BCGL Conference 21/22
How Many Nodes Are in the GC?
 Percentage of faulty (red) 
and healthy (blue) nodes 
in the respective giant 
component for various r's
 The phase transition 
happens when all faulty 
nodes join the giant 
component
 Two “resistive” phases: 
“resistive­A” (truly 
“resistive”) and 
“resistive­B” (“resistive­
dielectric”)
0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5
0%
20%
40%
60%
80%
100%
r
All faulty nodes join 
the giant component!
05-01-2013 3rd BCGL Conference 22/22
Conclusion
 Random transactional networks can stay in four phases of interest: 
“superconductive” (no transactions fail), “resistive­A and ­B'' (some transactions 
fail), and “dielectric” (all transactions fail)
 Injection rates associated with the phase transitions, scale almost quadratically with 
respect to the node capacity
 At the resistive­to­dielectric phase transition, the effects of excessive network load 
and internal, spontaneous, and irreparable node faults are equivalent and almost 
perfectly anticorrelated
 The phase transition between two “resistive” phases can be attributed to the 
evolution of the giant component of faulty nodes

Contenu connexe

Similaire à Resilience in Transactional Networks

A02120201010
A02120201010A02120201010
A02120201010theijes
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesDelay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesProjectENhANCE
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWSECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkIJMTST Journal
 
Best-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptxBest-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptxBelayAmareB
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...IJECEIAES
 
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...IJCSEIT Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
 

Similaire à Resilience in Transactional Networks (20)

A02120201010
A02120201010A02120201010
A02120201010
 
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSSIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKS
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesDelay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWSECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection Network
 
50120130406027
5012013040602750120130406027
50120130406027
 
Best-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptxBest-Fit Topology - LO1 Part I.pptx
Best-Fit Topology - LO1 Part I.pptx
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...
 
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...Design and Implementation of Multistage Interconnection Networks for SoC Netw...
Design and Implementation of Multistage Interconnection Networks for SoC Netw...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
 

Plus de Dmitry Zinoviev

Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Dmitry Zinoviev
 
WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?Dmitry Zinoviev
 
The “Musk” Effect at Twitter
The “Musk” Effect at TwitterThe “Musk” Effect at Twitter
The “Musk” Effect at TwitterDmitry Zinoviev
 
Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?Dmitry Zinoviev
 
Using Complex Network Analysis for Periodization
Using Complex Network Analysis for PeriodizationUsing Complex Network Analysis for Periodization
Using Complex Network Analysis for PeriodizationDmitry Zinoviev
 
Text analysis of The Book Club Play
Text analysis of The Book Club PlayText analysis of The Book Club Play
Text analysis of The Book Club PlayDmitry Zinoviev
 
Exploring the History of Mental Stigma
Exploring the History of Mental StigmaExploring the History of Mental Stigma
Exploring the History of Mental StigmaDmitry Zinoviev
 
Roles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction NetworkRoles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction NetworkDmitry Zinoviev
 
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...Dmitry Zinoviev
 
Network analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweetsNetwork analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweetsDmitry Zinoviev
 
Network Analysis of The Shining
Network Analysis of The ShiningNetwork Analysis of The Shining
Network Analysis of The ShiningDmitry Zinoviev
 
The Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network AnalysisThe Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network AnalysisDmitry Zinoviev
 
DaVinci Code. Network Analysis
DaVinci Code. Network AnalysisDaVinci Code. Network Analysis
DaVinci Code. Network AnalysisDmitry Zinoviev
 
Soviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success PredictorsSoviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success PredictorsDmitry Zinoviev
 

Plus de Dmitry Zinoviev (20)

Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)Machine Learning Basics for Dummies (no math!)
Machine Learning Basics for Dummies (no math!)
 
WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?WHat is star discourse in post-Soviet film journals?
WHat is star discourse in post-Soviet film journals?
 
The “Musk” Effect at Twitter
The “Musk” Effect at TwitterThe “Musk” Effect at Twitter
The “Musk” Effect at Twitter
 
Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?Are Twitter Networks of Regional Entrepreneurs Gendered?
Are Twitter Networks of Regional Entrepreneurs Gendered?
 
