-
Optimizing Robot Dispersion on Grids: with and without Fault Tolerance
Authors:
Rik Banerjee,
Manish Kumar,
Anisur Rahaman Molla
Abstract:
The introduction and study of dispersing mobile robots across the nodes of an anonymous graph have recently gained traction and have been explored within various graph classes and settings. While optimal dispersion solution was established for {\em oriented} grids [Kshemkalyani et al., WALCOM 2020], a significant unresolved question pertains to whether achieving optimal dispersion is feasible on a…
▽ More
The introduction and study of dispersing mobile robots across the nodes of an anonymous graph have recently gained traction and have been explored within various graph classes and settings. While optimal dispersion solution was established for {\em oriented} grids [Kshemkalyani et al., WALCOM 2020], a significant unresolved question pertains to whether achieving optimal dispersion is feasible on an {\em unoriented} grid. This paper investigates the dispersion problem on unoriented grids, considering both non-faulty and faulty robots. The challenge posed by unoriented grids lies in the absence of a clear sense of direction for a single robot moving between nodes, as opposed to the straightforward navigation of oriented grids.
We present three deterministic algorithms tailored to our robot model. The first and second algorithms deal with the dispersion of faulty and non-faulty robots, ensuring both time and memory optimization in oriented and unoriented grids, respectively. Faulty robots that are prone to crashing at any time, causing permanent failure. In both settings, we achieve dispersion in $O(\sqrt{n})$ rounds while requiring $O(\log n)$ bits of memory per robot. The third algorithm tackles faulty robots prone to crash faults in an unoriented grid. In this scenario, our algorithm operates within $O(\sqrt{n} \log n)$ time and uses $O(\sqrt{n} \log n)$ bits of memory per robot. The robots need to know the value of $n$ for termination.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Agent-based Leader Election, MST, and Beyond
Authors:
Ajay D. Kshemkalyani,
Manish Kumar,
Anisur Rahaman Molla,
Gokarna Sharma
Abstract:
Leader election is one of the fundamental and well-studied problems in distributed computing. In this paper, we initiate the study of leader election using mobile agents. Suppose $n$ agents are positioned initially arbitrarily on the nodes of an arbitrary, anonymous, $n$-node, $m$-edge graph $G$. The agents relocate themselves autonomously on the nodes of $G$ and elect an agent as a leader such th…
▽ More
Leader election is one of the fundamental and well-studied problems in distributed computing. In this paper, we initiate the study of leader election using mobile agents. Suppose $n$ agents are positioned initially arbitrarily on the nodes of an arbitrary, anonymous, $n$-node, $m$-edge graph $G$. The agents relocate themselves autonomously on the nodes of $G$ and elect an agent as a leader such that the leader agent knows it is a leader and the other agents know they are not leaders. The objective is to minimize time and memory requirements. Following the literature, we consider the synchronous setting in which each agent performs its operations synchronously with others and hence the time complexity can be measured in rounds. The quest in this paper is to provide solutions without agents knowing any graph parameter, such as $n$, a priori. We first establish that, without agents knowing any graph parameter a priori, there exists a deterministic algorithm to elect an agent as a leader in $O(m)$ rounds with $O(n\log n)$ bits at each agent. Using this leader election result, we develop a deterministic algorithm for agents to construct a minimum spanning tree of $G$ in $O(m+n\log n)$ rounds using $O(n \log n)$ bits memory at each agent, without agents knowing any graph parameter a priori. Finally, using the same leader election result, we provide improved time/memory results for other fundamental distributed graph problems, namely, gathering, maximal independent set, and minimal dominating sets, removing the assumptions on agents knowing graph parameters a priori.
△ Less
Submitted 22 May, 2024; v1 submitted 20 March, 2024;
originally announced March 2024.
-
Agent-Based Triangle Counting and its Applications in Anonymous Graphs
Authors:
Prabhat Kumar Chand,
Apurba Das,
Anisur Rahaman Molla
Abstract:
Triangle counting in a graph is a fundamental problem and has a wide range of applications in various domains. It is crucial in understanding the structural properties of a graph and is often used as a building block for more complex graph analytics. In this paper, we solve the triangle counting problem in an anonymous graph in a distributed setting using mobile agents and subsequently use this as…
▽ More
Triangle counting in a graph is a fundamental problem and has a wide range of applications in various domains. It is crucial in understanding the structural properties of a graph and is often used as a building block for more complex graph analytics. In this paper, we solve the triangle counting problem in an anonymous graph in a distributed setting using mobile agents and subsequently use this as a subroutine to tackle the truss decomposition and triangle centrality problem. The paper employs mobile agents, placed on the nodes of the graph to coordinate among themselves to solve the triangle enumeration problem for the graph. Following the literature, we consider the synchronous systems where each robot executes its tasks concurrently with all others and hence time complexity can be measured as the number of rounds needed to complete the task. The graph is anonymous, i.e., without any node labels or IDs, but the agents are autonomous with distinct IDs and have limited memory. Agents can only communicate with other agents locally i.e., if and only if they are at the same node. The goal is to devise algorithms that minimise both the time required for triangle counting and the memory usage at each agent. We further demonstrate how the triangle count obtained through the mobile agent approach can be leveraged to address the truss decomposition, triangle centrality and local clustering coefficient problems, which involves finding maximal sub-graphs with strong interconnections. Truss decomposition helps in identifying maximal, highly interconnected sub-graphs, or trusses, within a network, thus, revealing the structural cohesion and tight-knit communities in complex graphs, facilitating the analysis of relationships and information flow in various fields, such as social networks, biology, and recommendation systems.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Run for Cover: Dominating Set via Mobile Agents
Authors:
Prabhat Kumar Chand,
Anisur Rahaman Molla,
Sumathi Sivasubramaniam
Abstract:
Research involving computing with mobile agents is a fast-growing field, given the advancement of technology in automated systems, e.g., robots, drones, self-driving cars, etc. Therefore, it is pressing to focus on solving classical network problems using mobile agents. In this paper, we study one such problem -- finding small dominating sets of a graph $G$ using mobile agents. Dominating set is i…
▽ More
Research involving computing with mobile agents is a fast-growing field, given the advancement of technology in automated systems, e.g., robots, drones, self-driving cars, etc. Therefore, it is pressing to focus on solving classical network problems using mobile agents. In this paper, we study one such problem -- finding small dominating sets of a graph $G$ using mobile agents. Dominating set is interesting in the field of mobile agents as it opens up a way for solving various robotic problems, e.g., guarding, covering, facility location, transport routing, etc. In this paper, we first present two algorithms for computing a {\em minimal dominating set}: (i) an $O(m)$ time algorithm if the robots start from a single node (i.e., gathered initially), (ii) an $O(\ellΔ\log(λ)+n\ell+m)$ time algorithm, if the robots start from multiple nodes (i.e., positioned arbitrarily), where $m$ is the number of edges and $Δ$ is the maximum degree of $G$, $\ell$ is the number of clusters of the robot initially and $λ$ is the maximum ID-length of the robots. Then we present a $\ln (Δ)$ approximation algorithm for the {\em minimum} dominating set which takes $O(nΔ\log (λ))$ rounds.
