Radio Network Distributed Algorithms in the Unknown Neighborhood Model

Size: px
Start display at page:

Download "Radio Network Distributed Algorithms in the Unknown Neighborhood Model"

Transcription

1 Radio Network Distributed Algorithms in the Unknown Neighborhood Model Bilel Derbel and El-Ghazali Talbi Laboratoire d Informatique Fondamentale de Lille LIFL Université des Sciences et Technologies de Lille France USTL Bilel.Derbel@lifl.fr, El-ghazali.talbi@lifl.fr Abstract. The paper deals with radio network distributed algorithms where initially no information about node degrees is available. We show that the lack of such an information affects the time complexity of existing fundamental algorithms by only a polylogarithmic factor. More precisely, given an n-node graph modeling a multi-hop radio network, we provide a Olog 2 n time distributed algorithm that computes w.h.p., a constant approximation value of the degree of each node. We also provide a O log n+log 2 n time distributed algorithm that computes w.h.p., a constant approximation value of the local maximum degree of each node, where the global maximum degree of the graph is not known. Using our algorithm as a plug-and-play procedure, we show that the local maximum degree can be used instead of to break the symmetry efficiently. We illustrate this claim by revisiting some fundamental algorithms that use as a key parameter. First, we investigate the generic problem of simulating any point-to-point interference-free message passing algorithm in the radio network model. Then, we study the fundamental coloring problem in unit disk graphs. The obtained results show that the local maximum degree allows nodes to self-organize in a local manner and to avoid the radio interferences from being a communication bottleneck. 1 Introduction Motivation and goals We consider a multi-hop network of radio devices modeled by a graph. We assume that the nodes of the graph are not yet organized in any specific manner, that is, we consider a newly deployed network where no specific communication structure is available. In such a network, it is crucial that initially the nodes self-organize in some accurate manner before any tasks could be conducted. For that purpose, nodes have to communicate with their neighbors and coordinate their computations. Compared to a classical pointto-point message passing network where any two neighboring nodes are related by a direct link allowing them to communicate safely, communications between neighbors in a radio network are subject to interferences, i.e., a message sent by a node may get lost due to interferences caused by other message sending. Coping A preliminary version of this paper appeared as an inria internal research report [6] The two authors are supported by the Equipe Projet INRIA DOLPHIN.

2 with these interferences is indeed one of the major obstacles to design efficient distributed algorithms for radio networks. In this paper, we focus on what knowledge about the network is required to avoid interferences while organizing the network nodes efficiently. More specifically, we study the impact of two parameters: the degree of each node and the maximum network degree, on designing time-efficient distributed algorithms for solving basic radio network tasks. These two parameters are in fact used as crucial ingredients to compute fundamental distributed structures in many past works, e.g., node/edge coloring [10, 11, 5], matching [2], single-hop emulation [3], broadcasting and gossiping [7, 1, 4], etc. Unfortunately, nodes in a newly deployed network could even not be aware of their own neighbors. Thus, efficient algorithms working under the assumption that no knowledge about node degrees is available are more likely to be applied in a real setting. The key challenge of this paper is to provide time-efficient algorithms working under an unknown neighborhood model, i.e., a model where no information about node degrees is available. Apart from being of a great importance in realistic settings, the unknown neighborhood model is also of a great theoretical interest. In fact, the time complexity of solving many basic tasks is tightly related to the degrees of nodes lower and upper bounds are often functions of those degrees. To illustrate this claim, let us assume a communication model where a node can hear a message from one neighbor in a given time slot if and only if no other neighbors are being sending in that time slot. It is obvious that if a given node v has to receive one message from each of its neighbors, then the degree of v is a time lower bound. Assuming that v s neighbors know v s degree, if each neighbor of v transmits with a probability inversely proportional to v s degree, then we can show that the latter lower bound is almost tight. Now if we consider the problem of broadcasting a message from every node to its neighbors, then it can be shown that tuning the sending probabilities according to the maximum degree of the network leads to almost time-optimal algorithms. These observations show that a knowledge about node degree can significantly affect the most primitive network tasks. More generally, tuning the sending probability of a node according to that knowledge appears to be very helpful to avoid interferences caused by simultaneous transmissions. It is in fact a key idea to coordinate node transmissions distributively and to break the symmetry efficiently. In this work, we show how to overcome the absence of such a knowledge when thinking and designing efficient distributed algorithms: i by giving a polylogarithmic time algorithm that estimates the degree of each node and ii by showing that the maximum degree of the network is not a bottleneck parameter for computing some fundamental structures such as coloring. The Model We consider a classical graph based radio network model. More precisely, the network is modeled by an n-node graph G = V, E. The nodes represent a set of radio devices. There is an edge between two nodes if the two nodes are in the transmission range of one another. Nodes can communicate by sending and receiving messages. For the sake of analysis, we assume that the nodes have access to a global clock generating discrete pulses slots. We

3 also assume that the nodes wake up synchronously, i.e., at pulse 0 all nodes are awaken. At each pulse, a node can transmit or stay silent. A node receives a message in a given pulse iff it is silent then and precisely one of its neighbors transmits. No collision detection mechanism is available to nodes in any way. We assume that nodes do not have any knowledge about the number of their neighbors. Nevertheless, we assume that an estimate ñ on the number of nodes n in the network is known. In practice, these assumptions can be interpreted as following: nodes know that they may have between 1 and ñ neighbors, but they do not know how many. As we will show, we remark that the running time of all our algorithms depends polylogarithmically on ñ, i.e., a rough estimate value ñ of n e.g., ñ = n O1 affects the time complexity by only a constant factor. Therefore, for a sake of clarity our algorithms are described for ñ = n. For every node v, we denote Nv the set of v s neighbors and d v = Nv the degree of v. We denote N + v = Nv {v}. The maximum degree of the network is denoted by = max {d v v V }. The local maximum degree of a node v is defined by v = max {d u u N + v}. We say that an event occurs with high probability w.h.p., for short if the probability that the event occurs is at least 1 1/n α for a positive constant α which can be made arbitrarily large by setting the corresponding parameters to large enough values. Contributions and Outline Our first contribution Section 2 is a Olog 2 n time distributed algorithm that computes w.h.p., a constant approximation value of the degree of each node. The idea of the algorithm is based on the claim that if the nodes transmit with the same probability p then the probability that a given node v hears a message from its neighbors is maximized for p = 1/d v. Thus, to decide on an estimate value of its degree, a node v changes its sending probability periodically and tries to detect the sending probability for which it hears the most often messages from its neighbors. Our second contribution Section 3 is a O log n+log 2 n time distributed algorithm that computes w.h.p., a constant approximation value v of the local maximum degree v of every node v. The idea of the algorithm is based on the claim that if all the neighbors of a given node v send with the same probability p = 1/d v then w.h.p., node v hears a message from each neighbor during a Od v log n time period. Thus, by combining this claim with our first algorithm, we are able to coordinate the nodes by periodically varying their sending probabilities so that every node can communicate its approximate degree to neighbors having a lower degree. The third result of the paper Section 4 is more general in the sense that it allows us to overcome the lack of information about the global maximum degree. Our analysis reveals that fundamental tasks using the knowledge of as a key assumption can still be scheduled efficiently when such a knowledge is not available. We illustrate this claim for three fundamental problems: i the SRS Single Round Simulation problem [1] which consists in simulating the rounds of a synchronous point-to-point message passing algorithm into the radio network model, ii the classical node coloring problem [10, 11] which consists in coloring the nodes such that every two neighbors have distinct colors iii a

