首页> 外文学位 >Linear iterative strategies for information dissemination and processing in distributed systems.
【24h】

Linear iterative strategies for information dissemination and processing in distributed systems.

机译:分布式系统中信息传播和处理的线性迭代策略。

获取原文
获取原文并翻译 | 示例

摘要

Given an arbitrary network of interconnected nodes, each with some initial value, we develop and analyze distributed strategies that enable a subset of the nodes to calculate any function of the initial values of the nodes. Specifically, we focus on linear iterative strategies where each node updates its value to be a weighted average of its previous value and those of its neighbors over the course of several time-steps.;We start by showing that in networks with time-invariant topologies, choosing the weights for the linear iteration randomly from a field of sufficiently large size will (with high probability) allow every node to calculate any arbitrary function of the initial node values after running the linear iteration for a finite number of time-steps. We show that the number of time-steps required can be determined from the structure of the network topology, and in fact, may be minimal over all possible strategies for information dissemination.;We then apply our results to calculate linear functions in networks with real-valued transmissions and updates, where communications between nodes are corrupted by additive noise. We show that by using a linear iterative strategy with almost any set of real-valued weights for a finite number of time-steps, any node in the network will be able to calculate an unbiased estimate of any linear function by taking a linear combination of the values that it sees over the course of the linear iteration. Furthermore, for a given set of weights, we describe how to choose this linear combination to minimize the variance of the unbiased estimate calculated by each node.;Next, we consider the problem of distributed function calculation in the presence of faulty or malicious agents, and we study the susceptibility of linear iterative strategies to misbehavior by some nodes in the network; specifically, we consider a node to be malicious if it updates its value arbitrarily at each time-step, instead of following the predefined linear iterative strategy. Our analysis is constructive, in that it provides specific attacking and decoding strategies which the malicious and non-malicious nodes can use to achieve their objectives.;We then utilize our framework to study the topic of network coding in the presence of malicious nodes. We consider the wireless broadcast communication model, where each transmission by a node is received by all of its neighbors in the network. We use linear network coding to disseminate information, whereby at each time-step, each node transmits a value that is a linear combination of the most recent transmissions of its neighbors. We allow for the possibility that the malicious nodes conspiratorially transmit arbitrary values in an effort to disrupt the network, and we show that linear network codes in the presence of such attackers can be conveniently modeled as a linear dynamical system with unknown inputs.;Finally, we generalize existing theory on structured linear systems to encompass finite fields, and apply these results at various points in the thesis. Specifically, we show that certain structural properties of linear systems remain valid with high probability if the parameters are chosen from a finite field of sufficiently large size. In the process, we obtain new insights into structural properties of linear systems (such as an improved upper bound on the observability index in terms of the topology of the graph associated with the system). (Abstract shortened by UMI.)
机译:给定任意一个互连节点的网络,每个节点都有一些初始值,我们将开发和分析分布式策略,这些策略使节点的子集能够计算节点初始值的任何函数。具体来说,我们专注于线性迭代策略,其中每个节点在几个时间步长的过程中将其值更新为其先前值及其邻居的值的加权平均值。;我们首先显示具有时不变拓扑的网络,从足够大的字段中随机选择线性迭代的权重(很有可能)将使每个节点在运行线性迭代有限的时间步数之后,可以计算初始节点值的任意函数。我们证明了所需的时间步长可以从网络拓扑的结构中确定,实际上,在所有可能的信息传播策略中可能都是最小的;然后我们将结果应用于计算具有实数的网络中的线性函数值的传输和更新,其中节点之间的通信被附加噪声破坏。我们表明,通过对有限数量的时间步使用几乎任何一组实值权重的线性迭代策略,网络中的任何节点都将能够通过采用以下公式的线性组合来计算任何线性函数的无偏估计:它在线性迭代过程中看到的值。此外,对于给定的一组权重,我们描述了如何选择此线性组合以最小化每个节点计算的无偏估计的方差。接下来,我们考虑存在故障或恶意代理的情况下的分布式函数计算问题,并且我们研究了线性迭代策略对网络中某些节点行为不当的敏感性。具体来说,如果节点在每个时间步长随意更新其值,而不是遵循预定义的线性迭代策略,则认为该节点是恶意的。我们的分析具有建设性,因为它提供了恶意和非恶意节点可以用来实现其目标的特定攻击和解码策略。然后,我们使用我们的框架来研究存在恶意节点的网络编码主题。我们考虑无线广播通信模型,其中节点的每次传输都被网络中所有邻居接收。我们使用线性网络编码来传播信息,从而在每个时间步长,每个节点都发送一个值,该值是其邻居最近一次传输的线性组合。我们考虑了恶意节点串谋传输任意值以破坏网络的可能性,并且我们证明存在此类攻击者的线性网络代码可以方便地建模为具有未知输入的线性动态系统。我们将关于结构化线性系统的现有理论进行概括,以涵盖有限域,并将这些结果应用于论文的各个方面。具体来说,我们表明,如果参数是从足够大的有限域中选择的,则线性系统的某些结构属性将以很高的概率保持有效。在此过程中,我们获得了有关线性系统结构特性的新见解(例如,根据与系统相关的图的拓扑结构,可观察性指标的上限有所提高)。 (摘要由UMI缩短。)

著录项

  • 作者

    Sundaram, Shreyas.;

  • 作者单位

    University of Illinois at Urbana-Champaign.;

  • 授予单位 University of Illinois at Urbana-Champaign.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 142 p.
  • 总页数 142
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:37:47

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号