Loading...
Search for: distributed-computing
0.008 seconds
Total 160 records

    Fault injection into verilog models for dependability evaluation of digital systems

    , Article 2nd International Symposium on Parallel and Distributed Computing, ISPDC 2003, 13 October 2003 through 14 October 2003 ; 2003 , Pages 281-287 ; 0769520693 (ISBN); 9780769520698 (ISBN) Zarandi, H. R ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2003
    Abstract
    This paper presents transient and permanent fault injection into Verilog models of digital systems during the design phase by a developed simulation-based fault injection tool called INJECT. With this fault injection tool, it is possible to inject crucial fault models in all abstraction levels (such as swith-level) supported by Verilog HDL. Several fault models for injecting into Verilog models are specified and described. Analyzing the results obtained from the fault injections, using INJECT enables system designers to inform from dependable parameters, such as fault latency, propagation and coverage. As a case study, a 32-bit processor, namely DP32, has been evaluated and effects of faults... 

    Token-based function computation with memory

    , Article IEEE Transactions on Parallel and Distributed Systems ; Volume 27, Issue 6 , 2016 , Pages 1811-1823 ; 10459219 (ISSN) Salehkaleybar, S ; Golestani, S. J ; Sharif University of Technology
    IEEE Computer Society  2016
    Abstract
    In distributed function computation, each node has an initial value and the goal is to compute a function of these values in a distributed manner. In this paper, we propose a novel token-based approach to compute a wide class of target functions to which we refer as "token-based function computation with memory" (TCM) algorithm. In this approach, node values are attached to tokens and travel across the network. Each pair of travelling tokens would coalesce when they meet, forming a token with a new value as a function of the original token values. In contrast to the coalescing random walk (CRW) algorithm, where token movement is governed by random walk, meeting of tokens in our scheme is... 

    Delay Analysis and Improving in Distributed Computing

    , M.Sc. Thesis Sharif University of Technology Doudi, Fatemeh (Author) ; Ashtiani Mofrad Tehrani, Farid (Supervisor) ; Maddah Ali, Mohammad Ali (Supervisor)
    Abstract
    In this contemporary era, distributed computing is a vital solution for many applications. The traditional computing scheme based on allocating one complete computation to only one server is not efficient anymore. Delay has a very important role in computation’s performance especially for the computation at the edge of the network. To alleviate the effect of big data and complex algorithms, distributed computing is a very promising solution. In this structure, all computations are divided into some small tasks or coded, based on the system's status and will be executed in parallel. In fully parallelized distributed computing, a task is broken into N smaller tasks and whenever all N subtasks... 

    A scalable framework for wireless distributed computing

    , Article IEEE/ACM Transactions on Networking ; Volume 25, Issue 5 , 2017 , Pages 2643-2654 ; 10636692 (ISSN) Li, S ; Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Abstract
    We consider a wireless distributed computing system, in which multiple mobile users, connected wirelessly through an access point, collaborate to perform a computation task. In particular, users communicate with each other via the access point to exchange their locally computed intermediate computation results, which is known as data shuffling. We propose a scalable framework for this system, in which the required communication bandwidth for data shuffling does not increase with the number of users in the network. The key idea is to utilize a particular repetitive pattern of placing the data set (thus a particular repetitive pattern of intermediate computations), in order to provide the... 

    CodedSketch: Coded distributed computation of approximated matrix multiplication

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 2489-2493 ; 21578095 (ISSN); 9781538692912 (ISBN) Jahani Nezhad, T ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we propose CodedSketch, as a distributed straggler-resistant scheme to compute an approximation of the multiplication of two massive matrices. The objective is to reduce the recovery threshold, defined as the total number of worker nodes that the master node needs to wait for to be able to recover the final result. To exploit the fact that only an approximated result is required, in reducing the recovery threshold, some sorts of pre-compression are required. However, compression inherently involves some randomness that would lose the structure of the matrices. On the other hand, considering the structure of the matrices is crucial to reduce the recovery threshold. In... 

