1,620 research outputs found
Leader Election in Anonymous Rings: Franklin Goes Probabilistic
We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state, so that various model checking techniques can be employed to verify its correctness, that is, eventually a unique leader is elected with probability one. We also sketch a formal correctness proof of the algorithm for rings with arbitrary size
Deterministic Symmetry Breaking in Ring Networks
We study a distributed coordination mechanism for uniform agents located on a
circle. The agents perform their actions in synchronised rounds. At the
beginning of each round an agent chooses the direction of its movement from
clockwise, anticlockwise, or idle, and moves at unit speed during this round.
Agents are not allowed to overpass, i.e., when an agent collides with another
it instantly starts moving with the same speed in the opposite direction
(without exchanging any information with the other agent). However, at the end
of each round each agent has access to limited information regarding its
trajectory of movement during this round.
We assume that mobile agents are initially located on a circle unit
circumference at arbitrary but distinct positions unknown to other agents. The
agents are equipped with unique identifiers from a fixed range. The {\em
location discovery} task to be performed by each agent is to determine the
initial position of every other agent.
Our main result states that, if the only available information about movement
in a round is limited to %information about distance between the initial and
the final position, then there is a superlinear lower bound on time needed to
solve the location discovery problem. Interestingly, this result corresponds to
a combinatorial symmetry breaking problem, which might be of independent
interest. If, on the other hand, an agent has access to the distance to its
first collision with another agent in a round, we design an asymptotically
efficient and close to optimal solution for the location discovery problem.Comment: Conference version accepted to ICDCS 201
Memory lower bounds for deterministic self-stabilization
In the context of self-stabilization, a \emph{silent} algorithm guarantees
that the register of every node does not change once the algorithm has
stabilized. At the end of the 90's, Dolev et al. [Acta Inf. '99] showed that,
for finding the centers of a graph, for electing a leader, or for constructing
a spanning tree, every silent algorithm must use a memory of
bits per register in -node networks. Similarly, Korman et al. [Dist. Comp.
'07] proved, using the notion of proof-labeling-scheme, that, for constructing
a minimum-weight spanning trees (MST), every silent algorithm must use a memory
of bits per register. It follows that requiring the algorithm
to be silent has a cost in terms of memory space, while, in the context of
self-stabilization, where every node constantly checks the states of its
neighbors, the silence property can be of limited practical interest. In fact,
it is known that relaxing this requirement results in algorithms with smaller
space-complexity.
In this paper, we are aiming at measuring how much gain in terms of memory
can be expected by using arbitrary self-stabilizing algorithms, not necessarily
silent. To our knowledge, the only known lower bound on the memory requirement
for general algorithms, also established at the end of the 90's, is due to
Beauquier et al.~[PODC '99] who proved that registers of constant size are not
sufficient for leader election algorithms. We improve this result by
establishing a tight lower bound of bits per
register for self-stabilizing algorithms solving -coloring or
constructing a spanning tree in networks of maximum degree~. The lower
bound bits per register also holds for leader election
Computing on Anonymous Quantum Network
This paper considers distributed computing on an anonymous quantum network, a
network in which no party has a unique identifier and quantum communication and
computation are available. It is proved that the leader election problem can
exactly (i.e., without error in bounded time) be solved with at most the same
complexity up to a constant factor as that of exactly computing symmetric
functions (without intermediate measurements for a distributed and superposed
input), if the number of parties is given to every party. A corollary of this
result is a more efficient quantum leader election algorithm than existing
ones: the new quantum algorithm runs in O(n) rounds with bit complexity
O(mn^2), on an anonymous quantum network with n parties and m communication
links. Another corollary is the first quantum algorithm that exactly computes
any computable Boolean function with round complexity O(n) and with smaller bit
complexity than that of existing classical algorithms in the worst case over
all (computable) Boolean functions and network topologies. More generally, any
n-qubit state can be shared with that complexity on an anonymous quantum
network with n parties.Comment: 25 page
Compact Deterministic Self-Stabilizing Leader Election: The Exponential Advantage of Being Talkative
This paper focuses on compact deterministic self-stabilizing solutions for
the leader election problem. When the protocol is required to be \emph{silent}
(i.e., when communication content remains fixed from some point in time during
any execution), there exists a lower bound of Omega(\log n) bits of memory per
node participating to the leader election (where n denotes the number of nodes
in the system). This lower bound holds even in rings. We present a new
deterministic (non-silent) self-stabilizing protocol for n-node rings that uses
only O(\log\log n) memory bits per node, and stabilizes in O(n\log^2 n) rounds.
Our protocol has several attractive features that make it suitable for
practical purposes. First, the communication model fits with the model used by
existing compilers for real networks. Second, the size of the ring (or any
upper bound on this size) needs not to be known by any node. Third, the node
identifiers can be of various sizes. Finally, no synchrony assumption, besides
a weakly fair scheduler, is assumed. Therefore, our result shows that, perhaps
surprisingly, trading silence for exponential improvement in term of memory
space does not come at a high cost regarding stabilization time or minimal
assumptions
The Energy Complexity of Broadcast
Energy is often the most constrained resource in networks of battery-powered
devices, and as devices become smaller, they spend a larger fraction of their
energy on communication (transceiver usage) not computation. As an imperfect
proxy for true energy usage, we define energy complexity to be the number of
time slots a device transmits/listens; idle time and computation are free.
In this paper we investigate the energy complexity of fundamental
communication primitives such as broadcast in multi-hop radio networks. We
consider models with collision detection (CD) and without (No-CD), as well as
both randomized and deterministic algorithms. Some take-away messages from this
work include:
1. The energy complexity of broadcast in a multi-hop network is intimately
connected to the time complexity of leader election in a single-hop (clique)
network. Many existing lower bounds on time complexity immediately transfer to
energy complexity. For example, in the CD and No-CD models, we need
and energy, respectively.
2. The energy lower bounds above can almost be achieved, given sufficient
() time. In the CD and No-CD models we can solve broadcast using
energy and energy,
respectively.
3. The complexity measures of Energy and Time are in conflict, and it is an
open problem whether both can be minimized simultaneously. We give a tradeoff
showing it is possible to be nearly optimal in both measures simultaneously.
For any constant , broadcast can be solved in
time with
energy, where is the diameter of the network
Computing in Additive Networks with Bounded-Information Codes
This paper studies the theory of the additive wireless network model, in
which the received signal is abstracted as an addition of the transmitted
signals. Our central observation is that the crucial challenge for computing in
this model is not high contention, as assumed previously, but rather
guaranteeing a bounded amount of \emph{information} in each neighborhood per
round, a property that we show is achievable using a new random coding
technique.
Technically, we provide efficient algorithms for fundamental distributed
tasks in additive networks, such as solving various symmetry breaking problems,
approximating network parameters, and solving an \emph{asymmetry revealing}
problem such as computing a maximal input.
The key method used is a novel random coding technique that allows a node to
successfully decode the received information, as long as it does not contain
too many distinct values. We then design our algorithms to produce a limited
amount of information in each neighborhood in order to leverage our enriched
toolbox for computing in additive networks
- …