Franck Petit INRIA, LIP Lab. Univ. / ENS of Lyon France Optimal Probabilistic Ring Exploration by Semi-Synchronous Oblivious Robots Joint work with Stéphane.

Slides:



Advertisements
Similar presentations
Distributed Leader Election Algorithms in Synchronous Ring Networks
Advertisements

Impossibility of Distributed Consensus with One Faulty Process
N-Consensus is the Second Strongest Object for N+1 Processes Eli Gafni UCLA Petr Kuznetsov Max Planck Institute for Software Systems.
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Consensus Steve Ko Computer Sciences and Engineering University at Buffalo.
Chapter 15 Basic Asynchronous Network Algorithms
Distributed Computing 2. Leader Election – ring network Shmuel Zaks ©
Distributed Transactional Memory for General Networks Gokarna Sharma Costas Busch Srivathsan Srinivasagopalan Louisiana State University May 24, 2012.
Distributed Algorithms – 2g1513 Lecture 10 – by Ali Ghodsi Fault-Tolerance in Asynchronous Networks.
Fast Leader (Full) Recovery despite Dynamic Faults Ajoy K. Datta Stéphane Devismes Lawrence L. Larmore Sébastien Tixeuil.
Linearizing Peer-to-Peer Systems with Oracles by Rizal Mohd Nor Mikhail Nesterenko Sébastien Tixeuil SSS 2013 Nov 13-16, 2013.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Self Stabilization 1.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Dobrev, S., Flocchini, P., Prencipe, G., & Santoro, N. (2007). Mobile Search for a Black Hole in an Anonymous Ring. Mengfei Peng.
A Distributed Algorithm for Gathering Many Fat Mobile Robots in the Plane Chrysovalandis Agathangelou Chryssis Georgiou Marios Mavronicolas Department.
Stéphane Devismes VERIMAG UMR 5104 Univ. Joseph Fourier Grenoble, France Optimal Exploration of Small Rings Talk by Franck Petit, Univ. Pierre et Marie.
Introduction to Self-Stabilization Stéphane Devismes.
Byzantine Generals Problem: Solution using signed messages.
A Randomized Gathering Algorithm for Multiple Robots with Limited Sensing Capabilities Noam Gordon Israel A. Wagner Alfred M. Bruckstein Technion – Israel.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Berkeley slides were used for this tutorial 1 Internet Networking Spring 2003 Tutorial 3 DUAL Algorithm.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
LSRP: Local Stabilization in Shortest Path Routing Hongwei Zhang and Anish Arora Presented by Aviv Zohar.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
1 Fault-Tolerant Consensus. 2 Failures in Distributed Systems Link failure: A link fails and remains inactive; the network may get partitioned Crash:
CPSC 668Self Stabilization1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
The max flow problem
What Can Be Implemented Anonymously ? Paper by Rachid Guerraui and Eric Ruppert Presentation by Amir Anter 1.
Geometric Routing without Geometry
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
Preference Analysis Joachim Giesen and Eva Schuberth May 24, 2006.
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
NetworkModel-1 Network Optimization Models. NetworkModel-2 Network Terminology A network consists of a set of nodes and arcs. The arcs may have some flow.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
Distributed Asynchronous Bellman-Ford Algorithm
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Selected topics in distributed computing Shmuel Zaks
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Consensus and Its Impossibility in Asynchronous Systems.
1 Permutation routing in n-cube. 2 n-cube 1-cube2-cube3-cube 4-cube.
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
Distributed Algorithms Lecture 10b – by Ali Ghodsi Fault-Tolerance in Asynchronous Networks – Probabilistic Consensus.
Termination Detection
By J. Burns and J. Pachl Based on a presentation by Irina Shapira and Julia Mosin Uniform Self-Stabilization 1 P0P0 P1P1 P2P2 P3P3 P4P4 P5P5.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
A correction The definition of knot in page 147 is not correct. The correct definition is: A knot in a directed graph is a subgraph with the property that.
A Self-Stabilizing O(n)-Round k-Clustering Algorithm Stéphane Devismes, VERIMAG.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Weak vs. Self vs. Probabilistic Stabilization Stéphane Devismes (CNRS, LRI, France) Sébastien Tixeuil (LIP6-CNRS & INRIA, France) Masafumi Yamashita (Kyushu.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch CSCE 668 Set 3: Leader Election in Rings 1.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Snap-Stabilizing Depth-First Search on Arbitrary Networks Alain Cournier, Stéphane Devismes, Franck Petit, and Vincent Villain OPODIS 2004, December
Chapter 11. Chapter Summary  Introduction to trees (11.1)  Application of trees (11.2)  Tree traversal (11.3)  Spanning trees (11.4)
Sorting by placement and Shift Sergi Elizalde Peter Winkler By 資工四 B 周于荃.
Distributed Leader Election Krishnendu Mukhopadhyaya Indian Statistical Institute, Kolkata.
第1部: 自己安定の緩和 すてふぁん どぅゔぃむ ポスドク パリ第11大学 LRI CNRS あどばいざ: せばすちゃ てぃくそい
New Variants of Self-Stabilization
Analysis of Link Reversal Routing Algorithms
Presenter: Solomon Ayalew
Parallel and Distributed Algorithms
MATS Quantitative Methods Dr Huw Owens
Introduction to Self-Stabilization
Locality In Distributed Graph Algorithms
Presentation transcript:

