Symmetric Rendezvous in Graphs: Deterministic Approaches

Similar documents
Rendezvous and Election of Mobile Agents: Impact of Sense of Direction

Searching for Black Holes in Subways

Time Optimal Algorithms for Black Hole Search in Rings

Multiple Agents RendezVous In a Ring in Spite of a Black Hole

Exploring an Unknown Graph to Locate a Black Hole Using Tokens

Ping Pong in Dangerous Graphs: Optimal Black Hole Search with Pure Tokens

Leader Election in Asymmetric Labeled Unidirectional Rings

arxiv: v1 [cs.ds] 18 Apr 2016

Research Collection. Grid exploration. Master Thesis. ETH Library. Author(s): Wernli, Dino. Publication Date: 2012

Symmetric Network Computation

Combining Shared Coin Algorithms

Theoretical Computer Science

Part V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows

Distributed Systems Byzantine Agreement

A Brief Introduction to Model Checking

Polynomial Deterministic Rendezvous in Arbitrary Graphs

arxiv: v2 [cs.ds] 15 Feb 2017

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Quantum Algorithms for Leader Election Problem in Distributed Systems

Network Decontamination with Temporal Immunity

6.852: Distributed Algorithms Fall, Class 24

Complexity of searching for a black hole

Randomized Rendez-Vous with Limited Memory

Fault-Tolerant Consensus

Black Virus Disinfection in Chordal Rings

Proving lower bounds in the LOCAL model. Juho Hirvonen, IRIF, CNRS, and Université Paris Diderot

A Lower Bound for Deterministic Asynchronous Rendez-Vous on the Line

The Las-Vegas Processor Identity Problem (How and When to Be Unique)

Searching for Black-Hole Faults in a Network Using Multiple Agents

Discrete Bee Dance Algorithms for Pattern Formation on a Grid

Breadth-First Search of Graphs

An O(1) RMRs Leader Election Algorithm

15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu)

Generating p-extremal graphs

Advanced topic: Space complexity

How to beat a random walk with a clock?

Section 6 Fault-Tolerant Consensus

Collision-Free Network Exploration

Using Determining Sets to Distinguish Kneser Graphs

Asynchronous Models For Consensus

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007

arxiv: v1 [cs.dc] 4 Oct 2018

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

The State Explosion Problem

Graph-theoretic Problems

On shredders and vertex connectivity augmentation

Finally the Weakest Failure Detector for Non-Blocking Atomic Commit

On Stabilizing Departures in Overlay Networks

How to beat a random walk with a clock?

Recall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching

arxiv: v1 [cs.dc] 3 Oct 2011

Combinatorial Optimization

Mediated Population Protocols

Towards More Realistic ANTS

Coordination. Failures and Consensus. Consensus. Consensus. Overview. Properties for Correct Consensus. Variant I: Consensus (C) P 1. v 1.

Algorithms Design & Analysis. Approximation Algorithm

Space and Nondeterminism

An O(1) RMRs Leader Election Algorithm

Locality Lower Bounds

Price of Stability in Survivable Network Design

Failure detectors Introduction CHAPTER

Self-Stabilizing Silent Disjunction in an Anonymous Network

CS505: Distributed Systems

Self-stabilizing universal algorithms

Smoothed Analysis of Dynamic Networks

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

1 Introduction (January 21)

Online Learning, Mistake Bounds, Perceptron Algorithm

On Fast Bitonic Sorting Networks

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Multi-coloring and Mycielski s construction

Black Hole Search in Common Interconnection Networks

The Complexity of a Reliable Distributed System

Towards optimal synchronous counting

Lecture 14: Random Walks, Local Graph Clustering, Linear Programming

Planar Graphs (1) Planar Graphs (3) Planar Graphs (2) Planar Graphs (4)

6.852: Distributed Algorithms Fall, Class 10

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005

Ring Sums, Bridges and Fundamental Sets

Avoider-Enforcer games played on edge disjoint hypergraphs

Ability to Count Messages Is Worth Θ( ) Rounds in Distributed Computing

Snap-Stabilizing Depth-First Search on Arbitrary Networks

EFFICIENT COUNTING WITH OPTIMAL RESILIENCE. Lenzen, Christoph.