Using Complex Network Analysis for Periodization
Using Complex Network Analysis for PeriodizationUsing Complex Network Analysis for Periodization
Using Complex Network Analysis for Periodization
 
Algorithms
AlgorithmsAlgorithms
Algorithms
 
Text analysis of The Book Club Play
Text analysis of The Book Club PlayText analysis of The Book Club Play
Text analysis of The Book Club Play
 
Exploring the History of Mental Stigma
Exploring the History of Mental StigmaExploring the History of Mental Stigma
Exploring the History of Mental Stigma
 
Roles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction NetworkRoles and Words in a massive NSSI-Related Interaction Network
Roles and Words in a massive NSSI-Related Interaction Network
 
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
“A Quaint and Curious Volume of Forgotten Lore,” or an Exercise in Digital Hu...
 
Network analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweetsNetwork analysis of the 2016 USA presidential campaign tweets
Network analysis of the 2016 USA presidential campaign tweets
 
Network Analysis of The Shining
Network Analysis of The ShiningNetwork Analysis of The Shining
Network Analysis of The Shining
 
The Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network AnalysisThe Lord of the Ring. A Network Analysis
The Lord of the Ring. A Network Analysis
 
Pickling and CSV
Pickling and CSVPickling and CSV
Pickling and CSV
 
Python overview
Python overviewPython overview
Python overview
 
Welcome to CS310!
Welcome to CS310!Welcome to CS310!
Welcome to CS310!
 
Programming languages
Programming languagesProgramming languages
Programming languages
 
The P4 of Networkacy
The P4 of NetworkacyThe P4 of Networkacy
The P4 of Networkacy
 
DaVinci Code. Network Analysis
DaVinci Code. Network AnalysisDaVinci Code. Network Analysis
DaVinci Code. Network Analysis
 
Soviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success PredictorsSoviet Popular Music Landscape: Community Structure and Success Predictors
Soviet Popular Music Landscape: Community Structure and Success Predictors
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Resilience in Transactional Networks