△ Less
Submitted 5 September, 2023;
originally announced September 2023.
-
Sublinear Message Bounds of Authenticated Implicit Byzantine Agreement
Authors:
Manish Kumar,
Anisur Rahaman Molla
Abstract:
This paper studies the message complexity of authenticated Byzantine agreement (BA) in synchronous, fully-connected distributed networks under an honest majority. We focus on the so-called {\em implicit} Byzantine agreement problem where each node starts with an input value and at the end a non-empty subset of the honest nodes should agree on a common input value by satisfying the BA properties (i…
▽ More
This paper studies the message complexity of authenticated Byzantine agreement (BA) in synchronous, fully-connected distributed networks under an honest majority. We focus on the so-called {\em implicit} Byzantine agreement problem where each node starts with an input value and at the end a non-empty subset of the honest nodes should agree on a common input value by satisfying the BA properties (i.e., there can be undecided nodes). We show that a sublinear (in $n$, number of nodes) message complexity BA protocol under honest majority is possible in the standard PKI model when the nodes have access to an unbiased global coin and hash function. In particular, we present a randomized Byzantine agreement algorithm which, with high probability achieves implicit agreement, uses $\tilde{O}(\sqrt{n})$ messages, and runs in $\tilde{O}(1)$ rounds while tolerating $(1/2 - ε)n$ Byzantine nodes for any fixed $ε> 0$, the notation $\Tilde{O}$ hides a $O(\polylog{n})$ factor. The algorithm requires standard cryptographic setup PKI and hash function with a static Byzantine adversary. The algorithm works in the CONGEST model and each node does not need to know the identity of its neighbors, i.e., works in the $KT_0$ model. The message complexity (and also the time complexity) of our algorithm is optimal up to a $\polylog n$ factor, as we show a $Ω(\sqrt{n})$ lower bound on the message complexity.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
Fast Deterministic Gathering with Detection on Arbitrary Graphs: The Power of Many Robots
Authors:
Anisur Rahaman Molla,
Kaushik Mondal,
William K. Moses Jr
Abstract:
Over the years, much research involving mobile computational entities has been performed. From modeling actual microscopic (and smaller) robots, to modeling software processes on a network, many important problems have been studied in this context. Gathering is one such fundamental problem in this area. The problem of gathering $k$ robots, initially arbitrarily placed on the nodes of an $n$-node g…
▽ More
Over the years, much research involving mobile computational entities has been performed. From modeling actual microscopic (and smaller) robots, to modeling software processes on a network, many important problems have been studied in this context. Gathering is one such fundamental problem in this area. The problem of gathering $k$ robots, initially arbitrarily placed on the nodes of an $n$-node graph, asks that these robots coordinate and communicate in a local manner, as opposed to global, to move around the graph, find each other, and settle down on a single node as fast as possible. A more difficult problem to solve is gathering with detection, where once the robots gather, they must subsequently realize that gathering has occurred and then terminate.
In this paper, we propose a deterministic approach to solve gathering with detection for any arbitrary connected graph that is faster than existing deterministic solutions for even just gathering (without the requirement of detection) for arbitrary graphs. In contrast to earlier work on gathering, it leverages the fact that there are more robots present in the system to achieve gathering with detection faster than those previous papers that focused on just gathering. The state of the art solution for deterministic gathering~[Ta-Shma and Zwick, TALG, 2014] takes $\Tilde{O}$$(n^5 \log \ell)$ rounds, where $\ell$ is the smallest label among robots and $\Tilde{O}$ hides a polylog factor. We design a deterministic algorithm for gathering with detection with the following trade-offs depending on how many robots are present: (i) when $k \geq \lfloor n/2 \rfloor + 1$, the algorithm takes $O(n^3)$ rounds, (ii) when $k \geq \lfloor n/3 \rfloor + 1$, the algorithm takes $O(n^4 \log n)$ rounds, and (iii) otherwise, the algorithm takes $\Tilde{O}$$(n^5)$ rounds. The algorithm is not required to know $k$, but only $n$.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Improved Deterministic Leader Election in Diameter-Two Networks
Authors:
Manish Kumar,
Anisur Rahaman Molla,
Sumathi Sivasubramaniam
Abstract:
In this paper, we investigate the leader election problem in diameter-two networks. Recently, Chatterjee et al. [DC 2020] studied the leader election in diameter-two networks. They presented a $O(\log n)$-round deterministic {implicit} leader election algorithm which incurs optimal $O(n\log n)$ messages, but a drawback of their algorithm is that it requires knowledge of $n$. An important question…
▽ More
In this paper, we investigate the leader election problem in diameter-two networks. Recently, Chatterjee et al. [DC 2020] studied the leader election in diameter-two networks. They presented a $O(\log n)$-round deterministic {implicit} leader election algorithm which incurs optimal $O(n\log n)$ messages, but a drawback of their algorithm is that it requires knowledge of $n$. An important question -- whether it is possible to remove the assumption on the knowledge of $n$ was left open in their paper. Another interesting open question raised in their paper is whether {\em explicit} leader election can be solved in $\tilde{O}(n)$ messages deterministically. In this paper, we give an affirmative answer to them. Further, we solve the {\em broadcast problem}, another fundamental problem in distributed computing, deterministically in diameter-two networks with $\tilde{O}(n)$ messages and $\tilde{O}(1)$ rounds without the knowledge of $n$. In fact, we address all the open questions raised by Chatterjee et al. for the deterministic leader election problem in diameter-two networks. To the best of our knowledge, this is the first $\tilde{O}(n)$ deterministic result for the explicit leader election in the diameter-two networks, that too without the knowledge of $n$.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Fault-Tolerant Dispersion of Mobile Robots
Authors:
Prabhat Kumar Chand,
Manish Kumar,
Anisur Rahaman Molla,
Sumathi Sivasubramaniam
Abstract:
We consider the mobile robot dispersion problem in the presence of faulty robots (crash-fault). Mobile robot dispersion consists of $k\leq n$ robots in an $n$-node anonymous graph. The goal is to ensure that regardless of the initial placement of the robots over the nodes, the final configuration consists of having at most one robot at each node. In a crash-fault setting, up to $f \leq k$ robots m…
▽ More
We consider the mobile robot dispersion problem in the presence of faulty robots (crash-fault). Mobile robot dispersion consists of $k\leq n$ robots in an $n$-node anonymous graph. The goal is to ensure that regardless of the initial placement of the robots over the nodes, the final configuration consists of having at most one robot at each node. In a crash-fault setting, up to $f \leq k$ robots may fail by crashing arbitrarily and subsequently lose all the information stored at the robots, rendering them unable to communicate. In this paper, we solve the dispersion problem in a crash-fault setting by considering two different initial configurations: i) the rooted configuration, and ii) the arbitrary configuration. In the rooted case, all robots are placed together at a single node at the start. The arbitrary configuration is a general configuration (a.k.a. arbitrary configuration in the literature) where the robots are placed in some $l<k$ clusters arbitrarily across the graph. For the first case, we develop an algorithm solving dispersion in the presence of faulty robots in $O(k^2)$ rounds, which improves over the previous $O(f\cdot\text{min}(m,kΔ))$-round result by \cite{PS021}. For the arbitrary configuration, we present an algorithm solving dispersion in $O((f+l)\cdot\text{min}(m, k Δ, k^2))$ rounds, when the number of edges $m$ and the maximum degree $Δ$ of the graph is known to the robots.