Distributed Optimization. Song Chong EE, KAIST

On the Effectiveness of Symmetry Breaking

Graph G = (V, E). V ={vertices}, E={edges}. V={a,b,c,d,e,f,g,h,k} E={(a,b),(a,g),( a,h),(a,k),(b,c),(b,k),...,(h,k)}

Approximation bounds for Black Hole Search problems

Distributed primal-dual approximation algorithms for network design problems

A An Overview of Complexity Theory for the Algorithm Designer

Impossibility of Distributed Consensus with One Faulty Process

Advanced Topics in Discrete Math: Graph Theory Fall 2010

Algorithms: Lecture 12. Chalmers University of Technology

Graph Theory and Optimization Computational Complexity (in brief)

Tree Exploration with Advice

k-degenerate Graphs Allan Bickle Date Western Michigan University

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

Register machines L2 18

Transcription:

Symmetric Rendezvous in Graphs: Deterministic Approaches Shantanu Das Technion, Haifa, Israel http://www.bitvalve.org/~sdas/pres/rendezvous_lorentz.pdf Coauthors: Jérémie Chalopin, Adrian Kosowski, Peter Widmayer

What this talk is about... A group of friends visiting an unknown town gets separated. How can they get together again?

What this talk is about... Identical Mobile Agents in finite graphs Deterministic Algorithms Objective: Must meet at a node! Optimize: Worst case complexity

Mobile Agent Models Symmetric Agents vs. Asymmetric (Distinct ID's) Asynchronous vs. Synchronous Local vision vs. Global vision Arbitrary Graph vs. Known topology Meeting on a node vs. Meeting anywhere Anonymous vs. Labelled Nodes

Outline of the Talk Mobile agents and their capabilities When is Rendezvous possible? Rendezvous Algorithms, Tradeoffs Without any Marking Marking on Nodes With Tokens only Fault Tolerance Faulty Tokens Faulty nodes/edges Future Directions

Mobile Agent Model Operates in Asynchronous LCM cycles Look- Compute- Move (1 edge at a time) Local Orientation (Incident edges are ordered) Local Visibility (#agents, tokens) Memory (non-constant) Prior Knowledge (n,k,d, N>n etc.) 1 3 2 Marking of nodes YES / NO Deterministic symmetric strategy (no coin-flips, no ID's)

The environment An instance of the problem is given by: (G, λ, δ, ξ, χ p ) Finite connected Graph G(V,E) Nodes have labels λ:v(g) L (may not be bijective) Port numbering: δ Set of Agents: ξ Locations of Agents p:ξ V(G) => χ p : V(G) {0,1} ξ = k, V(G) = n, E(G) = m, Max.degree(G)= d

Impossibility of Rendezvous Single Edge Symmetric Line 1 1 2 2 1 1 Symmetric Ring

Rendezvous-with-Detect Explicit Termination Solves Rendezvous whenever deterministically possible Otherwise output NO Cost Measures Move Complexity (1 edge traversal costs 1) Agent Memory Node Memory Number of Tokens

When is Rendezvous feasible? Theorem: [Boldi & Vigna 2001] Rendezvous is possible only if (G, λ, δ, χ p ) is covering-minimal. The homomorphism is locally bijective & preserves labels λ, δ, χ p Minimum-base: The smallest graph B such that G covers B

When is Rendezvous feasible? Definition: [Yamashita & Kameda 1988] The view of a node v in (G, δ, p) is the infinite tree of all paths starting at v....... Nodes having identical views are symmetric. [Norris 1995] View of depth n-1 is sufficient!

