The Cost of Monotonicity in Distributed Graph Searching David - - PowerPoint PPT Presentation

the cost of monotonicity in distributed graph searching
SMART_READER_LITE
LIVE PREVIEW

The Cost of Monotonicity in Distributed Graph Searching David - - PowerPoint PPT Presentation

The Cost of Monotonicity in Distributed Graph Searching David Ilcinkas 1 Nicolas Nisse 2 David Soguet 2 1 Universit du Qubec en Outaouais, Canada. 2 LRI, Universit Paris-Sud, France. Opodis, December 2007 1 Graph searching problem Goal:


slide-1
SLIDE 1

1

The Cost of Monotonicity in Distributed Graph Searching

David Ilcinkas1 Nicolas Nisse2 David Soguet2

1 Université du Québec en Outaouais, Canada.

2 LRI, Université Paris-Sud, France.

Opodis, December 2007

slide-2
SLIDE 2

2

Graph searching problem

Goal:

In an undirected connected simple graph,

  • in which edges are contaminated,
  • a team of searchers is aiming at clearing the graph.

We want to find a strategy that clears the graph using the minimum number of searchers.

Applications:

  • network security,
  • decontaminating a set of polluted pipes,
slide-3
SLIDE 3

3

Graph searching in distributed settings Distributed graph searching:

  • The searchers compute themselves a strategy;
  • The strategy must be computed and performed in polynomial time.

Distributed search problem:

To design a distributed protocol that enables the minimum number of searchers to clear the network in polynomial time.

slide-4
SLIDE 4

4

Search strategy

The searchers move along the edges.

slide-5
SLIDE 5

5

Search strategy

The searchers move along the edges. An edge is cleared when it is traversed by a searcher.

slide-6
SLIDE 6

6

Search strategy

The searchers move along the edges. An edge is cleared when it is traversed by a searcher. A clear edge e is recontaminated if a path exists between e and a contaminated edge, and no searchers stand on this path.

slide-7
SLIDE 7

7

Search strategy

The searchers move along the edges. An edge is cleared when it is traversed by a searcher. A clear edge e is recontaminated if a path exists between e and a contaminated edge, and no searchers stand on this path.

A strategy consists of:

  • Initially, all searchers are placed at the homebase v0;
  • sequence of moves of searcher; a searcher can move if it does

not imply recontamination;

  • until the graph is clear.
slide-8
SLIDE 8

8

Search strategy

The searchers move along the edges. An edge is cleared when it is traversed by a searcher. A clear edge e is recontaminated if a path exists between e and a contaminated edge, and no searchers stand on this path.

A strategy consists of:

  • Initially, all searchers are placed at the homebase v0;
  • sequence of moves of searcher; a searcher can move if it does

not imply recontamination;

  • until the graph is clear.

mcs(G,v0): minimum number of searchers required to clear the graph G in this way, starting from v0, in centralized setting.

slide-9
SLIDE 9

9

Two simple examples : the path and the ring

slide-10
SLIDE 10

10

Two simple examples : the path and the ring

slide-11
SLIDE 11

11

Two simple examples : the path and the ring

slide-12
SLIDE 12

12

Two simple examples : the path and the ring

slide-13
SLIDE 13

13

Two simple examples : the path and the ring

slide-14
SLIDE 14

14

Two simple examples : the path and the ring

slide-15
SLIDE 15

15

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-16
SLIDE 16

16

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-17
SLIDE 17

17

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-18
SLIDE 18

18

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-19
SLIDE 19

19

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-20
SLIDE 20

20

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-21
SLIDE 21

21

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-22
SLIDE 22

22

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-23
SLIDE 23

23

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-24
SLIDE 24

24

Two simple examples : the path and the ring

mcs(path,v0)=1

slide-25
SLIDE 25

25

Two simple examples : the path and the ring

mcs(path,v0)=1 mcs(ring,v0)=2

slide-26
SLIDE 26

26

Monotone connected search strategy Monotone connected strategy:

  • Monotonicity: the contaminated part of the graph never

grows (i.e., no recontamination can occur) ⇒ polynomial time

  • Connectivity: the cleared part is connected

⇒ safe communications

slide-27
SLIDE 27

27

Monotone connected search strategy Monotone connected strategy:

  • Monotonicity: the contaminated part of the graph never

grows (i.e., no recontamination can occur) ⇒ polynomial time

  • Connectivity: the cleared part is connected

⇒ safe communications Remark: The problem of computing mcs(G,v0) and the corresponding monotone connected strategy is NP-complete in a centralized setting [Megiddo et al. 1988].

slide-28
SLIDE 28

28

Model : Environment

  • Undirected connected simple graph;
  • Local orientation of the edges;
  • Whiteboard (zone of local memory);
  • Synchronous/asynchronous environment.
slide-29
SLIDE 29

29

Model : the searchers

Autonomous mobile computing entities with memory and distinct IDs.

