1. Trang chủ
  2. » Công Nghệ Thông Tin

Distributed computing and networking 15th international conference

567 164 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 567
Dung lượng 10,5 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Specifically, for this case, we establish a tight bound of cn c2−1 for the rendezvous time, in case agents have sense of direction.. Any rendezvous algorithm in the white board model requ

Trang 1

15th International Conference, ICDCN 2014

Coimbatore, India, January 2014

Proceedings

Distributed Computing and Networking

Trang 2

Lecture Notes in Computer Science 8314

Commenced Publication in 1973

Founding and Former Series Editors:

Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Trang 3

Mainak Chatterjee Jian-nong Cao

Kishore Kothapalli Sergio Rajsbaum (Eds.)

Distributed Computing and Networking

15th International Conference, ICDCN 2014

Coimbatore, India, January 4-7, 2014

Proceedings

1 3

Trang 4

Mainak Chatterjee

University of Central Florida

Dept of Electrical Engineering and Computer Science

P.O Box 162362, Orlando, FL 32816-2362, USA

Springer Heidelberg New York Dordrecht London

Library of Congress Control Number: 2013954779

CR Subject Classification (1998): C.2, D.1.3, D.2.12, C.2.4, D.4, F.2, F.1.2, H.4LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues

© Springer-Verlag Berlin Heidelberg 2014

This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work Duplication of this publication

or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location,

in ist current version, and permission for use must always be obtained from Springer Permissions for use may be obtained through RightsLink at the Copyright Clearance Center Violations are liable to prosecution under the respective Copyright Law.

The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.

While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made The publisher makes no warranty, express or implied, with respect to the material contained herein.

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India

Printed on acid-free paper

Trang 5

Welcome to the 15th International Conference on Distributed Computing andNetworking (ICDCN 2014) The conference this year was hosted by Amrita Uni-versity on its scenic Coimbatore campus, following the tradition set by previousICDCN conferences held at reputed institutions including IITs, IIITs, TIFR,and Infosys.

ICDCN started 14 years ago as an international workshop and quickly emerged

as a premier conference devoted to the latest research results in distributed puting and networking The conference today attracts high-quality submissionsand top speakers from all over the world

com-An excellent technical program consisting of 32 full papers and eight shortpapers was put together thanks to the dedicated efforts of the program chairs,Sergio Rajsbaum and Kishore Kothapalli (Distributed Computing) and Jian-nong Cao and Mainak Chatterjee (Networking), and the Program Committeemembers We thank all the authors who submitted papers to the conference andall the reviewers for taking the time to provide thoughtful reviews Springer’scontinued support of ICDCN by publishing the main proceedings of the confer-ence is greatly appreciated

ICDCN 2014 featured a number of additional events, including keynote ers, panel discussion, workshops, tutorials, industry forum, and doctoral sympo-sium Rupak Biswas (NASA, Ames), Prasad Jayanti (Dartmouth College), andMisha Pavel (National Science Foundation, USA) gave the keynote talks.Thanks to the workshop chairs and their teams, four workshops on cutting-edge topics were planned:

speak-1 ComNet-IoT: Computing and Networking for Internet of Things

2 CoNeD: Complex Network Dynamics

3 VirtCC: Virtualization and Cloud Computing

4 SPBDA: Smarter Planet and Big Data Analytics

The workshops were held on the first day of the conference and were open

to all conference attendees This year ACM In-Cooperation status was solicitedfor the main conference as well as for each of the workshops, and the workshopproceedings are expected to appear in the ACM digital library

Sajal Das and Sukumar Ghosh, the Steering Commitee co-chairs, providedtheir guidance at every step of the planning process Their accumulated wisdomfrom steering the ICDCN conferences since inception was invaluable

Thanks to Amrita University’s vice-chancellor, Dr Venkat Rangan, for ing the conference, and to the organizing co-chairs, Prashant Nair and K Gan-gadharan, and their entire team at Amrita for excellent local arrangements Last

Trang 6

host-but not least, the generous support of the sponsors of the ICDCN conferenceand workshops is greatly appreciated.

On behalf of the entire ICDCN conference team, thanks to everyone whohelped make ICDCN 2014 a successful and memorable event

Dilip Krishnaswamy

Trang 7

It gives us great pleasure to present the proceedings of the 15th InternationalConference on Distributed Computing and Networking (ICDCN), which washeld during January 4–7, 2014, in Coimbatore, India Over the years, ICDCNhas grown as a leading forum for presenting state-of-the-art resrach in distributedcomputing and networking.

This year we received 110 submissions by authors from 26 countries To view these submissions and to create the technical program, a Technical ProgramCommittee (TPC) consisting of 57 experts in distributed computing and net-working was formed Eventually, 32 full papers and 8 short papers were selectedafter the review phase followed by the discussion phase All papers were reviewed

re-by at least three reviewers The help of additional reviewers was sought in somecases

Each track selected its best papers The selection was done by an adhoccommittee comprising four to five TPC members It is our pleasure to announcethat the Best Paper Award in the Distributed Computing Track was authored

by Varsha Dani, Valerie King, Mahnush Movahedi, and Jared Saia for the papertitled “Quorums Quicken Queries: Efficient Asynchronous Secure MultipartyComputation.” For the Networking track, the Best Paper was awarded to thepaper titled “InterCloud RAIDer: A Do It Yourself Multi-cloud Private DataBackup System” authored by Chih Wei Ling and Anwitaman Datta

Besides the technical sessions of ICDCN 2014, there were a number of otherevents including workshops, keynote speeches, tutorials, industry sessions, paneldiscussions, and a PhD forum

We thank all authors who submitted papers to ICDCN 2014 Compared

to previous years, we feel that the quality of the papers in terms of technicalnovelty was better We thank the Program Committee members and externalreviewers for their diligence and commitment, both during the reviewing processand during the online discussion phase We would also like to thank the generalchairs and the Organizing Committee members for their continuous support inmaking ICDCN 2014 a grand success

Jiannong CaoKishore KothapalliSergio Rajsbaum

Trang 8

ICDCN 2014 was organized by Amrita University, Coimbatore, India.

General Chairs

Program Chairs

Distributed Computing Track

Networking Track

SAR China

Doctoral Forum Chairs

Demo Chairs

Tutorial Chairs

Trang 9

Industry Track Chairs

Workshop Chairs

Nalini Venkatasubramanian University of California, Irvine, USA

Publicity Chairs

Advisory Board

Industry Track Chairs

Organizing Secretary

Steering Committee Co-chairs

Trang 10

Sanjoy Paul Accenture, India

Program Committee

Networking Track Program Committee

India

India

India

Trang 11

Dan Wang Hong Kong Polytechnic University, Hong Kong,

SAR ChinaNalini Venkatasubramanian University of California, Irvine, USA

Distributed Computing Track Program Committee

Germany

Sandeep HansWei-Lun Hung

Eleni KanellouMarcin KikKamil KluczniakYaron KoralAnissa LamaniI-Ting LeeErwan Le MerrerLukas Li

Xiapu LuoXiaoqiang MaAlex Matveev

Trang 12

Michal SzydelkoCorentin TraversVasileios Trigonakis

Prabhat UpadhyayWeichao WangShu YangYuan YangMarcin ZawadaMarek ZawirskiHang Zhao