Franck Petit INRIA, LIP Lab. Univ. / ENS of Lyon France Optimal Probabilistic Ring Exploration by Semi-Synchronous Oblivious Robots Joint work with Stéphane Devismes, VERIMAG, Grenoble, France Sébastien Tixeuil, Univ. Pierre et Marie Curie - Paris 6, France

Context o A team of k “weak” robots evolving into a ring of n nodes 2F. Petit – SIROCCO 2009 o Autonomous: No central authority o Anonymous: Undistinguishable o Oblivious: No mean to know the past o Disoriented: No mean to agree on a common direction or orientation

Context o A team of k “weak” robots evolving into a ring of n nodes 3F. Petit – SIROCCO 2009 o Atomicity: In every configuration, each robot is located at exactly one node o Multiplicity: In every configuration, each node contains zero, one, or more than one robot (every robot is able to detect it)

Context o A team of k “weak” robots evolving into a ring of n nodes 4F. Petit – SIROCCO 2009 o SSM: In every configuration, k’ robots are activated (0 < k’ ≤ k) 1. Look: Instantaneous snapshot with multiplicity detection o The k’ activated robots execute the cycle: 2. Compute : Based on this observation, decides to either stay idle or move to one of the neighboring nodes 3. Move: Move toward its destination

Problem o Exploration: Each node must be visited by at least one robot o Termination: Eventually, every robot stays idle 5F. Petit – SIROCCO 2009 o Performance: Number of robots (k<n) Starting from a configuration where no two robots are located at the same node:

Related works (Deterministic) o Tree networks Ω(n) robots are necessary in general A deterministic algorithm with O(log n/log log n) robots, assuming that Δ ≤ 3 [Flocchini, Ilcinkas, Pelc, Santoro, SIROCCO 08] o Ring networks Θ(log n) robots are necessary and sufficient, provided that n and k are coprime A deterministic algorithm for k ≥ 17 [Flocchini, Ilcinkas, Pelc, Santoro, OPODIS 07] 6F. Petit – SIROCCO 2009

Contribution o n and k are not required to be coprime 1. Exploration impossible with less than 4 robots 2. An algorithm working with 4 probabilistic robots (n > 8) 7F. Petit – SIROCCO 2009 Theorem. 4 probabilistic robots are necessary and sufficient, provided that n > 8

Oblivious Robots 8F. Petit – SIROCCO 2009 At least one configuration that cannot be an initial configuration Remark. If n > k, any terminal configuration of any protocol contains at least one tower. TerminationExploration Implicit memory

Tower 9F. Petit – SIROCCO 2009 Definition. A node with at least two robots. k ≥ 2

Tower Building 10F. Petit – SIROCCO 2009 Can be an initial configuration Cannot be a terminal configuration

Enabling Exploration 11F. Petit – SIROCCO 2009 k ≥ 3 Lemma. Every execution must contain a suffix of at least n–k+1 configurations containing a tower of less than k robots and any two of them are distinguishable.

Enabling Exploration 12F. Petit – SIROCCO 2009 Two undistinguishable configurations Two other undistinguishable configurations Lemma. With 3 robots and a fixed tower of 2 robots, the maximum number of distinguishable configurations is equal to.

