386,569 research outputs found
Robust Leader Election in a Fast-Changing World
We consider the problem of electing a leader among nodes in a highly dynamic
network where the adversary has unbounded capacity to insert and remove nodes
(including the leader) from the network and change connectivity at will. We
present a randomized Las Vegas algorithm that (re)elects a leader in O(D\log n)
rounds with high probability, where D is a bound on the dynamic diameter of the
network and n is the maximum number of nodes in the network at any point in
time. We assume a model of broadcast-based communication where a node can send
only 1 message of O(\log n) bits per round and is not aware of the receivers in
advance. Thus, our results also apply to mobile wireless ad-hoc networks,
improving over the optimal (for deterministic algorithms) O(Dn) solution
presented at FOMC 2011. We show that our algorithm is optimal by proving that
any randomized Las Vegas algorithm takes at least omega(D\log n) rounds to
elect a leader with high probability, which shows that our algorithm yields the
best possible (up to constants) termination time.Comment: In Proceedings FOMC 2013, arXiv:1310.459
Labeling Schemes with Queries
We study the question of ``how robust are the known lower bounds of labeling
schemes when one increases the number of consulted labels''. Let be a
function on pairs of vertices. An -labeling scheme for a family of graphs
\cF labels the vertices of all graphs in \cF such that for every graph
G\in\cF and every two vertices , the value can be inferred
by merely inspecting the labels of and .
This paper introduces a natural generalization: the notion of -labeling
schemes with queries, in which the value can be inferred by inspecting
not only the labels of and but possibly the labels of some additional
vertices. We show that inspecting the label of a single additional vertex (one
{\em query}) enables us to reduce the label size of many labeling schemes
significantly
Leader Election in Anonymous Rings: Franklin Goes Probabilistic
We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state, so that various model checking techniques can be employed to verify its correctness, that is, eventually a unique leader is elected with probability one. We also sketch a formal correctness proof of the algorithm for rings with arbitrary size
Node counting in wireless ad-hoc networks
We study wireless ad-hoc networks consisting of small microprocessors with
limited memory, where the wireless communication between the processors can be highly unreliable. For this setting, we propose a number of algorithms to estimate the number of nodes in the network, and the number of direct neighbors of each node. The algorithms are simulated, allowing comparison of their performance
Byzantine-Tolerant Set-Constrained Delivery Broadcast
Set-Constrained Delivery Broadcast (SCD-broadcast), recently introduced at ICDCN 2018, is a high-level communication abstraction that captures ordering properties not between individual messages but between sets of messages. More precisely, it allows processes to broadcast messages and deliver sets of messages, under the constraint that if a process delivers a set containing a message m before a set containing a message m\u27, then no other process delivers first a set containing m\u27 and later a set containing m. It has been shown that SCD-broadcast and read/write registers are computationally equivalent, and an algorithm implementing SCD-broadcast is known in the context of asynchronous message passing systems prone to crash failures.
This paper introduces a Byzantine-tolerant SCD-broadcast algorithm, which we call BSCD-broadcast. Our proposed algorithm assumes an underlying basic Byzantine-tolerant reliable broadcast abstraction. We first introduce an intermediary communication primitive, Byzantine FIFO broadcast (BFIFO-broadcast), which we then use as a primitive in our final BSCD-broadcast algorithm. Unlike the original SCD-broadcast algorithm that is tolerant to up to t<n/2 crashing processes, and unlike the underlying Byzantine reliable broadcast primitive that is tolerant to up to t<n/3 Byzantine processes, our BSCD-broadcast algorithm is tolerant to up to t<n/4 Byzantine processes. As an illustration of the high abstraction power provided by the BSCD-broadcast primitive, we show that it can be used to implement a Byzantine-tolerant read/write snapshot object in an extremely simple way
Modelling and Verification of a Cluster-tree Formation Protocol Implementation for the IEEE 802.15.4 TSCH MAC Operation Mode
Correct and efficient initialization of wireless sensor networks can be
challenging in the face of many uncertainties present in ad hoc wireless
networks. In this paper we examine an implementation for the formation of a
cluster-tree topology in a network which operates on top of the TSCH MAC
operation mode of the IEEE 802.15.4 standard, and investigate it using formal
methods. We show how both the mCRL2 language and toolset help us in identifying
scenarios where the implementation does not form a proper topology. More
importantly, our analysis leads to the conclusion that the cluster-tree
formation algorithm has a super linear time complexity. So, it does not scale
to large networks.Comment: In Proceedings MARS 2017, arXiv:1703.0581
- …