Trang 13

Mutual Exclusion, Agreement, and Consensus

Fast Rendezvous on a Cycle by Agents with Different Speeds 1

Ofer Feinerman, Amos Korman, Shay Kutten, and Yoav Rodeh

Iterative Byzantine Vector Consensus in Incomplete Graphs 14

Nitin H Vaidya

Mutual Exclusion Algorithms in the Shared Queue Model 29

Junxing Wang and Zhengyu Wang

On the Signaling Problem 44

Gal Amram

Parallel and Multi-core Computing

Optimization of Execution Time under Power Consumption Constraints

in a Heterogeneous Parallel System with GPUs and CPUs 66

Pawel Czarnul and Pawel Ro´ sciszewski

Multicore Parallelization of the PTAS Dynamic Program

for the Bin-Packing Problem 81

Anirudh Chakravorty, Thomas George, and Yogish Sabharwal

Energy Accounting and Control with SLURM Resource and Job

Management System 96

Yiannis Georgiou, Thomas Cadeau, David Glesser, Danny Auble,

Morris Jette, and Matthieu Hautreux

Distributed Algorithms I

Asynchronous Reconfiguration for Paxos State Machines 119

Leander Jehl and Hein Meling

A Causal Checkpointing Algorithm for Mobile Computing

Environments 134

Astrid Kiehn, Pranav Raj, and Pushpendra Singh

Trang 14

Gathering and Exclusive Searching on Rings under Minimal

Assumptions 149

Gianlorenzo D’Angelo, Alfredo Navarra, and Nicolas Nisse

Online Algorithms to Generate Slices for Regular Temporal Logic

Predicates 165

Aravind Natarajan, Neeraj Mittal, and Vijay K Garg

Transactional Memory

HiperTM: High Performance, Fault-Tolerant Transactional Memory 181

Sachin Hirve, Roberto Palmieri, and Binoy Ravindran

Non-interference and Local Correctness in Transactional Memory 197

Petr Kuznetsov and Sathya Peri

A TimeStamp Based Multi-version STM Algorithm 212

Priyanka Kumar, Sathya Peri, and K Vidyasankar

Distributed Algorithms II

Optimized OR-Sets without Ordering Constraints 227

Madhavan Mukund, Gautham Shenoy R., and S.P Suresh

Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty

Computation 242

Varsha Dani, Valerie King, Mahnush Movahedi, and Jared Saia

Conscious and Unconscious Counting on Anonymous Dynamic

Networks 257

Giuseppe Antonio Di Luna, Roberto Baldoni, Silvia Bonomi, and

Ioannis Chatzigiannakis

On Probabilistic Snap-Stabilization 272

Karine Altisen and St´ ephane Devismes

P2P and Distributed Networks

Backward-Compatible Cooperation of Heterogeneous P2P Systems 287

Hoang Giang Ngo, Luigi Liquori, and Chan Hung Nguyen

Towards a Peer-to-Peer Bandwidth Marketplace 302

Mihai Capot˘ a, Johan Pouwelse, and Dick Epema

A Fault Tolerant Parallel Computing Scheme of Scalar Multiplication

for Wireless Sensor Networks 317

Yanbo Shou and Herv´ e Guyennet

Trang 15

Conflict Resolution in Heterogeneous Co-allied MANET:

A Formal Approach 332

Soumya Maity and Soumya K Ghosh

Resource Sharing and Scheduling

Batch Method for Efficient Resource Sharing in Real-Time Multi-GPU

Systems 347

Uri Verner, Avi Mendelson, and Assaf Schuster

Impairment-Aware Dynamic Routing and Wavelength Assignment

in Translucent Optical WDM Networks 363

Sriharsha Varanasi, Subir Bandyopadhyay, and Arunita Jaekel

Mobility Aware Charge Scheduling of Electric Vehicles for Imbalance

Reduction in Smart Grid 378

Joy Chandra Mukherjee and Arobinda Gupta

Effective Scheduling to Tame Wireless Multi-Hop Forwarding 393

Chen Liu, Janelle Harms, and Mike H MacGregor

Cellular and Cognitive Radio Networks

Dynamic Gateway Selection for Load Balancing in LTE Networks 408

Sakshi Patni and Krishna M Sivalingam

Exploiting Scalable Video Coding for Content Aware Downlink Video

Delivery over LTE 423

Ahmed Ahmedin, Kartik Pandit, Dipak Ghosal, and Amitabha Ghosh

Stochastic Model for Cognitive Radio Networks under Jamming

Attacks and Honeypot-Based Prevention 438

Suman Bhunia, Xing Su, Shamik Sengupta, and Felisa V´ azquez-Abad

Backbone Networks

InterCloud RAIDer: A Do-It-Yourself Multi-cloud Private Data Backup

System 453

Chih Wei Ling and Anwitaman Datta

Improved Heterogeneous Human Walk Mobility Model with Hub

and Gateway Identification 469

Zunnun Narmawala and Sanjay Srivastava

FlowMaster: Early Eviction of Dead Flow on SDN Switches 484

Kalapriya Kannan and Subhasis Banerjee

Trang 16

Short Papers

A Simple Lightweight Encryption Scheme for Wireless Sensor

Networks 499

Kamanashis Biswas, Vallipuram Muthukkumarasamy,

Elankayer Sithirasenan, and Kalvinder Singh

Analyzing the Network Connectivity Probability of a Linear VANET

in Nakagami Fading Channels 505

Ninsi Mary Mathew and Neelakantan P.C.

Max-Min-Path Energy-Efficient Routing Algorithm – A Novel

Approach to Enhance Network Lifetime of MANETs 512

Vijayalakshmi Ponnuswamy, Sharmila Anand John Francis, and

Abraham Dinakaran J.

Towards a New Internetworking Architecture: A New Deployment

Approach for Information Centric Networks 519

Amine Abidi, Sonia Mettali Gammar, Farouk Kamoun,

Walid Dabbous, and Thierry Turletti

Energy-Efficient Multimedia Communication for Cognitive Radio

Networks 525

Ansuman Bhattacharya, Koushik Sinha, and Bhabani P Sinha

Stabilizing Dining with Failure Locality 1 532

Hyun Chul Chung, Srikanth Sastry, and Jennifer L Welch

Machine Learning in a Policy Driven Grid Environment 538

Kumar Dheenadayalan, Maulik Shah, Abhishek Badjatya, and

Biswadeep Chatterjee

Not So Synchronous RPC: RPC with Silent Synchrony Switch

for Avoiding Repeated Marshalling of Data 544

Fatema Tuz Zohora, Md Yusuf Sarwar Uddin, and

Johra Muhammad Moosa

Author Index 551

Trang 17

with Different Speeds

Ofer Feinerman1,, Amos Korman2,, Shay Kutten3,, and Yoav Rodeh4

1 The Shlomo and Michla Tomarin Career Development Chair,

Weizmann Institute of Science, Rehovot, Israel

2 CNRS and University Paris Diderot, Paris, France

3 Faculty of IR&M, Technion, Haifa 32000, Israel

4 Jerusalem College of Engineering

Abstract The difference between the speed of the actions of different

processes is typically considered as an obstacle that makes the ment of cooperative goals more difficult In this work, we aim to highlightpotentialbenefits of such asynchrony phenomena to tasks involving sym-

achieve-metry breaking Specifically, in this paper, identical (except for theirspeeds) mobile agents are placed at arbitrary locations on a (continuous)cycle of length n and use their speed difference in order to rendezvous

fast We normalize the speed of the slower agent to be 1, and fix thespeed of the faster agent to be somec > 1 (An agent does not know

whether it is the slower agent or the faster one.) The straightforward

distributed-race (DR) algorithm is the one in which both agents simply

start walking until rendezvous is achieved It is easy to show that, inthe worst case, the rendezvous time of DR isn/(c − 1) Note that in the

interesting case, wherec is very close to 1 (e.g., c = 1+1/n k), this bound

becomes huge Our first result is a lower bound showing that, up to amultiplicative factor of 2, this bound is unavoidable, even in a model thatallows agents to leave arbitrary marks (thewhite board model), even as-

suming sense of direction, and even assumingn and c are known to agents.

That is, we show that under such assumptions, the rendezvous time ofany algorithm is at least 2(c−1) n ifc  3 and slightly larger (specifically,

n

matches the lower bound for the casec  2, and almost matches it when

c > 2 Moreover, our algorithm performs under weaker assumptions than

those stated above, as it does not assume sense of direction, and it allowsagents to leave only a single mark (a pebble) and only at the place wherethey start the execution Finally, we investigate the setting in which nomarks can be used at all, and show tight bounds forc  2, and almost

tight bounds forc > 2.

Keywords: rendezvous, asynchrony, heterogeneity, speed, cycle, pebble,

white board, mobile agents

Supported by the Clore Foundation, the Israel Science Foundation (FIRST grant

no 1694/10) and the Minerva Foundation

 Supported by the ANR project DISPLEXITY, and by the INRIA project GANG.

Supported in part by the ISF and by the Technion TASP center.