△ Less
Submitted 22 November, 2022;
originally announced November 2022.
-
Fault-Tolerant Graph Realizations in the Congested Clique
Authors:
Anisur Rahaman Molla,
Manish Kumar,
Sumathi Sivasubramaniam
Abstract:
In this paper, we study the graph realization problem in the Congested Clique model of distributed computing under crash faults. We consider {\em degree-sequence realization}, in which each node $v$ is associated with a degree value $d(v)$, and the resulting degree sequence is realizable if it is possible to construct an overlay network with the given degrees.
Our main result is a $O(f)$-round d…
▽ More
In this paper, we study the graph realization problem in the Congested Clique model of distributed computing under crash faults. We consider {\em degree-sequence realization}, in which each node $v$ is associated with a degree value $d(v)$, and the resulting degree sequence is realizable if it is possible to construct an overlay network with the given degrees.
Our main result is a $O(f)$-round deterministic algorithm for the degree-sequence realization problem in a $n$-node Congested Clique, of which $f$ nodes could be faulty ($f<n$). The algorithm uses $O(n^2)$ messages. We complement the result with lower bounds to show that the algorithm is tight w.r.t the number of rounds and the messages simultaneously.
We also extend our result to the Node Capacitated Clique (NCC) model, where each node is restricted to sending and receiving at-most $O(\log n)$ messages per round. In the NCC model, our algorithm solves degree-sequence realization in $O(nf/\log n)$ rounds and $O(n^2)$ messages.
For both settings, our algorithms work without the knowledge of $f$, the number of faults. To the best of our knowledge, these are the first results for the graph realization problem in the crash-fault distributed network.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Byzantine Dispersion on Graphs
Authors:
Anisur Rahaman Molla,
Kaushik Mondal,
William K. Moses Jr
Abstract:
This paper considers the problem of Byzantine dispersion and extends previous work along several parameters. The problem of Byzantine dispersion asks: given $n$ robots, up to $f$ of which are Byzantine, initially placed arbitrarily on an $n$ node anonymous graph, design a terminating algorithm to be run by the robots such that they eventually reach a configuration where each node has at most one n…
▽ More
This paper considers the problem of Byzantine dispersion and extends previous work along several parameters. The problem of Byzantine dispersion asks: given $n$ robots, up to $f$ of which are Byzantine, initially placed arbitrarily on an $n$ node anonymous graph, design a terminating algorithm to be run by the robots such that they eventually reach a configuration where each node has at most one non-Byzantine robot on it.
Previous work solved this problem for rings and tolerated up to $n-1$ Byzantine robots. In this paper, we investigate the problem on more general graphs. We first develop an algorithm that tolerates up to $n-1$ Byzantine robots and works for a more general class of graphs.
We then develop an algorithm that works for any graph but tolerates a lesser number of Byzantine robots.
We subsequently turn our focus to the strength of the Byzantine robots. Previous work considers only ``weak" Byzantine robots that cannot fake their IDs. We develop an algorithm that solves the problem when Byzantine robots are not weak and can fake IDs.
Finally, we study the situation where the number of the robots is not $n$ but some $k$. We show that in such a scenario, the number of Byzantine robots that can be tolerated is severely restricted. Specifically, we show that it is impossible to deterministically solve Byzantine dispersion when $\lceil k/n \rceil > \lceil (k-f)/n \rceil$.
△ Less
Submitted 26 September, 2021; v1 submitted 15 February, 2021;
originally announced February 2021.
-
Economy Versus Disease Spread: Reopening Mechanisms for COVID 19
Authors:
John Augustine,
Khalid Hourani,
Anisur Rahaman Molla,
Gopal Pandurangan,
Adi Pasic
Abstract:
We study mechanisms for reopening economic activities that explore the trade off between containing the spread of COVID-19 and maximizing economic impact. This is of current importance as many organizations, cities, and states are formulating reopening strategies. Our mechanisms, referred to as group scheduling, are based on partitioning the population into groups and scheduling each group on appr…
▽ More
We study mechanisms for reopening economic activities that explore the trade off between containing the spread of COVID-19 and maximizing economic impact. This is of current importance as many organizations, cities, and states are formulating reopening strategies. Our mechanisms, referred to as group scheduling, are based on partitioning the population into groups and scheduling each group on appropriate days with possible gaps (when all are quarantined). Each group interacts with no other group and, importantly, any person who is symptomatic in a group is quarantined. Specifically, our mechanisms are characterized by three parameters $(g,d,t)$, where $g$ is the number of groups, $d$ is the number of days a group is continuously scheduled, and $t$ is the gap between cycles. We show that our mechanisms effectively trade off economic activity for more effective control of the COVID-19 virus. In particular, we show that the $(2,5,0)$ mechanism, which partitions the population into two groups that alternatively work for five days each, flat lines the number of COVID-19 cases quite effectively, while still maintaining economic activity at 70% of pre-COVID-19 level. We also study mechanisms such as $(2,3,2)$ and $(3,3,0)$ that achieve a somewhat lower economic output (about 50%) at the cost of more aggressive control of the virus; these could be applicable in situations when the disease spread is more rampant in the population. We demonstrate the efficacy of our mechanisms by theoretical analysis and extensive experimental simulations on various epidemiological models. Our mechanisms prove beneficial just by regulating human interactions. Moreover, our results show that if the disease transmission (reproductive) rate is made lower by following social distancing, mask wearing, and other public health guidelines, it can further increase the efficacy of our mechanisms.