Enabling Exploration 13F. Petit – SIROCCO 2009 Lemma. For every n > 4, there exists no exploration protocol (even probabilistic) of a n-size ring with 3 robots. Proof :

Negative result 14F. Petit – SIROCCO 2009 Theorem. For every n ≥ 4, there exists no exploration protocol (even probabilistic) of a n-size ring with three robots. Proof : There exists no protocol with 3 robots in a 4-size ring with a distributed scheduler.

Contribution o n and k are not required to be coprime 1. Exploration impossible with less than 4 robots 2. Give an algorithm working with 4 probabilistic robots (n > 8) 15F. Petit – SIROCCO 2009 Theorem. 4 probabilistic robots are necessary and sufficient, provided that n > 8

Definitions 16F. Petit – SIROCCO 2009 Segment. A maximal non-empty elementary path of occupied nodes. 2 segments of length 1 a 2-segment

Definitions 17F. Petit – SIROCCO 2009 Hole. A maximal non-empty elementary path of free nodes. 1 hole of length 4 a 2-hole

Definitions 18F. Petit – SIROCCO 2009 Arrow. A 1-segment, followed by a non-empty elementary path of free nodes, a tower, and a 1-segment. 1 arrow Head of length 4 Tail

Definitions 19F. Petit – SIROCCO 2009 Arrow. A 1-segment, followed by a non-empty elementary path of free nodes, a tower, and a 1-segment. final arrow

Definitions 20F. Petit – SIROCCO 2009 Arrow. A 1-segment, followed by a non-empty elementary path of free nodes, a tower, and a 1-segment. Primary arrow

Algorithm 21F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate 0 0 If I am an internal node, then I try to move on the other internal node. 1

Algorithm 22F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate  Primary arrow

Algorithm 23F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate   Final arrow  Primary arrow

Algorithm 24F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate a)3-segment   Final arrow  Primary arrow If I am the isolated node, then I move through a shortest hole.

Algorithm 25F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate a)3-segment b)a unique 2-segment   Final arrow  Primary arrow If I am at the closest distance from the 2- segment, then I move toward the closest extremity.

Algorithm 26F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate a)3-segment b)a unique 2-segment c)two 2-segments   Final arrow  Primary arrow If I am a neighbor of the longest hole, then I try to move toward the other 2- segment. 1 0

Algorithm 27F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate a)3-segment b)a unique 2-segment c)two 2-segments d)four isolated nodes   Final arrow  Primary arrow L: length of the longest hole If 4 robots are neighbors of an L-hole, then I try to move through my longest neighboring hole. 1 0

Algorithm 28F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate a)3-segment b)a unique 2-segment c)two 2-segments d)four isolated nodes   Final arrow  Primary arrow L: length of the longest hole If 3 robots are neighbors of an L-hole, then if I am one of this 3 robots and a neighbor of a smaller hole h, then I move through h.

Algorithm 29F. Petit – SIROCCO 2009 o Initially, there is no tower 1. Converge toward a 4-segment 2. Build a tower 3. Visit the ring and terminate a)3-segment b)a unique 2-segment c)two 2-segments d)four isolated nodes   Final arrow  Primary arrow L: length of the longest hole If 2 robots are neighbors of an L-hole, then if I am neighbor of the L-hole, then I move through the other neighboring hole.

Phase 1, Summary 30F. Petit – SIROCCO 2009

Proof 31F. Petit – SIROCCO 2009 Lemma. No tower is created during Phase 1 in a n-ring with n > 8. Proof Base: With n > 8 and 4 robots, there always exists a hole of length greater than 1.

Proof 32F. Petit – SIROCCO 2009 Lemma. No tower is created during Phase 1 in a n-ring with n > 8. Lemma. Starting from any initial configuration, the system reaches in finite expected time a configuration containing a 4- segment. Theorem. The algorithm (Phases 1 to 3) is a probabilistic exploration protocol for 4 robots in a ring of n > 8 nodes.

Conclusion o 4 probabilistic robots are necessary and sufficient, provided that n > 8 o Future works:  Ad hoc solutions for n ≤ 8 (done)  Convergence time  Full asynchronous model 33F. Petit – SIROCCO 2009

Conclusion 34F. Petit – SIROCCO 2009 Thank you.