4,533 research outputs found
Time vs. Information Tradeoffs for Leader Election in Anonymous Trees
The leader election task calls for all nodes of a network to agree on a
single node. If the nodes of the network are anonymous, the task of leader
election is formulated as follows: every node of the network must output a
simple path, coded as a sequence of port numbers, such that all these paths end
at a common node, the leader. In this paper, we study deterministic leader
election in anonymous trees.
Our aim is to establish tradeoffs between the allocated time and the
amount of information that has to be given to the nodes to
enable leader election in time in all trees for which leader election in
this time is at all possible. Following the framework of , this information (a single binary string) is provided to all
nodes at the start by an oracle knowing the entire tree. The length of this
string is called the . For an allocated time ,
we give upper and lower bounds on the minimum size of advice sufficient to
perform leader election in time .
We consider -node trees of diameter . While leader election
in time can be performed without any advice, for time we give
tight upper and lower bounds of . For time we give
tight upper and lower bounds of for even values of ,
and tight upper and lower bounds of for odd values of .
For the time interval for constant ,
we prove an upper bound of and a lower bound of
, the latter being valid whenever is odd or when
the time is at most . Finally, for time for any
constant (except for the case of very small diameters), we give
tight upper and lower bounds of
About randomised distributed graph colouring and graph partition algorithms
AbstractWe present and analyse a very simple randomised distributed vertex colouring algorithm for arbitrary graphs of size n that halts in time O(logn) with probability 1-o(n-1). Each message containing 1 bit, its bit complexity per channel is O(logn).From this algorithm, we deduce and analyse a randomised distributed vertex colouring algorithm for arbitrary graphs of maximum degree Δ and size n that uses at most Δ+1 colours and halts in time O(logn) with probability 1-o(n-1).We also obtain a partition algorithm for arbitrary graphs of size n that builds a spanning forest in time O(logn) with probability 1-o(n-1). We study some parameters such as the number, the size and the radius of trees of the spanning forest
Design Patterns in Beeping Algorithms
We consider networks of processes which interact with beeps. In the basic model defined by Cornejo and Kuhn, which we refer to as the BL variant, processes can choose in each round either to beep or to listen. Those who beep are unable to detect simultaneous beeps. Those who listen can only distinguish between silence and the presence of at least one beep. Stronger variants exist where the nodes can also detect collision while they are beeping (B_{cd}L) or listening (BL_{cd}), or both (B_{cd}L_{cd}). Beeping models are weak in essence and even simple tasks are difficult or unfeasible with them.
This paper starts with a discussion on generic building blocks (design patterns) which seem to occur frequently in the design of beeping algorithms. They include multi-slot phases: the fact of dividing the main loop into a number of specialised slots; exclusive beeps: having a single node beep at a time in a neighbourhood (within one or two hops); adaptive probability: increasing or decreasing the probability of beeping to produce more exclusive beeps; internal (resp. peripheral) collision detection: for detecting collision while beeping (resp. listening); and emulation of collision detection: for enabling this feature when it is not available as a primitive.
We then provide algorithms for a number of basic problems, including colouring, 2-hop colouring, degree computation, 2-hop MIS, and collision detection (in BL). Using the patterns, we formulate these algorithms in a rather concise and elegant way. Their analyses (in the full version) are more technical, e.g. one of them relies on a Martingale technique with non-independent variables; another improves that of the MIS algorithm (P. Jeavons et al.) by getting rid of a gigantic constant (the asymptotic order was already optimal).
Finally, we study the relative power of several variants of beeping models. In particular, we explain how every Las Vegas algorithm with collision detection can be converted, through emulation, into a Monte Carlo algorithm without, at the cost of a logarithmic slowdown. We prove that this slowdown is optimal up to a constant factor by giving a matching lower bound
Techniques for Failure Recovery in a Software-Defined Network
As our lives become ever more dependent on network connectivity, it becomes increasingly more important for networks to be able to overcome the failure of individual components and continue to function. This thesis examines approaches to fault tolerance in software defined networks, and how the global viewpoint that Software-Defined Networking provides can be leveraged to create more reliable networks.
In order to continue operation after the failure of a network component, the failure must first be detected, and then the network must automatically change its behaviour to mitigate any adverse consequences. This thesis evaluates a variety of fault detection methods and potential responses. Based on these evaluations the design for a fault tolerance system for software defined networks is presented. This system builds protected paths using Ring Based Forwarding, an algorithm for creating a full mesh of paths between switches in a network where each path has a fail-over path at each hop. The system monitors the network for faults using Traffic Colouring, a technique for passively monitoring network traffic
- …