△ Less
Submitted 22 April, 2021; v1 submitted 14 September, 2020;
originally announced September 2020.
-
Efficient Distributed Algorithms for the $K$-Nearest Neighbors Problem
Authors:
Reza Fathi,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
The $K$-nearest neighbors is a basic problem in machine learning with numerous applications. In this problem, given a (training) set of $n$ data points with labels and a query point $p$, we want to assign a label to $p$ based on the labels of the $K$-nearest points to the query. We study this problem in the {\em $k$-machine model}, (Note that parameter $k$ stands for the number of machines in the…
▽ More
The $K$-nearest neighbors is a basic problem in machine learning with numerous applications. In this problem, given a (training) set of $n$ data points with labels and a query point $p$, we want to assign a label to $p$ based on the labels of the $K$-nearest points to the query. We study this problem in the {\em $k$-machine model}, (Note that parameter $k$ stands for the number of machines in the $k$-machine model and is independent of $K$-nearest points.) a model for distributed large-scale data. In this model, we assume that the $n$ points are distributed (in a balanced fashion) among the $k$ machines and the goal is to quickly compute answer given a query point to a machine.
Our main result is a simple randomized algorithm in the $k$-machine model that runs in $O(\log K)$ communication rounds with high probability success (regardless of the number of machines $k$ and the number of points $n$). The message complexity of the algorithm is small taking only $O(k\log K)$ messages. Our bounds are essentially the best possible for comparison-based algorithms (Algorithms that use only comparison operations ($\leq, \geq, =$) between elements to distinguish the ordering among them). This is due to the existence of a lower bound of $Ω(\log n)$ communication rounds for finding the {\em median} of $2n$ elements distributed evenly among two processors by Rodeh \cite{rodeh}.
We also implemented our algorithm and show that it performs well compared to an algorithm (used in practice) that sends $K$ nearest points from each machine to a single machine which then computes the answer.
△ Less
Submitted 21 August, 2020; v1 submitted 15 May, 2020;
originally announced May 2020.
-
Efficient Dispersion on an Anonymous Ring in the Presence of Weak Byzantine Robots
Authors:
Anisur Rahaman Molla,
Kaushik Mondal,
William K. Moses Jr
Abstract:
The problem of dispersion of mobile robots on a graph asks that $n$ robots initially placed arbitrarily on the nodes of an $n$-node anonymous graph, autonomously move to reach a final configuration where exactly each node has at most one robot on it. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, lo…
▽ More
The problem of dispersion of mobile robots on a graph asks that $n$ robots initially placed arbitrarily on the nodes of an $n$-node anonymous graph, autonomously move to reach a final configuration where exactly each node has at most one robot on it. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing, relocation of self-driving electric cars to recharge stations, etc. The robots have unique IDs, typically in the range $[1,poly(n)]$ and limited memory, whereas the graph is anonymous, i.e., the nodes do not have identifiers. The objective is to simultaneously minimize two performance metrics: (i) time to achieve dispersion and (ii) memory requirement at each robot. This problem has been relatively well-studied when robots are non-faulty.
In this paper, we introduce the notion of Byzantine faults to this problem, i.e., we formalize the problem of dispersion in the presence of up to $f$ Byzantine robots. We then study the problem on a ring while simultaneously optimizing the time complexity of algorithms and the memory requirement per robot. Specifically, we design deterministic algorithms that attempt to match the time lower bound ($Ω(n)$ rounds) and memory lower bound ($Ω(\log n)$ bits per robot).
Our main result is a deterministic algorithm that is both time and memory optimal, i.e., $O(n)$ rounds and $O(\log n)$ bits of memory required per robot, subject to certain constraints. We subsequently provide results that require less assumptions but are either only time or memory optimal but not both. We also provide a primitive, utilized often, that takes robots initially gathered at a node of the ring and disperses them in a time and memory optimal manner without additional assumptions required.
△ Less
Submitted 3 September, 2020; v1 submitted 23 April, 2020;
originally announced April 2020.
-
Live Exploration with Mobile Robots in a Dynamic Ring, Revisited
Authors:
Subhrangsu Mandal,
Anisur Rahaman Molla,
William K. Moses Jr
Abstract:
The graph exploration problem requires a group of mobile robots, initially placed arbitrarily on the nodes of a graph, to work collaboratively to explore the graph such that each node is eventually visited by at least one robot. One important requirement of exploration is the {\em termination} condition, i.e., the robots must know that exploration is completed. The problem of live exploration of a…
▽ More
The graph exploration problem requires a group of mobile robots, initially placed arbitrarily on the nodes of a graph, to work collaboratively to explore the graph such that each node is eventually visited by at least one robot. One important requirement of exploration is the {\em termination} condition, i.e., the robots must know that exploration is completed. The problem of live exploration of a dynamic ring using mobile robots was recently introduced in [Di Luna et al., ICDCS 2016]. In it, they proposed multiple algorithms to solve exploration in fully synchronous and semi-synchronous settings with various guarantees when $2$ robots were involved. They also provided guarantees that with certain assumptions, exploration of the ring using two robots was impossible. An important question left open was how the presence of $3$ robots would affect the results. In this paper, we try to settle this question in a fully synchronous setting and also show how to extend our results to a semi-synchronous setting.