M Chatterjee et al (Eds.): ICDCN 2014, LNCS 8314, pp 1–13, 2014.

c

 Springer-Verlag Berlin Heidelberg 2014

Trang 18

1 Introduction

The difference between the speed of the actions of different entities is typicallyconsidered disruptive in real computing systems In this paper, we illustrate

some advantages of such phenomena in cases where the difference remains fixed

throughout the execution1 We demonstrate the usefulness of this manifestation

of asynchrony to tasks involving symmetry breaking More specifically, we showhow two mobile agents, identical in every aspect save their speed, can lever theirspeed difference in order to achieve fast rendezvous

Symmetry breaking is a major issue in distributed computing that is pletely absent from traditional sequential computing Symmetry can often pre-vent different processes from reaching a common goal Well known examplesinclude leader election [3], mutual exclusion [14], agreement [4,25] and renaming[6] To address this issue, various differences between processes are exploited Forexample, solutions for leader election often rely on unique identifiers assumed

com-to be associated with each entity (e.g., a process) [3] Another example of adifference is the location of the entities in a network graph Entities located indifferent parts of a non-symmetric graph can use this knowledge in order tobehave differently; in such a case, a leader can be elected even without usingunique identifiers [26] If no differences exist, breaking symmetry deterministi-cally is often impossible (see, e.g., [3,27]) and one must resort to randomizedalgorithms, assuming that different entities can draw different random bits [19]

We consider mobile agents aiming to rendezvous See, e.g., [7,13,22,23,24,27]

As is the case with other symmetry breaking problems, it is well known that if theagents are completely identical then rendezvous is, in some cases, impossible Infact, a large portion of the research about rendezvous dealt with identifying theconditions under which rendezvous was possible, as a result of some asymetries.Here, the fact that agents have different speeds implies that the mere feasibility ofrendezvous is trivial, and our main concern is therefore the time complexity, that

is, the time to reach a rendezvous More specifically, we study the case where theagents are identical except for the fact that they have different speeds of motion.Moreover, to isolate the issue of the speed difference, we remove other possibledifferences between the agents For example, the agents, as well as the graphover which the agents walk, are assumed to be anonymous To avoid solutions

of the kind of [26], we consider a symmetric graph, that is, specifically, a cycletopology Further symmetry is obtained by hiding the graph features That is,

an agent views the graph as a continuous cycle of length n, and cannot even

distinguish between the state it is at a node and the state it is walking over anedge

1Advantages can also be exploited in cases where the difference in speed follows some

stochastic distribution, however, in this initial study, we focus on the simpler fullydeterministic case That is, we assume a speed heterogeneity that is arbitrary butfixed throughout the execution

Trang 19

1.2 The Model and the Problem

The problem of rendezvous on a cycle: Consider two identical deterministic agents placed on a cycle of length n (in some distance units) To ease the descrip- tion, we name these agents A and B but these names are not known to the agents.

Each agent is initially placed in some location on the cycle by an adversary andboth agents start the execution of the algorithm simultaneously An agent canmove on the cycle at any direction Specifically, at any given point in time, anagent can decide to either start moving, continue in the same direction, stop,

or change its direction The agents’ goal is to rendezvous, namely, to get to be

co-located somewhere on the cycle2 We consider continuous movement, so thisrendezvous can occur at any location along the cycle An agent can detect thepresence of another agent at its location and hence detect a rendezvous Whenagents detect a rendezvous, the rendezvous task is considered completed

Orientation issues: We distinguish between two models regarding orientation The first assumes that agents have the sense of direction [8], that is, we assume

that the agents can distinguish clockwise from the anti-clockwise In the secondmodel, we do not assume this orientation assumption Instead, each agent hasits own perception of which direction is clockwise and which is anti-clockwise,but there is no guarantee that these perceptions are globally consistent (Hence,e.g., in this model, if both agents start walking in their own clockwise direction,they may happen to walk in opposite directions, i.e., towards each other)

The pebble and the white board models: Although the agents do not hold any

direct means of communication, in some cases we do assume that an agent canleave marks in its current location on the cycle, to be read later by itself and by

the other agent In the pebble model, an agent can mark its location by dropping

a pebble [10,11] Both dropping and detecting a pebble are local acts takingplace only on the location occupied by the agent We note that in the case wherepebbles can be dropped, our upper bound employs agents that drop a pebbleonly once and only at their initial location [1,9,24] On the other hand, ourcorresponding lower bound holds for any mechanism of (local) pebble dropping

Moreover, this lower bound holds also for the seemingly stronger ’white board

model, in which an agent can change a memory associated with its currentlocation such that it could later be read and further manipulated by itself or theother agent [20,16,17]

Speed: Each agent moves at the same fixed speed at all times; the speed of

an agent A, denoted s(A), is the inverse of the time t α it takes agent A to

2In some sense, this rendezvous problem reminds also the cow-path problem, see,

e.g., [5] Here, the agents (the cow and the treasure she seeks to find) are bothmobile (in the cow-path problem only one agent, namely, the cow, is mobile) It wasshown in [5] that if the cow is initially located at distanceD from the treasure on

the infinite line then the time to find the treasure can be 9D, and that 9 is the best

multiplicative constant (up to lower order terms inD).

Trang 20

traverse one unit of length For agent B, the time t β and speed s(B) are defined analogously Without loss of generality, we assume that agent A is faster, i.e., s(A) > s(B) but emphasize that this is unknown to the agents themselves.

Furthermore, for simplicity of presentation, we normalize the speed of the slower

agent B to one, that is, s(B) = 1 and denote s(A) = c where c > 1 We stress that the more interesting cases are when c is a function of n and arbitrarily close

to 1 (e.g., c = 1 + 1/n k , for some constant k) We assume that each agent has

a pedometer that enables it to measure the distance it travels Specifically, a

(local) step of an agent is a movement of one unit of distance (not necessarily

all in the same direction, e.g., in one step, an agent can move half a step in onedirection and the other half in the other direction) Using the pedometer, agentscan count the number of steps they took (which is a real number at any given

time) In some cases, agents are assumed to posses some knowledge regarding n and c; whenever used, this assumption will be mentioned explicitly.

Time complexity: The rendezvous time of an algorithm is defined as the worst

case time bound until rendezvous, taken over all pairs of initial placements ofthe two agents on the cycle Note, a lower bound for the rendezvous time that isestablished assuming sense of direction holds trivially for the case where no sense

of direction is assumed All our lower bounds hold assuming sense of direction

The Distributed Race (DR) algorithm: Let us consider a trivial algorithm, called Distributed Race (DR), in which an agent starts moving in an arbitrary direction,

and continues to walk in that direction until reaching rendezvous Note that

this algorithm does not assume knowledge of n and c, does not assume sense

of direction and does not leave marks on the cycle The worst case for thisalgorithm is that both agents happen to walk on the same direction Without loss

of generality, assume this direction is clockwise Let d denote the the clockwise distance from the initial location of A to that of B The rendezvous time t thus satisfies t · s(A) = t · s(B) + d Hence, we obtain the following.

Observation 1 The rendezvous time of DR is d/(c − 1) < n/(c − 1).

Note that in the cases where c is very close to 1, e.g., c = 1 + 1/n k, for some

constant k, the bound on the rendezvous time of DR is very large.

Our first result is a lower bound showing that, up to a multiplicative mation factor of 2, the bound of DR mentioned in Observation 1 is unavoidable,even in the white board model, even assuming sense of direction, and even assum-

approxi-ing n and c are known to agents That is, we show that under such assumptions,

the rendezvous time of any algorithm is at least n

2(c−1) if c  3 and slightly

larger (specifically, c+1 n ) if c > 3 We then manage to construct an algorithm that matches the lower bound precisely for the case c  2, and almost matches

it when c > 2 Specifically, when c  2, our algorithm runs in time 2(c−1) n and

when c > 2, the rendezvous time is n/c (yielding a (2 −2c)-approximation when

Trang 21

2 < c  3, and a ( c+1 c )-approximation when c > 3) Moreover, our algorithm

performs under weaker assumptions than those stated above, as it does not sume sense of direction, and allows agents to leave only a single mark (a pebble)and only at the place where they start the execution

as-Finally, we investigate the setting in which no marks can be used at all, and

show tight bounds for c  2, and almost tight bounds for c > 2 Specifically, for

this case, we establish a tight bound of cn

c2−1 for the rendezvous time, in case

agents have sense of direction With the absence of sense of direction, the samelower bound of cn

c2−1 holds, and we obtain an algorithm matching this bound forthe case c  2, and rather efficient algorithms for the case c > 2 Specifically, the rendezvous time for the case c  2 is c2cn −1 , for the case 2 < c  3, the rendezvous

time is c+1 2n , and for the case c > 3, the rendezvous time is c−1 n

The following lower bound implies that DR is a 2-approximation algorithm, and

it becomes close to optimal when c goes to infinity.

Theorem 1 Any rendezvous algorithm in the white board model requires at least

2(c−1) , c+1 n } time, even assuming sense of direction and even assuming n and c are known to the agents.

