7,436 research outputs found

    Small Cuts and Connectivity Certificates: A Fault Tolerant Approach

    Get PDF
    We revisit classical connectivity problems in the {CONGEST} model of distributed computing. By using techniques from fault tolerant network design, we show improved constructions, some of which are even "local" (i.e., with O~(1) rounds) for problems that are closely related to hard global problems (i.e., with a lower bound of Omega(Diam+sqrt{n}) rounds). Distributed Minimum Cut: Nanongkai and Su presented a randomized algorithm for computing a (1+epsilon)-approximation of the minimum cut using O~(D +sqrt{n}) rounds where D is the diameter of the graph. For a sufficiently large minimum cut lambda=Omega(sqrt{n}), this is tight due to Das Sarma et al. [FOCS \u2711], Ghaffari and Kuhn [DISC \u2713]. - Small Cuts: A special setting that remains open is where the graph connectivity lambda is small (i.e., constant). The only lower bound for this case is Omega(D), with a matching bound known only for lambda <= 2 due to Pritchard and Thurimella [TALG \u2711]. Recently, Daga, Henzinger, Nanongkai and Saranurak [STOC \u2719] raised the open problem of computing the minimum cut in poly(D) rounds for any lambda=O(1). In this paper, we resolve this problem by presenting a surprisingly simple algorithm, that takes a completely different approach than the existing algorithms. Our algorithm has also the benefit that it computes all minimum cuts in the graph, and naturally extends to vertex cuts as well. At the heart of the algorithm is a graph sampling approach usually used in the context of fault tolerant (FT) design. - Deterministic Algorithms: While the existing distributed minimum cut algorithms are randomized, our algorithm can be made deterministic within the same round complexity. To obtain this, we introduce a novel definition of universal sets along with their efficient computation. This allows us to derandomize the FT graph sampling technique, which might be of independent interest. - Computation of all Edge Connectivities: We also consider the more general task of computing the edge connectivity of all the edges in the graph. In the output format, it is required that the endpoints u,v of every edge (u,v) learn the cardinality of the u-v cut in the graph. We provide the first sublinear algorithm for this problem for the case of constant connectivity values. Specifically, by using the recent notion of low-congestion cycle cover, combined with the sampling technique, we compute all edge connectivities in poly(D) * 2^{O(sqrt{log n log log n})} rounds. Sparse Certificates: For an n-vertex graph G and an integer lambda, a lambda-sparse certificate H is a subgraph H subseteq G with O(lambda n) edges which is lambda-connected iff G is lambda-connected. For D-diameter graphs, constructions of sparse certificates for lambda in {2,3} have been provided by Thurimella [J. Alg. \u2797] and Dori [PODC \u2718] respectively using O~(D) number of rounds. The problem of devising such certificates with o(D+sqrt{n}) rounds was left open by Dori [PODC \u2718] for any lambda >= 4. Using connections to fault tolerant spanners, we considerably improve the round complexity for any lambda in [1,n] and epsilon in (0,1), by showing a construction of (1-epsilon)lambda-sparse certificates with O(lambda n) edges using only O(1/epsilon^2 * log^{2+o(1)} n) rounds

    Fault-Tolerant Spanners: Better and Simpler

    Full text link
    A natural requirement of many distributed structures is fault-tolerance: after some failures, whatever remains from the structure should still be effective for whatever remains from the network. In this paper we examine spanners of general graphs that are tolerant to vertex failures, and significantly improve their dependence on the number of faults rr, for all stretch bounds. For stretch k3k \geq 3 we design a simple transformation that converts every kk-spanner construction with at most f(n)f(n) edges into an rr-fault-tolerant kk-spanner construction with at most O(r3logn)f(2n/r)O(r^3 \log n) \cdot f(2n/r) edges. Applying this to standard greedy spanner constructions gives rr-fault tolerant kk-spanners with O~(r2n1+2k+1)\tilde O(r^{2} n^{1+\frac{2}{k+1}}) edges. The previous construction by Chechik, Langberg, Peleg, and Roddity [STOC 2009] depends similarly on nn but exponentially on rr (approximately like krk^r). For the case k=2k=2 and unit-length edges, an O(rlogn)O(r \log n)-approximation algorithm is known from recent work of Dinitz and Krauthgamer [arXiv 2010], where several spanner results are obtained using a common approach of rounding a natural flow-based linear programming relaxation. Here we use a different (stronger) LP relaxation and improve the approximation ratio to O(logn)O(\log n), which is, notably, independent of the number of faults rr. We further strengthen this bound in terms of the maximum degree by using the \Lovasz Local Lemma. Finally, we show that most of our constructions are inherently local by designing equivalent distributed algorithms in the LOCAL model of distributed computation.Comment: 17 page