Decision is computed locally and depends on:

  • its current state;
  • the states of the other searchers present at the vertex;
  • information on the whiteboard;
  • if appropriate the incoming port number.

A searcher can decide to:

  • leave a vertex via a specific port number;
  • write, read or erase information on the whiteboard;
  • switch its state.
slide-30
SLIDE 30

30

Related work 1/2

The searchers have no prior information about the graph.

Protocol to clear an unknown graph

Distributed chasing of network intruders [Blin, Fraignaud, Nisse and Vial. 2006] A connected and optimal strategy is performed.

slide-31
SLIDE 31

31

Related work 1/2

The searchers have no prior information about the graph.

Protocol to clear an unknown graph

Distributed chasing of network intruders [Blin, Fraignaud, Nisse and Vial. 2006] A connected and optimal strategy is performed. Problem: the strategy is not monotone and may be performed in exponential time.

slide-32
SLIDE 32

32

Related work 2/2

The searchers have a prior knowledge about the graph.

slide-33
SLIDE 33

33

Related work 2/2

The searchers have a prior knowledge about the graph.

Protocols to clear specific topologies

  • Mesh [Flocchini, Luccio and Song. 2005]
  • Hypercube [Flocchini, Huang and Luccio. 2005]
  • Tori [Flocchini, Luccio and Song. 2006]
  • Siperski’s graph [Luccio. 2007]

A monotone connected and optimal strategy is performed.

slide-34
SLIDE 34

34

Related work 2/2

The searchers have a prior knowledge about the graph.

Protocols to clear specific topologies

  • Mesh [Flocchini, Luccio and Song. 2005]
  • Hypercube [Flocchini, Huang and Luccio. 2005]
  • Tori [Flocchini, Luccio and Song. 2006]
  • Siperski’s graph [Luccio. 2007]

A monotone connected and optimal strategy is performed.

Protocol to clear a graph with advice

Θ(n log n) bits of advice (information) are necessary and sufficient to clear any n nodes graph in a monotone connected and optimal way [Nisse and Soguet. 2007].

slide-35
SLIDE 35

35

Graph searching in distributed settings Distributed search problem:

To design a distributed protocol that enables the searchers to clear the network in a monotone connected and optimal way.

slide-36
SLIDE 36

36

Graph searching in distributed settings Distributed search problem:

To design a distributed protocol that enables the searchers to clear the network in a monotone connected and optimal way.

Relaxed distributed search problem:

To design a distributed protocol that enables the searchers to clear the network in a monotone connected but not necessary

  • ptimal way.
slide-37
SLIDE 37

37

Problem

A natural question is :

Compared to the optimal number of searchers in a centralized setting, how many additional searchers are necessary and sufficient, to clear in a monotone and connected way any unknown graph, in a decentralized manner?

slide-38
SLIDE 38

38

Quality and competitive ratio

  • f a protocol

The quality of a protocol P to clear a graph G starting from v0 is measured by comparing the number of searchers it used to the number mcs(G, v0). The competitive ratio of a protocol P is the quality of the protocol P, maximized over all graphs and all starting nodes.

slide-39
SLIDE 39

39

Our results

Upper bound:

The relaxed distributed search problem can be solved by a protocol of competitive ratio O(n / log n).

slide-40
SLIDE 40

40

Our results

Upper bound:

The relaxed distributed search problem can be solved by a protocol of competitive ratio O(n / log n).

We design a protocol that use at most O( (n/log n) mcs(G,v0)) searchers to clear any graph G in a monotone connected way, starting from v0∈VG. The searchers use at most O(log n) bits of memory, and whiteboards are of size O(n) bits.

slide-41
SLIDE 41

41

Our results

Upper bound:

The relaxed distributed search problem can be solved by a protocol of competitive ratio O(n / log n).

Lower bound:

Any protocol for solving the relaxed distributed search problem has competitive ratio Ω(n / log n).

slide-42
SLIDE 42

42

Our results

Upper bound:

The relaxed distributed search problem can be solved by a protocol of competitive ratio O(n / log n).