Algorithms for Rendezvous

Rendezvous without Marking Number of agents and their initial locations is irrelevant! Rendezvous is feasible only if (G, λ, δ) is covering minimal. Algorithm 1: Construct the minimum-base graph B If B = n, meet at vertex 1 of B. Otherwise output Not solvable ; Algorithm-1 solves Rendezvous-with-Detect. How to map an (anonymous) graph without marking?

Mapping an unlabeled Graph Theorem: [Aleliunas et al. 1979] For any positive integers n, d, d < n, there exists a universal exploration sequence for the family of all graphs with at most n nodes and maximum degree at most d. A UXS is sequence of edge labels that when applied to any graph G (in the family) is guaranteed to visit every node of G Mapping Algorithm For i=1 to n Traverse G using uxs(n,d); Classify the visited vertices according to View[i] Compute distinguishing paths of length i Cost = O(n^6 d^3 log n) moves = O(n^3d) * uxs(n,d)

Rendezvous without Marking To summarize: Algorithm 1 solves Rendezvous-with-Detect, when n is known. If the agents only know a bound N n, then the algorithm solves Rendezvous for the solvable cases. Can we improve the cost of the algorithm? O(n^3 d^6 log n)

Rendezvous With Marking

Rendezvous with Marking [Baston & Gal 2001] RV with marks on Starting locations! Rendezvous is feasible only if and only if (G, λ, δ, χ p ) is covering minimal. Whiteboard Model: Each node v has a whiteboard. An agent on node v can write any information on it.

Rendezvous with Marking Distributed DFS: The agent that first reaches node v, claims it by marking on it. Spanning forest of the graph (with k components) How to merge the components?

Partial-View of an agent The Partial-View of an agent is the territory T of the agent plus some external nodes corresponding to each outgoing edge. If the Partial-views of all the agents are identical then (G, λ, δ, χ p ) is not covering minimal. => Rendezvous is not solvable!

Rendezvous with Marking Algorithm-2: Perform DDFS and mark your territory; (Let T A be the territory marked by agent A) Repeat (for at most k phases)- 1Compare your Partial-View with neighbors; 2 If lost, become passive and stop; 3 If won, acquire the territory of loser and continue; Until (T A spans the whole graph G); Correctness of the Algorithm: In each phase, either at least one agent loses, or, all agents have identical PV's. After k phases, either there is single Tree, or, Rendezvous is impossible; --- Cost = O(m k) moves Node Memory = O(m log n) bits

Optimizations and Tradeoffs Problem Move-Cost Node Memory Agent Memory RV-with-Detect O(m k) O(m log n) O(m log n) RV-with-Detect O(m^2 k) O(log n) O(m log n) RV-with-Detect O(m^2 n k) O(m log n) O(log n) Rendezvous O(m log k) '' ''

Rendezvous Using only Tokens

Rendezvous using Tokens Algorithm-3: Mark your home with a Token; Construct the minimum-base graph B. If B = n, meet at vertex 1 of B. Otherwise output Not solvable ; Algorithm-1 Algorithm-3 solves Rendezvous-with-Detect. Cost = O(n^6 d^3 log n) moves Number of tokens = 1 per agent. How to obtain a more efficient algorithm?

More efficient Rendezvous Algorithm BFST: Mark your home with a Token; Perform BFS traversal and store paths in RootPaths; For each visited vertex v, and each p in RootPaths, Check if Target(v,p) is a marked homebase; If no path leads to home, add v to the BFS tree; Else add a cross edge to the map; Stop when there are no more edges to explore; For k=2 agents, If maps of the agents are identical then (G, λ, δ, χ p ) is not covering minimal => Rendezvous is not solvable! Otherwise, compare the maps and choose one of the root nodes. Thus we can solve Rendezvous-with-Detect. Cost = O(n^2 d^2) moves Number of tokens = 1 per agent.

Rendezvous with Marking Move Cost: Rendezvous-with-Detect can be solved in O(m k) moves. Agent Memory: Agent memory of O(log n) is sufficient to solve Rendezvouswith-Detect. Number of Tokens: One token is sufficient to solve Rendezvous-with-Detect. When does having more tokens help?

