2,061 research outputs found

    Quasirandom Rumor Spreading: An Experimental Analysis

    Full text link
    We empirically analyze two versions of the well-known "randomized rumor spreading" protocol to disseminate a piece of information in networks. In the classical model, in each round each informed node informs a random neighbor. In the recently proposed quasirandom variant, each node has a (cyclic) list of its neighbors. Once informed, it starts at a random position of the list, but from then on informs its neighbors in the order of the list. While for sparse random graphs a better performance of the quasirandom model could be proven, all other results show that, independent of the structure of the lists, the same asymptotic performance guarantees hold as for the classical model. In this work, we compare the two models experimentally. This not only shows that the quasirandom model generally is faster, but also that the runtime is more concentrated around the mean. This is surprising given that much fewer random bits are used in the quasirandom process. These advantages are also observed in a lossy communication model, where each transmission does not reach its target with a certain probability, and in an asynchronous model, where nodes send at random times drawn from an exponential distribution. We also show that typically the particular structure of the lists has little influence on the efficiency.Comment: 14 pages, appeared in ALENEX'0

    Super-exponential extinction time of the contact process on random geometric graphs

    Full text link
    In this paper, we prove lower and upper bounds for the extinction time of the contact process on random geometric graphs with connecting radius tending to infinity. We obtain that for any infection rate λ>0\lambda >0, the contact process on these graphs survives a time super-exponential in the number of vertices.Comment: Accepted for publication in Combinatorics, Probability and Computin

    The age of information in gossip networks

    Get PDF
    We introduce models of gossip based communication networks in which each node is simultaneously a sensor, a relay and a user of information. We model the status of ages of information between nodes as a discrete time Markov chain. In this setting a gossip transmission policy is a decision made at each node regarding what type of information to relay at any given time (if any). When transmission policies are based on random decisions, we are able to analyze the age of information in certain illustrative structured examples either by means of an explicit analysis, an algorithm or asymptotic approximations. Our key contribution is presenting this class of models.Comment: 15 pages, 8 figure

    Robustness of Randomized Rumour Spreading

    Get PDF
    In this work we consider three well-studied broadcast protocols: Push, Pull and Push&Pull. A key property of all these models, which is also an important reason for their popularity, is that they are presumed to be very robust, since they are simple, randomized, and, crucially, do not utilize explicitly the global structure of the underlying graph. While sporadic results exist, there has been no systematic theoretical treatment quantifying the robustness of these models. Here we investigate this question with respect to two orthogonal aspects: (adversarial) modifications of the underlying graph and message transmission failures. We explore in particular the following notion of Local Resilience: beginning with a graph, we investigate up to which fraction of the edges an adversary has to be allowed to delete at each vertex, so that the protocols need significantly more rounds to broadcast the information. Our main findings establish a separation among the three models. It turns out that Pull is robust with respect to all parameters that we consider. On the other hand, Push may slow down significantly, even if the adversary is allowed to modify the degrees of the vertices by an arbitrarily small positive fraction only. Finally, Push&Pull is robust when no message transmission failures are considered, otherwise it may be slowed down. On the technical side, we develop two novel methods for the analysis of randomized rumour spreading protocols. First, we exploit the notion of self-bounding functions to facilitate significantly the round-based analysis: we show that for any graph the variance of the growth of informed vertices is bounded by its expectation, so that concentration results follow immediately. Second, in order to control adversarial modifications of the graph we make use of a powerful tool from extremal graph theory, namely Szemer\`edi's Regularity Lemma.Comment: version 2: more thorough literature revie

    On the push&pull protocol for rumour spreading

    Full text link
    The asynchronous push&pull protocol, a randomized distributed algorithm for spreading a rumour in a graph GG, works as follows. Independent Poisson clocks of rate 1 are associated with the vertices of GG. Initially, one vertex of GG knows the rumour. Whenever the clock of a vertex xx rings, it calls a random neighbour yy: if xx knows the rumour and yy does not, then xx tells yy the rumour (a push operation), and if xx does not know the rumour and yy knows it, yy tells xx the rumour (a pull operation). The average spread time of GG is the expected time it takes for all vertices to know the rumour, and the guaranteed spread time of GG is the smallest time tt such that with probability at least 11/n1-1/n, after time tt all vertices know the rumour. The synchronous variant of this protocol, in which each clock rings precisely at times 1,2,1,2,\dots, has been studied extensively. We prove the following results for any nn-vertex graph: In either version, the average spread time is at most linear even if only the pull operation is used, and the guaranteed spread time is within a logarithmic factor of the average spread time, so it is O(nlogn)O(n\log n). In the asynchronous version, both the average and guaranteed spread times are Ω(logn)\Omega(\log n). We give examples of graphs illustrating that these bounds are best possible up to constant factors. We also prove theoretical relationships between the guaranteed spread times in the two versions. Firstly, in all graphs the guaranteed spread time in the asynchronous version is within an O(logn)O(\log n) factor of that in the synchronous version, and this is tight. Next, we find examples of graphs whose asynchronous spread times are logarithmic, but the synchronous versions are polynomially large. Finally, we show for any graph that the ratio of the synchronous spread time to the asynchronous spread time is O(n2/3)O(n^{2/3}).Comment: 25 page

    A variant of the multi-agent rendezvous problem

    Full text link
    The classical multi-agent rendezvous problem asks for a deterministic algorithm by which nn points scattered in a plane can move about at constant speed and merge at a single point, assuming each point can use only the locations of the others it sees when making decisions and that the visibility graph as a whole is connected. In time complexity analyses of such algorithms, only the number of rounds of computation required are usually considered, not the amount of computation done per round. In this paper, we consider Ω(n2logn)\Omega(n^2 \log n) points distributed independently and uniformly at random in a disc of radius nn and, assuming each point can not only see but also, in principle, communicate with others within unit distance, seek a randomised merging algorithm which asymptotically almost surely (a.a.s.) runs in time O(n), in other words in time linear in the radius of the disc rather than in the number of points. Under a precise set of assumptions concerning the communication capabilities of neighboring points, we describe an algorithm which a.a.s. runs in time O(n) provided the number of points is o(n3)o(n^3). Several questions are posed for future work.Comment: 18 pages, 3 figures. None of the authors has any previous experience in this area of research (multi-agent systems), hence we welcome any feedback from specialist
    corecore