In particular, we present algorithms for exploration with explicit termination using $3$ robots in conjunction with either (i) unique IDs of the robots and edge crossing detection capability (i.e., two robots moving in opposite directions through an edge in the same round can detect each other), or (ii) access to randomness. The time complexity of our deterministic algorithm is asymptotically optimal. We also provide complementary impossibility results showing that there does not exist any explicit termination algorithm for $2$ robots. The theoretical analysis and comprehensive simulations of our algorithm show the effectiveness and efficiency of the algorithm in dynamic rings. We also present an algorithm to achieve exploration with partial termination using $3$ robots in the semi-synchronous setting.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Dispersion of Mobile Robots in the Global Communication Model
Authors:
Ajay D. Kshemkalyani,
Anisur Rahaman Molla,
Gokarna Sharma
Abstract:
The dispersion problem on graphs asks $k\leq n$ robots placed initially arbitrarily on the nodes of an $n$-node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing et…
▽ More
The dispersion problem on graphs asks $k\leq n$ robots placed initially arbitrarily on the nodes of an $n$-node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing etc. In this paper, we consider dispersion in the {\em global communication} model where a robot can communicate with any other robot in the graph (but the graph is unknown to robots). We provide three novel deterministic algorithms, two for arbitrary graphs and one for arbitrary trees, in a synchronous setting where all robots perform their actions in every time step. For arbitrary graphs, our first algorithm is based on a DFS traversal and guarantees $O(\min(m,kΔ))$ steps runtime using $Θ(\log (\max(k,Δ)))$ bits at each robot, where $m$ is the number of edges and $Δ$ is the maximum degree of the graph. The second algorithm for arbitrary graphs is based on a BFS traversal and guarantees $O( \max(D,k) Δ(D+Δ))$ steps runtime using $O(\max(D,Δ\log k))$ bits at each robot, where $D$ is the diameter of the graph. The algorithm for arbitrary trees is also based on a BFS travesal and guarantees $O(D\max(D,k))$ steps runtime using $O(\max(D,Δ\log k))$ bits at each robot. Our results are significant improvements compared to the existing results established in the {\em local communication} model where a robot can communication only with other robots present at the same node. Particularly, the DFS-based algorithm is optimal for both memory and time in constant-degree arbitrary graphs. The BFS-based algorithm for arbitrary trees is optimal with respect to runtime when $k\leq O(D)$.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
Scalable and Secure Computation Among Strangers: Resource-Competitive Byzantine Protocols
Authors:
John Augustine,
Valerie King,
Anisur R. Molla,
Gopal Pandurangan,
Jared Saia
Abstract:
Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary…
▽ More
Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary nodes (whose identities are not known apriori) can join and leave at will, we extend established research in scalable Byzantine agreement to a more practical model where each node (initially) does not know the identity of other nodes. A node can send to new destinations only by sending to random (or arbitrary) nodes, or responding (if it chooses) to messages received from those destinations. We assume a synchronous and fully-connected network, with a full-information, but static Byzantine adversary. A general drawback of existing Byzantine protocols is that the communication cost incurred by the honest nodes may not be proportional to those incurred by the Byzantine nodes; in fact, they can be significantly higher. Our goal is to design Byzantine protocols for fundamental problems which are {\em resource competitive}, i.e., the number of bits sent by honest nodes is not much more than those sent by Byzantine nodes.
We describe a randomized scalable algorithm to solve Byzantine agreement, leader election, and committee election in this model. Our algorithm sends an expected $O((T+n)\log n)$ bits and has latency $O(polylog(n))$, where $n$ is the number of nodes, and $T$ is the minimum of $n^2$ and the number of bits sent by adversarially controlled nodes. The algorithm is resilient to $(1/4-ε)n$ Byzantine nodes for any fixed $ε> 0$, and succeeds with high probability. Our work can be considered as a first application of resource-competitive analysis to fundamental Byzantine problems.
To complement our algorithm we also show lower bounds for resource-competitive Byzantine agreement. We prove that, in general, one cannot hope to design Byzantine protocols that have communication cost that is significantly smaller than the cost of the Byzantine adversary.
△ Less
Submitted 25 July, 2019; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Efficient Distributed Community Detection in the Stochastic Block Model
Authors:
Reza Fathi,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
Designing effective algorithms for community detection is an important and challenging problem in {\em large-scale} graphs, studied extensively in the literature. Various solutions have been proposed, but many of them are centralized with expensive procedures (requiring full knowledge of the input graph) and have a large running time.
In this paper, we present a distributed algorithm for communi…
▽ More
Designing effective algorithms for community detection is an important and challenging problem in {\em large-scale} graphs, studied extensively in the literature. Various solutions have been proposed, but many of them are centralized with expensive procedures (requiring full knowledge of the input graph) and have a large running time.
In this paper, we present a distributed algorithm for community detection in the {\em stochastic block model} (also called {\em planted partition model}), a widely-studied and canonical random graph model for community detection and clustering. Our algorithm called {\em CDRW(Community Detection by Random Walks)} is based on random walks, and is localized and lightweight, and easy to implement. A novel feature of the algorithm is that it uses the concept of {\em local mixing time} to identify the community around a given node.
We present a rigorous theoretical analysis that shows that the algorithm can accurately identify the communities in the stochastic block model and characterize the model parameters where the algorithm works. We also present experimental results that validate our theoretical analysis. We also analyze the performance of our distributed algorithm under the CONGEST distributed model as well as the $k$-machine model, a model for large-scale distributed computations, and show that it can be efficiently implemented.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Dispersion of Mobile Robots: The Power of Randomness
Authors:
Anisur Rahaman Molla,
William K. Moses Jr
Abstract:
We consider cooperation among insects, modeled as cooperation between mobile robots on a graph. Within this setting, we consider the problem of mobile robot dispersion on graphs. The study of mobile robots on a graph is an interesting paradigm with many interesting problems and applications. The problem of dispersion in this context, introduced by Augustine and Moses Jr., asks that $n$ robots, ini…
▽ More
We consider cooperation among insects, modeled as cooperation between mobile robots on a graph. Within this setting, we consider the problem of mobile robot dispersion on graphs. The study of mobile robots on a graph is an interesting paradigm with many interesting problems and applications. The problem of dispersion in this context, introduced by Augustine and Moses Jr., asks that $n$ robots, initially placed arbitrarily on an $n$ node graph, work together to quickly reach a configuration with exactly one robot at each node. Previous work on this problem has looked at the trade-off between the time to achieve dispersion and the amount of memory required by each robot. However, the trade-off was analyzed for \textit{deterministic algorithms} and the minimum memory required to achieve dispersion was found to be $Ω(\log n)$ bits at each robot. In this paper, we show that by harnessing the power of \textit{randomness}, one can achieve dispersion with $O(\log Δ)$ bits of memory at each robot, where $Δ$ is the maximum degree of the graph. Furthermore, we show a matching lower bound of $Ω(\log Δ)$ bits for any \textit{randomized algorithm} to solve dispersion.
