[SOLVED] 代写 algorithm openmp scala concurrency operating system graph software network PASSING THE MESSAGE

30 $

File Name: 代写_algorithm_openmp_scala_concurrency_operating_system_graph_software_network_PASSING_THE_MESSAGE.zip
File Size: 951.42 KB

SKU: 9387004604 Category: Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Or Upload Your Assignment Here:


PASSING THE MESSAGE
Assignment for all students of Systems, Networks and Concurrency
This is the second, carefully marked assignment of the course. Extra care is expected on all levels. A good solu- tion will have a surprisingly small amount of code. Make sure that this code is excellently written – in whichever language you prefer.
Overview
Routers are basic ingredients of most distributed systems. They commonly have no a-priori knowledge about the wider network topology in which they are embedded. Nevertheless they are expected to send messages via a network port which will move those messages closer to their destinations. Many constraints can be taken into consideration for a practical router, yet this assignment focuses on sending messages on the shortest paths to their destinations.
What an individual router needs to provide to clients:
• Acceptamessagefromaclient(inanpredefinedformat).Themessagealsocontainsades-
tination id. The expectation is that this message will eventually end at the router of this id.
• Store and provide received messages for a client to pick up (in an predefined format).
What is accessible to an individual router:
• The local network ports which are connected to other routers.
• The Id’s of all neighbouring routers. In the physical world this would need to be established by means of initial communications first, yet we assume here that this already happened.
• The total number of routers as well as the fact that they are numbered consecutively from 1 to the total number of routers. In a real router you would use hash tables for the router id’s.
What the routers need to agree upon before they are deployed:
• One or multiple message formats which are exchanged between routers (in addi- tion to the already given formats used to send to and received from clients).
• The semantics for those messages. What a router can do:
• Send messages in any of the globally defined inter-router formats over any of its ports to any of its directly connected neighbours.
• Receive messages on any local port and process their contents.
What a router cannot do is to sneak behind the scenes and extract the global topology of the network from a central place in a direct way. Routers can still organize themselves in whichever form they see fit. Thus a central place could for instance be one router which by election, or other means nominated itself as a central place. Communication with this router would need to go through the normal network channels though – no secret direct wires to a central coordina- tor.Yet there does not need to be any central instance at all – distributed solutions are usually also more robust.
1 | ANU College of Engineering and Computer Science October 2019

How to implement a router
You can implement this router in any language or environment, as long as it roughly follows the frame described above. One essential feature for your implementation needs to be kept in mind: the connections between routers are “wires” – not software buffers. A close software equivalent to a wire is synchronous message passing. Any buffer which might be needed,
will need to be implemented as part of the router.You can emulate synchronous (or otherwise “immediate”) communication by means of multiple asynchronous messages or by means of asynchronous messages combined with signals/interrupts.
There is a framework available to you in Ada which generates a number of classical network topologies and places router tasks inside a chosen topology. It also runs a simple evaluation which sends messages from each router to every other one and takes notes about the number of hops the message passed through.
If you decide to write it in another language than Ada, then you will need to program this simple infrastructure as well (details below). Simply contact us which your specific plans and we will see what is achievable with reasonable effort in your chosen environment.
The Ada framework
The program test_routers can be fully controlled via command line parameters:
accepted options: [-t {Topology
by Size : by Degree, Depths : by Dimension, Size :
: String }] -> CUBE_CONNECTED_CYCLES Line, Ring, Star, Fully_Connected
Tree
Mesh, Torus
Hypercube, Cube_Connected_Cycles, Butterfly, Wrap_Around_Butterfly
: Positive }] -> 20 : Positive }] -> 3 : Positive }] -> 4 : Positive }] -> 3 : Boolean }] -> TRUE : Boolean }] -> TRUE
by Dimension
:
[-s {Size
[-g {Degree
[-p {Depths
[-d {Dimension
[-c {Print connections [-i {Print distances
[-w {Routers settle time : Seconds }] -> 0.10
ources/CDS-Course/Assignments/Assignment 2 2011/Routers/Executables
[-o {Comms timeout : Seconds }] -> 0.10
-c TRUE -i TRUE -t Wrap_Around_Butterfly -d 3 -s 4 -g 3 -p 3 -w 0.1
[-m {Test mode : String }] -> ONE_TO_ALL Available modes: One_to_All, All_to_One
[-x {Dropouts : Natural }] -> 0
-> WRAP_AROUND_BUTTERFLY
Last login: Wed Sep 21 10:11:02 on ttys005 localhost:~ uwe$ cd /Users/uwe/Documents/S localhost:Executables uwe$ ./test_routers
accepted options:
[-t {Topology : String }]
by Size : Line, Ring, Star, Fully_Connected by Degree, Depths : Tree
by Dimension, Size : Mesh, Torus
by Dimension : Hypercube, Cube_Connected_Cycles,
Availab Butterfly, Wrap_Around_Butterfly : Positive }] -> 4
Figure 1: Command line options
pa
a
hy
Yo
o
u
o
e
s
me time to get themselves organized and specify for instance:
for a 200ms preparation phase during which no client messages will be sent through the network. After this settling time for the routers, the evaluation phase starts and a messages will be sent via every router to every other router. Those messages will be sent in groups, i.e. all messages originating from a specific router will be sent in bulk (“One to all”). This will be changed via the command line parameter -m All_To_One to a schema, where all mes- sages which are destined to a specific router will be send in bulk. The default time-out for any network activity is 100ms (but can also be adjusted via the command line interface). If a router does not respond after this time-out then the communication test is noted as unsuc- cessful. From the testing environment it cannot be distinguished whether the message was
[-s {Sizele network topologies are denoted by name (out of the list above) together with the [-g {Degree : Positive }] -> 3
[-
e
r
q
[
UE
[-
s
o
r
e
ed for a given topology. Thus you can test your routers in a 4-d
p
{
-c
{P
u
c
o{
m
h
e
uir
Dep
[-d {Dimension
: Positive }] -> 3
p
e
c
r
e
b
r
Co
a
ths
:
Po
in
mm
u
t
con
n
a
ters whic
a
st
b
im
nec
l
e
l
w yo
r
r
ut
r
o
ti
ut
:
S
y
on
:
./
_r
rs -t Hypercube -d 4
s
:
Bo
[-i {Print distances
[-w {Routers settle time : Seconds }] -> 0.10
[-m {Test mode : String }] -> ONE_TO_ALL Available modes: One_to_All, All_to_One
t
si
e
ol
eco
r
t
s
e
n
ive
}
t
o
an
}]

