6 research outputs found
Fast and Compact Distributed Verification and Self-Stabilization of a DFS Tree
We present algorithms for distributed verification and silent-stabilization
of a DFS(Depth First Search) spanning tree of a connected network. Computing
and maintaining such a DFS tree is an important task, e.g., for constructing
efficient routing schemes. Our algorithm improves upon previous work in various
ways. Comparable previous work has space and time complexities of bits per node and respectively, where is the highest
degree of a node, is the number of nodes and is the diameter of the
network. In contrast, our algorithm has a space complexity of bits
per node, which is optimal for silent-stabilizing spanning trees and runs in
time. In addition, our solution is modular since it utilizes the
distributed verification algorithm as an independent subtask of the overall
solution. It is possible to use the verification algorithm as a stand alone
task or as a subtask in another algorithm. To demonstrate the simplicity of
constructing efficient DFS algorithms using the modular approach, We also
present a (non-sielnt) self-stabilizing DFS token circulation algorithm for
general networks based on our silent-stabilizing DFS tree. The complexities of
this token circulation algorithm are comparable to the known ones
Self-stabilizing algorithms for Connected Vertex Cover and Clique decomposition problems
In many wireless networks, there is no fixed physical backbone nor
centralized network management. The nodes of such a network have to
self-organize in order to maintain a virtual backbone used to route messages.
Moreover, any node of the network can be a priori at the origin of a malicious
attack. Thus, in one hand the backbone must be fault-tolerant and in other hand
it can be useful to monitor all network communications to identify an attack as
soon as possible. We are interested in the minimum \emph{Connected Vertex
Cover} problem, a generalization of the classical minimum Vertex Cover problem,
which allows to obtain a connected backbone. Recently, Delbot et
al.~\cite{DelbotLP13} proposed a new centralized algorithm with a constant
approximation ratio of for this problem. In this paper, we propose a
distributed and self-stabilizing version of their algorithm with the same
approximation guarantee. To the best knowledge of the authors, it is the first
distributed and fault-tolerant algorithm for this problem. The approach
followed to solve the considered problem is based on the construction of a
connected minimal clique partition. Therefore, we also design the first
distributed self-stabilizing algorithm for this problem, which is of
independent interest
Snap-Stabilization in Message-Passing Systems
In this paper, we tackle the open problem of snap-stabilization in
message-passing systems. Snap-stabilization is a nice approach to design
protocols that withstand transient faults. Compared to the well-known
self-stabilizing approach, snap-stabilization guarantees that the effect of
faults is contained immediately after faults cease to occur. Our contribution
is twofold: we show that (1) snap-stabilization is impossible for a wide class
of problems if we consider networks with finite yet unbounded channel capacity;
(2) snap-stabilization becomes possible in the same setting if we assume
bounded-capacity channels. We propose three snap-stabilizing protocols working
in fully-connected networks. Our work opens exciting new research perspectives,
as it enables the snap-stabilizing paradigm to be implemented in actual
networks
Snap-stabilizing depth-first search on arbitrary networks
Abstract A snap-stabilizing protocol, starting from any arbitrary initial configuration, always behaves accord-ing to its specification. In this paper, we present the first snap-stabilizing depth first search wave protocol for arbitrary rooted networks. In this protocol, a wave of computation is initiated by the root. In this wave,all the processors are sequentially visited in depth first search order. After the end of the visit, the root eventually detects the termination of this process. Furthermore, our protocol is proven assuming an unfairdaemon, i.e., assuming the weakest scheduling assumption