Proof We assume that agents have sense of direction; hence, both agents start

walking at the same direction We first show that any algorithm in the whiteboard model requires 2(c−1) n time Consider the case that the adversary locates

the agents at symmetric locations of the cycle, i.e., they are at distance n/2 apart Now consider any algorithm used by the agents Let us fix any c  such

that 1 < c  < c, and define the (continuous) interval

I :=



 2(c − 1)



.

For every (real) i ∈ I, let us define the following (imaginary) scenario S i In

scenario S i , each agent executes the algorithm for i steps and terminates3 We

claim that for every i ∈ I, the situation at the end of scenario S i is completelysymmetric: that is, the white board at symmetric locations contain the sameinformation and the two agents are at symmetric locations We prove this claim

by induction The basis of the induction, the case i = 0, is immediate Let us assume that the claim holds for scenario S i , for (real) i ∈ I, and consider scenario Si+ , for any positive  such that  < n4(1− c 

c ) Our goal is to show that the claim holds for scenario S i+4

3We can think of this scenario as if each agent executes another algorithm B, in

which it simulates preciselyi steps of the original algorithm and then terminates.

4Note that for somei ∈ I and some  < n

4(1− c 

c), we may have thati +  /∈ I Our

proof will show that the claim for S i+ holds also in such cases However, since wewish to show that the claim holds forS j, wherej ∈ I, we are not really interested

in those cases, and are concerned only with the cases wherei +  ∈ I and i ∈ I.

Trang 22

Consider scenario S i+ During the time interval [0, i c), both agents perform

the same actions as they do in the corresponding time interval in scenario S i Let

a denote the location of agent A at time i/c Now, during the time period [ c i , i+ c ],

agent A performs some movement all of which is done at distance at most  from

a (during this movement it may write information at various locations it visits);

then, at time i+ c , agent A terminates.

Let us focus on agent B (in scenario S i+) during the time period [i c , i] We claim that during this time period, agent B is always at distance at least  from

a Indeed, as long as it is true that agent B is at distance at least  from a, it performs the same actions as it does in scenario S i (because it is unaware of

any action made by agent A in scenario S i+, during the time period [c i , i+ c ])

Therefore, if at some time t  ∈ [ i

c , i], agent B is (in scenario Si+) at distance less

than  from a then the same is true also for scenario S i However, in scenario S i,

by the induction hypothesis, agent B was at time i at ¯a, the symmetric location

of a, that is, at distance n/2 from a Thus, to get from a distance less than  from a to ¯a, agent B needs to travel a distance of n/2 − , which takes n/2 − 

time This is impossible since

 2c <

n

2 − , where the first inequality follows from the definition of I and the second follows from the definition of  It follows that during the time period from [ i

c , i), agent

B behaves (in scenario Si+) the same as it does in the corresponding time

period in scenario S i Therefore, according to the induction hypothesis, at the

corresponding i’th steps in scenario S i+ , agent B is at distance n/2 from where agent A is at its i’th step (recall, agent A is at a at its i’th step), and the cycle

configuration (including the white boards) is completely symmetric Now, since

 < n/4, during the time period [i, i + ], agent B is still at a distance more than

 from a and remains unaware of any action made by agent A, during the time

period [i c , i+ c ] (Similarly, agent A, during the time period [ c i , i+ c ], is unaware

of any action made by agent B during this time period.) Hence, at each time

i  ∈ [i, i + ], agent B takes the same action as agent A in the corresponding time i  /c This establishes the induction proof To sum up, we have just shown that for any i ∈ I, the cycle configuration at the end of scenario S iis completelysymmetric

Now assume by contradiction that the rendezvous time t is less than the claimed one, that is, t < 2(c−1) n At time t, both agents meet at some location

u Since t ∈ I, the above claim holds for St Hence, at time t/c, agent A is at ¯ u, the symmetric location of u Since rendezvous happened at time t, this means that agent A traveled from ¯ u to u (i.e., a distance of n/2) during the time period

[t

c , t] Therefore t(1 −1

c )c  n/2, contradicting the assumption that t < n

2(c−1).This establishes that any algorithm requires 2(c−1) n time

We now show the simpler part of the theorem, namely, that the rendezvoustime of any algorithm in the white board model is at least c+1 n Let us represent

the cycle as the reals modulo n, that is, we view the cycle as the continuous

Trang 23

collection of reals [0, n], where n coincides with 0 Assume that the starting point of agent A is 0 Consider the time period T = [0, c+1 n − ], for some small positive  In this time period, agent A moves a total length of less than c+1 nc.

Let r (and , correspondingly) be the furthest point from 0 on the cycle that A

reached while going clockwise (or anti-clockwise, correspondingly), during that

time period Note that there is a gap of length larger than n− c+1 nc =c+1 n between

 and r This gap corresponds to an arc not visited by agent A during this time period On the other hand, agent B walks a total distance of less than n

c+1during

the time period T Hence, the adversary can locate agent B initially at some point in the gap between r and , such that during the whole time period T , agent B remains in this gap This establishes the c+1 n time lower bound, andconcludes the proof of the theorem

Note that the assumptions of the pebble model are weaker than the white boardmodel Hence, in view of Theorem 1, the following theorem establishes a tight

bound for the case where c  2, a (2 −2c )-approximation for the case 2 < c  3, and a (c + 1)/c-approximation for the case c > 3.

Theorem 2 There exists an algorithm that in the pebble model whose

ren-dezvous time is max { n

2(c−1) , n c } Moreover, this algorithm does not assume sense

of direction, uses only one pebble and drops it only once: at the initial position of the agent The algorithm assumes that agents know n and whether or not c > 2 Proof Consider the following algorithm Each agent (1) leaves a pebble at its

initial position and then starts walking in an arbitrary direction while countingthe distance travelled If (2) an agent reaches a location with a pebble for the

first time and (3) the distance it walked is strictly less than τ := min{n/2, n/c},

then (4) the agent turns around and walks continuously in the other direction.First note that if both agents happen to start walking in opposite directions(due to lack of sense of direction), then they walk until they meet In this simple

case, their relative speed is c + 1, hence rendezvous happens in time at most n

c+1 < max{ 2(c−1) n , n c } For the remaining of the proof, we consider the case

that both agents start walking at the same direction, which is without loss of

generality, the clockwise direction Let d be the initial clockwise distance from

A to B Consider three cases.

1 d = τ

Here, no agent turns around In other words, they behave exactly as in

DR If d = n/2, Observation 1 implies that the rendezvous time is n

2(c−1)

Otherwise, c > 2 and d = n/c By Observation 1, the rendezvous is reached

earlier, specifically, by time c−1 d =c(c−1) n

2 d < τ

In this case, Agent A will reach B’s starting point v B , at time d/c, before

B reaches A’s starting point vA Moreover, agent B does not turn, since its

Trang 24

initial distance to A’s starting point is at least τ At time d/c, agent B is at distance d/c clockwise from v B By the algorithm, Agent A then turns and walks anti-clockwise The anti-clockwise distance from A to B is then n−d/c Their relative speed is c + 1 Hence, they will rendezvous in an additional

time of n−d/c 1+c , since no agent may turn around after time d/c Hence, the

total time for reaching rendezvous is at most

d/c + n − d/c

d + n

1 + c . This function is maximized when d = τ where it is τ +n 1+c Now, if c  2, we have τ = n/2 and the rendezvous time is therefore 2(1+c) 3n Since c  2, the

later bound is at most 2(c−1) n On the other hand, if c > 2, we have τ = n/c and the rendezvous time is n/c.

3 d > τ

In this case, A doesn’t turn when it hits B’s initial position Consider the

following sub-cases

(a) The agents meet before B reaches A’s initial position.

In this case, the rendezvous time (as in DR) is d/(c − 1) On the other hand, the rendezvous time is at most n − d since B did not reach A’s initial position So d/(c − 1)  n − d A simple calculation now implies that the rendezvous time d/(c − 1) is at most n/c.

(b) Agent B reaches A’s initial position before rendezvous.

In this case, Agent B walks for d  = n − d time to first reach A’s initial position We first claim that d  < τ One case is that c  2, and thus,

τ = n/2 Since d > τ , we have d  < n/2 = τ The other case is that

c > 2, so τ = n/c We claim that also in this case, we have d  < τ Otherwise, we would have had d   n/c, which would have meant that the faster agent A would have had, at least, n/c time before B reached the initial position of A So much time would have allowed it to cover the whole cycle This contradicts the assumption that B reached A’s initial

position before rendezvous This establishes the fact that, regardless of

the value of c, we have d  < τ This fact implies that when agent B reaches A’s initial position, it turns around and both agents go towards each other By the time B turns around, A has walked a distance of cd 

Hence, at that point in time, they are n − cd  apart This implies to thefollowing rendezvous time:

d +n − cd 

2n − d

1 + c . Now recall that we are in the case that agent B reaches A’s initial position before they rendezvous This implies that n−d < n/c Hence, the running

Trang 25

4 Rendezvous without Communication

In this section, we consider the case that agents cannot use are marks (e.g., bles) to mark their location More generally, the agents cannot communicate inany way (before rendezvous)

peb-Theorem 3 Consider the setting in which no communication is allowed, and

assume both n and c are known to the agents.

