1 Brief Announcement: Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg: Open University of Israel Moshe Schwartz:

Slides:



Advertisements
Similar presentations
Chapter 11 Trees Graphs III (Trees, MSTs) Reading: Epp Chp 11.5, 11.6.
Advertisements

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
Introduction to Algorithms Graph Algorithms
Chapter 5: Tree Constructions
Graph Algorithms Algorithm Design and Analysis Victor AdamchikCS Spring 2014 Lecture 11Feb 07, 2014Carnegie Mellon University.
Distributed Leader Election Algorithms in Synchronous Ring Networks
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Chapter 15 Basic Asynchronous Network Algorithms
Graphs III (Trees, MSTs) (Chp 11.5, 11.6)
Lecture 7: Synchronous Network Algorithms
Minimum Spanning Trees
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Università degli Studi dell’Aquila Academic Year 2009/2010 Course: Algorithms for Distributed Systems Instructor: Prof. Guido Proietti Time: Monday:
Applied Discrete Mathematics Week 12: Trees
CPSC 668Set 2: Basic Graph Algorithms1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
1 Minimum Spanning Trees Gallagher-Humblet-Spira (GHS) Algorithm.
A (nlog(n)) lower bound for leader election in a clique.
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Lecture 15: Depth First Search Shang-Hua Teng. Graphs G= (V,E) B E C F D A B E C F D A Directed Graph (digraph) –Degree: in/out Undirected Graph –Adjacency.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 10 Instructor: Paul Beame.
Data Structures, Spring 2006 © L. Joskowicz 1 Data Structures – LECTURE 14 Strongly connected components Definition and motivation Algorithm Chapter 22.5.
1 Nick Harvey (MIT) Kamal Jain (MSR) Lap Chi Lau (U. Toronto) Chandra Nair (MSR) Yunnan Wu (MSR) Conservative Network Coding.
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
CS2420: Lecture 36 Vladimir Kulyukin Computer Science Department Utah State University.
Message Passing Systems A Formal Model. The System Topology – network (connected undirected graph) Processors (nodes) Communication channels (edges) Algorithm.
Graphs – Shortest Path (Weighted Graph) ORD DFW SFO LAX
Distributed Algorithms 2014 Igor Zarivach A Distributed Algorithm for Minimum Weight Spanning Trees By Gallager, Humblet,Spira (GHS)
Broadcast & Convergecast Downcast & Upcast
1 Graphs Algorithms Sections 9.1, 9.2, and Graphs v1v1 v2v2 v5v5 v7v7 v8v8 v3v3 v6v6 v4v4 A graph G = (V, E) –V: set of vertices (nodes) –E: set.
Introduction Distributed Algorithms for Multi-Agent Networks Instructor: K. Sinan YILDIRIM.
Equality Function Computation (How to make simple things complicated) Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Guanfeng.
Distributed Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopDistributed Algorithms1.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 February 10, 2005 Session 9.
Simulation of the OLSRv2 Protocol First Report Presentation.
Testing the independence number of hypergraphs
© 2004 Goodrich, Tamasia Recall: Digraphs A digraph is a graph whose edges are all directed Short for “directed graph” Applications one-way streets flights.
DISTRIBUTED SYSTEMS II A POLYNOMIAL LOCAL SOLUTION TO MUTUAL EXCLUSION Prof Philippas Tsigas Distributed Computing and Systems Research Group.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
Dzmitry Kliazovich University of Luxembourg, Luxembourg
DISTRIBUTED ALGORITHMS Spring 2014 Prof. Jennifer Welch Set 2: Basic Graph Algorithms 1.
An Optimal Certificate Dispersal Algorithm for Mobile Ad Hoc Networks Nagoya Institute of Technology Hua Zheng Shingo Omura Jiro Uchida Koichi Wada.
DATA STRUCTURES AND ALGORITHMS Lecture Notes 10 Prepared by İnanç TAHRALI.
Graph Theory. undirected graph node: a, b, c, d, e, f edge: (a, b), (a, c), (b, c), (b, e), (c, d), (c, f), (d, e), (d, f), (e, f) subgraph.
CSE 421 Algorithms Richard Anderson Winter 2009 Lecture 5.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Graph Concepts and Algorithms Using LEDA By Caroline Moore and Carmen Frerichs (252a-at and 252a-ao) each graph in the presentation was created using gw_basic_graph_algorithms.
Outline  Introduction  Subgraph Pattern Matching  Types of Subgraph Pattern Matching  Models of Computation  Distributed Algorithms  Performance.
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes Haowen Chan, Adrian Perrig Carnegie Mellon University 1.
November 22, Algorithms and Data Structures Lecture XII Simonas Šaltenis Nykredit Center for Database Research Aalborg University
CSC317 1 At the same time: Breadth-first search tree: If node v is discovered after u then edge uv is added to the tree. We say that u is a predecessor.
CSE 373 Topological Sort Graph Traversals
The Echo Algorithm The echo algorithm can be used to collect and disperse information in a distributed system It was originally designed for learning network.
Michael Langberg: Open University of Israel
A Distributed Algorithm for Minimum-Weight Spanning Trees
CSE 2331/5331 Topic 9: Basic Graph Alg.
COMP 6/4030 ALGORITHMS Prim’s Theorem 10/26/2000.
Concurrent Graph Exploration with Multiple Robots
CSE 373 Graphs 4: Topological Sort reading: Weiss Ch. 9
Lecture 8: Synchronous Network Algorithms
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Combinatorial Topology and Distributed Computing
Richard Anderson Lecture 5 Graph Theory
Locality In Distributed Graph Algorithms
Presentation transcript:

