1,148 research outputs found

    Leader Election in Anonymous Rings: Franklin Goes Probabilistic

    Get PDF
    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state, so that various model checking techniques can be employed to verify its correctness, that is, eventually a unique leader is elected with probability one. We also sketch a formal correctness proof of the algorithm for rings with arbitrary size

    Time vs. Information Tradeoffs for Leader Election in Anonymous Trees

    Full text link
    The leader election task calls for all nodes of a network to agree on a single node. If the nodes of the network are anonymous, the task of leader election is formulated as follows: every node vv of the network must output a simple path, coded as a sequence of port numbers, such that all these paths end at a common node, the leader. In this paper, we study deterministic leader election in anonymous trees. Our aim is to establish tradeoffs between the allocated time τ\tau and the amount of information that has to be given a priori\textit{a priori} to the nodes to enable leader election in time τ\tau in all trees for which leader election in this time is at all possible. Following the framework of algorithms with advice\textit{algorithms with advice}, this information (a single binary string) is provided to all nodes at the start by an oracle knowing the entire tree. The length of this string is called the size of advice\textit{size of advice}. For an allocated time τ\tau, we give upper and lower bounds on the minimum size of advice sufficient to perform leader election in time τ\tau. We consider nn-node trees of diameter diamDdiam \leq D. While leader election in time diamdiam can be performed without any advice, for time diam1diam-1 we give tight upper and lower bounds of Θ(logD)\Theta (\log D). For time diam2diam-2 we give tight upper and lower bounds of Θ(logD)\Theta (\log D) for even values of diamdiam, and tight upper and lower bounds of Θ(logn)\Theta (\log n) for odd values of diamdiam. For the time interval [βdiam,diam3][\beta \cdot diam, diam-3] for constant β>1/2\beta >1/2, we prove an upper bound of O(nlognD)O(\frac{n\log n}{D}) and a lower bound of Ω(nD)\Omega(\frac{n}{D}), the latter being valid whenever diamdiam is odd or when the time is at most diam4diam-4. Finally, for time αdiam\alpha \cdot diam for any constant α<1/2\alpha <1/2 (except for the case of very small diameters), we give tight upper and lower bounds of Θ(n)\Theta (n)

    Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings

    Full text link
    We study the problem of locating a particularly dangerous node, the so-called black hole in a synchronous anonymous ring network with mobile agents. A black hole is a harmful stationary process residing in a node of the network and destroying destroys all mobile agents visiting that node without leaving any trace. We consider the more challenging scenario when the agents are identical and initially scattered within the network. Moreover, we solve the problem with agents that have constant-sized memory and carry a constant number of identical tokens, which can be placed at nodes of the network. In contrast, the only known solutions for the case of scattered agents searching for a black hole, use stronger models where the agents have non-constant memory, can write messages in whiteboards located at nodes or are allowed to mark both the edges and nodes of the network with tokens. This paper solves the problem for ring networks containing a single black hole. We are interested in the minimum resources (number of agents and tokens) necessary for locating all links incident to the black hole. We present deterministic algorithms for ring topologies and provide matching lower and upper bounds for the number of agents and the number of tokens required for deterministic solutions to the black hole search problem, in oriented or unoriented rings, using movable or unmovable tokens

    Computing on Anonymous Quantum Network

    Full text link
    This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available. It is proved that the leader election problem can exactly (i.e., without error in bounded time) be solved with at most the same complexity up to a constant factor as that of exactly computing symmetric functions (without intermediate measurements for a distributed and superposed input), if the number of parties is given to every party. A corollary of this result is a more efficient quantum leader election algorithm than existing ones: the new quantum algorithm runs in O(n) rounds with bit complexity O(mn^2), on an anonymous quantum network with n parties and m communication links. Another corollary is the first quantum algorithm that exactly computes any computable Boolean function with round complexity O(n) and with smaller bit complexity than that of existing classical algorithms in the worst case over all (computable) Boolean functions and network topologies. More generally, any n-qubit state can be shared with that complexity on an anonymous quantum network with n parties.Comment: 25 page
    corecore