1 The rendezvous time of any algorithm is, at least, cn

c2−1 , even assuming sense

Proof Let us first show the first part of the theorem, namely, the lower bound.

the algorithm, that is, the maximum time (over all initial placements and all

cycles of length n) for the agents (executing this algorithm) to reach rendezvous.

Recall, in this part of the theorem, we assume that agents have sense of direction.Without loss of generality, we assume that the direction an agent starts walking

(in particular, h(v) = u).

For each time t ∈ [0, ˆt], let d(t) denote the clockwise distance between the location b t ∈ CB of the slower agent B at time t and the homologous location h(at)∈ CB of the location a t ∈ CA of the faster agent A at time t Note that d(t) is a real value in [0, n) Initially, we assume that all reals in [0, n) are colored white As time passes, we color the corresponding distances by black, that is, at every time t, we color the distance d(t) ∈ [0, n) by black Note that the size of

the set of black distances is monotonously non-decreasing with time

We first claim that, by time ˆt, the whole range [0, n) is colored black To prove

by contradiction, assume that there is a real d ∈ [0, n) that remains white Now, consider the execution on a single cycle of length n, where agent A is initially

Trang 26

placed at anti-clockwise distance d from agent B In such a case, rendezvous is

not reached by time ˆt, contrary to the assumption that it is This implies that the time T it takes until all reals in [0, n) are colored black in the imaginary scenario, is a lower bound on the rendezvous time, that is, T  ˆt It is left to analyze the time T

With time, the change in the distance d(t) has to follow two rules:

– R1 After one time unit, the distance can change by at most 1 + c (the sum

of the agents’ speeds)

– R2 At time x, the distance, in absolute value is, at most, x(c − 1).

To see why Rule R2 holds, recall that the programs of the agents are identical

Hence, if agent A is at some point a ∈ C A , at A’s kth step, then agent B is at point b = h(a) at its own kth step This happens for agent B at time k and for agent A at time k/c Since A’s speed is c, the maximum it can get away from point a during the time period from k/c until c is c(k − k/c) = k(c − 1) Consider the path P := d(t) covering the range [0, n) in T time First, note that this path P may go several times through the zero point (i.e., when d(t) = 0).

At a given time s, we say that the path is on the right side, if the last time it left the zero point before time s was while going towards 1 Similarly, the path

is on the left, if the last time it left the zero point before time s was while going towards n − 1 Let x denote the largest point on the range [0, n) reached by the path while the path was on the right side Let y = n − x By time T , path P had to go left to distance y from the zero point Assume, w.l.o.g that x < y (In particular, x may be zero.) The fastest way to color these two points (and all

the rest of the points, since those lie between them), would be to go from zero

to the right till reaching x, then return to zero and go to distance y on the left Hence, T will be at least: T  c−1 x +c+1 n Indeed, Rule R2, applied to the time

of reaching distance x, implies the first term above The second term uses Rule R1 to capture the time that starts with the distance reaching x, proceeds with the distance reaching the zero point and ends when the distance reaches y when going left Since c > 1, we obtain

On the other hand, applying Rule R2 to the final destination y, we have T (c −

1) y = n − x This implies that:

Combining Equations 1 and 2, we get T  c2cn −1 This establishes the first part of

the theorem We now prove the second and third parts of the theorem, namely,the upper bounds

Proof of Parts 2 and 3: Note that the DR algorithm does not assume sense

of direction, and its complexity is the one required by the third part of the

theorem for the case c > 3 We now revise DR and consider an algorithm, called

Trang 27

Turn(k), which consists of two stages At the first stage, the agent walks over its

own clockwise direction for k steps Subsequently (if rendezvous hasn’t occurred

yet), the agent executes the second stage of the algorithm: it turns around andgoes in the other direction until rendezvous

Let us now concentrate on proving the second part of the theorem, and

as-sume that agents have sense of direction Here we consider Algorithm Turn(k),

c2−1 Since we assume sense of direction, both agents walk

initially in the same direction (clockwise) Assume by contradiction that

ren-dezvous hasn’t occurred by time k By that time, agent B took k steps Agent

A took those k steps by time k/c At that time, agent A turns (However, agent

B will turn only at time k) Hence, between those two turning times, there is a time duration k(1 −1c) where the two agents walk towards each other Hence,

at each time unit they shorten the distance between them by 1 + c Let d 

de-note the maximum distance between the agents at time k/c It follows that

d  > k(1 −1c )(1 + c) = n A contradiction This establishes the second part of

the theorem

We now prove the third part of the theorem, which focuses on the case where

no sense of direction is assumed Let us first consider the case c  2 Here we

apply the same algorithm above, namely Algorithm Turn(k), with parameter

k = c2cn −1 As proved before, if the two agents happen to start at the same

direction then rendezvous occurs by time c2cn −1 Hence, let us consider the case

that both agents walk initially at opposite directions Assume by contradiction,

that rendezvous hasn’t occurred by time k/c In this case, by time k/c the faster agent A walked k steps toward B, and the slower agent B walked k/c steps towards A Hence, the initial distance between them must be greater than k(1 + 1/c) = n/(c − 1) > n, a contradiction This proves the first item in Part 3

of the Theorem

Note that Algorithm DR establishes the third item in Part 3 of the Theorem

Hence, it is left to prove the second item in Part 3, namely, the case 2 < c  3.

For this case, we apply Algorithm Turn(k), with parameter k = c+1 cn First note,

if the two agents happen to start walking towards each other they continue to

do that until time k/c = c+1 n , hence they would meet by this time Therefor, wemay assume that initially, both agents start in the same direction In this case, if

rendezvous haven’t occurred by time k/c, then at this time agent A turns around, and both agents walk towards each other for at least k(1 − 1/c) more time (the time when agent B is supposed to turn) Since c > 2, we have k(1 − 1/c) > k/c, and hence, from the time agent A turns, both agents walk towards each other

We show how some form of asynchrony could be useful for solving a symmetrybreaking problem efficiently Our study could be considered as a first attempt

to harness the (unknown) heterogeneity between individuals in a cooperativepopulation towards more efficient functionality

Trang 28

There are many natural ways of further exploring this idea in future work.First, we have studied the exploitation of asynchrony for a specific kind of prob-lems It seems that it can be useful for other symmetry breaking problems as well.Another generalization: the “level” of asynchrony considered in this paper is very

limited: the ratio c between the speeds of the agents is the same throughout the

execution, and is known to the agents Exploiting a higher level of asynchronyshould also be studied, for example, the case that the speed difference is stochas-tic and changes through time

Our main interest was the exploitation of asymmetry, rather than the specificproblem of rendezvous Still, even for the rendezvous problem, this current studyleaves many open questions First, even for the limited case we study, not all ourbounds are completely tight, and it would be interesting to close the remaininggaps between our lower and upper bounds (these gaps hold for some cases when

c > 2) In addition, it would be interesting to study further the uniform case [21],

in which n and c are not known to agents Another direction is to generalize the

study to multiple agents (more than two, see, e.g., [15,18]) and to other graphclasses This would also allow one to study interactions between various means

of breaking symmetry (such as different speeds together with different locations

Asyn-5 Baeza-Yates, R.A., Culberson, J.C., Rawlins, G.J.E.: Searching in the plane form and Comput 106(2), 234–252 (1993)

In-6 Attiya, H., Bar-Noy, A., Dolev, D., Peleg, D., Reischuk, R.: Renaming in an chronous environment Journal of the ACM 37(3), 524–548 (1990)

asyn-7 Bampas, E., Czyzowicz, J., Gasieniec, L., Ilcinkas, D., Labourel, A.: Almost Op-timal Asynchronous Rendezvous in Infinite Multidimensional Grids In: Lynch,N.A., Shvartsman, A.A (eds.) DISC 2010 LNCS, vol 6343, pp 297–311 Springer,Heidelberg (2010)

