10,125 research outputs found
Hamiltonian cycles in faulty random geometric networks
In this paper we analyze the Hamiltonian properties of
faulty random networks.
This consideration is of interest when considering wireless
broadcast networks.
A random geometric network is a graph whose vertices
correspond to points
uniformly and independently distributed in the unit square,
and whose edges
connect any pair of vertices if their distance is below some
specified bound.
A faulty random geometric network is a random geometric
network whose vertices
or edges fail at random. Algorithms to find Hamiltonian
cycles in faulty random
geometric networks are presented.Postprint (published version
Information Spreading in Stationary Markovian Evolving Graphs
Markovian evolving graphs are dynamic-graph models where the links among a
fixed set of nodes change during time according to an arbitrary Markovian rule.
They are extremely general and they can well describe important dynamic-network
scenarios.
We study the speed of information spreading in the "stationary phase" by
analyzing the completion time of the "flooding mechanism". We prove a general
theorem that establishes an upper bound on flooding time in any stationary
Markovian evolving graph in terms of its node-expansion properties.
We apply our theorem in two natural and relevant cases of such dynamic
graphs. "Geometric Markovian evolving graphs" where the Markovian behaviour is
yielded by "n" mobile radio stations, with fixed transmission radius, that
perform independent random walks over a square region of the plane.
"Edge-Markovian evolving graphs" where the probability of existence of any edge
at time "t" depends on the existence (or not) of the same edge at time "t-1".
In both cases, the obtained upper bounds hold "with high probability" and
they are nearly tight. In fact, they turn out to be tight for a large range of
the values of the input parameters. As for geometric Markovian evolving graphs,
our result represents the first analytical upper bound for flooding time on a
class of concrete mobile networks.Comment: 16 page
Simple and Optimal Randomized Fault-Tolerant Rumor Spreading
We revisit the classic problem of spreading a piece of information in a group
of fully connected processors. By suitably adding a small dose of
randomness to the protocol of Gasienic and Pelc (1996), we derive for the first
time protocols that (i) use a linear number of messages, (ii) are correct even
when an arbitrary number of adversarially chosen processors does not
participate in the process, and (iii) with high probability have the
asymptotically optimal runtime of when at least an arbitrarily
small constant fraction of the processors are working. In addition, our
protocols do not require that the system is synchronized nor that all
processors are simultaneously woken up at time zero, they are fully based on
push-operations, and they do not need an a priori estimate on the number of
failed nodes.
Our protocols thus overcome the typical disadvantages of the two known
approaches, algorithms based on random gossip (typically needing a large number
of messages due to their unorganized nature) and algorithms based on fair
workload splitting (which are either not {time-efficient} or require intricate
preprocessing steps plus synchronization).Comment: This is the author-generated version of a paper which is to appear in
Distributed Computing, Springer, DOI: 10.1007/s00446-014-0238-z It is
available online from
http://link.springer.com/article/10.1007/s00446-014-0238-z This version
contains some new results (Section 6
A Distributed algorithm to find Hamiltonian cycles in Gnp random graphs
In this paper, we present a distributed algorithm to find Hamiltonian cycles in random binomial graphs Gnp. The algorithm works on a synchronous distributed setting by first creating a small cycle, then covering almost all vertices in the graph with several disjoint paths, and finally patching these paths and the uncovered vertices to the cycle. Our analysis shows that, with high probability, our algorithm is able to find a Hamiltonian cycle in Gnp when p_n=omega(sqrt{log n}/n^{1/4}). Moreover, we conduct an average case complexity analysis that shows that our algorithm terminates in expected sub-linear time, namely in O(n^{3/4+epsilon}) pulses.Postprint (published version
Broadcasting in Noisy Radio Networks
The widely-studied radio network model [Chlamtac and Kutten, 1985] is a
graph-based description that captures the inherent impact of collisions in
wireless communication. In this model, the strong assumption is made that node
receives a message from a neighbor if and only if exactly one of its
neighbors broadcasts.
We relax this assumption by introducing a new noisy radio network model in
which random faults occur at senders or receivers. Specifically, for a constant
noise parameter , either every sender has probability of
transmitting noise or every receiver of a single transmission in its
neighborhood has probability of receiving noise.
We first study single-message broadcast algorithms in noisy radio networks
and show that the Decay algorithm [Bar-Yehuda et al., 1992] remains robust in
the noisy model while the diameter-linear algorithm of Gasieniec et al., 2007
does not. We give a modified version of the algorithm of Gasieniec et al., 2007
that is robust to sender and receiver faults, and extend both this modified
algorithm and the Decay algorithm to robust multi-message broadcast algorithms.
We next investigate the extent to which (network) coding improves throughput
in noisy radio networks. We address the previously perplexing result of Alon et
al. 2014 that worst case coding throughput is no better than worst case routing
throughput up to constants: we show that the worst case throughput performance
of coding is, in fact, superior to that of routing -- by a
gap -- provided receiver faults are introduced. However, we show that any
coding or routing scheme for the noiseless setting can be transformed to be
robust to sender faults with only a constant throughput overhead. These
transformations imply that the results of Alon et al., 2014 carry over to noisy
radio networks with sender faults.Comment: Principles of Distributed Computing 201
Consensus Computation in Unreliable Networks: A System Theoretic Approach
This work addresses the problem of ensuring trustworthy computation in a
linear consensus network. A solution to this problem is relevant for several
tasks in multi-agent systems including motion coordination, clock
synchronization, and cooperative estimation. In a linear consensus network, we
allow for the presence of misbehaving agents, whose behavior deviate from the
nominal consensus evolution. We model misbehaviors as unknown and unmeasurable
inputs affecting the network, and we cast the misbehavior detection and
identification problem into an unknown-input system theoretic framework. We
consider two extreme cases of misbehaving agents, namely faulty (non-colluding)
and malicious (Byzantine) agents. First, we characterize the set of inputs that
allow misbehaving agents to affect the consensus network while remaining
undetected and/or unidentified from certain observing agents. Second, we
provide worst-case bounds for the number of concurrent faulty or malicious
agents that can be detected and identified. Precisely, the consensus network
needs to be 2k+1 (resp. k+1) connected for k malicious (resp. faulty) agents to
be generically detectable and identifiable by every well behaving agent. Third,
we quantify the effect of undetectable inputs on the final consensus value.
Fourth, we design three algorithms to detect and identify misbehaving agents.
The first and the second algorithm apply fault detection techniques, and
affords complete detection and identification if global knowledge of the
network is available to each agent, at a high computational cost. The third
algorithm is designed to exploit the presence in the network of weakly
interconnected subparts, and provides local detection and identification of
misbehaving agents whose behavior deviates more than a threshold, which is
quantified in terms of the interconnection structure
- …