1 Brief Announcement: Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg: Open University of Israel Moshe Schwartz: Ben Gurion University of the Negev Jehoshua Bruck: California Institute of Technology Presenting: Michael Elkin, Ben Gurion University of the Negev

2 Anonymous Networks : General framework: Processors: Processors: Do not have unique identifiers. Do not have unique identifiers. Execute identical protocols. Execute identical protocols. No knowledge of topology of network. No knowledge of topology of network. May distinguish between incoming edges. May distinguish between incoming edges. Objectives: Objectives: Broadcast. Broadcast. Label assignment. Label assignment. Graph exploration. Graph exploration. Previously studied: Undirected graphs (or directed + strongly connected). Undirected graphs (or directed + strongly connected). Protocols based on message passing. Protocols based on message passing.

3 This talk Directed anonymous graphs. Directed anonymous graphs. Not necessarily strongly connected. Not necessarily strongly connected. Has not been considered previously. Has not been considered previously. Standard (message passing) protocols studied do not apply: Standard (message passing) protocols studied do not apply: Graph may not be strongly connected. Graph may not be strongly connected. Processors may have single chance to send message. Processors may have single chance to send message. Outline of talk: Outline of talk: Model. Model. Results. Results.

4 Model Two special vertices: Two special vertices: Root s. Root s. Terminal t. Terminal t. Protocol proceeds as follows: Protocol proceeds as follows: Initial message sent from s to children. Initial message sent from s to children. Triggers a distributed protocol. Triggers a distributed protocol. Protocol terminates when terminal vertex t is in final state – with its state as the output of protocol. Protocol terminates when terminal vertex t is in final state – with its state as the output of protocol. Connectivity : Connectivity : Protocol will terminate iff all nodes lay on a path between s and t. Protocol will terminate iff all nodes lay on a path between s and t. Nodes only reachable from s or nodes that are only connected to t will not allow termination. Nodes only reachable from s or nodes that are only connected to t will not allow termination. s t Otherwise cannot distinguish between: t s t s Not connected Motivation: Consider dynamically growing network of unknown topology. Access to network through s and t. Our model enables to perform maintenance tasks. Maintenance is triggered by s and status report obtained via t.

5 Results Broadcast: send a message m to entire network. Broadcast: send a message m to entire network. Trivial without termination requirement at t. Trivial without termination requirement at t. Theorem: Broadcast + termination achievable with total communication O(|E| 2 |V|log(d out )) + |E||m|. Theorem: Broadcast + termination achievable with total communication O(|E| 2 |V|log(d out )) + |E||m|. Proof idea for termination: Proof idea for termination: Messages sent will represent a certain commodity. Messages sent will represent a certain commodity. Send unit of commodity out of s (split between children). Send unit of commodity out of s (split between children). Internal vertex: upon receiving commodity – process commodity and split among children. Internal vertex: upon receiving commodity – process commodity and split among children. t terminates when over time it receives a unit of commodity. t terminates when over time it receives a unit of commodity. Proof is non trivial even for acyclic graphs: must split commodity carefully – otherwise exponential communication complexity. Proof is non trivial even for acyclic graphs: must split commodity carefully – otherwise exponential communication complexity. Proof more involved for graphs with cycles. Proof more involved for graphs with cycles. s t

6 Results II Unique label assignment: Unique label assignment: Theorem: Unique label assignment + termination achievable with total communication complexity of O(|E| 2 |V|log(d out )). Theorem: Unique label assignment + termination achievable with total communication complexity of O(|E| 2 |V|log(d out )). Labels are of length O(|V|log(d out )). Proof idea: Proof idea: Follows commodity based protocol for broadcast. Follows commodity based protocol for broadcast. Part of the commodity is reserved for unique id. Part of the commodity is reserved for unique id. Large label length is essential (matching lower bound). Large label length is essential (matching lower bound). s t

7 Summary Initiate study of anonymous directed networks which are not strongly connected. Initiate study of anonymous directed networks which are not strongly connected. Present protocols for broadcast and label assignment + termination. Present protocols for broadcast and label assignment + termination. Open questions: Open questions: Close gap in communication complexity (not tight for digraphs with and without cycles). Close gap in communication complexity (not tight for digraphs with and without cycles). Our algorithms based on commodity preserving paradigm. Does paradigm yield optimal complexity on DAGs? Our algorithms based on commodity preserving paradigm. Does paradigm yield optimal complexity on DAGs?