### Abstract

Original language | English |
---|---|

Title of host publication | QEST 2009, Sixth International Conference on the Quantitative Evaluation of Systems, Budapest, Hungary, 13-16 September 2009 |

Publisher | IEEE Computer Society |

Pages | 41-50 |

Number of pages | 10 |

ISBN (Print) | 978-0-7695-3808-2 |

DOIs | |

Publication status | Published - 2009 |

Externally published | Yes |

Event | 6th International Conference on Quantitative Evaluation of SysTems, QEST 2009 - Technical University of Budapest, Budapest, Hungary Duration: 13 Sep 2009 → 16 Sep 2009 Conference number: 6 http://www.qest.org/qest2009/ |

### Conference

Conference | 6th International Conference on Quantitative Evaluation of SysTems, QEST 2009 |
---|---|

Abbreviated title | QEST |

Country | Hungary |

City | Budapest |

Period | 13/09/09 → 16/09/09 |

Internet address |

### Fingerprint

### Cite this

*QEST 2009, Sixth International Conference on the Quantitative Evaluation of Systems, Budapest, Hungary, 13-16 September 2009*(pp. 41-50). IEEE Computer Society. https://doi.org/10.1109/QEST.2009.37

}

*QEST 2009, Sixth International Conference on the Quantitative Evaluation of Systems, Budapest, Hungary, 13-16 September 2009.*IEEE Computer Society, pp. 41-50, 6th International Conference on Quantitative Evaluation of SysTems, QEST 2009, Budapest, Hungary, 13/09/09. https://doi.org/10.1109/QEST.2009.37

**On the Impact of Modelling Choices for Distributed Information Spread.** / Bakhshi, Rena; Fehnker, Ansgar.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review

TY - GEN

T1 - On the Impact of Modelling Choices for Distributed Information Spread

AU - Bakhshi, Rena

AU - Fehnker, Ansgar

PY - 2009

Y1 - 2009

N2 - We consider a distributed shuf¿ing algorithm for sharing data in a distributed network. Nodes executing the algorithm periodically contact each other and exchange data. The behavior of the algorithm is probabilistic in nature; a node chooses a random peer and sends a random subset of its local data. Moreover, the algorithm exhibits nondeterministic behavior; the order in which nodes initiate an exchange is not speci¿ed. For the shuf¿ing algorithm we build several formal models using the probabilistic model checker PRISM. Despite of the well known state-space explosion problem, we were able to model a network of up to 15 nodes. In addition, we implement two equational models in MATLAB, a discrete model and its continuous alternative, as well as the algorithm itself in the peer-to-peer network simulator PeerSim. By comparing different modelling frameworks, we further explore the impact of modelling choices, such as different scheduling policies and the notion of rounds. The evaluation of distributed protocols, especially gossiping protocols, is dif¿cult and a comparison of different evaluation techniques is greatly desired, since the evaluation techniques vary a lot and are based on different assumptions. The comparison of different models allowed us to discover hidden assumptions, which helps with the interpretation of the obtained results.

AB - We consider a distributed shuf¿ing algorithm for sharing data in a distributed network. Nodes executing the algorithm periodically contact each other and exchange data. The behavior of the algorithm is probabilistic in nature; a node chooses a random peer and sends a random subset of its local data. Moreover, the algorithm exhibits nondeterministic behavior; the order in which nodes initiate an exchange is not speci¿ed. For the shuf¿ing algorithm we build several formal models using the probabilistic model checker PRISM. Despite of the well known state-space explosion problem, we were able to model a network of up to 15 nodes. In addition, we implement two equational models in MATLAB, a discrete model and its continuous alternative, as well as the algorithm itself in the peer-to-peer network simulator PeerSim. By comparing different modelling frameworks, we further explore the impact of modelling choices, such as different scheduling policies and the notion of rounds. The evaluation of distributed protocols, especially gossiping protocols, is dif¿cult and a comparison of different evaluation techniques is greatly desired, since the evaluation techniques vary a lot and are based on different assumptions. The comparison of different models allowed us to discover hidden assumptions, which helps with the interpretation of the obtained results.

U2 - 10.1109/QEST.2009.37

DO - 10.1109/QEST.2009.37

M3 - Conference contribution

SN - 978-0-7695-3808-2

SP - 41

EP - 50

BT - QEST 2009, Sixth International Conference on the Quantitative Evaluation of Systems, Budapest, Hungary, 13-16 September 2009

PB - IEEE Computer Society

ER -