SPECIAL CASE: Rendezvous Without Common Port-Numbering

RV without common Port-numbers What if the agents do not agree on local orientation? An agent must be able to order the edges incident to any node (in a consistent manner). δ A Otherwise the agent cannot navigate in G! 27

RV without common Port-numbers What if the agents do not agree on local orientation? It is not possible to uniquely order the views Which instances are solvable in this case? Different techniques are needed for solving RV in this case. δ A δ B 28

RV without common Port-numbers Theorem: If Rendezvous can be solved in (G,λ,δ,χp) for any common port-numbering δ (chosen by adversary), then Rendezvous can be solved in (G,λ,χp) without agreement on port-numbering. (Assumption: Each agent has 2 tokens!) Assuming that (G,λ,χp) is covering minimal... Each agents can obtain a map of the graph. Each agent knows the homebases of the other agents (marked by token). The maps of the agents are isomorphic (no unique ordering of the nodes). 29

Equivalence classes of V(G) Definition: Equivalent vertices v w if there exists an automorphism σ of (G, p) such that σ(v) = w We only consider automorphisms that preserve homebases. 30

Equivalence classes of V(G) Definition: Equivalent vertices v w if there exists an automorphism σ of (G, p) such that σ(v) = w We only consider homomorphisms that preserve homebases. 31

Refining the Class Partition Basic Technique: Mark nodes to break symmetry within a class and Refine the class partitions. 32

Refining the Class Partition Basic Technique: Mark nodes to break symmetry within a class and Refine the class partitions. 33

Refining the Class Partition Basic Technique: Mark nodes to break symmetry within a class and Refine the class partitions. 34

Refining the Class Partition As long as there are classes of different sizes, it is possible to break a larger class into two. The process ends when all classes have the same size. 35

Synchronizing the Agents It is not easy to mark vertices in an asynchronous setting. We divide the algorithm into rounds. In each round one class C of nodes is chosen to be partitioned. The start and end of each round is signaled adding or removing tokens to the homebases. 36

Proof of Correctness-1 Claim 1: The classes C 1,C 2,... C t obtained by the algorithm are all of size 1. Assume that the classes have multiple nodes (i.e. t < n)... Theorem [Yamashita and Kameda 99] Rendezvous can be solved on (G, p) if and only if there is no partition C 1,C 2,... C t with 1 t < n such that G[Ci,Cj ] is regular G[Ci ] is d-regular for some d, and contains a perfect matching if d is odd The first property can be shown using a counting argument. The second property follows from a lemma of Gallai- Edmonds about vertex-transitive graphs. 37

Proof of Correctness Claim 1: The classes C 1,C 2,... C t obtained by the algorithm are all of size 1. Claim 2: The agents compute the same ordered sequence of classes C 1,C 2,... C t. To Summarize: The algorithm solves Rendezvous without agreement on local orientation for all instances (G,p) for which Rendezvous is solvable with common local orientation. We also show that two tokens per agent are necessary and sufficient for the former case while one token suffices in the latter case. 38

Fault Tolerant Rendezvous

When Tokens Fail... Token Failures: The token placed on a node may disappear suddenly. Failures are permanent. (tokens eaten by birds, lizards, etc.) [Flocchini et al. 2004]: Ring Networks (for special values of n and k) Theorem: Rendezvous can be solved in (G,λ,δ,χp) with one token per agent, in presence of f < k faults, iff it can be solved in the fault-free case. (Assumption: Both n and k are known!)

RV using Tokens RV is impossible RV is Solvable

When tokens fail: RV using Tokens RV is impossible RV is Solvable??

RV in spite of Token Failure Basic Idea: Each agent puts the token in its home. Each agent builds a map of G and returns to its home. If the token at home is still present, the agent remains at home, guarding the token. (Owner) If the token at home has disappeared, the agent becomes a Runner. If a token guarded by an agent fails, it has no effect on the execution of the algorithm. If the agent fails to build a map due to some token failures, the agent can detect this fact. n'/k' n/k => Token Failure!