    Distributed Fault-tolerant Computation for Massive Data

    , M.Sc. Thesis Sharif University of Technology Mahvari Habibabadi, Mohammad Mahdi (Author) ; Maddah-Ali, Mohammad Ali (Supervisor)
    Abstract
    In this thesis we consider the problem of distributed computation by many processors.We mainly concentrate on matrix multiplication problem in this thesis because of its importance. A distributed system consists of N worker processors and one master processor. The master processor should distribute the computation between workers and after computation in each of them, collect the results. In this thesis, we are going to mitigate the effect of straggler processors by using coding methods. Straggler processors can cause delays in the computation time.In this thesis, we firstly introduce a method to multiply any number of matrices in each other. The proposed method occurred in one shot without... 

    Coordination Among Nodes of a Network: an Information Theoretic
    Perspective

    , M.Sc. Thesis Sharif University of Technology Abroshan, Mahed (Author) ; Aminzadeh Gohari, Amin (Supervisor)
    Abstract
    In this work, we consider a zero error coordination problem wherein the nodes of a network exchange messages to be able to perfectly coordinate their actions with the individual observations of each other. While previous works on coordination commonly assume an asymptotically vanishing error, we assume exact, zero error coordination. Furthermore, unlike previous works that employ the empirical or strong notions of coordination, we define and use a notion of set coordination. This notion of coordination bears similarities with the empirical notion of coordination. We observe that set coordination, in its special case of two nodes with a one-way communication link is equivalent with the “Hide... 

    An enhanced random-walk method for content locating in P2P networks

    , Article 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07, Toronto, ON, 22 June 2007 through 29 June 2007 ; 2007 ; 0769528384 (ISBN); 9780769528380 (ISBN) Ronasi, K ; Firooz, M. H ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
    2007
    Abstract
    The important problem of content location in an unstructured distributed network (such as P2P, with no central searching system, graph construction control or file placement regulation) is addressed. The existing methods that are based on either flooding or random walk impose a large traffic load on the network or require a long time to search. In this work, we propose a method that outperforms the existing methods in both of these measures. These advantages are achieved by publishing traces of the contents of each node in its nearby nodes, so that the closer nodes to the target have a stronger trace of it. Such traces are used to rapidly locate the desired content. The superb performance of... 

    Assessment of message missing failures in CAN-based systems

    , Article IASTED International Conference on Parallel and Distributed Computing and Networks, as part of the 23rd IASTED International Multi-Conference on Applied Informatics, Innsbruck, 15 February 2005 through 17 February 2005 ; 2005 , Pages 387-392 ; 10272666 (ISSN) Salmani, H ; Miremadi, S. G ; Fahringer T ; Hamza M. H ; Sharif University of Technology
    2005
    Abstract
    This paper presents a simulation-based environment to study fault effects in message missing failures in CAN-based systems. A CAN controller is modeled by VHDL at behavioral level and is exploited to set up a network composed of several nodes. A total of 27,000 transient faults of seven types are injected into five critical portions of the system including the bus and four portions of the CAN controller. The experimental results show that the faults affect the message sending in which more than 20% of faults cause the failure. Besides, with a heavy workload, faults that are occurred into the CAN controller and on the bus cause about 90% and 10% of all failures, respectively  

    Distributed arboricity-dependent graph coloring via all-to-all communication

    , Article 46th International Colloquium on Automata, Languages, and Programming, ICALP 2019, 9 July 2019 through 12 July 2019 ; Volume 132 , 2019 ; 18688969 (ISSN); 9783959771092 (ISBN) Ghaffari, M ; Sayyadi, A ; Sharif University of Technology
    Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing  2019
    Abstract
    We present a constant-time randomized distributed algorithms in the congested clique model that computes an O(α)-vertex-coloring, with high probability. Here, α denotes the arboricity of the graph, which is, roughly speaking, the edge-density of the densest subgraph. Congested clique is a well-studied model of synchronous message passing for distributed computing with all-to-all communication: per round each node can send one O(log n)-bit message algorithm to each other node. Our O(1)-round algorithm settles the randomized round complexity of the O(α)-coloring problem. We also explain that a similar method can provide a constant-time randomized algorithm for decomposing the graph into O(α)... 

