Mobile Agent Rendezvous Problem in a Ring Roberta Capuano,Vikas Kumar Jha.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Distributed Leader Election Algorithms in Synchronous Ring Networks
Midwestern State University Department of Computer Science Dr. Ranette Halverson CMPS 2433 – CHAPTER 4 GRAPHS 1.
Michael Alves, Patrick Dugan, Robert Daniels, Carlos Vicuna
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
Self Stabilizing Algorithms for Topology Management Presentation: Deniz Çokuslu.
Graphs Graphs are the most general data structures we will study in this course. A graph is a more general version of connected nodes than the tree. Both.
CPSC 668Set 5: Synchronous LE in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
1 Complexity of Network Synchronization Raeda Naamnieh.
Tractable and intractable problems for parallel computers
© 2006 Pearson Addison-Wesley. All rights reserved14 A-1 Chapter 14 Graphs.
International Workshop on Computer Vision - Institute for Studies in Theoretical Physics and Mathematics, April , Tehran 1 IV COMPUTING SIZE.
Explorations in Anonymous Communication Andrew Bortz with Luis von Ahn Nick Hopper Aladdin Center, Carnegie Mellon University, 8/19/2003.
CPSC 668Set 3: Leader Election in Rings1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Parallel Routing Bruce, Chiu-Wing Sham. Overview Background Routing in parallel computers Routing in hypercube network –Bit-fixing routing algorithm –Randomized.
25/06/2015Marius Mikucionis, AAU SSE1/22 Principles and Methods of Testing Finite State Machines – A Survey David Lee, Senior Member, IEEE and Mihalis.
Complexity 19-1 Parallel Computation Complexity Andrei Bulatov.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Information Theory and Security
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
The Fundamentals: Algorithms, the Integers & Matrices.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
1 9/8/2015 MATH 224 – Discrete Mathematics Basic finite probability is given by the formula, where |E| is the number of events and |S| is the total number.
Approximating the MST Weight in Sublinear Time Bernard Chazelle (Princeton) Ronitt Rubinfeld (NEC) Luca Trevisan (U.C. Berkeley)
Programming & Data Structures
Distributed Algorithms 2014 Igor Zarivach A Distributed Algorithm for Minimum Weight Spanning Trees By Gallager, Humblet,Spira (GHS)
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Fixed Parameter Complexity Algorithms and Networks.
Limits of Local Algorithms in Random Graphs
Complexity Classes (Ch. 34) The class P: class of problems that can be solved in time that is polynomial in the size of the input, n. if input size is.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Lecture #12 Distributed Algorithms (I) CS492 Special Topics in Computer Science: Distributed Algorithms and Systems.
Randomized Turing Machines
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
On Probabilistic Snap-Stabilization Karine Altisen Stéphane Devismes University of Grenoble.
Approximation Algorithms Pages ADVANCED TOPICS IN COMPLEXITY THEORY.
Controller and Estimator for Dynamic Networks Amos Korman Shay Kutten Technion.
A Clustering Algorithm based on Graph Connectivity Balakrishna Thiagarajan Computer Science and Engineering State University of New York at Buffalo.
Probability and Independence 1 Krishna.V.Palem Kenneth and Audrey Kennedy Professor of Computing Department of Computer Science, Rice University.
NP Complexity By Mussie Araya. What is NP Complexity? Formal Definition: NP is the set of decision problems solvable in polynomial time by a non- deterministic.
Télécom 2A – Algo Complexity (1) Time Complexity and the divide and conquer strategy Or : how to measure algorithm run-time And : design efficient algorithms.
10 December 2002ENS Cachan1 Generalized dining philosophers Catuscia Palamidessi, INRIA in collaboration with Mihaela Oltea Herescu, IBM Michael Pilquist,
Observe and Remain Silent Communication-less agent location discovery MFCS 2012 Speaker: Thomas Gorry (University of Liverpool) Co-authors: Tom Friedetzky.
1 Permutation routing in n-cube. 2 n-cube 1-cube2-cube3-cube 4-cube.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
The Power of Tokens: Rendezvous and Symmetry Detection for two Mobile Agents in a Ring J. Czyzovicz, Stefan Dobrev, E. Kranakis, D. Krizanc.
Symbol Tables and Search Trees CSE 2320 – Algorithms and Data Structures Vassilis Athitsos University of Texas at Arlington 1.
Copyright © Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS.
1 Leader Election in Rings. 2 A Ring Network Sense of direction left right.
Search CPSC 386 Artificial Intelligence Ellen Walker Hiram College.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS Fall 2011 Prof. Jennifer Welch CSCE 668 Set 5: Synchronous LE in Rings 1.
Hwajung Lee.  Models are simple abstractions that help understand the variability -- abstractions that preserve the essential features, but hide the.
The Ant System Optimization by a colony of cooperating agents.
1 Fault tolerance in distributed systems n Motivation n robust and stabilizing algorithms n failure models n robust algorithms u decision problems u impossibility.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
I can describe the differences between Hamilton and Euler circuits and find efficient Hamilton circuits in graphs. Hamilton Circuits I can compare and.
P, NP, and NP-Complete Problems Section 10.3 The class P consists of all problems that can be solved in polynomial time, O(N k ), by deterministic computers.
Theory of Computational Complexity Probability and Computing Lee Minseon Iwama and Ito lab M1 1.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
Algorithms for Big Data: Streaming and Sublinear Time Algorithms
Prof. Dr. Holger Schlingloff 1,2 Dr. Esteban Pavese 1
Analysis and design of algorithm
Parallel and Distributed Algorithms
Objective of This Course
Permutation routing in n-cube
Some Graph Algorithms.
Presentation transcript:

Mobile Agent Rendezvous Problem in a Ring Roberta Capuano,Vikas Kumar Jha

AGENDA  The renzezvous dilemma  Definitions  Mobile agent in rendezvous in a ring  Rendezvous asymmetry  Rendezvous symmetry  How to break symmetry ?  Algorithms  Conclusion  References 2

The Rendezvous Dilemma  Formalized by Steve Alpern[1,2] in 1976 “Two young people have a date in a park they have never been to before. Arriving separately in the park, they are both surprised to discover that it is a huge area and consequently they cannot find one another. In this situation each person has to choose between waiting in a fixed place in the hope that the other will find them, or else starting to look for the other in the hope that they have chosen to wait somewhere.” 3

An Example: The Rendezvous Problem An example of this class of problem is known as rendezvous problem. Recently the theoretical computer science community has taken up the challenge of the problem of rendezvous for autonomous software agents moving through a distributed network. Requiring such agents to meet in order to synchronize, share information, divide up duties, etc. would seem to be a natural fundamental operation useful as a subroutine in more complicated applications such as web-crawling, peer- to-peer lookup, meeting scheduling, etc. [3] 4

Definitions (1/3)  Mobile agent: It is a set of software entities that act more or less autonomously from their originator and have the ability to move from node to node in a distributed network. Each mobile agent is modeled as a set of states and transition function.  Deterministic: We have the knowledge of the behavior of the agents.  Randomized: Has a source of randomness that is taken as input.  Anonymous Agents: Agents without identities. Anonymous agents are limited to running precisely the same program.  Non-Anonymous Agents: The agents are distinguishable. As the identity is assumed to be part of the starting state of the automaton, agents with identities have the potential to run different programs. 5

Definitions (2/3)  Distributed network: It is essentially inherited directly from the theory of distributed computing. We model the network by a graph whose vertices comprise the computing nodes and edges correspond to communication links.  Anonymous  Non anonymous  Synchronous  Asynchronous 6

Definitions (3/3)  Ring network: It is a network where each node is connected to exactly two other nodes. In this way every nodes forms a single path from itself to it’s adjacent nodes. 7

Considered Scenario: Mobile Agent in Rendezvous in a Ring Given a particular agent model and network model, a set of k agents distributed arbitrarily over the nodes of the network are said to rendezvous if after running their programs after some finite time they all occupy the same node of the network at the same time. It is generally assumed that two agents occupying the same node can recognize this fact. In our study we consider the case of 2 mobile agents in rendezvous. 8

Rendezvous Problem Asymmetry  Asymmetry in a rendezvous problem may arise from:  Network: A network is asymmetric if it has one or more uniquely distinguishable vertices.  Agents: Agents have unique identities that allow them to act di ff erently depending upon their values.  *Common approach is called Wait For Mummy (WFM) 9

Rendezvous Problem Symmetry  Symmetry: In the case of symmetric rendezvous, both the network and the agents are assumed to be anonymous.  Randomized rendezvous: Rendezvous may be solved by anonymous agents on an anonymous network by having the agents perform a random walk. The expected time to rendezvous is then a (polynomial) function of the (size of the) network and is directly related to the cover time of the network.  Rendezvous using token: Every agent mark its starting node with a unique token. Then the agents perform a walk and stop in two cases: 1: An agent find a previously marked node 2: The agents meet each others in a node, then the rendezvous is solved. 10

An Important Note: It’s not possible to solve all rendezvous problems. This will depend upon both the properties of the agents (deterministic or randomized, anonymous or with identities, knowledge of the size of the network or not, etc.) and the network (synchronous or asynchronous, anonymous or with identities, tokens available or not, etc.). The solvability is also a function of the starting positions chosen for the agents. 11

The Problem and The Algorithm  Case of two parachutists who land in unkwon territory and must meet as soon as possible. The propsed solution is that parchutists meet at a focal point, i.e. a distinguished point in landscape. [4]  Many incremental ways of approaching this issue.  Divide the location into n identical discrete location and two identical searchers.  n= dintinctly labelled number of nodes.  n can be put in a structure which form a topology of a network. 12

 Three location strategy:  If three discrete location comprised a ring the searcher should follow ∏ “Pi” strategy.  Chose the first location at random and then choose subsequent moves in pairs. That is, if a rendezvous does not occur after step j,j=1,3,5,.., then for the next two steps a searcher either returns to the location visited in step 1 or it visits the two other locations in random order.  Result expected rendezvous time is then 10/3. 13

 Probabilistic Methods for searching random locations with equal probability.  Another Extension : Searchers start searching at different times or they could move between locations at any time.  Last Extension : Searchers could leave messages at locations they have searched. 14

Semi Symmetric Networks and How to Break It  Randomized Rendezvous : Rendezvous may be solved by anonymous agents on an anonymous network by having the agents perform a random walk.  The expected time to rendezvous is then a (polynomial) function of the (size of the) network and is directly related to the cover time of the network.  For example, it is straightforward to show that two agents performing a symmetric random walk on ring of size n will rendezvous within expected O(n2) time. This expected time can be improved by considering the following strategy (for a ring with sense of direction). Repeat the following until rendezvous is achieved: flip a (fair) coin and walk n/2 steps to the right  if the result is heads, n/2 steps to the left if the result is tails. If the two agents choose different directions  (which they do with probability 1/2) then they will rendezvous (at least on an edge if not at a node). It is easy to see that expected time until rendezvous is O(n).Referred as Coin Half Tour  Note that the agents are required to count up to n and thus seem to require  O(log n) bits of memory to perform this algorithm (whereas the straightforward random walk requires only a constant number of states to implement). 15

Another Approach 16

Contd…  Revisit locations in the original set at random until a message left by the other searcher is discovered.  Then uniformaly distribute visits between the two locations which both searchers have visited 17

Conclusion  Rendezvous problem is solvable under particular conditions and there are multiple ways to approach this classic problem.  Some open ended questions still remain : A friend has given you the name but not the address of a restaurant in downtown. Manhattan. You start searching for the restaurant by asking passersby which direction the restaurant is in. Their answers are sometimes erroneous, even contradictory. What is the best strategy to use in order to find the restaurant quickly?  Just saying… 18

References  1. S. Alpern, Hide and Seek Games, Seminar, Institut f¨ur H¨ohere Studien,Wien, July1976.  2. S. Alpern, The Rendezvous Search Problem, SIAM Journal of Control and Optimization,33, pp ,  3.Kranakis, E., Krizanc, D. and Rajsbaum, S., Mobile agent rendezvous: A survey. In Structural Information and Communication Complexity (pp. 1-9). Springer Berlin Heidelberg.  f-b310- 5cbe2432f37a/etd_pdf/aaa7a1c79e7c91f760219ca a f/sawchuk-mobileagentrendezvousinthering.pdf 19

Thank you! 20