4 variant of the maximum matching problem [5] which consists in computing a set of distance-2 pairwise disjoint edges. We revised these three problems under the assumption that no information about node degrees is available and we show that using an approximate value of the local maximum degree of each node is sufficient to obtain essentially the same time complexity. 2 From scratch approximation of node degrees 2.1 Description of the algorithm Input: An n-node graph G, an integer k = Θlog n, and a small constant β. e Output: A constant approximate value f d v of d v. for i = 1 to log n do c i := 0; p i := 1/2 i ; for j = 1 to k do v sends a ping message with probability p i; if v hears a ping message then c i := c i + 1 ; if c i e β k then f d v := 2 i ; Fig. 1: Algorithm InitNetwork; code for a node v. Algorithm InitNetwork Fig. 1 works in log n phases. At each phase i, every node transmits with a decreasing probability p i = p i 1 /2 for k = Θlog n rounds. At each phase, each node counts the number of times it hears a message variable c i. If that number exceeds a threshold β k then the node decides that its degree is order of 1/p i. Roughly speaking, we will show that if all the neighbors of a node v are sending with the same probability p i, then w.h.p., the number of times node v hears a message is roughly order of k when p i is roughly order of 1/d v. Thus, by varying geometrically the sending probability at each phase from 1/2 to 1/n, each node is likely to experience a phase where it hears order of k messages, and can decide on an approximate value of its degree. In order to obtain the w.h.p. correctness property of our algorithm, the precise value of β and k are to be fixed later in the analysis. 2.2 Analysis Fact 1 e.g., [10,11] x 1 and t x, e t 1 t2 x 1 + t x x e t. Fact 2 Chernoff and Hoeffding s Inequalities, e.g., [9] Let X 1,, X k be k independent Bernoulli trials, PX i = 1 = p = 1 PX i = 0. Let X = k i=1 X i, and EX = µ. For any ǫ and ǫ verifying 0 < ǫ < 1 and ǫ > 0, we have: PX < 1 ǫµ < e µǫ2 /2 and PX µ kε e 2kε 2.

5 Let c i v be the value of counter c i of node v at the end of a given phase i. Lemma 1. Given a node v V, we have Ec i v = k d v p i 1 p i dv. Proof. Due to lack of space, this proof is omitted see [6]. Lemma 2. There exist positive constants ν, β, ǫ > 0 such that: 1 For any node v and phase i such that i 1 log d v i, Ec i v β k, and 2 For any node v and phase i / [logd v 2, logd v + 4], Ec i v 1 ǫβ ν k. Proof. Due to lack of space, this proof is omitted see [6]. In the following, we set β = 1 ǫβ in algorithm InitNetwork where ǫ and β are the constants from the previous lemma. We also set k = α max { β/2ε 2, 1/2ν 2 } log n, where α 1 is any constant. We say that a node decides on the value of d v at phase i if the condition c i βk is true. Lemma 3. Given a node v and a phase i verifying i [logd v, logd v + 1], v decides on the value of d v at phase i with probability at least 1 1/n α. Proof. At phase i [logd v, logd v + 1], we have 1/p i 1 d v 1/p i. Thus, using the Chernoff s inequality, we have: P c i v < 1 εec i v Fact 2 exp ε2 2 Ec iv Lemma 2 exp ε2 2 β k 1 n α Now, using Lemma 2, for i [logd v, logd v + 1], we have Ec i v βk. Thus P c i v < 1 εβk = P c i v < βk 1/n α, and the lemma is proved. In the next lemma, we prove that w.h.p., a node v does not decide on the value of dv at a phase not in the range of log d v, i.e., w.h.p., the condition c i v βk does not hold for i not order of log d v. Lemma 4. Given a node v and a phase i verifying i / [logd v 2, logd v + 4], v does not decide on the value of d v at phase i with probability at least 1 1/n α. Proof. Take a phase i / [logd v 2, logd v + 4]. By Lemma 2, we have Ec i v β νk. Thus, using the Hoeffding s inequality, we have P c i v βk = P c i v Ec i v β Ec iv k k Fact 2 exp 2k β Ec 2 iv k Lemma 2 exp 2kν 2 1 n α

6 Theorem 1. In Olog 2 n time, algorithm InitNetwork outputs w.h.p., a constant approximation value of the degree of any node. Proof. The running time is straightforward. Using the two previous lemmas, a node v decides only at a phase i verifying i [logd v 2, logd v + 4] with probability at least 1 1/n α k. Thus all nodes decide on such a phase with probability at least : 1 1 k n α = 1 1 k n n α Fact n α 2 v V The last inequality holds for a sufficiently large constant α and k = Θlog n. 3 An algorithm for computing the local maximum degree Input: An n-node graph G and a parameter k = Θlog n. Output: A constant approximate value f v of v. Run algorithm InitNetwork and compute f d v; f v := f d v; i := 0; while i Θlog f d v do i := i + 1; p i := 1/2 i ; for j = 1 to k/p i do v sends message f d v with probability p i; if v hears a message d f w from node w and d f w > f v then f v := d f w; Fig. 2: Algorithm LocalMaxDegree; code for a node v. The idea of algorithm LocalMaxDegree Fig. 2 is to coordinate the sending probabilities so that each node can successfully send its approximate degree to neighbors having lower degrees. Given a node v, the crucial observation is that if all its neighbors are sending with probability 1/d v, then within Od v log n time, v will receive a message from each neighbor w.h.p.. The main difficulty is that a neighbor u of v does not know the degree of v. Thus, neighbor u cannot set its sending probability to the required value. Moreover, node u may have other neighbors with different degrees. Thus, node u should change its sending probability according to those neighbors. The key idea of our algorithm is to decrease geometrically the sending probability p i each Θ1/p i log n time period, from p i = 1/2 until reaching p i = Θ1/d v. Thus, at a phase i, nodes having a degree order of 1/p i can hear a message from neighbors having larger degrees. Note that nodes with low degree will finish their while loop early. Theorem 2. In O log n + log 2 n time, algorithm LocalMaxDegree outputs, w.h.p., a constant approximation of the local maximum degree of any node.

