{"title":"Resource efficient stabilization for local tasks despite unknown capacity links","authors":"","doi":"10.1016/j.tcs.2024.114744","DOIUrl":null,"url":null,"abstract":"<div><p>Self-stabilizing protocols enable distributed systems to recover correct behavior starting from any arbitrary configuration. In particular, when processors communicate by message passing and the communication links are unbounded, fake messages may be placed in communication links by an adversary. When the number of such fake messages is unknown, self-stabilization may require huge resources:</p><ul><li><span>•</span><span><p>generic solutions (<em>a.k.a.</em> data link protocols) require unbounded resources, which makes them unrealistic to deploy,</p></span></li><li><span>•</span><span><p>specific solutions (<em>e.g.</em>, census or tree construction) require <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> or <span><math><mi>O</mi><mo>(</mo><mi>Δ</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> bits of memory per node, where <em>n</em> denotes the network size and Δ its maximum degree, which may prevent scalability.</p></span></li></ul><p>We investigate the possibility of resource-efficient self-stabilizing protocols in this context.</p><p>Specifically, we present self-stabilizing protocols for <span><math><mo>(</mo><mi>Δ</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-coloring and maximal independent set construction in any <em>n</em>-node graph, under the asynchronous message-passing model. The problems of <span><math><mo>(</mo><mi>Δ</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-coloring and maximal independent set construction are widely regarded as benchmark problems for evaluating local algorithms. Our protocols offer many desirable features. They are deterministic, converge in <span><math><mi>O</mi><mo>(</mo><mi>k</mi><mi>Δ</mi><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> message exchanges, where <em>k</em> is the (unknown) initial number of (possibly corrupted) messages in a communication link. They use messages of <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>log</mi><mo></mo><mi>n</mi><mo>+</mo><mi>log</mi><mo></mo><mi>Δ</mi><mo>)</mo></math></span> bits with a memory of <span><math><mi>O</mi><mo>(</mo><mi>Δ</mi><mi>log</mi><mo></mo><mi>Δ</mi><mo>+</mo><mi>log</mi><mo></mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> bits at each node. The resource consumption of our protocols is thus almost oblivious to the number of nodes, enabling scalability. Moreover, a striking property of our protocols is that the nodes do not need to know the number, or any bound on the number of messages initially present in each communication link of the initial (potentially corrupted) network configuration. This permits our protocols to handle any future network with unknown message capacity communication links.</p><p>A key building block of our coloring and maximal independent set schemes is an algorithm to obtain an acyclic orientation of graph edges, that is of independent interest, and can serve as a useful tool for solving other tasks in this challenging setting.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S030439752400361X","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Self-stabilizing protocols enable distributed systems to recover correct behavior starting from any arbitrary configuration. In particular, when processors communicate by message passing and the communication links are unbounded, fake messages may be placed in communication links by an adversary. When the number of such fake messages is unknown, self-stabilization may require huge resources:
•
generic solutions (a.k.a. data link protocols) require unbounded resources, which makes them unrealistic to deploy,
•
specific solutions (e.g., census or tree construction) require or bits of memory per node, where n denotes the network size and Δ its maximum degree, which may prevent scalability.
We investigate the possibility of resource-efficient self-stabilizing protocols in this context.
Specifically, we present self-stabilizing protocols for -coloring and maximal independent set construction in any n-node graph, under the asynchronous message-passing model. The problems of -coloring and maximal independent set construction are widely regarded as benchmark problems for evaluating local algorithms. Our protocols offer many desirable features. They are deterministic, converge in message exchanges, where k is the (unknown) initial number of (possibly corrupted) messages in a communication link. They use messages of bits with a memory of bits at each node. The resource consumption of our protocols is thus almost oblivious to the number of nodes, enabling scalability. Moreover, a striking property of our protocols is that the nodes do not need to know the number, or any bound on the number of messages initially present in each communication link of the initial (potentially corrupted) network configuration. This permits our protocols to handle any future network with unknown message capacity communication links.
A key building block of our coloring and maximal independent set schemes is an algorithm to obtain an acyclic orientation of graph edges, that is of independent interest, and can serve as a useful tool for solving other tasks in this challenging setting.
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.