: Boolean }] -> TRUE
ds
}
./test_routers -t Hypercube -d 4 -w 0.2
———————– Instantiating router tasks —————————– => Routers up and running
——————————– Waiting ————————————— Time for routers to establish their strategies : 0.10 second(s)
—————————— Measurements ———————————— Minimal hops : 1
Maximal hops : Average hops :
4 2.39
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 1 | . 2 2 3 2 2 3 3 2 2 2 3 3 3 3 2 3 3 4 4|
2 |
3 |
4 | 2
5 |
6 | 2
7 | 3
8 | 2
9 | 2
10 | 3
11 | 3
12 | 2
13 | 2
14 | 2
15 |
16 | 3
17 | 3
18 | 3
19 | 3
20 | 2
21 | 3
22 | 3
23 | 4
24 | 4
. 2 2 2 2 3 3 . 2 2 3 2 2 2 3 2 . 3 3 2 3 2
2 2 . 3 3 3 2 2 2 3 . 2 3 3 2
2 2 3 3 2 . 2
2 3 3 3 . 2
2 2 3 3 . 2 2 3 2 3 2 2 2 2 .
3 3 2 2 2 2 . 3 3 2 2 2 2 3
2 3 3 3 3 2 3 3 4 3 2 3 3 2 2 3 3 4 3 2 2 3 2 3 3 3 3 4 4 3 3 2 2 3 4 4 3 2 3 2 2 3 2 4 3 4 2 3 2 3 2 2 4 4 3 3 3 2 3 3 4 4 2 2 3 3 3 3 4 3 4 2 3 2 3 3 3 3 4 4 3 2 2 3 2 4 4 3 2 3 3 3 3 2 2 3 4 2 3 3 3 3 2 2 3
3 2 3 2 3 3 2 3 2 2 3 2 3 2 3 3 3 2 2
3 3 2 2 3 2 2 3 2 3 2 2 2 3 2 3 3 4 4
2 2 3 3 4 3 4
3 3 3 3 4 4 3
3 4 4 3 2 3
4 3 4 2 3 3
. 4 4 3 3 3 3 4 . 2 2 4 . 2 2 3 . 2 2 3 3 2 2 .
3 2 2 .
3 2 2 3 . 3 3 2 2 3 3 2
2 2 2 3 3 3
3 2 2 2 3 3
2 3 3 4
3 3 3 4
3 4 4 3
4 3 4 2
4 4 3 3 2 2 3 2 3 2 3
2 2 3 3 3 3 2 3 3 2 2
3 2 3
3 2 2 3 2 2 3
2 2 2
3 3 2 3
3 3 3 2 2 3 3 2
. 2
.
. 2
3
4 3|
]
->
3
]
->
0
123 +————————————————————————+
u
>
TR
t
e
.1
0
3 3 2 3 2 2 2 3 3 3 2 2
2 2 . 2 2
| . | .| +————————————————————————+
4 3 3 3 3 3
2 3
2 2
2 3
3 2
2 2
2 3
2
3 3|
3
3 3|
3
2 3|
2
3 2|
2
3 2|
3
3 3|
2
2 |
2
2 3|
4|
3|
3|
2|
|
2|
3|
2|
2| 2| 2|
Figure 2: Measurements ————— Information about the selected network topology —————-
Topology : WRAP_AROUND_BUTTERFLY 2Dimension : 3
Number of nodes in topology : 24 Constant connection degree : 4
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 +————————————————————————+ 1 | . <-><-> <-> <-> |
| ANU College of Engineering and Computer Science
October 2019
2 |<-> . <-><-> <-> |