  • 1. 05-01-2013 3rd BCGL Conference 1/22 Resilience in Transaction-Oriented Networks Dmitry Zinoviev*, Hamid Benbrahim, Greta Meszoely+ , Dan Stefanescu* *Mathematics and Computer Science Department + Sawyer School of Management Suffolk University, Boston
  • 2. 05-01-2013 3rd BCGL Conference 2/22 Outline  Transaction­oriented networks  Network model and its interpretations  Simulation results:  Dense and sparse networks  Throughput amplification  Equivalence of excessive traffic and faulty nodes  Network as a four­phase matter  Conclusion and future work
  • 3. 05-01-2013 3rd BCGL Conference 3/22 Transaction-Oriented Networks  Used to execute distributed transactions (compound operations that succeed or fail  atomically)  Interpretations:  Distributed database transactions (original, HPC­related interpretation)  Financial transactions (e.g., loans)  Transportation (e.g., multi­leg flights)  How resilient are these networks to externally and internally induced failures?
  • 4. 05-01-2013 3rd BCGL Conference 4/22 Transactions and Network Network Incoming transactions Committed transactions Aborted transactions
  • 5. 05-01-2013 3rd BCGL Conference 5/22 Network Model Overview  Random Erdös–Rényi network, N=1,600 identical nodes representing network  hosts, density d.  Each node can simultaneously execute up to C almost independent  subtransactions. Each subtransaction takes constant time  0  to complete. The  network is simulated for the duration of S 0 .  Each node can be used for injecting transactions into the network and for  terminating transactions. Transactions are injected uniformly across the network.  The delays between subsequent transactions are drawn from the exponential  distribution E(1/r).  Each transaction has L=N(10,4) subtransactions.
  • 6. 05-01-2013 3rd BCGL Conference 6/22 Opportunistic Routing  The node for the next subtransaction is chosen uniformly at random from all  neighbors of the current node.  If the next node is disabled, then another neighbor is chosen.  If all neighbors are disabled, the subtransaction is aborted, and the master  transaction rolls back.  If a transaction is aborted, all other transactions that crossed path with it in the past  T time units (T=100 ), are also aborted with probability p0 =.01.  We observed very little dependence of the simulated network measures on p0 .
  • 7. 05-01-2013 3rd BCGL Conference 7/22 Node Shutdown  When a node is overloaded (load > C), it shuts down.  A node may fail randomly after an initial delay drawn from the exponential  distribution E(Tf ).  Once disabled, a node is not restarted. All subtransactions currently executed at a  disabled node are aborted.
  • 8. 05-01-2013 3rd BCGL Conference 8/22 Simulation Framework  Custom­built network simulator in C++  In each experiment, the network has been simulated for a variety of combinations  of node capacities and densities (C, d):  d  {0.01, 0.011, 0.015, 0.025, 0.04, 0.055, 0.075, 0.1, 0.2, 0.3, 0.5, 0.6,  0.75, 0.85, 0.99}  C  {2, 3, 4, ... 22}  Red color indicates sparse networks (they behave diferently from the dense  networks)
  • 9. 05-01-2013 3rd BCGL Conference 9/22 Failing by Overloading  Start with a fully functional network.  Gradually increase the injection rate from  0 to r0  until at least 10­6  of all  transactions abort (superconductive  mode ⇒ resistive mode).  The fraction of aborted transactions  monotonically increases, until at some  rate r1   the network chokes (resistive  mode ⇒ dielectric mode).   Define 0  = r0  / r1 .  r0  and r1  slightly depend on the simulation  running time. Our results have been  obtained for S=84,6000  (“one day”).
  • 10. 05-01-2013 3rd BCGL Conference 10/22 Phase Transition Injection Rates r1 , smaller d r0 , smaller d dense
  • 11. 05-01-2013 3rd BCGL Conference 11/22 Quadratic Amplification  Both r0 (C) and r1 (C) can be approximated by a power function:  The exponents i  for the dense networks are ~1.7 and ~2.1, respectively. Both i 's  tend to 1 as d tends to 0.  The mantissas Ai  for the dense networks are ~0.7 and ~2.8, respectively. Both Ai   increase and possibly diverge as d tends to 0.  Doubling node capacity almost quadruples the throughput. r0,1C ≈A0,1C−2 0,1
  • 12. 05-01-2013 3rd BCGL Conference 12/22 Failing by Internal Faults  Start with a fully functional network.  Gradually increase the injection rate  from 0 to r0 .  At the fixed injection rate, fail  random nodes after random delays.   Let m0  be the smallest fraction of  failed nodes that causes the network  to choke.
  • 13. 05-01-2013 3rd BCGL Conference 13/22 Phase Transition Fault Rate smaller d dense
  • 14. 05-01-2013 3rd BCGL Conference 14/22 Faulty Nodes Effect  Estimation of m0 :  For the dense networks, A tends to [0...0.23]  That is, it takes no more 23% of internally faulty nodes to choke a dense network  with infinite buffer space in the presence of the highest superconductive injection  rate. m0C≈  A−1erf logC−2/− A1 2
  • 15. 05-01-2013 3rd BCGL Conference 15/22 Failing by Overloading and Internal Faults  Start with a fully functional network.  Gradually increase the injection rate  from 0 to r () and simultaneously  fail random nodes after random  delays, until the network chokes.
  • 16. 05-01-2013 3rd BCGL Conference 16/22 Phase Space Summary (C=4, d=.2) dielectric resistive superconductive
  • 17. 05-01-2013 3rd BCGL Conference 17/22 Equivalence of Excessive Traffic and Node Failures dense
  • 18. 05-01-2013 3rd BCGL Conference 18/22 Equivalence of Excessive Traffic and Node Failures  To a first approximation, the relationship between the network resilience  parameters 0  and m0  is almost linear, with the slope of ­1  Tolerating additional superconductive traffic 0 is equivalent to disabling extra  network nodes m0  due to internal faults: ≈−m0
  • 19. 05-01-2013 3rd BCGL Conference 19/22 A Closer Look at the Resistive Phase r1 r0 ???
  • 20. 05-01-2013 3rd BCGL Conference 20/22 What Happens around the “knee”?  The “knee” is visible only in sparse networks  Network state at the end of the simulation run: red circles correspond to faulty  nodes, cyan circles—to healthy nodes
  • 21. 05-01-2013 3rd BCGL Conference 21/22 How Many Nodes Are in the GC?  Percentage of faulty (red)  and healthy (blue) nodes  in the respective giant  component for various r's  The phase transition  happens when all faulty  nodes join the giant  component  Two “resistive” phases:  “resistive­A” (truly  “resistive”) and  “resistive­B” (“resistive­ dielectric”) 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 0% 20% 40% 60% 80% 100% r All faulty nodes join  the giant component!
  • 22. 05-01-2013 3rd BCGL Conference 22/22 Conclusion  Random transactional networks can stay in four phases of interest:  “superconductive” (no transactions fail), “resistive­A and ­B'' (some transactions  fail), and “dielectric” (all transactions fail)  Injection rates associated with the phase transitions, scale almost quadratically with  respect to the node capacity  At the resistive­to­dielectric phase transition, the effects of excessive network load  and internal, spontaneous, and irreparable node faults are equivalent and almost  perfectly anticorrelated  The phase transition between two “resistive” phases can be attributed to the  evolution of the giant component of faulty nodes