Lower bound:

Any protocol for solving the relaxed distributed search problem has competitive ratio Ω(n / log n).

For any distributed protocol P, there exists a constant c such that for any sufficiently large n, there exists a n-node graph G, and v0∈V (G), such that P requires at least (cn / log n) mcs(G,v0) searchers to clear G starting from v0.

slide-43
SLIDE 43

43

Idea of the upper bound : O(n / log n)

Definition: A graph H is a minor of a graph G if H is a subgraph of a

graph obtained by a succession of edge contractions of G.

slide-44
SLIDE 44

44

Idea of the upper bound : O(n / log n)

Definition: A graph H is a minor of a graph G if H is a subgraph of a

graph obtained by a succession of edge contractions of G.

Main issue of the protocol clearing a graph G:

  • maintain a dynamic rooted tree S;
  • S is a tree of degree at most 3;
  • and S is a minor of the clear part of G.
  • at each step, the protocol tries to clear an edge of G such that S

becomes as close as possible to a complete tree of degree 3.

slide-45
SLIDE 45

45

Idea of the upper bound : O(n / log n)

Let Tk be a complete tree of degree 3 of depth k.

slide-46
SLIDE 46

46

Idea of the upper bound : O(n / log n)

Let Tk be a complete tree of degree 3 of depth k.

At each step, the protocol is such that:

  • V(S) is the set of vertices of G occupied by a searcher
slide-47
SLIDE 47

47

Idea of the upper bound : O(n / log n)

Let Tk be a complete tree of degree 3 of depth k.

At each step, the protocol is such that:

  • V(S) is the set of vertices of G occupied by a searcher

⇒ if k is the maximum depth of S, the protocol uses at most |V(Tk)| searchers.

slide-48
SLIDE 48

48

Idea of the upper bound : O(n / log n)

Let Tk be a complete tree of degree 3 of depth k.

At each step, the protocol is such that:

  • V(S) is the set of vertices of G occupied by a searcher

⇒ if k is the maximum depth of S, the protocol uses at most |V(Tk)| searchers.

  • S is a minor of G, and S has depth k≥1 iff there exists a previous step

such that S was Tk-1.

slide-49
SLIDE 49

49

Idea of the upper bound : O(n / log n)

Let Tk be a complete tree of degree 3 of depth k.

At each step, the protocol is such that:

  • V(S) is the set of vertices of G occupied by a searcher

⇒ if k is the maximum depth of S, the protocol uses at most |V(Tk)| searchers.

  • S is a minor of G, and S has depth k≥1 iff there exists a previous step

such that S was Tk-1.

⇒ O(k) ≤ O(mcs(G,v0))

slide-50
SLIDE 50

50

Idea of the upper bound : O(n / log n)

Let Tk be a complete tree of degree 3 of depth k.

At each step, the protocol is such that:

  • V(S) is the set of vertices of G occupied by a searcher

⇒ if k is the maximum depth of S, the protocol uses at most |V(Tk)| searchers.

  • S is a minor of G, and S has depth k≥1 iff there exists a previous step

such that S was Tk-1.

⇒ O(k) ≤ O(mcs(G,v0))

Then it can be proved that, if N is the number of searchers used by S:

⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎝ ⎛ × = ) v mcs(G, n log n O N

slide-51
SLIDE 51

51

Partial graph

A partial graph is:

  • a graph which can have edges with only one end;
  • a half-edge is an edge with one single end;
  • a full-edge is an edge with two ends.

denotes a full-edge denotes a half-edge

a partial graph G = (V,H,F)

slide-52
SLIDE 52

52

Partial graph

G = (V,H,F) the graph G+

  • btained by adding a

degree-one end to any half-edge of G.

slide-53
SLIDE 53

53

Lower bound : Ω(n / log n)

Let P be any protocol which solves the relaxed distributed search problem.

Game turn by turn between P and adversary A:

  • P and A play alternatively, starting with P;
  • P clears the graph in a monotone connected way;
  • The role of A is to force P to use the maximum number of searchers.
slide-54
SLIDE 54

54

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3.

slide-55
SLIDE 55

55

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

v0

The partial graph T1

slide-56
SLIDE 56

56

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;

Example with n=10

v0

slide-57
SLIDE 57

57

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

Example with n=10

v0

slide-58
SLIDE 58

58

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

Example with n=10

v0

slide-59
SLIDE 59

59

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.