We further extend the problem to a general $k$-dispersion problem where $k> n$ robots need to disperse over $n$ nodes such that at most $\lceil k/n \rceil$ robots are at each node in the final configuration.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
Efficient Dispersion of Mobile Robots on Arbitrary Graphs and Grids
Authors:
Ajay D. Kshemkalyani,
Anisur Rahaman Molla,
Gokarna Sharma
Abstract:
The mobile robot dispersion problem on graphs asks $k\leq n$ robots placed initially arbitrarily on the nodes of an $n$-node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load…
▽ More
The mobile robot dispersion problem on graphs asks $k\leq n$ robots placed initially arbitrarily on the nodes of an $n$-node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing, and relocation of self-driven electric cars (robots) to recharge stations (nodes). In this paper, we provide two novel deterministic algorithms for dispersion, one for arbitrary graphs and another for grid graphs, in a synchronous setting where all robots perform their actions in every time step. Our algorithm for arbitrary graphs has $O(\min(m,kΔ) \cdot \log k)$ steps runtime using $O(\log n)$ bits of memory at each robot, where $m$ is the number of edges and $Δ$ is the maximum degree of the graph. This is an exponential improvement over the $O(mk)$ steps best previously known algorithm. In particular, the runtime of our algorithm is optimal (up to a $O(\log k)$ factor) in constant-degree arbitrary graphs. Our algorithm for grid graphs has $O(\min(k,\sqrt{n}))$ steps runtime using $Θ(\log k)$ bits at each robot. This is the first algorithm for dispersion in grid graphs. Moreover, this algorithm is optimal for both memory and time when $k=Ω(n)$.
△ Less
Submitted 27 April, 2019; v1 submitted 13 December, 2018;
originally announced December 2018.
-
The Communication Cost of Information Spreading in Dynamic Networks
Authors:
Mohamad Ahmadi,
Fabian Kuhn,
Shay Kutten,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
This paper investigates the message complexity of distributed information spreading (a.k.a gossip or token dissemination) in adversarial dynamic networks, where the goal is to spread $k$ tokens of information to every node on an $n$-node network. We consider the amortized (average) message complexity of spreading a token, assuming that the number of tokens is large. Our focus is on token-forwardin…
▽ More
This paper investigates the message complexity of distributed information spreading (a.k.a gossip or token dissemination) in adversarial dynamic networks, where the goal is to spread $k$ tokens of information to every node on an $n$-node network. We consider the amortized (average) message complexity of spreading a token, assuming that the number of tokens is large. Our focus is on token-forwarding algorithms, which do not manipulate tokens in any way other than storing, copying, and forwarding them.
We consider two types of adversaries that arbitrarily rewire the network while kee** it connected: the adaptive adversary that is aware of the status of all the nodes and the algorithm (including the current random choices), and the oblivious adversary that is oblivious to the random choices made by the algorithm. The central question that motivates our work is whether one can achieve subquadratic amortized message complexity for information spreading.
We present two sets of results depending on how nodes send messages to their neighbors: (1) Local broadcast: We show a tight lower bound of $Ω(n^2)$ on the number of amortized local broadcasts, which is matched by the naive flooding algorithm, (2) Unicast: We study the message complexity as a function of the number of dynamic changes in the network. To facilitate this, we introduce a natural complexity measure for analyzing dynamic networks called adversary-competitive message complexity where the adversary pays a unit cost for every topological change. Under this model, it is shown that if $k$ is sufficiently large, we can obtain an optimal amortized message complexity of $O(n)$. We also present a randomized algorithm that achieves subquadratic amortized message complexity when the number of tokens is not large under an oblivious adversary.
△ Less
Submitted 26 June, 2018;
originally announced June 2018.
-
Local Mixing Time: Distributed Computation and Applications
Authors:
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
The mixing time of a graph is an important metric, which is not only useful in analyzing connectivity and expansion properties of the network, but also serves as a key parameter in designing efficient algorithms. We introduce a new notion of mixing of a random walk on a (undirected) graph, called local mixing. Informally, the local mixing with respect to a given node $s$, is the mixing of a random…
▽ More
The mixing time of a graph is an important metric, which is not only useful in analyzing connectivity and expansion properties of the network, but also serves as a key parameter in designing efficient algorithms. We introduce a new notion of mixing of a random walk on a (undirected) graph, called local mixing. Informally, the local mixing with respect to a given node $s$, is the mixing of a random walk probability distribution restricted to a large enough subset of nodes --- say, a subset of size at least $n/β$ for a given parameter $β$ --- containing $s$. The time to mix over such a subset by a random walk starting from a source node $s$ is called the local mixing time with respect to $s$. The local mixing time captures the local connectivity and expansion properties around a given source node and is a useful parameter that determines the running time of algorithms for partial information spreading, gossip etc.
Our first contribution is formally defining the notion of local mixing time in an undirected graph. We then present an efficient distributed algorithm which computes a constant factor approximation to the local mixing time with respect to a source node $s$ in $\tilde{O}(τ_s)$ rounds, where $τ_s$ is the local mixing time w.r.t $s$ in an $n$-node regular graph. This bound holds when $τ_s$ is significantly smaller than the conductance of the local mixing set (i.e., the set where the walk mixes locally); this is typically the interesting case where the local mixing time is significantly smaller than the mixing time (with respect to $s$). We also present a distributed algorithm that computes the exact local mixing time in $\tilde{O}(τ_s \mathcal{D})$ rounds, where $\mathcal{D} =\min\{τ_s, D\}$ and $D$ is the diameter of the graph. We further show that local mixing time tightly characterizes the complexity of partial information spreading.
△ Less
Submitted 5 January, 2018;
originally announced January 2018.
-
Distributed Computation of Mixing Time
Authors:
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
The mixing time of a graph is an important metric, which is not only useful in analyzing connectivity and expansion properties of the network, but also serves as a key parameter in designing efficient algorithms. We present an efficient distributed algorithm for computing the mixing time of undirected graphs. Our algorithm estimates the mixing time $τ_s$ (with respect to a source node $s$) of any…
▽ More
The mixing time of a graph is an important metric, which is not only useful in analyzing connectivity and expansion properties of the network, but also serves as a key parameter in designing efficient algorithms. We present an efficient distributed algorithm for computing the mixing time of undirected graphs. Our algorithm estimates the mixing time $τ_s$ (with respect to a source node $s$) of any $n$-node undirected graph in $O(τ_s \log n)$ rounds. Our algorithm is based on random walks and require very little memory and use lightweight local computations, and work in the CONGEST model. Hence our algorithm is scalable under bandwidth constraints and can be an helpful building block in the design of topologically aware networks.