RV in spite of Token Failure (cont.) 3 types of agents: RUNNER agents: Those agents which have lost their token; They traverse the ring collecting information. OWNER agents: Those agents who have not lost their Token in the first round. They remain stationary, guarding the token. LEADER agent: Exactly one owner becomes Leader, (only if there are no Runners).

When f > 1 Tokens fail There is at least 1 RUNNER and 1 OWNER! Each RUNNER associates with the nearest OWNER. (it remembers the path to home) OWNER: remains stationary and, receives RUNNERs. RUNNER: Traverses the graph G communicates with OWNERs. An OWNER agent obtains complete information to construct a map of (G,λ,δ,χp)

When f=0 (no token fails) Each agent becomes an OWNER after first round. Each agent builds a map and returns to its home. If RV is not solvable, every agent detects it! Otherwise, The agent at the RV-location becomes LEADER. The LEADER checks if there are (k-1) OWNER agents. The LEADER collects the other agents to RV-location. The algorithm solves Rendezvous-with-Detect in the presence of 0 f < k faults occurring at any instance during the execution. Cost of the algorithm: (same as Algorithm-1).

Other Faults : Black-Holes Faulty Node: destroys any agent arriving at that node. (Black Hole) Faulty Edge: an agent attempting to traverse the edge is destroyed. Faults are permanent and do not occur during the execution. [Dobrev et al. 2001]: Ring Networks (With one Black Hole) Rendezvous in spite of Black hole faults: Agent start at safe nodes. The subgraph consisting of safe nodes and edges is connected. Partial Rendezvous: Gather as many agents as possible!

Extended-Map of a Faulty Graph Number of Faulty Links: t = 4 Theorem: We can rendezvous at most (k-t) agents.

Rendezvous in Faulty Graphs Theorem: Rendezvous of k-t agents can be solved <=> the extended-map is covering minimal! The agents need to know n or a tight bound B < 2n (k and t may be unknown) Rendezvous-with-Detect is not possible, even if the topology is known

Exploring Graphs with Faults How to traverse a faulty graph? Cautious Walk Approach: To visit an unexplored edge (u,v) mark it as Dangerous Traverse e and return back to u Mark edge (u,v) as explored (safe!) Ensures that no more than t agents die! Note: Agents are asynchronous! It is not possible to distinguish a faulty edge from a slow edge.

Rendezvous in Faulty Graphs The Algorithm RVBH: Alternating phases of exploration and competition Each team of agents has a territory that they try to expand Exploring phases Agents explore edges that have never been traversed yet Some agents may die during Exploration Competing phases Team of agents that have neighboring territories try to invade each other No agent can die during Competition For each team, one competing agent is enough The algorithm terminates when one team acquires more than n/2 nodes.

Rendezvous in Faulty Graphs Algorithm RVBH solves Maximal-Rendezvous whenever the extended-map is covering minimal. Cost of the algorithm = O(m(m+k)) moves. There are O(m+k) competing rounds. Total cost of competing rounds = O(m(m+k)) Total cost of exploring rounds = O(n(m+k)) The algorithm has optimal move complexity. Theorem: Any deterministic algorithm for maximal rendezvous in faulty graphs with at most m edges, requires O(m(m+k)) moves in the worst case.

Conclusions We can solve Rendezvous-with-Detect under minimum assumptions about the environment and even overcoming failures. The algorithms work for connected graphs of arbitrary topology. What happens when the environment is a directed graph? (Using whiteboards: [DISC 2010], using Pebbles?) We considered rendezvous in graphs containing (permanent) faults. Can we solve rendezvous in a dynamic graph? Is it possible to solve rendezvous when agents have constant memory? (Rings:Yes, Torus:Yes [Kranakis et al.] Other topology?)