4,533 research outputs found

    Time vs. Information Tradeoffs for Leader Election in Anonymous Trees

    Full text link
    The leader election task calls for all nodes of a network to agree on a single node. If the nodes of the network are anonymous, the task of leader election is formulated as follows: every node vv of the network must output a simple path, coded as a sequence of port numbers, such that all these paths end at a common node, the leader. In this paper, we study deterministic leader election in anonymous trees. Our aim is to establish tradeoffs between the allocated time τ\tau and the amount of information that has to be given a priori\textit{a priori} to the nodes to enable leader election in time τ\tau in all trees for which leader election in this time is at all possible. Following the framework of algorithms with advice\textit{algorithms with advice}, this information (a single binary string) is provided to all nodes at the start by an oracle knowing the entire tree. The length of this string is called the size of advice\textit{size of advice}. For an allocated time τ\tau, we give upper and lower bounds on the minimum size of advice sufficient to perform leader election in time τ\tau. We consider nn-node trees of diameter diamDdiam \leq D. While leader election in time diamdiam can be performed without any advice, for time diam1diam-1 we give tight upper and lower bounds of Θ(logD)\Theta (\log D). For time diam2diam-2 we give tight upper and lower bounds of Θ(logD)\Theta (\log D) for even values of diamdiam, and tight upper and lower bounds of Θ(logn)\Theta (\log n) for odd values of diamdiam. For the time interval [βdiam,diam3][\beta \cdot diam, diam-3] for constant β>1/2\beta >1/2, we prove an upper bound of O(nlognD)O(\frac{n\log n}{D}) and a lower bound of Ω(nD)\Omega(\frac{n}{D}), the latter being valid whenever diamdiam is odd or when the time is at most diam4diam-4. Finally, for time αdiam\alpha \cdot diam for any constant α<1/2\alpha <1/2 (except for the case of very small diameters), we give tight upper and lower bounds of Θ(n)\Theta (n)

    About randomised distributed graph colouring and graph partition algorithms

    Get PDF
    AbstractWe present and analyse a very simple randomised distributed vertex colouring algorithm for arbitrary graphs of size n that halts in time O(logn) with probability 1-o(n-1). Each message containing 1 bit, its bit complexity per channel is O(logn).From this algorithm, we deduce and analyse a randomised distributed vertex colouring algorithm for arbitrary graphs of maximum degree Δ and size n that uses at most Δ+1 colours and halts in time O(logn) with probability 1-o(n-1).We also obtain a partition algorithm for arbitrary graphs of size n that builds a spanning forest in time O(logn) with probability 1-o(n-1). We study some parameters such as the number, the size and the radius of trees of the spanning forest

    Achieving parallel performance in scientific computations

    Get PDF

    Design Patterns in Beeping Algorithms

    Get PDF
    We consider networks of processes which interact with beeps. In the basic model defined by Cornejo and Kuhn, which we refer to as the BL variant, processes can choose in each round either to beep or to listen. Those who beep are unable to detect simultaneous beeps. Those who listen can only distinguish between silence and the presence of at least one beep. Stronger variants exist where the nodes can also detect collision while they are beeping (B_{cd}L) or listening (BL_{cd}), or both (B_{cd}L_{cd}). Beeping models are weak in essence and even simple tasks are difficult or unfeasible with them. This paper starts with a discussion on generic building blocks (design patterns) which seem to occur frequently in the design of beeping algorithms. They include multi-slot phases: the fact of dividing the main loop into a number of specialised slots; exclusive beeps: having a single node beep at a time in a neighbourhood (within one or two hops); adaptive probability: increasing or decreasing the probability of beeping to produce more exclusive beeps; internal (resp. peripheral) collision detection: for detecting collision while beeping (resp. listening); and emulation of collision detection: for enabling this feature when it is not available as a primitive. We then provide algorithms for a number of basic problems, including colouring, 2-hop colouring, degree computation, 2-hop MIS, and collision detection (in BL). Using the patterns, we formulate these algorithms in a rather concise and elegant way. Their analyses (in the full version) are more technical, e.g. one of them relies on a Martingale technique with non-independent variables; another improves that of the MIS algorithm (P. Jeavons et al.) by getting rid of a gigantic constant (the asymptotic order was already optimal). Finally, we study the relative power of several variants of beeping models. In particular, we explain how every Las Vegas algorithm with collision detection can be converted, through emulation, into a Monte Carlo algorithm without, at the cost of a logarithmic slowdown. We prove that this slowdown is optimal up to a constant factor by giving a matching lower bound

    Techniques for Failure Recovery in a Software-Defined Network

    Get PDF
    As our lives become ever more dependent on network connectivity, it becomes increasingly more important for networks to be able to overcome the failure of individual components and continue to function. This thesis examines approaches to fault tolerance in software defined networks, and how the global viewpoint that Software-Defined Networking provides can be leveraged to create more reliable networks. In order to continue operation after the failure of a network component, the failure must first be detected, and then the network must automatically change its behaviour to mitigate any adverse consequences. This thesis evaluates a variety of fault detection methods and potential responses. Based on these evaluations the design for a fault tolerance system for software defined networks is presented. This system builds protected paths using Ring Based Forwarding, an algorithm for creating a full mesh of paths between switches in a network where each path has a fail-over path at each hop. The system monitors the network for faults using Traffic Colouring, a technique for passively monitoring network traffic
    corecore