△ Less
Submitted 18 October, 2016;
originally announced October 2016.
-
The Cost of Global Broadcast in Dynamic Radio Networks
Authors:
Mohamad Ahmadi,
Abdolhamid Ghodselahi,
Fabian Kuhn,
Anisur Rahaman Molla
Abstract:
We study the single-message broadcast problem in dynamic radio networks. We show that the time complexity of the problem depends on the amount of stability and connectivity of the dynamic network topology and on the adaptiveness of the adversary providing the dynamic topology. More formally, we model communication using the standard graph-based radio network model. To model the dynamic network, we…
▽ More
We study the single-message broadcast problem in dynamic radio networks. We show that the time complexity of the problem depends on the amount of stability and connectivity of the dynamic network topology and on the adaptiveness of the adversary providing the dynamic topology. More formally, we model communication using the standard graph-based radio network model. To model the dynamic network, we use a generalization of the synchronous dynamic graph model introduced in [Kuhn et al., STOC 2010]. For integer parameters $T\geq 1$ and $k\geq 1$, we call a dynamic graph $T$-interval $k$-connected if for every interval of $T$ consecutive rounds, there exists a $k$-vertex-connected stable subgraph. Further, for an integer parameter $τ\geq 0$, we say that the adversary providing the dynamic network is $τ$-oblivious if for constructing the graph of some round $t$, the adversary has access to all the randomness (and states) of the algorithm up to round $t-τ$.
As our main result, we show that for any $T\geq 1$, any $k\geq 1$, and any $τ\geq 1$, for a $τ$-oblivious adversary, there is a distributed algorithm to broadcast a single message in time $O\big(\big(1+\frac{n}{k\cdot\min\left\{τ,T\right\}}\big)\cdot n\log^3 n\big)$. We further show that even for large interval $k$-connectivity, efficient broadcast is not possible for the usual adaptive adversaries. For a $1$-oblivious adversary, we show that even for any $T\leq (n/k)^{1-\varepsilon}$ (for any constant $\varepsilon>0$) and for any $k\geq 1$, global broadcast in $T$-interval $k$-connected networks requires at least $Ω(n^2/(k^2\log n))$ time. Further, for a $0$ oblivious adversary, broadcast cannot be solved in $T$-interval $k$-connected networks as long as $T<n-k$.
△ Less
Submitted 8 January, 2016;
originally announced January 2016.
-
Distributed Computation of Sparse Cuts
Authors:
Atish Das Sarma,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
Finding sparse cuts is an important tool in analyzing large-scale distributed networks such as the Internet and Peer-to-Peer networks, as well as large-scale graphs such as the web graph, online social communities, and VLSI circuits. In distributed communication networks, they are useful for topology maintenance and for designing better search and routing algorithms.
In this paper, we focus on d…
▽ More
Finding sparse cuts is an important tool in analyzing large-scale distributed networks such as the Internet and Peer-to-Peer networks, as well as large-scale graphs such as the web graph, online social communities, and VLSI circuits. In distributed communication networks, they are useful for topology maintenance and for designing better search and routing algorithms.
In this paper, we focus on develo** fast distributed algorithms for computing sparse cuts in networks. Given an undirected $n$-node network $G$ with conductance $φ$, the goal is to find a cut set whose conductance is close to $φ$. We present two distributed algorithms that find a cut set with sparsity $\tilde O(\sqrtφ)$ ($\tilde{O}$ hides $\polylog{n}$ factors). Both our algorithms work in the CONGEST distributed computing model and output a cut of conductance at most $\tilde O(\sqrtφ)$ with high probability, in $\tilde O(\frac{1}{b}(\frac{1}φ + n))$ rounds, where $b$ is balance of the cut of given conductance. In particular, to find a sparse cut of constant balance, our algorithms take $\tilde O(\frac{1}φ + n)$ rounds.
Our algorithms can also be used to output a {\em local} cluster, i.e., a subset of vertices near a given source node, and whose conductance is within a quadratic factor of the best possible cluster around the specified node. Both our distributed algorithm can work without knowledge of the optimal $φ$ value and hence can be used to find approximate conductance values both globally and with respect to a given source node. We also give a lower bound on the time needed for any distributed algorithm to compute any non-trivial sparse cut --- any distributed approximation algorithm (for any non-trivial approximation ratio) for computing sparsest cut will take $\tilde Ω(\sqrt{n} + D)$ rounds, where $D$ is the diameter of the graph.
△ Less
Submitted 20 October, 2013;
originally announced October 2013.
-
Storage and Search in Dynamic Peer-to-Peer Networks
Authors:
John Augustine,
Anisur Rahaman Molla,
Ehab Morsy,
Gopal Pandurangan,
Peter Robinson,
Eli Upfal
Abstract:
We study robust and efficient distributed algorithms for searching, storing, and maintaining data in dynamic Peer-to-Peer (P2P) networks. P2P networks are highly dynamic networks that experience heavy node churn (i.e., nodes join and leave the network continuously over time). Our goal is to guarantee, despite high node churn rate, that a large number of nodes in the network can store, retrieve, an…
▽ More
We study robust and efficient distributed algorithms for searching, storing, and maintaining data in dynamic Peer-to-Peer (P2P) networks. P2P networks are highly dynamic networks that experience heavy node churn (i.e., nodes join and leave the network continuously over time). Our goal is to guarantee, despite high node churn rate, that a large number of nodes in the network can store, retrieve, and maintain a large number of data items. Our main contributions are fast randomized distributed algorithms that guarantee the above with high probability (whp) even under high adversarial churn:
1. A randomized distributed search algorithm that (whp) guarantees that searches from as many as $n - o(n)$ nodes ($n$ is the stable network size) succeed in ${O}(\log n)$-rounds despite ${O}(n/\log^{1+δ} n)$ churn, for any small constant $δ> 0$, per round. We assume that the churn is controlled by an oblivious adversary (that has complete knowledge and control of what nodes join and leave and at what time, but is oblivious to the random choices made by the algorithm).