+————————————————————————+
not delivered or whether the destination router is not responsive, as the internal states of the
routers are not accessed. Next, the results of the communication tests are displayed (Figure 2).
In the provided framework the routers do not exist yet, thus this section will not appear up on
your screen until you provide a router implementation.
The minimum number of hops for a message shou
d
b
number of hops should represents the diameter1 of the chosen topology. The aver- age number of hops is characteristic for a specific topology. By using the command line option -i True you will also see the full table of individual measurements between all nodes. As we only consider bidirectional connections, the number of hops should be identical in both directions between any two routers. If the measurements are different, warnings will be displayed. 1-hop connec- tions are left blank to make the matrix some- what more readable.
+————————————————————————+
The last section (Figure 3) which will appear
on screen gives general parameters of the
current topology, like the minimum and maxi-
mal connection degree and the total number
of nodes.You can also print the connec-
tions inside the topology as a matrix – which
should be the mirror image of the empty spots in the measurement matrix. Double arrows denote bidirectional connections.
The individual routers need to respond to the following four pre-defined entries:
task type Router_Task (Task_Id: Router_Range := Draw_Id) is
entry Configure (Links : Ids_To_Links);
entry Shutdown;
entry Send_Message(Message : Messages_Client);
entry Receive_Message (Message : out Messages_Mailbox);
Configure is only called once right after the task has been created. The existing links to neigh- bouring routers are delivered here in the form of an array over the router id’s in which connect- ed routers will appear while all other entries are null.
type Ids_To_Links is array (Router_Range) of Router_Task_P;
type Router_Task_P is access all Router_Task;
Two message formats are already defined, yet you need to add at least one more message format and entry which you will be using for communications between routers.
type Messages_Client is record
Destination : Router_Range;
The_Message : The_Core_Message;
end record;
type Messages_Mailbox is record
Sender: Router_Range;
The_Message : The_Core_Message;
Hop_Counter : Natural := 0;
end record;
The diameter of a given topology is the greatest distance between any two nodes.
3 | ANU College of Engineering and Computer Science October 2019
1| . 2 2| .
3| . 2 4| 2 2 . 5| 2 2 6| 2 2 3 7| 3 2 2 3 8| 2 2 3 9| 2 2 2
10 | 3 3 2 3 11 | 3 3 3 2 12 | 2 3 3 2
2 3 2 2 2 2 3 2 3 . 3 . 2 3 2 .
3 3
3 3
2 2 2 2
2 2
3 3
2 2 3 3 2 2 2 2 3 3 3 2 3
2 2 3 3 2
3 2 3 2 2 3 3
3 3 2 2 3 3 3 3 2 2 3 2 2 2 3 2
. 2 2 2 3
. 2 2 3 3 3
2 . 3 4 2 2 . 4 3 2 3 . 4 4
2 3 3 4 4 .
3 3 3 3 3 2 3 2 3 2 2
2 3 2 2 2 3 4 4 4 3 4 4 4 3 3 2 3 2 3 3 3 3 3
13 | 2 2
3 3
2
2 2
14 | 2 3 2 3 3 2 2
33 43
4.
15 | 2 2 3 2 3 3 3 3 4 4 3 . 2 2 3 2 2 2 3 3|
16 | 3 3 3 2 2 3 4 4 3 2 3 2 2 .
17 | 3 3 2 2 3 2 4 3 4 2 3 3 2 2 . 3 3 3 2 2 |
18 | 3 2 3 2 2 4 4 3 3 3 3 2 2 3 . 2 3 3 2 2|
19 | 3 2 3 3 4 4 2 2 3 3 3 3 2 2 3 3 2 . 2 2|
20 | 2 3 3 4 3 4 2 3 2 3 3 2 2 2 3 3 3 21 | 3 3 3 4 4 3 2 2 3 2 3 2 2 2 3 3
. 2 2| . 2 2 3| 2 . | 2 2 . |
22 | 3 4 4 3 2 3 3 3 3 2 2 3 3 2 3 2 2 2 23 | 4 3 4 2 3 3 3 3 2 2 3 2 3 3 3 2 2
2
rges
e
l
fc
se
d
4
|
4
4
3
3
3
3
3
2
3
2
2
2
33
2
2
2
2
3
.
e
‘1