8 Barri´ere, L., Flocchini, P., Fraigniaud, P., Santoro, N.: Rendezvous and Election ofMobile Agents: Impact of Sense of Direction Theory Comput Syst 40(2), 143–162(2007)

9 Baston, V., Gal, S.: Rendezvous search when marks are left at the starting points.Naval Research Logistics 48(8), 722–731 (2001)

10 Bender, M.A., Fernandez, A., Ron, D., Sahai, A., Vadhan, S.: The power of apebble: Exploring and mapping directed graphs In: Proc 30th ACM Symp onTheory of Computing (STOC), pp 269–287 (1998)

Trang 29

11 Blum, M., Kozen, D.: On the power of the compass (or, why mazes are easier tosearch than graphs) In: 19th Annual Symposium on Foundations of ComputerScience (FOCS 1978), October 16-18 (1978)

12 Czyzowicz, J., Dobrev, S., Krizanc, D., Kranakis, E.: The Power of Tokens: dezvous and Symmetry Detection for Two Mobile Agents in a Ring In: Geffert, V.,Karhum¨aki, J., Bertoni, A., Preneel, B., N´avrat, P., Bielikov´a, M (eds.) SOFSEM

Ren-2008 LNCS, vol 4910, pp 234–246 Springer, Heidelberg (2008)

13 Czyzowicz, J., Ilcinkas, D., Labourel, A., Pelc, A.: Asynchronous deterministicrendezvous in bounded terrains Theor Comput Sci 412(50), 6926–6937 (2011)

14 Dijkstra, E.W.: Self-stabilizing systems in spite of distributed control cations of the ACM 17(11), 643–644 (1974)

Communi-15 Dobrev, S., Flocchini, P., Prencipe, G., Santoro, N.: Multiple Agents RendezVous in

a Ring in Spite of a Black Hole In: Papatriantafilou, M., Hunel, P (eds.) OPODIS

2003 LNCS, vol 3144, pp 34–46 Springer, Heidelberg (2004)

16 Flocchini, P., Nayak, A., Schulz, A.: Cleaning an Arbitrary Regular Networkwith Mobile Agents In: Chakraborty, G (ed.) ICDCIT 2005 LNCS, vol 3816,

19 Itai, A., Rodeh, M.: Symmetry Breaking in Distributive Networks In: FOCS, pp.150–158 (1981)

20 Korach, E., Kutten, S., Moran, S.: A Modular Technique for the Design of EfficientDistributed Leader Finding Algorithms In: ACM PODC 1985, pp 163–174 (1985)

21 Korman, A., Sereni, J.-S., Viennot, L.: Toward More Localized Local Algorithms:Removing Assumptions Concerning Global Knowledge In: ACM PODC 2011, pp.49–58 (2011)

22 Kranakis, E., Krizanc, D., Markou, E.: The Mobile Agent Rendezvous Problem inthe Ring Morgan & Claypool Publishers (2010)

23 Kranakis, E., Krizanc, D., Rajsbaum, S.: Mobile Agent Rendezvous: A Survey.In: Flocchini, P., Gasieniec, L (eds.) SIROCCO 2006 LNCS, vol 4056, pp 1–9.Springer, Heidelberg (2006)

24 Kranakis, E., Santoro, N., Sawchuk, C.: Mobile Agent Rendezvous in a Ring In:ICDCS 2003, pp 592–599 (2003)

25 Suzuki, I., Yamashita, M.: Distributed Anonymous Mobile Robots: Formation ofGeometric Patterns SIAM J Computing 28(4), 1347–1363 (1999)

26 Yamashita, M., Kameda, T.: Computing on an Anonymous Network In: ACMPODC 1988, pp 117–130 (1988)

27 Yu, X., Yung, M.: Agent Rendezvous: A Dynamic Symmetry-Breaking Problem.In: Meyer auf der Heide, F., Monien, B (eds.) ICALP 1996 LNCS, vol 1099,

pp 610–621 Springer, Heidelberg (1996)

Trang 30

in Incomplete Graphs

Nitin H VaidyaDepartment of Electrical and Computer Engineering,

University of Illinois at Urbana-Champaign

nhv@illinois.edu

Abstract This work addresses Byzantine vector consensus, wherein the

input at each process is a d-dimensional vector of reals, and each cess is required to decide on a decision vector that is in the convex hull

pro-of the input vectors at the fault-free processes [9,12] The input vector

at each process may also be viewed as a point in the d-dimensional

Eu-clidean space Rd , where d > 0 is a finite integer Recent work [9,12] has

addressed Byzantine vector consensus, and presented algorithms with timal fault tolerance in complete graphs This paper considers Byzantine

op-vector consensus in incomplete graphs using a restricted class of iterative

algorithms that maintain only a small amount of memory across tions For such algorithms, we prove a necessary condition, and a suffi-cient condition, for the graphs to be able to solve the vector consensusproblem iteratively We present an iterative Byzantine vector consensusalgorithm, and prove it correct under the sufficient condition The nec-essary condition presented in this paper for vector consensus does not

itera-match with the sufficient condition for d > 1; thus, a weaker condition

may potentially suffice for Byzantine vector consensus

This work addresses Byzantine vector consensus (BVC), wherein the input at each process is a d-dimensional vector consisting of d real numbers, and each process is required to decide on a decision vector that is in the convex hull of the input vectors at the fault-free processes [9,12] The input vector at each process

may also be viewed as a point in the d-dimensional Euclidean space R d, where

d > 0 is a finite integer Due to this correspondence, we use the terms point and vector interchangeably Recent work [9,12] has addressed Byzantine vector

consensus, and presented algorithms with optimal fault tolerance in completegraphs The correctness conditions for Byzantine vector consensus (elaboratedbelow) cannot be satisfied by independently performing consensus on each ele-ment of the input vectors; therefore, new algorithms are necessary [9,12]

In this paper, we consider Byzantine vector consensus in incomplete graphs

us-ing a restricted class of iterative algorithms that maintain only a small amount

of memory across iterations We prove a necessary condition, and a sufficientcondition, for the graphs to be able to solve the vector consensus problem using

M Chatterjee et al (Eds.): ICDCN 2014, LNCS 8314, pp 14–28, 2014.

c

 Springer-Verlag Berlin Heidelberg 2014

Trang 31

such restricted algorithms We present an iterative Byzantine vector consensusalgorithm, and prove it correct under the sufficient condition; our proof of cor-rectness follows a structure previously used in our work to prove correctness ofother consensus algorithms [11,14] The use of matrix analysis tools in our proofs

is inspired by the prior work on non-fault tolerant consensus (e.g., [6]) For lack

of space, the proofs of most claims in the paper are omitted here Further detailscan be found in [15] The necessary condition presented in this paper for vec-

tor consensus does not match with the sufficient condition for d > 1; thus, it is

possible that a weaker condition may also suffice for Byzantine vector consensus

This paper extends our past work on scalar consensus (i.e., consensus with

scalar inputs) in incomplete graphs in presence of Byzantine faults [13], ing similarly restricted iterative algorithms The work in [13] yielded an exactcharacterization of graphs in which the scalar Byzantine consensus problem issolvable

us-Related Work: Approximate consensus has been previously explored in

syn-chronous as well as asynsyn-chronous systems Dolev et al [3] were the first toconsider approximate consensus in presence of Byzantine faults in asynchronoussystems Subsequently, for complete graphs, Abraham, Amit and Dolev [1] estab-lished that approximate Byzantine consensus is possible in asynchronous systems

if n ≥ 3f +1 Other algorithms for approximate consensus in presence of

Byzan-tine faults have also been proposed (e.g., [4]) Scalar consensus in incomplete

graphs under a malicious fault model in which the faulty nodes are restricted

to sending identical messages to their neighbors has also been explored by otherresearchers (e.g., [7,8])

The paper is organized as follows Section 2 presents our system model Theiterative algorithm structure considered in our work is presented in Section 3.Section 4 presents a necessary condition, and Section 5 presents a sufficient con-dition Section 5 also presents an iterative algorithm and proves its correctnessunder the sufficient condition The paper concludes with a summary in Section 6

The system is assumed to be synchronous.1The communication network is

mod-eled as a simple directed graph G( V, E), where V = {1, , n} is the set of n

processes, andE is the set of directed edges between the processes in V Thus,

|V| = n We assume that n ≥ 2, since the consensus problem for n = 1 is trivial Process i can reliably transmit messages to process j, j = i, if and only if the directed edge (i, j) is in E Each process can send messages to itself as well,

however, for convenience of presentation, we exclude self-loops from setE That

is, (i, i) ∈ E for i ∈ V We will use the terms edge and link interchangeably For each process i, let N −

i be the set of processes from which i has incoming edges That is, N −

i ={ j | (j, i) ∈ E } Similarly, define N+

i as the set of processes

to which process i has outgoing edges That is, N i+ = { j | (i, j) ∈ E } Since

1 Analogous results can be similarly derived for asynchronous systems, using the

asyn-chronous algorithm structure presented in [13] for the case of d = 1.