7 Proof. Let us consider a phase i and a node v verifying d v = Θ1/p i. Assuming that algorithm InitNetwork outputs the estimate value of the degree of each node, and from the initialization step line 2 of algorithm LocalMaxDegree, the condition of the while loop is still true for all nodes having degree at least order of 1/p i, i.e., neighbors of v with higher degree are still active at phase i. Let u be a neighbor of v with degree at least order of Θ1/p i. We denote u v j,i the event node v hears a message from neighbor u at a given iteration j of the for loop of phase i and u v,i the event node v hears a message from neighbor u at phase i. Thus, we have that: P u v j,i p i 1 p i dv 1 Thus, = P u v j,i Fact 1 p i e pidv 1 d v p 2 i = Θ 1 d v e Θ1 = Θ 1 d v 1 Θ 1 d v P u v,i k Θkdv 1 p 1 Θ i 1 1 Θ e Θk d v d v Thus, the probability that nodes having degree Θ1/p i do not receive a message from their neighbors with larger degree can be upper bounded as following: n Θ 1 e Θk 1 p i n Θ1 v V,d v=θ1/p i u Nv,d u>d v The last inequality holds for well chosen k = Θlog n. Thus, w.h.p., every node with degree order of 1/p i receives a message from each of its neighbors having a larger degree. We remark that we have implicitly assumed that for a node v with a degree order of 1/p i, there exist some neighbors having larger degree up to a constant. If this is not true, then from the initialization step in line 2, node v will decide that its local maximum degree is its own degree. Since the value d u sent by a node u is w.h.p. a constant approximation of u s degree, a simple verification shows that w.h.p., all nodes with a degree order of 1/p i succeeds computing their local maximum degree at phase i. This allows us to easily conclude that at the end of the algorithm, w.h.p., for every node v, v = Θ v. Since d v Θ for every node v, the time complexity is at most: Olog 2 n + Θlog i=1 Θlog k = Olog 2 n + k p i i=1 2 i = Olog 2 n + log n 2 log = Olog 2 n + log n

8 4 Applications 4.1 On simulating the message passing model The first application of the previous algorithms is on simulating the standard synchronous point-to-point message passing model on the graph-based radio model. This problem was first studied in [1]. Paraphrasing the introduction in [1], that study was motivated by the fact that whenever a type of communication mode emerges, new algorithms have to be developed for it for all standard network operations. Thus, simulation procedures could help to convert algorithms designed for networks with the same topology but different means of communication to algorithms for the new communication mode. In particular, since designing algorithms for radio networks from scratch turns to be a hard task, the simulation of algorithms for standard message-passing systems may prove to be a plausible approach. This motivation is still of interest since, compared to the advances gained by the research community in the classical message passing model, solving efficiently distributed tasks in a radio network model is still open for many fundamental problems. The work in [1] concentrated on round-by-round simulations where a separate phase of radio transmission is dedicated to simulate each single round of the original algorithm: in a single round of the original algorithm, it is assumed that each node can send a message to each neighbor. A general primitive called single-round simulation SRS as a building block is provided. The goal of this primitive is to ensure that every message passed by the original algorithm will be effectively transmitted and received during the simulation. We refer to this as the SRS problem. For the general message passing model where a node can send a different message to its neighbors at each pulse, a randomized distributed SRS algorithm with running time O 2 log n was given. For the so-called uniform message passing model where a node sends the same message to its neighbors at each pulse, the authors gave a randomized distributed SRS algorithm with O log n running time. The SRS algorithms in [1] use as a key parameter to schedule the sending probability of each node. Thus, these algorithms are impracticable in the unknown neighborhood model. By using our algorithms to compute an approximation of the local maximum degree of each node, and by locally using the computed value instead of, we can prove the following: Theorem 3. In the unknown neighborhood model, the nodes of any n-node graph can be initialized in O log n + log 2 n time so that the SRS problem can be solved w.h.p., for the uniform resp. general message passing model in O log n resp. O 2 log n time. Proof. First we consider a uniform point-to-point message passing algorithm A. For now let us assume that d v and v are known for each node v. Consider a round of A. To solve the SRS problem: each node v must send a message M v to all its neighbors during that round the message must be received by each neighbor. Consider the following SRS algorithm: each node v transmits message M v with probability 1/ v for r v rounds r v is to be fixed later.

9 Given a node v, let u v denote the event v hears the message M u in a single transmission round. Let u v denote the event v hears the message M u during the r v transmission rounds. Thus, we have: P u v = 1 u w N + v\{u} Using the fact that w N + v, w d v, we obtain 1 1 w P u v dv 1 Θ u d v u = P u v ru 1 ru 1 exp Θ Θ u u Hence, the probability that node u fails sending M u to at least one neighbor v satisfies P u v, v Nu P u v ru d u exp Θ u v Nu Thus by choosing r u = Θ u logd u n, node u succeeds sending M u to all its neighbors with probability at least 1 1/n Θ1. Thus, the SRS algorithm succeeds for all nodes with probability at least 1 1/n Θ1 n 1 1/n Θ1. Note that the constant hidden in the Θ notation when fixing r u is to be tuned carefully to obtain the w.h.p., property. In particular, a constant approximation value of u and d u affects r u by only a constant. Since algorithm LocalMaxDegree succeeds for all nodes w.h.p., it is not difficult to conclude that w.h.p., the SRS algorithm is successful for all nodes. Here, let us remark that the SRS algorithm has the nice property that sparse nodes are not penalized by dense regions, i.e., a node u terminates a SRS within r u = O u log n time. Now, let us consider the general point-to-point message passing model, i.e., at each round of the original algorithm, a node v can send a different message to each neighbor at most d v messages each round. It is easy to see that the previous SRS algorithm can be easily extended to this general case: each node v applies the previous SRS procedure each O v log n time period for each of the d v messages to be delivered. It is not difficult to prove that w.h.p., the messages are received within Od v v log n. However, this is not sufficient to guarantee the correctness of the SRS algorithm since a message sent from node u to node v can be received by another neighbor w of u. By concatenating nodes identifiers to messages, a node receiving a message can easily know if the message was for him. If unique identifiers are not available, then each node selects randomly an identifier from the { 1,, n O1}. Hence, it is easy to show that each node picks a unique identifier w.h.p. Then, each node sends its identifier to its neighbors using the uniform SRS procedure. Thus, w.h.p., in O log n time, each node can learn the identifiers of its neighbors.