    Straggler mitigation in distributed matrix multiplication: fundamental limits and optimal coding

    , Article IEEE Transactions on Information Theory ; Volume 66, Issue 3 , 2020 , Pages 1920-1933 Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    We consider the problem of massive matrix multiplication, which underlies many data analytic applications, in a large-scale distributed system comprising a group of worker nodes. We target the stragglers' delay performance bottleneck, which is due to the unpredictable latency in waiting for slowest nodes (or stragglers) to finish their tasks. We propose a novel coding strategy, named entangled polynomial code, for designing the intermediate computations at the worker nodes in order to minimize the recovery threshold (i.e., the number of workers that we need to wait for in order to compute the final output). We demonstrate the optimality of entangled polynomial code in several cases, and show... 

    Modeling and Simulation of Edge Computing Environments via Device-to-Device Communication Method

    , M.Sc. Thesis Sharif University of Technology Mohammadi, Ali (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    In order to use the high performance capabilities of a computing system, first it is required to provide a proper modelling for the job and the system's environment. Second, it is required to design scheduling and offloading algorithms based on the job and the system modeling and third for evaluating the performance of these algorithms. It is needed to either simulate them or prove their approximation factors. This project aims to carry out these three parts for the Edge Computing environment. The laid out model of the system in this thesis consists of many devices that are distributed around the network, which they can execute tasks parallel to each other, and between each two devices there... 

    Developing a Simulator for Concurrent Execution of Multiple Workflows in Fog Computing Environment

    , M.Sc. Thesis Sharif University of Technology Rayej, Mohamad Amin (Author) ; Izadi, Mohamad (Supervisor)
    Abstract
    Fog computing environment consists of several devices which distribute across an arbitrary topology. Each of these devices is capable of carrying out a designated computation simultaneously with other devices. One of the common ways of describing a computation is through the usage of workflows. Workflow is a flexible and formal way of modeling tasks and their requirements for execution. A workflow is essentially a DAG. Therefore, it can model the data dependency between tasks quite accurately. The complex structure of a workflow in conjunction with the homogenous nature of devices in a fog environment makes it difficult to find a resource management algorithm to minimize execution time, used... 

    Averaging consensus over erasure channels via local synchronization

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 1092-1096 ; 21578095 (ISSN); 9781479904464 (ISBN) Salehkaleybar, S ; Golestani, S. J ; Sharif University of Technology
    2013
    Abstract
    Averaging consensus on the values of nodes in a network is a principal problem in distributed computation. In the presence of erasure channels, conventional averaging consensus algorithms may not converge to the average value if packets are erased in arbitrary order. In this paper, we propose a 'Pseudo-Synchronous Averaging Consensus' (PSAC) algorithm to guarantee averaging consensus over erasure channels by employing tagged packets. We show that the PSAC algorithm has a simple structure and it can work with just two tags '0' and '1'. In asynchronous networks, the PSAC algorithm is a synchronizer in the sense that it keeps the updates of various nodes in step with each other. By exploiting... 

    Packet loss in peer-to-peer video streaming over the Internet

    , Article Multimedia Systems ; Volume 13, Issue 5-6 , 2008 , Pages 345-361 ; 09424962 (ISSN) Akbari, B ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    2008
    Abstract
    Peer-to-peer streaming has recently gained attention as an effective solution to support large scale media streaming applications over the Internet. One of the main challenges of peer-to-peer video streaming is the cumulative impact of the Internet packet loss due to the decoding dependency of the compressed video frames. In this paper we study the impact of the Internet packet loss on the performance of peer-to-peer video streaming systems, and analyze the efficiency of various packet loss recovery policies in such systems. Our analytical and simulation results show how the Internet packet loss can affect the performance of peer- to-peer video streaming systems and how different packet loss... 