Trang 32

we exclude self-loops fromE, i ∈ N −

tentially collaborate with each other Moreover, the faulty processes are assumed

to have a complete knowledge of the execution of the algorithm, including thestates of all the processes, contents of messages the other processes send to eachother, the algorithm specification, and the network topology

We use the notation |X| to denote the size of a set or a multiset, and the

notationx to denote the absolute value of a real number x.

Byzantine vector consensus: We are interested in iterative algorithms that satisfy the following conditions in presence of up to f Byzantine faulty processes:

– Termination: Each fault-free process must terminate after a finite number

of iterations

– Validity: The state of each fault-free process at the end of each iteration

must be in the convex hull of the d-dimensional input vectors at the

fault-free processes

– -Agreement: When the algorithm terminates, the l-th elements of the

deci-sion vectors at any two fault-free processes, where 1≤ l ≤ d, must be within

 of each other, where  > 0 is a pre-defined constant.

Any information carried over by a process from iteration t to iteration t + 1 is considered the state of process t at the end of iteration t The above validity

condition forces the algorithms to maintain “minimal” state, for instance, cluding the possibility of remembering messages received in several of the pastiterations, or remembering the history of detected misbehavior of the neighbors

pre-We focus on such restricted algorithms with the iterative structure below

Iterative structure: Each process i maintains a state variable vi, which is a

d-dimensional vector The initial state of process i is denoted as vi[0], and it

equals the input provided to process i For t ≥ 1, vi [t] denotes the state of process i at the end of the t-th iteration of the algorithm At the start of the t-th iteration (t ≥ 1), the state of process i is vi [t − 1] The iterative algorithms

of interest will require each process i to perform the following three steps in the t-th iteration Each “value” referred in the algorithm below is a d-dimensional vector (or, equivalently, a point in the d-dimensional Euclidean space).

1 Transmit step: Transmit current state, namely v i [t −1], on all outgoing edges

Trang 33

3 Update step: Process i updates its state using a transition function T i as

follows T i is a part of the specification of the algorithm, and takes as input

the multiset r i [t] and state v i [t − 1].

The decision (or output) of each process equals its state when the algorithmterminates

We assume that each element of the input vector at each fault-free process

is lower bounded by a constant μ and upper bounded by a constant U The

iterative algorithm may terminate after a number of rounds that is a function of

μ and U μ and U are assumed to be known a priori This assumption holds in

many practical systems, because the input vector elements represent quantitiesthat are constrained For instance, if the input vectors represent locations in

3-dimensional space occupied by mobile robots, then U and μ are determined

by the boundary of the region in which the robots are allowed to operate [12]

In Section 4, we develop a necessary condition that the graph G( V, E) must

satisfy in order for the Byzantine vector consensus algorithm to be solvable usingthe above iterative structure In Section 5, we develop a sufficient condition, suchthat the Byzantine vector consensus algorithm is solvable using the above itera-tive structure in any graph that satisfies this condition We present an iterativealgorithm, and prove its correctness under the sufficient condition

Hereafter, when we say that an algorithm solves Byzantine vector consensus, we

mean that the algorithm satisfies the termination, validity and -agreement

con-ditions stated above Thus, the state the algorithm can carry across iterations isrestricted by the above validity condition Also, hereafter when we refer to an iter-ative algorithm, we mean an algorithm with the structure specified in the previous

section In this section, we state a necessary condition on graph G( V, E) to be able

to solve Byzantine vector consensus First we present three definitions

Definition 1

e0 corresponds to the origin in the d-dimensional Euclidean space.

to 2, and the remaining elements equal to 0 Recall that  is the parameter

of the -agreement condition.

Definition 2 For empty disjoint sets of processes A and B, and a

Trang 34

Definition 3. H(X) denotes the convex hull of a multiset of points X.

Now we state the necessary condition

Condition NC: For any partition V0, V1, · · · , Vp, C, F of set V, where 1 ≤ p ≤ d,

Vk = ∅ for 0 ≤ k ≤ p, and |F | ≤ f, there exist i, j (0 ≤ i, j ≤ p, i = j), such that

V i ∪ C −→ Vj f That is, there are f + 1 incoming links from processes in Vi ∪ C to some process

in Vj.

The proof of the necessary condition below extends the proofs of necessaryconditions in [9,12,13]

Lemma 1 If the Byzantine vector consensus problem can be solved using an

iterative algorithm in G( V, E), then G(V, E) satisfies Condition NC.

Proof The proof is by contradiction Suppose that Condition NC is not true Then there exists a certain partition V0, V1, · · · , Vp, C, F such that Vk = ∅ (1 ≤

k ≤ p), |F | ≤ f, and for 0 ≤ i, k ≤ p, Vk ∪ C  −→ Vi f

Let the initial state of each process in V i be ei (0≤ i ≤ p) Suppose that all the processes in set F are faulty For each link (j, k) such that j ∈ F and k ∈ Vi

(0≤ i ≤ p), the faulty process j sends value ei to process j in each iteration.

We now prove by induction that if the iterative algorithm satisfies the validity

condition then the state of each fault-free process j ∈ Vi at the start of iteration

t equals ei , for all t > 0 The claim is true for t = 1 by assumption on the inputs

at the fault-free processes Now suppose that the claim is true through iteration

t, and prove it for iteration t + 1 Thus, the state of each fault-free process in Vi

at the start of iteration t equals e i, 0≤ i ≤ p.

Consider any fault-free process j ∈ Vi, where 0≤ i ≤ p In iteration t, process

j will receive vg [t − 1] from each fault-free incoming neighbor g, and receive

ei from each faulty incoming neighbor These received values form the multiset

rj [t] Since the condition in the lemma is assumed to be false, for any k = i,

−→ Vi,|Ak| ≤ f; therefore, all the processes in

Ak are potentially faulty Also, by assumption, the values received from all

fault-free processes equal their input, and the values received from faulty processes

in F equal e i Thus, due to the validity condition, process j must choose as its

new state a value that is in the convex hull of the set

Sk={em | m = k, 0 ≤ m ≤ p}.

Trang 35

where k = i Since this observation is true for each k = i, it follows that the new

state vj [t] must be a point in the convex hull of

1≤k≤p, k=i H(Sk ).

It is easy to verify that the above intersection only contains the point ei

There-fore, vj [t] = e i Thus, the state of process j at the start of iteration t + 1 equals

ei This concludes the induction

The above result implies that the state of each fault-free process remainsunchanged through the iterations Thus, the state of any two fault-free processes

The above lemma demonstrates the necessity of Condition NC Necessary

con-dition NC implies a lower bound on the number of processes n = |V| in G(V, E),

as stated in the next lemma

Lemma 2 Suppose that the Byzantine vector consensus problem can be solved

using an iterative algorithm in G( V, E) Then, n ≥ (d + 2)f + 1.

Proof Since the Byzantine vector consensus problem can be solved using an iterative algorithm in G( V, E), by Lemma 1, graph G must satisfy Condition

NC Suppose that 2≤ |V| = n ≤ (d + 2)f Then there exists p, 1 ≤ p ≤ d, such

that we can partitionV into sets V0, , Vp, F such that for each Vi , 0 < |Vi| ≤ f,

and|F | ≤ f Define C = ∅ Since |C ∪ Vi| ≤ f for each i, it is clear that this

When d = 1, the input at each process is a scalar For the d = 1 case, our

prior work [13] yielded a tight necessary and sufficient condition for Byzantine

consensus to be achievable in G( V, E) using iterative algorithms For d = 1, the

necessary condition stated in Lemma 1 is equivalent to the necessary condition in

[13] We previously showed that, for d = 1, the same condition is also sufficient [13] However, in general, for d > 1, Condition NC is not proved sufficient.

Instead, we prove the sufficiency of another condition stated in the next section

We now present Condition SC that is later proved to be sufficient for

achiev-ing Byzantine vector consensus in graph G( V, E) using an iterative algorithm.