10 Remark 1. In the correctness proof of algorithm LocalMaxDegree Theorem 2, we used the fact that nodes having a degree smaller than order of p i at a phase i have already finished computing their local maximum degree and so they are silent, i.e., only nodes having a degree larger than order of p i remain active and can transmit. This assumption is no longer true if the nodes begin running the simulation process described in Theorem 3 after terminating algorithm LocalMaxDegree. However, in our SRS procedure, each node v transmits with probability order of v. Thus, Equation 1 in the proof of Theorem 2 still holds when replacing p i by Θp i. The other inequalities given in Theorem 2 are then affected by only a constant and Theorem 2 still holds w.h.p. Corollary 1. Given a uniform resp. general point-to-point message passing algorithm A running on an n-node graph G in τ time τ = n O1, there exists a distributed algorithm that simulates w.h.p., A in the unknown neighborhood radio model in O log n τ + log 2 n time resp. O 2 log n τ + log 2 n time. Corollary 2. Consider a point-to-point message passing algorithm A running on an n-node graph G in τ time τ = n O1. Assume that at each round of algorithm A, each node sends the same message to a bounded number of neighbors and another message to the remaining neighbors. Then, there exists a distributed algorithm that simulates w.h.p., algorithm A in the unknown neighborhood radio model in O log n τ + log 2 n time. Consider for instance the local broadcasting problem where each node has to broadcast a message to its neighbors. Using the previous results it is straightforward that this problem can be solved w.h.p., in O log n + log 2 n time. This could be for instance compared with a randomized O log 3 n time protocol for the same problem in the SINR Signal-to-Interference-plus-Noise-Ratio radio model not the graph based model given recently in [8]. 4.2 On computing a coloring in unit disk graphs Node and edge coloring are one of the most important and fundamental tasks in distributed radio networks. In fact, coloring can be considered as a basic tool to initially organize unstructured wireless ad hoc and sensor networks. This is wellmotivated for instance by associating different colors with different time-slots in a time-division multiple access TDMA scheme. In the following paragraphs, we revised some coloring related problems in the unknown neighborhood model. Node coloring A correct node coloring is an assignment of a color to each node in the graph, such that any two adjacent nodes have different colors. In [10, 11], the authors provide an algorithm that produces w.h.p., a correct coloring with O colors in O log n time for unit disk graphs. That algorithm requires that is known to all nodes. In the conclusion of [10, 11], it was asked whether we can get rid of. Using our algorithms, we answer that question in the positive:

11 Proposition 1. In the unknown neighborhood model, there exists a distributed algorithm that produces w.h.p., a O node coloring within O log n + log 2 n time on any n-node unit disk graph. Proof Sketch. Due to lack of space, we only give the very general guidelines to prove the proposition. More specifically, we run the coloring algorithm of [10, 11] by using the approximated local maximum degree for each node instead of parameter. By carefully redefining the constants used in [10,11] according to our approximation factor, the reasoning used in [10, 11] can still be proved to hold w.h.p. In particular, we use some arguments from Remark 1 to ensure that the coloring process from [10, 11] does not interfere with the initialization step. One should however note that, at the same time and independently of our result [6], Schneider and Wattenhofer [12] came up with a new O + log 2 n time algorithm for -coloring without knowledge of. Partial strong edge coloring A correct edge coloring is an assignment of a color to each edge in the graph, such that any two adjacent edges have a different color. One can find many variants of the edge coloring problem. In particular, in [5], the authors considered the problem of computing a strong or a distance-2 edge coloring, that is the problem of assigning distinct colors to any pair of edges between which there is a path of length at most two. The algorithms described there are based on computing an approximate maximum strong matching by an algorithm originally described in [2]. Computing a strong maximum matching consists in computing a set, with maximum cardinality, of edges mutually at distance at least 2. In [5], it is proved that a O1-approximate solution to the strong maximum matching can be computed in Oρ log n time for unit disk graphs 1, where ρ denotes the time it takes to compute the active degree of each node. Following the same terminology than in [5], a node is said to be active in a given round if it decides to transmit. Then, the active degree of a node is the number of its neighbors that are active in the current round. Using our algorithms, we can show that ρ = Olog 2 n. Thus, we obtain the following: Proposition 2. In the unknown neighborhood model, there exists a distributed algorithm that produces w.h.p., a O1-approximate strong matching in Olog 3 n time on any n-node unit disk graph. 5 Conclusion In this paper, we have shown that computing in the unknown neighborhood model is up to a polylogarithmic factor similar to computing in the known neighborhood model. We have also shown that, for some distributed tasks, computing the local maximum degree of each node is sufficient to overcome the need to 1 In [5], it is also assumed that a node can hear collisions which is actually stronger than the assumptions of our model.

12 know the global parameter. Many open issues can however be investigated. For instance, although the correctness of our algorithms was proved analytically, it would be nice to give an experimental analysis and/or to study the impact of changing the values the constants used in our algorithms through simulation. Another interesting field of research is to derive new algorithms which are both time and energy efficient and to extend our algorithms to non graph based models and/or to multi-channel radio networks. References 1. Noga Alon, Amotz Bar-Noy, Nathan Linial, and David Peleg. On the complexity of radio communication. In 21 st annual ACM Symposium on Theory of computing STOC 89, pages , New York, NY, USA, ACM. 2. Hari Balakrishnan, Christopher L. Barrett, V. S. Anil Kumar, Madhav V. Marathe, and Shripad Thite. The distance-2 matching problem and its relationship to the mac-layer capacity of ad hoc wireless networks. IEEE Journal on Selected Areas in Communications, 226: , Reuven Bar-Yehuda, Oded Goldreich, and Alon Itai. Efficient emulation of singlehop radio network with collision detection on multi-hop radio network with no collision detection. In 3 rd International Workshop on Distributed Algorithms WDAG 89, DISC nowadays, pages 24 32, London, UK, Springer-Verlag. 4. Reuven Bar-Yehuda, Amos Israeli, and Alon Itai. Multiple communication in multihop radio networks. In 8 th ACM Symposium on Principles of distributed computing PODC 89, pages , Christopher L. Barrett, V. S. Anil Kumar, Madhav V. Marathe, Shripad Thite, and Gabriel Istrate. Strong edge coloring for channel assignment in wireless radio networks. In 4 th annual IEEE international conference on Pervasive Computing and Communications Workshops PERCOMW 06, page 106, Washington, DC, USA, IEEE Computer Society. 6. Bilel Derbel and El-Ghazali Talbi. Radio network distributed algorithms in the unknown neighborhood model. In Technical Report HAL, inria , RR- 6581, June Leszek Gasieniec, David Peleg, and Qin Xin. Faster communication in known topology radio networks. In 24 th symposium on principles of distributed computing PODC 05, pages ACM, Olga Goussevskaia, Thomas Moscibroda, and Roger Wattenhofer. Local Broadcasting in the Physical Interference Model. In International Workshop on Foundations of Mobile Computing DialM-POMC, Toronto, Canada, pages 35 44, August Michael Mitzenmacher and Eli Upfal. Probability and Computing, Randomized Algorithms and probabilistic analysis. Cambridge University Press, Thomas Moscibroda and Roger Wattenhofer. Coloring Unstructured Radio Networks. In 17 th ACM Symposium on Parallelism in Algorithms and Architectures SPAA 05, pages 39 48, July Thomas Moscibroda and Roger Wattenhofer. Coloring unstructured radio networks. Distributed Computing, 214: , Johannes Schneider and Roger Wattenhofer. Coloring unstructured wireless multi-hop networks. In 28 th Symposium on Principles of Distributed Computing PODC 09, pages , 2009.

Radio Network Clustering from Scratch

Radio Network Clustering from Scratch Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.

More information

On Asynchronous Node Coloring in the SINR Model

On Asynchronous Node Coloring in the SINR Model On Asynchronous Node Coloring in the SINR Model Fabian Fuchs Institute of Theoretical Informatics Karlsruhe Institute of Technology Karlsruhe, Germany fabian.fuchs@kit.edu Abstract In this work we extend

More information

Locality Lower Bounds

Locality Lower Bounds Chapter 8 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in log n + O(1) rounds. 8.1

More information

A Note on Node Coloring in the SINR Model

A Note on Node Coloring in the SINR Model A Note on Node Coloring in the SINR Model Bilel Derbel, El-Ghazali Talbi To cite this version: Bilel Derbel, El-Ghazali Talbi. A Note on Node Coloring in the SINR Model. [Research Report] RR-7058, INRIA.

More information

A Faster Distributed Radio Broadcast Primitive (Extended Abstract)

A Faster Distributed Radio Broadcast Primitive (Extended Abstract) A Faster Distributed Radio Broadcast Primitive (Extended Abstract Bernhard Haeupler Carnegie Mellon University haeupler@cs.cmu.edu David Wajc Carnegie Mellon University wajc@cs.cmu.edu ABSTRACT We present

More information

On the Locality of Distributed Sparse Spanner Constructions

On the Locality of Distributed Sparse Spanner Constructions On the Locality of Distributed Sparse Spanner Constructions B. Derbel, C. Gavoille, D. Peleg, L. Viennot University of Lille University of Bordeaux Weizmann Institute INRIA, Paris PODC 2008 Toronto What

More information

Energy-Efficient Size Approximation of Radio Networks with no Collision Detection

Energy-Efficient Size Approximation of Radio Networks with no Collision Detection Energy-Efficient Size Approximation of Radio Networs with no Collision Detection Tomasz Jurdzińsi 12, Mirosław Kutyłowsi 3, and Jan Zatopiańsi 2 1 Institute of Computer Science, Technical University Chemnitz

More information

Structuring Unreliable Radio Networks

Structuring Unreliable Radio Networks Structuring Unreliable Radio Networks Keren Censor-Hillel Seth Gilbert Fabian Kuhn Nancy Lynch Calvin Newport August 25, 2013 Abstract In this paper we study the problem of building a constant-degree connected

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

Initializing Newly Deployed Ad Hoc and Sensor Networks

Initializing Newly Deployed Ad Hoc and Sensor Networks Initializing Newly Deployed Ad Hoc and Sensor Networks Fabian Kuhn Computer Engineering and Networks Laboratory ETH Zurich, Switzerland kuhn@tikeeethzch Thomas Moscibroda Computer Engineering and Networks

More information

A Local Broadcast Layer for the SINR Network Model

A Local Broadcast Layer for the SINR Network Model A Local Broadcast Layer for the SINR Network Model Magnús M. Halldórsson mmh@ru.is Reykjavik University Stephan Holzer holzer@csail.mit.edu MIT Nancy Lynch lynch@csail.mit.edu MIT arxiv:505.0454v [cs.dc]

More information

Shortest Link Scheduling with Power Control under Physical Interference Model

Shortest Link Scheduling with Power Control under Physical Interference Model 2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks Shortest Link Scheduling with Power Control under Physical Interference Model Peng-Jun Wan Xiaohua Xu Department of Computer Science

More information

The mv-decomposition: definition and application to the distance-2 broadcast problem in multi-hops radio networks

The mv-decomposition: definition and application to the distance-2 broadcast problem in multi-hops radio networks The mv-decomposition: definition and application to the distance-2 broadcast problem in multi-hops radio networks Olivier Cogis, Benoît Darties, Sylvain Durand, Jean-Claude König, and Geneviève Simonet

More information

Deploying Wireless Networks with Beeps

Deploying Wireless Networks with Beeps Deploying Wireless Networks with Beeps Alejandro Cornejo 1 and Fabian Kuhn 2 1 Massachusetts Institute of Technology 2 University of Lugano Abstract. We present the discrete beeping communication model,

More information

Gradient Clock Synchronization

Gradient Clock Synchronization Noname manuscript No. (will be inserted by the editor) Rui Fan Nancy Lynch Gradient Clock Synchronization the date of receipt and acceptance should be inserted later Abstract We introduce the distributed

More information

Trading Bit, Message, and Time Complexity of Distributed Algorithms

Trading Bit, Message, and Time Complexity of Distributed Algorithms Trading Bit, Message, and Time Complexity of Distributed Algorithms Johannes Schneider, Roger Wattenhofer Computer Engineering and Networks Laboratory, ETH Zurich, 8092 Zurich, Switzerland Abstract We

More information

arxiv: v1 [cs.dc] 4 Oct 2018

arxiv: v1 [cs.dc] 4 Oct 2018 Distributed Reconfiguration of Maximal Independent Sets Keren Censor-Hillel 1 and Mikael Rabie 2 1 Department of Computer Science, Technion, Israel, ckeren@cs.technion.ac.il 2 Aalto University, Helsinki,

More information

Maximal Independent Set

Maximal Independent Set Lecture 5 Maximal Independent Set 5.1 The Problem Definition 5.1 (Independent Set). Given an undirected Graph G = (V, E), an independent set is a subset of nodes U V, such that no two nodes in U are adjacent.

More information

A Constant-Factor Approximation for Wireless Capacity Maximization with Power Control in the SINR Model

A Constant-Factor Approximation for Wireless Capacity Maximization with Power Control in the SINR Model A Constant-Factor Approximation for Wireless Capacity Maximization with Power Control in the SINR Model Thomas Kesselheim October 17, 2010 Abstract In modern wireless networks devices are able to set the

More information

Topology Control with Limited Geometric Information

Topology Control with Limited Geometric Information Topology Control with Limited Geometric Information Kevin Lillis and Sriram V. Pemmaraju Department of Computer Science The University of Iowa, Iowa City, IA 52242-1419, USA, [lillis, sriram]@cs.uiowa.edu

More information

Clock Synchronization with Bounded Global and Local Skew

Clock Synchronization with Bounded Global and Local Skew Clock Synchronization with ounded Global and Local Skew Distributed Computing Christoph Lenzen, ETH Zurich Thomas Locher, ETH Zurich Roger Wattenhofer, ETH Zurich October 2008 Motivation: No Global Clock

More information

On Alarm Protocol in Wireless Sensor Networks

On Alarm Protocol in Wireless Sensor Networks On Alarm Protocol in Wireless Sensor Networks Jacek Cichoń, Rafal Kapelko, Jakub Lemiesz, and Marcin Zawada Institute of Mathematics and Computer Science, Wrocław University of Technology, Poland Abstract.

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Distributed Distance-Bounded Network Design Through Distributed Convex Programming

Distributed Distance-Bounded Network Design Through Distributed Convex Programming Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design

More information

On the Complexity of Radio Communication

On the Complexity of Radio Communication On the Complexity of Radio Communication Extended Abstract) Noga Alon Amotz Bar-Noy Nathan Linial David Peleg Abstract A radio network is a synchronous network of processors that communicate by transmitting

More information

arxiv: v1 [cs.dc] 22 May 2017

arxiv: v1 [cs.dc] 22 May 2017 Symmetry Breaking in the Congest Model: Timeand Message-Efficient Algorithms for Ruling Sets Shreyas Pai, Gopal Pandurangan 2, Sriram V. Pemmaraju, Talal Riaz, and Peter Robinson 3 arxiv:705.0786v [cs.dc]

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode

Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode Maximizing Capacity with Power Control under Physical Interference Model in Simplex Mode Peng-Jun Wan, Chao Ma, Shaojie Tang, and Boliu Xu Illinois Institute of Technology, Chicago, IL 60616 Abstract.

More information

Time Synchronization

Time Synchronization Massachusetts Institute of Technology Lecture 7 6.895: Advanced Distributed Algorithms March 6, 2006 Professor Nancy Lynch Time Synchronization Readings: Fan, Lynch. Gradient clock synchronization Attiya,

More information

Maximal Independent Set

Maximal Independent Set Lecture 5 Maximal Independent Set The problem Definition 5.1 (Independent Set). Given an undirected Graph G = (V, E) an independent set is a subset of nodes U V, such that no two nodes in U are adjacent.

More information

Dominating Set. Chapter 7

Dominating Set. Chapter 7 Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Collision-free scheduling: Complexity of Interference Models

Collision-free scheduling: Complexity of Interference Models Collision-free scheduling: Complexity of Interference Models Anil Vullikanti Department of Computer Science, and Virginia Bioinformatics Institute, Virginia Tech Anil Vullikanti (Virginia Tech) 1/12 Link

More information

Weak Graph Colorings: Distributed Algorithms and Applications

Weak Graph Colorings: Distributed Algorithms and Applications Weak Graph Colorings: Distributed Algorithms and Applications Fabian Kuhn Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology Cambridge, MA 0139, USA fkuhn@csail.mit.edu

More information

Hardness of MST Construction

Hardness of MST Construction Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what

More information

Stone Age Distributed Computing

Stone Age Distributed Computing Stone Age Distributed Computing Yuval Emek Roger Wattenhofer Abstract A new model that depicts a network of randomized finite state machines operating in an asynchronous environment is introduced. This

More information

Radio communication in random graphs

Radio communication in random graphs Journal of Computer and System Sciences 72 (2006) 490 506 www.elsevier.com/locate/jcss Radio communication in random graphs R. Elsässer a,,1,l.garsieniec b a Department of Mathematics, University of California,

More information

A Local Broadcast Layer for the SINR Network Model

A Local Broadcast Layer for the SINR Network Model A Local Broadcast Layer for the SINR Network Model The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher

More information

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks

distributed approaches For Proportional and max-min fairness in random access ad-hoc networks distributed approaches For Proportional and max-min fairness in random access ad-hoc networks Xin Wang, Koushik Kar Rensselaer Polytechnic Institute OUTline Introduction Motivation and System model Proportional

More information

Chromatic number, clique subdivisions, and the conjectures of Hajós and Erdős-Fajtlowicz

Chromatic number, clique subdivisions, and the conjectures of Hajós and Erdős-Fajtlowicz Chromatic number, clique subdivisions, and the conjectures of Hajós and Erdős-Fajtlowicz Jacob Fox Choongbum Lee Benny Sudakov Abstract For a graph G, let χ(g) denote its chromatic number and σ(g) denote

More information

On the Resilience and Uniqueness of CPA for Secure Broadcast

On the Resilience and Uniqueness of CPA for Secure Broadcast On the Resilience and Uniqueness of CPA for Secure Broadcast Chris Litsas, Aris Pagourtzis, Giorgos Panagiotakos and Dimitris Sakavalas School of Electrical and Computer Engineering National Technical

More information

The Turán number of sparse spanning graphs

The Turán number of sparse spanning graphs The Turán number of sparse spanning graphs Noga Alon Raphael Yuster Abstract For a graph H, the extremal number ex(n, H) is the maximum number of edges in a graph of order n not containing a subgraph isomorphic

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,

More information

A Note on Interference in Random Networks

A Note on Interference in Random Networks CCCG 2012, Charlottetown, P.E.I., August 8 10, 2012 A Note on Interference in Random Networks Luc Devroye Pat Morin Abstract The (maximum receiver-centric) interference of a geometric graph (von Rickenbach

More information

arxiv: v2 [cs.ds] 5 Apr 2014

arxiv: v2 [cs.ds] 5 Apr 2014 Simple, Fast and Deterministic Gossip and Rumor Spreading Bernhard Haeupler Microsoft Research haeupler@cs.cmu.edu arxiv:20.93v2 [cs.ds] 5 Apr 204 Abstract We study gossip algorithms for the rumor spreading

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Optimal whitespace synchronization strategies

Optimal whitespace synchronization strategies Optimal whitespace synchronization strategies Yossi Azar Ori Gurel-Gurevich Eyal Lubetzky Thomas Moscibroda Abstract The whitespace-discovery problem describes two parties, Alice and Bob, trying to establish

More information

Efficient routing in Poisson small-world networks

Efficient routing in Poisson small-world networks Efficient routing in Poisson small-world networks M. Draief and A. Ganesh Abstract In recent work, Jon Kleinberg considered a small-world network model consisting of a d-dimensional lattice augmented with

More information

What Can Be Approximated Locally? Case Study: Dominating Sets in Planar Graphs

What Can Be Approximated Locally? Case Study: Dominating Sets in Planar Graphs What Can Be Approximated Locally? Case Study: Dominating Sets in Planar Graphs TIK Report Number 331 Christoph Lenzen, Yvonne Anne Oswald, Roger Wattenhofer Computer Engineering and Networks Laboratory

More information

What You Must Remember When Processing Data Words

What You Must Remember When Processing Data Words What You Must Remember When Processing Data Words Michael Benedikt, Clemens Ley, and Gabriele Puppis Oxford University Computing Laboratory, Park Rd, Oxford OX13QD UK Abstract. We provide a Myhill-Nerode-like

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

Dominating Set. Chapter 26

Dominating Set. Chapter 26 Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET 294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It

More information

Interference in Cellular Networks: The Minimum Membership Set Cover Problem

Interference in Cellular Networks: The Minimum Membership Set Cover Problem Interference in Cellular Networks: The Minimum Membership Set Cover Problem Fabian Kuhn 1, Pascal von Rickenbach 1, Roger Wattenhofer 1, Emo Welzl 2, and Aaron Zollinger 1 kuhn@tikeeethzch, pascalv@tikeeethzch,

More information

Structuring Unreliable Radio Networks

Structuring Unreliable Radio Networks Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set

More information

The concentration of the chromatic number of random graphs

The concentration of the chromatic number of random graphs The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2

More information

Distributed Deterministic Graph Coloring

Distributed Deterministic Graph Coloring Distributed Deterministic Graph Coloring Michael Elkin Ben-Gurion University + 1 The Model Unweighted undirected graph G = (V, E). Vertices host processors. Processors communicate over edges of G. Communication

More information

Notes 6 : First and second moment methods

Notes 6 : First and second moment methods Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative

More information

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

Balanced Allocation Through Random Walk

Balanced Allocation Through Random Walk Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.

More information

Packet Scheduling with Interference

Packet Scheduling with Interference Computer Science Computer Science Department Thomas Keßelheim Packet Scheduling with Interference Diploma Thesis January 3, 2009 Thesis advisor: Second advisor: Prof. Dr. Berthold Vöcking Prof. Dr. Petri

More information

Request Satisfaction Problem in Synchronous Radio Networks

Request Satisfaction Problem in Synchronous Radio Networks Request Satisfaction Problem in Synchronous Radio Networks Benoit Darties, Sylvain Durand, Jérôme Palaysi To cite this version: Benoit Darties, Sylvain Durand, Jérôme Palaysi. Request Satisfaction Problem

More information

An Improved Approximation Algorithm for Virtual Private Network Design

An Improved Approximation Algorithm for Virtual Private Network Design An Improved Approximation Algorithm for Virtual Private Network Design Friedrich Eisenbrand Fabrizio Grandoni Abstract Virtual private network design deals with the reservation of capacities in a network,

More information

Contention Resolution on a Fading Channel

Contention Resolution on a Fading Channel Contention Resolution on a Fading Channel ABSTRACT Jeremy T. Fineman Georgetown University jfineman@cs.georgetown.edu Fabian Kuhn U. of Freiburg, Germany kuhn@cs.uni-freiburg.de In this paper, we study

More information

Dominating Connectivity and Reliability of Heterogeneous Sensor Networks

Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Dominating Connectivity and Reliability of Heterogeneous Sensor Networks Kenneth A. Berman Email: ken.berman@uc.edu Fred S. Annexstein Email: fred.annexstein@uc.edu Aravind Ranganathan Email: rangana@email.uc.edu

More information

Decomposing Broadcast Algorithms Using Abstract MAC Layers Majid Khabbazian, Dariusz Kowalski, Fabian Kuhn, and Nancy Lynch

Decomposing Broadcast Algorithms Using Abstract MAC Layers Majid Khabbazian, Dariusz Kowalski, Fabian Kuhn, and Nancy Lynch Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2011-010 February 23, 2011 Decomposing Broadcast Algorithms Using Abstract MAC Layers Majid Khabbazian, Dariusz Kowalski,

More information

Packing and decomposition of graphs with trees

Packing and decomposition of graphs with trees Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.