    Capturing an intruder in product networks

    , Article Journal of Parallel and Distributed Computing ; Volume 67, Issue 9 , 2007 , Pages 1018-1028 ; 07437315 (ISSN) Imani, N ; Sarbazi Azad, H ; Zomaya, A. Y ; Sharif University of Technology
    2007
    Abstract
    In this paper, we propose a solution to the problem of capturing an intruder in a product network. This solution is derived based on the assumption of existing algorithms for basic member graphs of a graph product. In this problem, a team of cleaner agents are responsible for capturing a hostile intruder in the network. While the agents can move in the network one hop at a time, the intruder is assumed to be arbitrarily fast in a way that it can traverse any number of nodes contiguously as far as no agents reside in those nodes. Here, we consider a version of the problem where each agent can replicate new agents. Thus, the algorithm starts with a single agent and new agents are created on... 

    CodedSketch: A coding scheme for distributed computation of approximated matrix multiplication

    , Article IEEE Transactions on Information Theory ; Volume 67, Issue 6 , 2021 , Pages 4185-4196 ; 00189448 (ISSN) Jahani Nezhad, T ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In this paper, we propose CodedSketch, as a distributed straggler-resistant scheme to compute an approximation of the multiplication of two massive matrices. The objective is to reduce the recovery threshold, defined as the total number of worker nodes that the master node needs to wait for to be able to recover the final result. To exploit the fact that only an approximated result is required, in reducing the recovery threshold, some sorts of pre-compression are required. However, compression inherently involves some randomness that would lose the structure of the matrices. On the other hand, considering the structure of the matrices is crucial to reduce the recovery threshold. In... 

    Extended Rebeca: A component-based actor language with synchronous message passing

    , Article 5th International Conference on Application of Concurrency to System Design, ACSD 2005, St. Malo, 7 June 2005 through 9 June 2005 ; Volume 2005 , 2005 , Pages 212-220 ; 15504808 (ISSN); 0769523633 (ISBN); 9780769523637 (ISBN) Sirjani, M ; De Boer, F ; Movaghar, A ; Shali, A ; Sharif University of Technology
    2005
    Abstract
    In this paper, we propose extended Rebeca as a tool-supported actor-based language for modeling and verifying concurrent and distributed systems. We enrich Rebeca with a formal concept of components which integrates the message-driven computational model of actor-based languages with synchronous message passing. Components are used to encapsulate a set of internal active objects which react asynchronously to messages by means of methods and which additionally interact via a synchronous message passing mechanism. Components themselves interact only via asynchronous and anonymous messages. We present our compositional verification approach and abstraction techniques, and the theory... 

    A front-end tool for automated abstraction and modular verification of actor-based models

    , Article Proceedings - Fourth International Conference on Application of Concurrency to System Design, ACSD 2004, Hamilton, Ont., 16 June 2004 through 18 June 2004 ; 2004 , Pages 145-148 ; 0769520774 (ISBN); 9780769520773 (ISBN) Sirjani, M ; Shali, A ; Jaghoori, M. M ; Iravanchi, H ; Movaghar, A ; Sharif University of Technology
    2004
    Abstract
    Actor-based modeling is known to be an appropriate approach for representing concurrent and distributed systems. Rebeca is an actor-based language with a formal foundation, based on an operational interpretation of the actor model. We develop a front-end tool for translating a subset of Rebeca to SMV in order to model check Rebeca models. Automated modular verification and abstraction techniques are supported by the tool  

    A fundamental tradeoff between computation and communication in distributed computing

    , Article IEEE Transactions on Information Theory ; 2017 ; 00189448 (ISSN) Li, S ; Maddah Ali, M. A ; Yu, Q ; Avestimehr, A. S ; Sharif University of Technology
    Abstract
    How can we optimally trade extra computing power to reduce the communication load in distributed computing? We answer this question by characterizing a fundamental tradeoff between computation and communication in distributed computing, i.e., the two are inversely proportional to each other. More specifically, a general distributed computing framework, motivated by commonly used structures like MapReduce, is considered, where the overall computation is decomposed into computing a set of “Map” and “Reduce” functions distributedly across multiple computing nodes. A coded scheme, named “Coded Distributed Computing” (CDC), is proposed to demonstrate that increasing the computation load of the...