2. A storage and maintenance algorithm that guarantees (whp) data items can be efficiently stored (with only $Θ(\log{n})$ copies of each data item) and maintained in a dynamic P2P network with churn rate up to ${O}(n/\log^{1+δ} n)$ per round. Our search algorithm together with our storage and maintenance algorithm guarantees that as many as $n - o(n)$ nodes can efficiently store, maintain, and search even under ${O}(n/\log^{1+δ} n)$ churn per round. Our algorithms require only polylogarithmic in $n$ bits to be processed and sent (per round) by each node.
To the best of our knowledge, our algorithms are the first-known, fully-distributed storage and search algorithms that provably work under highly dynamic settings (i.e., high churn rates per step).
△ Less
Submitted 6 May, 2013;
originally announced May 2013.
-
Fast Distributed PageRank Computation
Authors:
Atish Das Sarma,
Anisur Rahaman Molla,
Gopal Pandurangan,
Eli Upfal
Abstract:
Over the last decade, PageRank has gained importance in a wide range of applications and domains, ever since it first proved to be effective in determining node importance in large graphs (and was a pioneering idea behind Google's search engine). In distributed computing alone, PageRank vector, or more generally random walk based quantities have been used for several different applications ranging…
▽ More
Over the last decade, PageRank has gained importance in a wide range of applications and domains, ever since it first proved to be effective in determining node importance in large graphs (and was a pioneering idea behind Google's search engine). In distributed computing alone, PageRank vector, or more generally random walk based quantities have been used for several different applications ranging from determining important nodes, load balancing, search, and identifying connectivity structures. Surprisingly, however, there has been little work towards designing provably efficient fully-distributed algorithms for computing PageRank. The difficulty is that traditional matrix-vector multiplication style iterative methods may not always adapt well to the distributed setting owing to communication bandwidth restrictions and convergence rates.
In this paper, we present fast random walk-based distributed algorithms for computing PageRanks in general graphs and prove strong bounds on the round complexity. We first present a distributed algorithm that takes $O\big(\log n/\eps \big)$ rounds with high probability on any graph (directed or undirected), where $n$ is the network size and $\eps$ is the reset probability used in the PageRank computation (typically $\eps$ is a fixed constant). We then present a faster algorithm that takes $O\big(\sqrt{\log n}/\eps \big)$ rounds in undirected graphs. Both of the above algorithms are scalable, as each node sends only small ($\polylog n$) number of bits over each edge per round. To the best of our knowledge, these are the first fully distributed algorithms for computing PageRank vector with provably efficient running time.
△ Less
Submitted 25 November, 2015; v1 submitted 15 August, 2012;
originally announced August 2012.
-
Fast Distributed Computation in Dynamic Networks via Random Walks
Authors:
Atish Das Sarma,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
The paper investigates efficient distributed computation in dynamic networks in which the network topology changes (arbitrarily) from round to round.
Our first contribution is a rigorous framework for design and analysis of distributed random walk algorithms in dynamic networks. We then develop a fast distributed random walk based algorithm that runs in $\tilde{O}(\sqrt{τΦ})$ rounds (with high p…
▽ More
The paper investigates efficient distributed computation in dynamic networks in which the network topology changes (arbitrarily) from round to round.
Our first contribution is a rigorous framework for design and analysis of distributed random walk algorithms in dynamic networks. We then develop a fast distributed random walk based algorithm that runs in $\tilde{O}(\sqrt{τΦ})$ rounds (with high probability), where $τ$ is the dynamic mixing time and $Φ$ is the dynamic diameter of the network respectively, and returns a sample close to a suitably defined stationary distribution of the dynamic network. We also apply our fast random walk algorithm to devise fast distributed algorithms for two key problems, namely, information dissemination and decentralized computation of spectral properties in a dynamic network.
Our next contribution is a fast distributed algorithm for the fundamental problem of information dissemination (also called as gossip) in a dynamic network. In gossip, or more generally, $k$-gossip, there are $k$ pieces of information (or tokens) that are initially present in some nodes and the problem is to disseminate the $k$ tokens to all nodes. We present a random-walk based algorithm that runs in $\tilde{O}(\min\{n^{1/3}k^{2/3}(τΦ)^{1/3}, nk\})$ rounds (with high probability). To the best of our knowledge, this is the first $o(nk)$-time fully-distributed token forwarding algorithm that improves over the previous-best $O(nk)$ round distributed algorithm [Kuhn et al., STOC 2010], although in an oblivious adversary model.
Our final contribution is a simple and fast distributed algorithm for estimating the dynamic mixing time and related spectral properties of the underlying dynamic network.
△ Less
Submitted 24 May, 2012;
originally announced May 2012.
-
Near-Optimal Random Walk Sampling in Distributed Networks
Authors:
Atish Das Sarma,
Anisur Rahaman Molla,
Gopal Pandurangan
Abstract:
Performing random walks in networks is a fundamental primitive that has found numerous applications in communication networks such as token management, load balancing, network topology discovery and construction, search, and peer-to-peer membership management. While several such algorithms are ubiquitous, and use numerous random walk samples, the walks themselves have always been performed naively…
▽ More
Performing random walks in networks is a fundamental primitive that has found numerous applications in communication networks such as token management, load balancing, network topology discovery and construction, search, and peer-to-peer membership management. While several such algorithms are ubiquitous, and use numerous random walk samples, the walks themselves have always been performed naively.
In this paper, we focus on the problem of performing random walk sampling efficiently in a distributed network. Given bandwidth constraints, the goal is to minimize the number of rounds and messages required to obtain several random walk samples in a continuous online fashion. We present the first round and message optimal distributed algorithms that present a significant improvement on all previous approaches. The theoretical analysis and comprehensive experimental evaluation of our algorithms show that they perform very well in different types of networks of differing topologies.
In particular, our results show how several random walks can be performed continuously (when source nodes are provided only at runtime, i.e., online), such that each walk of length $\ell$ can be performed exactly in just $\tilde{O}(\sqrt{\ell D})$ rounds, (where $D$ is the diameter of the network), and $O(\ell)$ messages. This significantly improves upon both, the naive technique that requires $O(\ell)$ rounds and $O(\ell)$ messages, and the sophisticated algorithm of [DasSarma et al. PODC 2010] that has the same round complexity as this paper but requires $Ω(m\sqrt{\ell})$ messages (where $m$ is the number of edges in the network). Our theoretical results are corroborated through extensive experiments on various topological data sets. Our algorithms are fully decentralized, lightweight, and easily implementable, and can serve as building blocks in the design of topologically-aware networks.
△ Less
Submitted 11 January, 2012; v1 submitted 6 January, 2012;
originally announced January 2012.