Example with n=10

v0

slide-60
SLIDE 60

60

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.

Example with n=10

v0

|V (T2

+)| = 6

slide-61
SLIDE 61

61

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.

Example with n=10

v0

|V (T3

+)| = 8

slide-62
SLIDE 62

62

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.

Example with n=10

v0

|V (T3

+)| = 8

slide-63
SLIDE 63

63

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.

Example with n=10

v0

|V (T4

+)| = 10

slide-64
SLIDE 64

64

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.

Example with n=10

v0

|V (T4

+)| = 10

slide-65
SLIDE 65

65

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.
  • When |V (Tp

+ )| = n. A decides that the graph T is actually Tp +.

Example with n=10

v0

|V (T4

+)| = 10

slide-66
SLIDE 66

66

The Game turn by turn

The adversary A gradually builds a n≥5 nodes tree T of degree at most 3. Initially all searchers are placed at v0, with T1 is the partial graph:

The turn i of P:

  • P chooses a searcher;
  • and moves it along an edge e of Ti.

The turn i of A:

  • If e is a half-edge, A adds a new end v to e

such that v is incident to two new half-edges.

  • If e is a full-edge, A skips is turn.
  • When |V (Tp

+ )| = n. A decides that the graph T is actually Tp +.

Example with n=10

v0

slide-67
SLIDE 67

67

Lower bound : Ω(n / log n)

The tree T is such that:

  • T is a tree with at least (n + 2)/2 leaves.

⇒ P uses at least k ≥n/4 searchers.

slide-68
SLIDE 68

68

Lower bound : Ω(n / log n)

The tree T is such that:

  • T is a tree with at least (n + 2)/2 leaves.

⇒ P uses at least k ≥n/4 searchers.

  • s(G): smallest number of searchers that are necessary to clear a graph

G without the constraints of monotonicity and connectivity.

Theorem: Let G be a tree with n≥2 vertices,

s(G)≤1 + log3(n − 1) [Megiddo et al. 1988] For any v0∈V(G), mcs(G, v0)≤2s(G) − 1 [Barrière et al. 2003] ⇒ mcs(T, v0)≤2(1 + log3(n − 1))

slide-69
SLIDE 69

69

Lower bound : Ω(n / log n)

The tree T is such that:

  • T is a tree with at least (n + 2)/2 leaves.

⇒ P uses at least k ≥n/4 searchers.

  • s(G): smallest number of searchers that are necessary to clear a graph

G without the constraints of monotonicity and connectivity.

Theorem: Let G be a tree with n≥2 vertices,

s(G)≤1 + log3(n − 1) [Megiddo et al. 1988] For any v0∈V(G), mcs(G, v0)≤2s(G) − 1 [Barrière et al. 2003] ⇒ mcs(T, v0)≤2(1 + log3(n − 1))

Then it can be proved that there is a constant c > 0 such that for any n≥5 we have

) v (T, logn n c k mcs ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎝ ⎛ ≥

slide-70
SLIDE 70

70

Conclusion and Perspectives

In decentralized settings:

  • Θ(n log n) bits of information are necessary and sufficient to clear any

n-node graph in a monotone connected and optimal way.

  • Any distributed protocol aiming at clearing any unknown n-node graph

in a monotone connected way has competitive ratio Θ(n / log n).

slide-71
SLIDE 71

71

Conclusion and Perspectives

In decentralized settings:

  • Θ(n log n) bits of information are necessary and sufficient to clear any

n-node graph in a monotone connected and optimal way.

  • Any distributed protocol aiming at clearing any unknown n-node graph

in a monotone connected way has competitive ratio Θ(n / log n). It would be interesting to establish a tradeoff between the number of searchers that are required to clear any graph G in a monotone connected way and the amount of information that must be provided to the searchers.

slide-72
SLIDE 72

72

Conclusion and Perspectives

In decentralized settings:

  • Θ(n log n) bits of information are necessary and sufficient to clear any

n-node graph in a monotone connected and optimal way.

  • Any distributed protocol aiming at clearing any unknown n-node graph

in a monotone connected way has competitive ratio Θ(n / log n). It would be interesting to establish a tradeoff between the number of searchers that are required to clear any graph G in a monotone connected way and the amount of information that must be provided to the searchers. An other problem is to improve the competitive ratio of a search protocol by allowing the search strategy to be not monotone while it is performed in polynomial time.