Condition SC is a generalization of the sufficient condition presented in [13] for

Trang 36

Later in the paper we will present a Byzantine vector consensus algorithmnamed Byz-Iter that is proved correct in all graphs that saitsfy Condition SC.The proof makes use of Lemmas 3 and 4 presented below.

of each process in V must be at least (d + 1)f + 1 That is, for each i ∈ V,

that |F| ≤ f, a graph H(V F , E F ) is said to be a reduced graph, if: (i) V F=V−F, and (ii) E F is obtained by first removing from E all the links incident on the processes in F, and then removing up to df additional incoming links at each process in V F

Note that for a given G( V, E) and a given F, multiple reduced graphs may exist

(depending on the choice of the links removed at each process)

that |F| ≤ f Then, in any reduced graph H(VF , EF ), there exists a process that has a directed path to all the remaining processes in VF

The proof of Lemma 4 is omitted for lack of space This proof, and the otheromitted proofs in the paper, are presented in [15]

We prove that, if graph G( V, E) satisfies Condition SC, then Algorithm Byz-Iter

presented below achieves Byzantine vector consensus Algorithm Byz-Iter hasthe three-step structure described in Section 3

The proposed algorithm is based on the following result by Tverberg [10]

multiset Y containing at least (d + 1)f + 1 points in R d , there exists a partition

Y1, · · · , Yf +1 of Y into f + 1 non-empty multisets such that ∩ f +1 H(Yl)= ∅.

Trang 37

The points in Y above need not be distinct [10]; thus, the same point may occur multiple times in Y , and also in each of its subsets (Y l’s) above The partition

in Theorem 1 is called a Tverberg partition, and the points in ∩ f +1

l=1 H(Yl) inTheorem 1 are called Tverberg points

Algorithm Byz-Iter

Each iteration consists of three steps: Transmit, Receive, and Update:

1 Transmit step: Transmit current state v i [t − 1] on all outgoing edges.

2 Receive step: Receive values on all incoming edges These values form multiset r i [t] of size |N −

i | (If a message is not received from some

in-coming neighbor, then that neighbor must be faulty In this case, the

missing message value is assumed to be e0 by default Recall that we

assume a synchronous system.)

3 Update step: Form a multiset Z i [t] using the steps below:

C ⊆ ri [t] such that |C| = (d + 1)f + 1 Since |C| = (d + 1)f + 1, by

Theorem 1, such a Tverberg point exists

Z i [t] is a multiset; thus a single point may appear in Z i [t] more than

once Note that|Zi [t] | =  |r i [t] |

vi [t] as:

vi [t] = vi [t − 1] +z∈Z i [t] z

iter-ations, where t endis a constant defined later in Equation (10) The value of

tend depends on graph G( V, E), constants U and μ defined earlier in Section

3 and parameter  of -agreement.

The proof of correctness of Algorithm Byz-Iter makes use of a matrix resentation of the algorithm’s behavior Before presenting the matrix represen-tation, we introduce some notations and definitions related to matrices

We use boldface letters to denote matrices, rows of matrices, and their elements

For instance, A denotes a matrix, Ai denotes the i-th row of matrix A, and A ij

denotes the element at the intersection of the i-th row and the j-th column of

matrix A.

Trang 38

Definition 5 A vector is said to be stochastic if all its elements are

non-negative, and the elements add up to 1 A matrix is said to be row stochastic if each row of the matrix is a stochastic vector.

For matrix products, we adopt the “backward” product convention below, where

a ≤ b,

For a row stochastic matrix A, coefficients of ergodicity δ(A) and λ(A) are

Lemma 6 If all the elements in any one column of matrix A are lower bounded

by a constant γ, then λ(A) ≤ 1 − γ That is, if ∃g, such that Aig ≥ γ, ∀i, then

λ(A) ≤ 1 − γ.

LetF denote the actual set of faulty processes in a given execution of Algorithm

Byz-Iter Let |F| = ψ Thus, 0 ≤ ψ ≤ f Without loss of generality, suppose that processes 1 through (n −ψ) are fault-free, and if ψ > 0, processes (n−ψ+1) through n are faulty.

In the analysis below, it is convenient to view the state of each process as a

point in the d-dimensional Euclidean space Denote by v[0] the column vector

consisting of the initial states of the (n −ψ) fault-free processes The i-th element

of v[0] is vi [0], the initial state of process i Thus, v[0] is a vector consisting of

(n − ψ) points in the d-dimensional Euclidean space Denote by v[t], for t ≥ 1,

the column vector consisting of the states of the (n − ψ) fault-free processes at

the end of the t-th iteration The i-th element of vector v[t] is state v i [t].

Lemma 7 below states the key result that helps in proving the correctness ofAlgorithm Byz-Iter In particular, Lemma 7 allows us to use results for non-homogeneous Markov chains to prove the correctness of Algorithm Byz-Iter

updates performed by the fault-free processes in the t-th iteration (t ≥ 1) of Algorithm Byz-Iter can be expressed as

Trang 39

where M[t] is a (n −ψ)×(n−ψ) row stochastic matrix with the following property: there exists a reduced graph H[t], and a constant β (0 < β ≤ 1) that depends only on graph G( V, E), such that

if j = i or edge (j, i) is in H[t].

The proof is presented in [15]

Matrix M[t] above is said to be a transition matrix As the lemma states, M[t]

is a row stochastic matrix The proof of Lemma 7 shows how to identify a suitable

row stochastic matrix M[t] for each iteration t The matrix M[t] depends on t,

as well as the behavior of the faulty processes Mi [t] is the i-th row of transition

matrix M[t] Thus, (4) implies that

vi [t] = M i [t] v[t − 1]

That is, the state of any fault-free process i at the end of iteration t can be

expressed as a convex combination of the state of just the fault-free processes at

the end of iteration t −1 Recall that vector v only includes the state of fault-free

processes

Theorem 2 Algorithm Byz-Iter satisfies the termination, validity and

-agreement conditions.

Proof This proof follows a structure used to prove correctness of other

con-sensus algorithms in our prior work [14,11] Sections 5.4, 5.5 and 5.6 providethe proof that Algorithm Byz-Iter satisfies the three conditions for Byzantinevector consensus, and thus prove Theorem 2

Observe that M[t + 1] (M[t]v[t − 1]) = (M[t + 1]M[t]) v[t − 1] Therefore, by

repeated application of (4), we obtain for t ≥ 1,

stochastic matrix Recall that vector v only includes the state of fault-free

pro-cesses Thus, (5) implies that the state of each fault-free process i at the end of iteration t can be expressed as a convex combination of the initial state of the

fault-free processes Therefore, the validity condition is satisfied

Algorithm Byz-Iter stops after a finite number (t end ) of iterations, where t end

is a constant that depends only on G( V, E), U, μ and  Therefore, trivially,

the algorithm satisfies the termination condition Later, using (10) we define a

suitable value for t

Trang 40

5.6 Algorithm Byz-Iter Satisfies the -Agreement Condition

The proof structure below is derived from our previous work [14] wherein we

proved the correctness of an iterative algorithm for scalar Byzantine consensus (i.e., the case of d = 1), and its generalization to a broader class of fault sets

r depends only on G( V, E) and f, and it is finite Note that |RF| ≤ r.

For each reduced graph H ∈ RF, define connectivity matrix H as follows,

where 1≤ i, j ≤ n − ψ:

– Hij = 1 if either j = i, or edge (j, i) exists in reduced graph H.

– Hij = 0, otherwise

Thus, the non-zero elements of row Hi correspond to the incoming links at

process i in the reduced graph H, and the self-loop at process i Observe that

H has a non-zero diagonal.

least one non-zero column (i.e., a column with all elements non-zero).

Proof Each reduced graph contains n − ψ processes because the fault set F contain ψ processes By Lemma 4, at least one process in the reduced graph, say process p, has directed paths to all the processes in the reduced graph H.

Element Hk jp of matrix product Hk is 1 if and only if process p has a directed path to process j containing at most k edges; each of these directed paths must contain less than n − ψ edges, because the number of processes in the reduced graph is n − ψ Since p has directed paths to all the processes, it follows that, when k ≥ n − ψ, all the elements in the p-th column of H k must be non-zero

For matrices A and B of identical dimensions, we say that A≤ B if and only

if Aij ≤ Bij,∀i, j Lemma 9 relates the transition matrices with the connectivity matrices Constant β used in the lemma below was introduced in Lemma 7.

βH[t] ≤ M[t], where H[t] is the connectivity matrix for H[t].

The proof is presented in [15]

non-zero.

The proof is presented in [15]

Ngày đăng: 04/03/2019, 10:02

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN