A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs Chenyu Yan, Yang Xiang, and Feodor F. Dragan (WADS 2009) Kent State University, Kent,
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Johannes Schneider –1 A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint.
LOCALITY IN DISTRIBUTED GRAPH ALGORITHMS Nathan Linial Presented by: Ron Ryvchin.
Christoph Lenzen, PODC What is a Maximal Independet Set (MIS)? inaugmentable set of non-adjacent nodes well-known symmetry breaking structure many.
Ad-Hoc Networks Beyond Unit Disk Graphs
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Routing, Anycast, and Multicast for Mesh and Sensor Networks Roland Flury Roger Wattenhofer RAM Distributed Computing Group.
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Exponential.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Leveraging Linial's Locality Limit Christoph Lenzen, Roger Wattenhofer Distributed Computing Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
ETH Zurich – Distributed Computing Group Jasmin Smula 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Minimum.
Ad Hoc and Sensor Networks – Roger Wattenhofer –10/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 10 TexPoint fonts used in EMF.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Distributed Computing Group Locality and the Hardness of Distributed Approximation Thomas Moscibroda Joint work with: Fabian Kuhn, Roger Wattenhofer.
Algorithmic Models for Sensor Networks Stefan Schmid and Roger Wattenhofer WPDRTS, Island of Rhodes, Greece, 2006.
Maximal Independent Set Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Johannes PODC 2009 –1 Coloring Unstructured Wireless Multi-Hop Networks Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read.
Distributed Coloring Discrete Mathematics and Algorithms Seminar Melih Onus November
1 Constant Density Spanners for Wireless Ad-Hoc Networks Discrete Mathematics and Algorithms Seminar Melih Onus April
Computer Algorithms Submitted by: Rishi Jethwa Suvarna Angal.
Ad Hoc and Sensor Networks – Roger Wattenhofer –3/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 3 TexPoint fonts used in EMF.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
Connected Dominating Sets. Motivation for Constructing CDS.
Ad Hoc and Sensor Networks – Roger Wattenhofer –7/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Clustering Chapter 7 TexPoint fonts used in EMF. Read.
Ad Hoc and Sensor Networks – Roger Wattenhofer –4/1Ad Hoc and Sensor Networks – Roger Wattenhofer – Topology Control Chapter 4 TexPoint fonts used in EMF.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Union Find ADT Data type for disjoint sets: makeSet(x): Given an element x create a singleton set that contains only this element. Return a locator/handle.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Vertex Coloring Distributed Algorithms for Multi-Agent Networks
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Portland, Oregon, 13 August, 2007 A Randomized Distributed Algorithm for the Maximal Independent Set Problem in Growth-Bounded Graphs Beat Gfeller, Elias.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
ETH Zurich – Distributed Computing Group Stephan HolzerSODA Stephan Holzer Silvio Frischknecht Roger Wattenhofer Networks Cannot Compute Their Diameter.
– Clustering TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
ETH Zurich – Distributed Computing Group Stephan HolzerETH Zurich – Distributed Computing – Stephan Holzer - ETH Zürich Thomas Locher.
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
L. Li, J. Y. Halpern Cornell University
Does Topology Control Reduce Interference?
New Characterizations in Turnstile Streams with Applications
Monitoring Churn in Wireless Networks
Minimum Dominating Set Approximation in Graphs of Bounded Arboricity
Ning Li and Jennifer C. Hou University of Illinois at Urbana-Champaign
Computing Connected Components on Parallel Computers
On Local Fixing Michael König Roger Wattenhofer
Leveraging Linial's Locality Limit
Maximal Independent Set
Clustering TexPoint fonts used in EMF.
Selection in heaps and row-sorted matrices
Clustering Chapter 7 TexPoint fonts used in EMF.
Maximal Independent Set
TexPoint fonts used in EMF.
Connected Dominating Sets
Introduction Wireless Ad-Hoc Network
Clustering Chapter 10 TexPoint fonts used in EMF.
Self-protection experiment
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
at University of Texas at Dallas
Locality In Distributed Graph Algorithms
Presentation transcript:

A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider Roger Wattenhofer TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA

Motivation Maximal Independent Set (MIS) algorithms allow to get Connected Dominating Sets (CDS) and Minimum Dominating Sets (MDS) for wireless multi-hop networks MDS and CDS are useful for Routing Media access control Coverage … Compute CDS/MDS with little communication to save valuable time and energy

Model and Definitions Maximal Independent Set (MIS) Node v in MIS or ≥1 neighbor in MIS Nodes u,v in MIS cannot be adjacent Unit Disk Graph (UDG) Geometrical graph Edge between nodes u,v if dist(u,v) < 1 Growth bounded Maximum size of an independent set in the neighborhood of a node is at most 5 Every node has an ID in [1,n] A node communicates with neighbors in synchronized rounds without interference Definition log* How often one has to take the logarithm to get 1 Example: log* 16 = 3 since log 16 = 4; loglog 16 = 2; logloglog 16 = 1

Algorithm Every node performs competitions (with breaks) until it (or a neighbor) is in the MIS Competition First one based on ID to obtain result r Node v picks neighbor u with smallest ID If ID_v ≤ ID_u result r_v is 0 If ID_v > ID_u result r_v is the maximum position where ID_v has a 1 and ID_u has a 0. Example: Position 4 3 2 1 ID_v 1 1 0 1 ID_u 1 0 1 0  r_v = 11 (binary) ID_a 10 r_a 0 ID_u 1010 r_u 100 ID_v 1101 r_v 11 ID_d 1100 r_d 11

What to do with the result of a competition? Node v changes its state depending on its result and those of neighbors. Dominator If result r_v < r_u for all neighbors u Joins the MIS Neighbors are dominated and stay quiet Ruler if result r_v ≤ r_u for all neighbors u and at least one has same result All neighbors become ruled (if not dominated or rulers themselves) Ruled nodes stay quiet until all neighbors become ruled or dominated. Rulers immediately become competitors again and compete again based on IDs Competitor None of above conditions applies Compete again based on the result of the last competition 100 110 101 110 111 10 10 110 111

How many competitions? How often must a competitor compete before changing its state? at most log* n times The result of log* n consecutive competitions must be 1. Proof The result of the 1st competition is in [0,log n] The result gives an index of a bit of the ID An ID in [1,n] => needs log n bits … 2nd … in [0,loglog n] Since the previous result has up to loglog n bits a.s.o. Once a node has result 1, it must change its state. Either its own result is a minimum or a neighbor has smallest result possible, i.e. 0.

How often can a node be before changing to ? Let S be the set of connected competitors with v in S A node not in S cannot join before v is ruled or dominated v

How often can a node be before changing to ? S shrinks with every transition When v becomes a ruler, one 2-hop neighbor w in S is not reachable by a path of rulers! Node w (and all its neighbors) cannot be in S any more. w v

How many of such 2-hop neighbors W exist? For the UDG there exist only 13 such 2 hop neighbors W for a node v. w v

How often can a node be before changing to ? After a competitor has become a ruler 13 times (without becoming ruled), no 2 hop neighbor can be reached by a path of rulers. Thus all neighbors of ruler v, that are still rulers form a clique. In the next competition based on the ID, the ruler of the clique with the smallest ID becomes a dominator! 101 10 101 10 1 100 1 100

How many competitions for an arbitrary node? After log* n competitions a competitor changes its state. If dominated or dominator it is done A competitor can become a ruler at most 13 times in a row. After 13·log* n competitions every node gets a dominator within distance 13. Within distance 13 there are at most 132 nodes in an independent set, thus the maximum comptetions the algorithm needs are 133 ·log* n. |W| 12 13 10 11 13 12 11 13 12 10 13 11 … … … … … Distance <= 13

Related work How many rounds of communication to get a MIS? … a CDS? Lower bounds on ring (log* n) [Lineal92] on general graphs (log n/loglog n) [Kuhn05] Upper bounds On general graphs O(log n) [Luby86] … a CDS? on UDG (log* n) [Lenzen08] on UDG O(loglog n log*n) [VicariGfeller07] on UDG with distance information O(log* n) [Kuhn05] Here: MIS, CDS, MDS and Coloring on UDG in O(log* n)

Thanks for your attention