o
o
ur
t
m
asure
,a
nd
t
————— Information about the selected network topology —————- Topology : WRAP_AROUND_BUTTERFLY
Dimension : 3
Number of nodes in topology : 24
Constant connection degree : 4
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 +————————————————————————+
1 | . <-><-> <->
2 |<-> . <-><->
3 |<-><-> .
4 | <->
<-> <->
<-> | | <-> | <-> | | <-> | <-> | | <-> | <->| | <-> | | | | | <->| <-> | <-> | <-> . <-><-> |
5 |<->
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
. <-><-> <-> . <-> <-><-> .
<-> <->
15 |<->
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
. <-><-> <-> . <-><-> <-><-> .
<-> <->
<-> <->
<->
<-> <-><->
<->
. <-><-> <-> . <-> <-><-> .
<->
localhost:Executables uwe$
<-> <->
<->
<->
<-> <->
. <-><-> <-> . <-> <-><-> .
. <-><-> <-> . <-><-> <-><-> .
<->
. <-><->
<->
| . <-><->| <-> . <->| <-><-> . | +————————————————————————+
<->
<-><-> <->
<->
<-><-> . <->
he
la
2 2 3 2 3 3 3 3 4 4 3
3 2 3
2 3 3
3 3 3
3 4 4
4 3 4
4 4 3 2 2
2 3 2 2 2 3 3 3 3 3 2 3 2 3
2 3 222 2
3 44| 4 34| 4 43| 3 23| 2 33| 3 33| 3 33| 3 32| 3 23| 2 2| 2 32|
22| 3 32| 3 3 3|
<->
3 3 2 3 2 2|
|
Figure 3: Topology
[1]

The purpose of Shutdown (which will be called upon once after all tests have been performed) is to allow for a graceful way to stop operations. If your router accepts this call, it is assumed that the router task (and all tasks or resources initiated by it) will terminate eventually. If the call to Shutdown is not accepted then an abort of this task is attempted by the environment.
All this sounds complicated but it really isn’t. The core of the assignment is just to decide in which direction to forward a specific message and to use your knowledge from the course to implement your strategy without locking up, unnecessary busy-waiting loops or losing informa- tion. In short: your solution should be implementing a router which is responsive on all ports and directs traffic onto the optimal routes.
Implementation alternatives
The basic requirements for an implementation in another language are:
• Option to select between and parametrize topologies as provided in the framework.
• Make sure that you routers do not access any information other than the initial connection list to neighbouring routers and the information which they gain by exchanging messages.
• Instantiate the number of routers required to populate the topology.
• The routers need to be instantiated as processes, threads, tasks, or what- ever your operating system or language will provide as concurrent entities.
• Provide each router entity with communication links to neighbouring routers. Those links shall resemble a “wire” semantic, i.e. synchronous forms of communication.
• Run a simple test by sending messages from every router to every oth- er router and measure the actual number of hops the messages took.
• Summarize the results as maximal as well as average number of measured hops.
If this sounds too demanding for your chosen environment, then contact us and we will work out a plan which can be done – a concurrent implementation of the router tasks is obviously mandatory though.
Candidates include Erlang, Go, Rust, Smalltalk, LabVIEW, Occam, OpenMP… just as long as you can rely on message passing (synchronous message passing might be emulated by asyn- chronous message passing) and support for concurrency.
If your environment cannot be reproduced by us with reasonable effort in order to run your pro- gram then we will potentially ask you to provide more detailed documentation of your tests.
Extension
As you have been attentive you will have noticed a command line parameter (-x) which controls the number of routers dropping out. After the initial configuration phase (and before normal traffic starts) a specific number of random routers can be powered down purposefully. Many network topologies offer multiple routes to the same node, so the resulting network may still be fully operational (minus any direct communication to the powered down nodes obviously).
Your extension assignment is to design routers which are robust with respect to such losses in the network and will still deliver the packets to the destination, even if the original/optimal path became unavailable. In the provided Ada framework routers will detect the loss of an im- mediate neighbour by receiving a Tasking_Error exception when trying to communicate to an already terminated router task. Handle this exception and provide an alternative route.
Reflect first for a moment on the following issues (all of which will be related to specific topolo- gies):
• How many dropped out routers can you handle and still guarantee delivery?
• How does the number of dropped out routers affect the performance?You may want to dis- tinguish the situation when you first detect the failure from the following routing operations.
• Can you respond locally or will you need to propagate the detection of the failure? 4 | ANU College of Engineering and Computer Science October 2019