More information

Approximation Algorithms for Computing Capacity of Wireless Networks with SINR constraints

Approximation Algorithms for Computing Capacity of Wireless Networks with SINR constraints Approximation Algorithms for Computing Capacity of Wireless Networks with SINR constraints Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marathe,, Srinivasan Parthasarathy and Aravind Srinivasan Department

More information

Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars

Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars Distributed Algorithms of Finding the Unique Minimum Distance Dominating Set in Directed Split-Stars Fu Hsing Wang 1 Jou Ming Chang 2 Yue Li Wang 1, 1 Department of Information Management, National Taiwan

More information

Rumor Spreading and Vertex Expansion

Rumor Spreading and Vertex Expansion Rumor Spreading and Vertex Expansion George Giakkoupis Thomas Sauerwald Abstract We study the relation between the rate at which rumors spread throughout a graph and the vertex expansion of the graph.

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

The k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks

The k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks The k-neighbors Approach to Interference Bounded and Symmetric Topology Control in Ad Hoc Networks Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi Abstract Topology control, wherein nodes adjust

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours

More information

Capacity of a Two-way Function Multicast Channel

Capacity of a Two-way Function Multicast Channel Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over

More information

Local Approximation Algorithms for a Class of 0/1 Max-Min Linear Programs

Local Approximation Algorithms for a Class of 0/1 Max-Min Linear Programs Local Approximation Algorithms for a Class of 0/ Max-Min Linear Programs Patrik Floréen, Marja Hassinen, Petteri Kaski, and Jukka Suomela Helsinki Institute for Information Technology HIIT, Department

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

arxiv: v2 [cs.dc] 5 Apr 2012

arxiv: v2 [cs.dc] 5 Apr 2012 Stone Age Distributed Computing Yuval Emek Jasmin Smula Roger Wattenhofer arxiv:1202.1186v2 [cs.dc] 5 Apr 2012 Computer Engineering and Networks Laboratory (TIK) ETH Zurich, Switzerland Abstract The traditional

More information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr

More information

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Combining Shared Coin Algorithms

Combining Shared Coin Algorithms Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence

More information

arxiv: v1 [cs.dc] 27 Sep 2016

arxiv: v1 [cs.dc] 27 Sep 2016 How to Elect a Low-energy Leader Yi-Jun Chang University of Michigan cyijun@umich.edu Tsvi Kopelowitz University of Michigan kopelot@gmail.com Seth Pettie University of Michigan pettie@umich.edu arxiv:1609.08486v1

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

Asymptotics, asynchrony, and asymmetry in distributed consensus

Asymptotics, asynchrony, and asymmetry in distributed consensus DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex

More information

New Lower Bounds for the CONGEST Model. Seri Khoury

New Lower Bounds for the CONGEST Model. Seri Khoury New Lower Bounds for the CONGEST Model Seri Khoury New Lower Bounds for the CONGEST Model Research Thesis Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

A FRAMEWORK FOR UNCONDITIONALLY SECURE PUBLIC-KEY ENCRYPTION (WITH POSSIBLE DECRYPTION ERRORS)

A FRAMEWORK FOR UNCONDITIONALLY SECURE PUBLIC-KEY ENCRYPTION (WITH POSSIBLE DECRYPTION ERRORS) A FRAMEWORK FOR UNCONDITIONALLY SECURE PUBLIC-KEY ENCRYPTION (WITH POSSIBLE DECRYPTION ERRORS) MARIYA BESSONOV, DIMA GRIGORIEV, AND VLADIMIR SHPILRAIN ABSTRACT. We offer a public-key encryption protocol

More information

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks

Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,

More information

Testing that distributions are close

Testing that distributions are close Tugkan Batu, Lance Fortnow, Ronitt Rubinfeld, Warren D. Smith, Patrick White May 26, 2010 Anat Ganor Introduction Goal Given two distributions over an n element set, we wish to check whether these distributions

More information

Gossip algorithms for solving Laplacian systems

Gossip algorithms for solving Laplacian systems Gossip algorithms for solving Laplacian systems Anastasios Zouzias University of Toronto joint work with Nikolaos Freris (EPFL) Based on : 1.Fast Distributed Smoothing for Clock Synchronization (CDC 1).Randomized

More information

How to beat a random walk with a clock?

How to beat a random walk with a clock? Introduction Moody walk analysis R/A Conclusion How to beat a random walk with a clock? Locating a Target With an Agent Guided by Unreliable Local Advice Nicolas Hanusse 1 David Ilcinkas 1 Adrian Kosowski

More information

Quantum query complexity of entropy estimation

Quantum query complexity of entropy estimation Quantum query complexity of entropy estimation Xiaodi Wu QuICS, University of Maryland MSR Redmond, July 19th, 2017 J o i n t C e n t e r f o r Quantum Information and Computer Science Outline Motivation

More information

Lower Bounds for Testing Bipartiteness in Dense Graphs

Lower Bounds for Testing Bipartiteness in Dense Graphs Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due

More information

An asymptotically tight bound on the adaptable chromatic number

An asymptotically tight bound on the adaptable chromatic number An asymptotically tight bound on the adaptable chromatic number Michael Molloy and Giovanna Thron University of Toronto Department of Computer Science 0 King s College Road Toronto, ON, Canada, M5S 3G

More information

Multi-Dimensional Online Tracking

Multi-Dimensional Online Tracking Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1

More information

Faster Johnson-Lindenstrauss style reductions

Faster Johnson-Lindenstrauss style reductions Faster Johnson-Lindenstrauss style reductions Aditya Menon August 23, 2007 Outline 1 Introduction Dimensionality reduction The Johnson-Lindenstrauss Lemma Speeding up computation 2 The Fast Johnson-Lindenstrauss

More information

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks

Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks 1 Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-hop Wireless Networks Changhee Joo, Member, IEEE, Xiaojun Lin, Member, IEEE, and Ness B. Shroff, Fellow, IEEE Abstract

More information

Poly-logarithmic independence fools AC 0 circuits

Poly-logarithmic independence fools AC 0 circuits Poly-logarithmic independence fools AC 0 circuits Mark Braverman Microsoft Research New England January 30, 2009 Abstract We prove that poly-sized AC 0 circuits cannot distinguish a poly-logarithmically

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Maximum-Weighted Subset of Communication Requests Schedulable without Spectral Splitting

Maximum-Weighted Subset of Communication Requests Schedulable without Spectral Splitting Maximum-Weighted Subset of Communication Requests Schedulable without Spectral Splitting Peng-Jun Wan, Huaqiang Yuan, Xiaohua Jia, Jiliang Wang, and Zhu Wang School of Computer Science, Dongguan University

More information