    Byzantine Approximate Agreement on Graphs

    Get PDF
    Consider a distributed system with n processors out of which f can be Byzantine faulty. In the approximate agreement task, each processor i receives an input value x_i and has to decide on an output value y_i such that 1) the output values are in the convex hull of the non-faulty processors\u27 input values, 2) the output values are within distance d of each other. Classically, the values are assumed to be from an m-dimensional Euclidean space, where m >= 1. In this work, we study the task in a discrete setting, where input values with some structure expressible as a graph. Namely, the input values are vertices of a finite graph G and the goal is to output vertices that are within distance d of each other in G, but still remain in the graph-induced convex hull of the input values. For d=0, the task reduces to consensus and cannot be solved with a deterministic algorithm in an asynchronous system even with a single crash fault. For any d >= 1, we show that the task is solvable in asynchronous systems when G is chordal and n > (omega+1)f, where omega is the clique number of G. In addition, we give the first Byzantine-tolerant algorithm for a variant of lattice agreement. For synchronous systems, we show tight resilience bounds for the exact variants of these and related tasks over a large class of combinatorial structures

    A multipath analysis of biswapped networks.

    Get PDF
    Biswapped networks of the form Bsw(G)Bsw(G) have recently been proposed as interconnection networks to be implemented as optical transpose interconnection systems. We provide a systematic construction of κ+1\kappa+1 vertex-disjoint paths joining any two distinct vertices in Bsw(G)Bsw(G), where κ1\kappa\geq 1 is the connectivity of GG. In doing so, we obtain an upper bound of max{2Δ(G)+5,Δκ(G)+Δ(G)+2}\max\{2\Delta(G)+5,\Delta_\kappa(G)+\Delta(G)+2\} on the (κ+1)(\kappa+1)-diameter of Bsw(G)Bsw(G), where Δ(G)\Delta(G) is the diameter of GG and Δκ(G)\Delta_\kappa(G) the κ\kappa-diameter. Suppose that we have a deterministic multipath source routing algorithm in an interconnection network GG that finds κ\kappa mutually vertex-disjoint paths in GG joining any 22 distinct vertices and does this in time polynomial in Δκ(G)\Delta_\kappa(G), Δ(G)\Delta(G) and κ\kappa (and independently of the number of vertices of GG). Our constructions yield an analogous deterministic multipath source routing algorithm in the interconnection network Bsw(G)Bsw(G) that finds κ+1\kappa+1 mutually vertex-disjoint paths joining any 22 distinct vertices in Bsw(G)Bsw(G) so that these paths all have length bounded as above. Moreover, our algorithm has time complexity polynomial in Δκ(G)\Delta_\kappa(G), Δ(G)\Delta(G) and κ\kappa. We also show that if GG is Hamiltonian then Bsw(G)Bsw(G) is Hamiltonian, and that if GG is a Cayley graph then Bsw(G)Bsw(G) is a Cayley graph

    Diameter of Cayley graphs of permutation groups generated by transposition trees

    Full text link
    Let Γ\Gamma be a Cayley graph of the permutation group generated by a transposition tree TT on nn vertices. In an oft-cited paper \cite{Akers:Krishnamurthy:1989} (see also \cite{Hahn:Sabidussi:1997}), it is shown that the diameter of the Cayley graph Γ\Gamma is bounded as \diam(\Gamma) \le \max_{\pi \in S_n}{c(\pi)-n+\sum_{i=1}^n \dist_T(i,\pi(i))}, where the maximization is over all permutations π\pi, c(π)c(\pi) denotes the number of cycles in π\pi, and \dist_T is the distance function in TT. In this work, we first assess the performance (the sharpness and strictness) of this upper bound. We show that the upper bound is sharp for all trees of maximum diameter and also for all trees of minimum diameter, and we exhibit some families of trees for which the bound is strict. We then show that for every nn, there exists a tree on nn vertices, such that the difference between the upper bound and the true diameter value is at least n4n-4. Observe that evaluating this upper bound requires on the order of n!n! (times a polynomial) computations. We provide an algorithm that obtains an estimate of the diameter, but which requires only on the order of (polynomial in) nn computations; furthermore, the value obtained by our algorithm is less than or equal to the previously known diameter upper bound. This result is possible because our algorithm works directly with the transposition tree on nn vertices and does not require examining any of the permutations (only the proof requires examining the permutations). For all families of trees examined so far, the value β\beta computed by our algorithm happens to also be an upper bound on the diameter, i.e. \diam(\Gamma) \le \beta \le \max_{\pi \in S_n}{c(\pi)-n+\sum_{i=1}^n \dist_T(i,\pi(i))}.Comment: This is an extension of arXiv:1106.535
    corecore