This extension is meant for the student who wants to dig deeper and find out more about real- world routing.
Deliverables
You do not need to provide a rationale or any report of sorts if you believe that your design is obvious and a few comments inside your code will make the idea sufficiently clear.
Yet you need to provide two items:
a. The sources for a working router (and an environment to test them in for the stu- dents not using the provided Ada framework). Zip up the Router directory (which should hold all sources which you manipulated or added) for submission.
b. A graphical representation of the workings inside your router (as a pdf file named Diagram.pdf). Add this file to your Router directory before you zip it up.
In any case, we will read your sources carefully. The core part of your router will be small – take your time to structure this part well.
Different entities in your graphical representation will have different meanings: Use different lines / arrows / colours / shadings / etc. to indicate what is what and provide a legend. Before you start drawing: decide what the main aspect of our diagram should be. Will you primarily provide a call-graph / data-flow-graph / synchronization-graph / dependency-graph / etc. or a mixture of multiple aspects. If you need multiple diagrams for multiple aspect, then please provide multiple diagrams (in the same pdf file).Your diagram will likely contain text labels, yet should not include full sentences or paragraphs.
There is no predefined template for your diagram as the idea is that you communicate your concept with it – whichever format supports this best is for you to decide.
Tutor-eyesight-health-warning: Make sure that your graphics will appear technically in vector (scalable) format inside your pdf file – never as an image made out of pixels!
Criteria
When you design your system, you might want to keep the following criteria in mind:
• Messages shall arrive at the destination router eventually (this is the minimal requirement).
• The number of hops should be minimal.
• The setup time should be proportional to the number of nodes or even bet- ter to the diameter of the network. Beware of combinatorial explosions.
• Performance of the solution. Did you arrange concurrent entities inside your router to guarantee minimal delivery delays? Assume that your rout- er can be provided with any number of physical concurrent entities.
• Elegance of the solution. Elegance is often a measure related to compactness and sim- plicity but not always.You will see whether your design is elegant once you reevalu- ate/scrutinize your sources a few days after you achieved a running system.
• Clarity and expressiveness of the provided graph. A meaningful graph will use a clear legend of graphical elements to distinguish different issues.
• Robustness of the routing algorithm. Could you design an algorithm which han- dles dropped out routers gracefully and with minimal effect to performance? If you do not target a high distinction in this assignment, you may consider drop- ping this criterion and focus on the remaining ones (this one is hard).
Final words
Implementing this basic router will give you a good starting point to look further and deeper into the world of distributed systems. The assignment combines what you now know about concurrent systems and expands your practical abilities towards problems in distributed envi-
5 | ANU College of Engineering and Computer Science October 2019

ronments. Getting closer to the end of the course, try to recollect the new concepts and tools which you have now at your disposal. While you should not expect that we made an experi- enced designer of concurrent and distributed systems out of you quite yet, you do have now a substantial amount of knowledge to already join in at discussions among professionals in the field.
Outlook
Students in Real-Time and Embedded Systems (final year course) will be working with actual hardware (below) and concurrent and distributed algorithms under strict real-time constraints. There is strong demand for outstanding professionals who can handle high integrity systems interacting with the physical world.Your course provides many foundations for any such career – academic or industrial.
6 | ANU College of Engineering and Computer Science October 2019

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] 代写 algorithm openmp scala concurrency operating system graph software network PASSING THE MESSAGE
30 $