166 research outputs found

    Simple and Efficient Local Codes for Distributed Stable Network Construction

    Full text link
    In this work, we study protocols so that populations of distributed processes can construct networks. In order to highlight the basic principles of distributed network construction we keep the model minimal in all respects. In particular, we assume finite-state processes that all begin from the same initial state and all execute the same protocol (i.e. the system is homogeneous). Moreover, we assume pairwise interactions between the processes that are scheduled by an adversary. The only constraint on the adversary scheduler is that it must be fair. In order to allow processes to construct networks, we let them activate and deactivate their pairwise connections. When two processes interact, the protocol takes as input the states of the processes and the state of the their connection and updates all of them. Initially all connections are inactive and the goal is for the processes, after interacting and activating/deactivating connections for a while, to end up with a desired stable network. We give protocols (optimal in some cases) and lower bounds for several basic network construction problems such as spanning line, spanning ring, spanning star, and regular network. We provide proofs of correctness for all of our protocols and analyze the expected time to convergence of most of them under a uniform random scheduler that selects the next pair of interacting processes uniformly at random from all such pairs. Finally, we prove several universality results by presenting generic protocols that are capable of simulating a Turing Machine (TM) and exploiting it in order to construct a large class of networks.Comment: 43 pages, 7 figure

    Moving in temporal graphs with very sparse random availability of edges

    Get PDF
    In this work we consider temporal graphs, i.e. graphs, each edge of which is assigned a set of discrete time-labels drawn from a set of integers. The labels of an edge indicate the discrete moments in time at which the edge is available. We also consider temporal paths in a temporal graph, i.e. paths whose edges are assigned a strictly increasing sequence of labels. Furthermore, we assume the uniform case (UNI-CASE), in which every edge of a graph is assigned exactly one time label from a set of integers and the time labels assigned to the edges of the graph are chosen randomly and independently, with the selection following the uniform distribution. We call uniform random temporal graphs the graphs that satisfy the UNI-CASE. We begin by deriving the expected number of temporal paths of a given length in the uniform random temporal clique. We define the term temporal distance of two vertices, which is the arrival time, i.e. the time-label of the last edge, of the temporal path that connects those vertices, which has the smallest arrival time amongst all temporal paths that connect those vertices. We then propose and study two statistical properties of temporal graphs. One is the maximum expected temporal distance which is, as the term indicates, the maximum of all expected temporal distances in the graph. The other one is the temporal diameter which, loosely speaking, is the expectation of the maximum temporal distance in the graph. We derive the maximum expected temporal distance of a uniform random temporal star graph as well as an upper bound on both the maximum expected temporal distance and the temporal diameter of the normalized version of the uniform random temporal clique, in which the largest time-label available equals the number of vertices. Finally, we provide an algorithm that solves an optimization problem on a specific type of temporal (multi)graphs of two vertices.Comment: 30 page

    Connectivity preserving network transformers

    Get PDF
    The Population Protocol model is a distributed model that concerns systems of very weak computational entities that cannot control the way they interact. The model of Network Constructors is a variant of Population Protocols capable of (algorithmically) constructing abstract networks. Both models are characterized by a fundamental inability to terminate. In this work, we investigate the minimal strengthenings of the latter that could overcome this inability. Our main conclusion is that initial connectivity of the communication topology combined with the ability of the protocol to transform the communication topology plus a few other local and realistic assumptions are sufficient to guarantee not only termination but also the maximum computational power that one can hope for in this family of models. The technique is to transform any initial connected topology to a less symmetric and detectable topology without ever breaking its connectivity during the transformation. The target topology of all of our transformers is the spanning line and we call Terminating Line Transformation the corresponding problem. We first study the case in which there is a pre-elected unique leader and give a time-optimal protocol for Terminating Line Transformation. We then prove that dropping the leader without additional assumptions leads to a strong impossibility result. In an attempt to overcome this, we equip the nodes with the ability to tell, during their pairwise interactions, whether they have at least one neighbor in common. Interestingly, it turns out that this local and realistic mechanism is sufficient to make the problem solvable. In particular, we give a very efficient protocol that solves Terminating Line Transformation when all nodes are initially identical. The latter implies that the model computes with termination any symmetric predicate computable by a Turing Machine of space Θ(n2)\Theta(n^2)
    • …
    corecore