Broadcast with Partial Knowledge - CiteSeerX

1 downloads 0 Views 906KB Size Report
Fellow- ship, by a Walter and Elise Haaa Career Development. Award and by a Bantrell ... ACM. 0-89791-439-2/91/0007/0153. $1.50 established for broadcast under ... listing the resources held at each site), or even a general database. The.
Broadcast

with

Partial

(Preliminary

Baruch

Awerbuch

*

Israel

Cidon

Version)

t

David

Shay Peleg

Abstract This

work

concerns

the problem

message

cessor has partial tial

information

prior held

of date

consequently, conflict

ing

of broadcast-

efficiently

when

knowledge

of the broadcast

be out

Kutten

each proabout

the

The

par-

message.

by the processors

or otherwise different

erroneous,

processors

information.

might

Tight

hold

bounds

Electrical Israel. fIBM

Engineering, T.J.

Yorktown

Watson

Heights,

The Research

NY

Haifa p,o.

center

and applications

Mathematics

are discussed.

1

Introduction

tasks

in object

the topology which

case the view

derlying

of

32000,

Box 704,

network

at the

view

is an inventory

at each site),

and Com-

ture,

and

(e.g.,

a link

here

are subject fails,

necessary

One obvious Permission to copy without fee all or part of this material k granted provided that the copies are not made or distributed for direct comthe ACM

permission

of the Association

otherwise, 01991

or to republish,

ACM

copyright and notice

notice

for Computing

requires

and

the title

is given that copying Machinery.

a fee and/or

0-89791-439-2/91/0007/0153

specific

dated

views

Broadcast

of the is by

on initiating

To copy

the

permission.

object

to the

$1.50

time 153

which

changes

is consumed

is modified).

consistent

This

whenever

It

mecha-

and updated

at the different

a broadcast

The in na-

to have an efficient

algorithm.

held

database.

unit

record

algorithm

complexity

case the

are dynamic

sites.

for maintaining

of a distributed

possibility

resources

the resources

a resource

(in

of the un-

to occasional

a database

of the object

is thus

(in

be

network

or even a general

considered

or released,

Fellowship.

sites

object algorithm

a change

up-

is the Full is based

of the entire

of message

of

may

or certain

listing

of

sites

object

is a description

system

deal

“view”

separate

This

graph),

held

objects

the

of a communication

for maintaining

and its date appear,

prob-

computing

in many

system.

views

advantage,

pro-

computing

maintaining

nism

mercial

condi-

of the broadcast

distributed

concurrently

Award

publication

such

Motivation

The Weizmann Institute, Rehovot 76100, Israel. Supported in part by an Allen Fellowship, by a Walter and Elise Haaa Career Development and by a Bantrell

under

distributed

lems

a common

Laboratory, Harvard Uni02138. Partially supported

of Applied

other

a distributed

NOO014-85-K-0445.

WDepartment puter Science,

broadcast

to

with

10598.

~Aiken Computation versity, Cambridge, MA by ONR

and Faculty

Technion,

for

tocol

1.1

0078, ARO contract DAAL03-86-K-0171, NSF contract CCR861 1442, and a special grant from IBM. T*J. Watson Research center, p-o. Box tIBM 10598,

~

are

of Mathematics and Lab. for Computer Science, M. I. T., Cambridge, MA 02139. Supported by Air Force Contract TNDGAFOSR-86-

NY

Mansour

and

may

“Dept.

Heights,

Yishay

tions,

Many

704, Yorktown

$

~

established

ing a large contents

Knowledge

view

of

occurs.

Due

pipelining,

the

of this algorithm

is relatively

low.

Ontheother

be very

hand,

wasteful

object

may

tively

have

a correct

and

few

broadcast

the

suggested

for

bility

very

makes

of this

of updating minimal

do not

small

such

conditions,

tions

to

the

munication it

amount

of for

and

time

out

of the database

update

Partial

y“

with

problem,

is,

we and

Under

space. efficient to

Broadcast

lem

can be formulated

with

Partial

an

asynchronous

regarding

pi

has

an

m-bit

view

of

processor’s

lo-

in order

to

com-

the

knowledge”

the

inputs

that

prob-

which

of its

the

namely

(besides

its

own

This

[ACK90],

where

of database

protocols.

Even

lem,

none

previously

The

makes

neighbor-knowledge

of the

weaker

neighbors.

in

date

1.3

processors. the

assumption,

is justified

is shown

has no infor-

of other

knows

ver-

each processor

mentioning

problem,

processor

each

strongest

and

inputs

“neighbor

sumption with

input,

it is worth of

the

for

it

comes

and this

topology weaker

known

both in communication

complexity

asfor uP-

prob-

solutions and time.

measures

Consider

ion po,

Our

through-

correct

in which

that input)

prob-

Knowledge

communicant

of n+ 1 processors,

processor

its own

version

can be char-

as follows.

and

communication

we solve

problem,

comset-

paper,

knows

However,

bottleneck

the

the

and

sion of this mation

“communication

and

as a re-

of the network.

to use the

time

they

changes

to each processor

only

solu-

In this

Broadcast

the

are efficient

The

each

w, and

free in context

model

topology

about

given

In this

lem

consisting

network

different

plexities.

the

database,

problem called

have

in the past,

losses,

is to inform

cal inputs

Knowledge.

The

the broadcaster

of message

descripone as a

messages

object

main

simple

may

different

The

In particu-

the

respect

the

object.

processors to

local

the

overheads.

that

as a fairly

complexit

with

in the

due

pi.

the correct

out

coordination

we look

problem

turns

acterized

two

The

from

repre-

is w = Wo,

be no possi-

That

initial

object

nature

a distributed

any

at processor

of the

differ

Wi is stored

all the processors

complex-

input,

the local

the asynchronous

is to study

assumptions.

assume only

every

input

goal

pipelining

local

can be in-

BGJ+85]).

the time

work

object

of changes

got from sult

The

broadcaster.

Wi may

descriptions

update

their

broadcaster’s

pi and describes

of the

minimize

purpose

problem

1.2

topology to

lar,

This

in

of the problem

description

result “nec-

of the

as follows.

by the

tions

algorithms

SG89,

information

which

held

incre-

only

value

formulation

correct

to

while

is the

the

as the

to the prob-

Wo.

sentation

angle,

knowledge

the

seems

write

the

at processor

high.

The

ting,

the

MRR80, there

this

of as having

of

processors

all

terpreted

of

of rela-

transmitted.

handling

to employ

under

from

there

lem

This

of the system.

heart

([ACK90,

method,

“most”

in which

is

the

Unfortunately,

of

partial

extreme

solution

w=

should

is distinguished

p.

In a correct

processors

of the object,

strategy,

is at

problem

allow

view

information

strategy

ity

Viewed

of prior

other

Update

essary”

this

picture

to the processors

mental

the

can be thought the entire

available

strategy

that

processor

broadcaster. output

a success-

need to be informed

advantage

On

fact

changes.

problem

taking

that

maintenance the

the object, the

is clear

to utilize

already

since the

large.

it

consistency

strive

T.oi, and

might

in communication,

be rather

Consequently, ful

thisalgorithm

In order

network,

. . . . pn,

local

to quantify

with

ing local

knowledge,

input

measure

that

154

the possibility

captures

we first

of exploit-

introduce

the level

a new

of “informa-

tion”

of the

knowledge

sor.

Let

held

by processor

which

the

~i,

from

discrepancy

the

the

local

total

Our

&~= goal

tween

A = ~i

8 = A/n, =

rnZLX;

the

these discrepancies

ition

that

tocols

should

most

are

of the protocol

We therefore

express

time

complexity ~.

1.4

the

correct”,

may

require

1.5

Our

first

with

Partial

to

Broadcast

protocol,

munication,

i.e.

other

hand

cast

can be done can terminate

one would

like

respect

aiming be close

to

The in

Incremental

Update

poses

an

strategy

with

“correct”

view

the

a “correction” positions In

where this

propagates

source,

till

nodes

the

algo-

our

algo-

a slightly

better

Note stored

discrepancy

constraints.

upper

codes.

time

bound

that ways,

are

codes

random

network.

[BOGW88] privacy

Rabin

a reliable

codes

to achieve in

BCH

[Rab89]

a colm-

uses codes routing

and

codes

a malicious

fault-tolerant

uses

Goldwasser use

in

in

for so’lv-

[Met84]

protocols

Ben-Or,

lin-

before

algorithms

retransmission

to the

using

used

Metzner

we

proces-

subject

derived

were

distributed problems. and

in all cases,

at the various

bounds Such

Wigderson

to

envircmto achieve with

a low

overhead.

to while

Using theory ory,

proposed

the

a pro-

simple and

we

bounds

approach.

is that

arguments

from

communication

are

able

are almost

average

to

show

tight.

information

complexity that

the-

our

upper

We argue that

discrepancy

is ~,

the

commu-

Q(A

log(~))

to

nication

complexity

which

cent ains

and

time

input

~ log(~)). We also argue that in the cabse that no information is known about the dis-

neighbor’s

is

a “correction

the network are

its

corrected.

the

crepancies,

from

send ft(nrn)

It 155

is at least

when

transmits

list,

algorithm, through

all

A,

to

A is known,

in arbitrary

guarantee

complexity.

alternative

strategy

erroneous. the

time

log ~)

that

the inputs

ment.

complexity

probabil-

log m+n

O(n log $ + m + log ~)

sors to differ

plete

algorithm

It has success

complexity.

Reed-Solomon

and

Partial

cation

efficient

Thus,

random-

+ m + log ~) and the same communi-

On the

time.

discrepancy

of this

neighbor

wave”

total

achieves

in com-

complexity,

this

in the

with

c is a parameter

ing various

the broad-

on this

of

protocol

an efficient

and uses O(A and

constructing

Full

fashion

+ m)

essence

cessor all

since

communication

near-optimal

[ACK90]

The

in O(n

reducing

the

bits.

in a pipelined

to improve to

towards

maintaining

is wasteful

fast,

to

of O(n allow

Broadcast is the

fl(nm)

it is rather

thus with

which

require

even the

Broadcast

problem.

Assuming

rithm

and

are mea-

the

the

l–c,

where

rithm.

Our to

and

network

we provide

solution

time,

then

as a function

problem

appears

results

communication of

model.

solution

Knowledge

assump-

exploitation

algorithm

In this paper,

solutions

obvious

there

efficient

ized

ear The

for

under

Q(J . n) time.

ity at least

be small.

complexities

knowledge,

case of a path

Knowledge

pro-

views

should

complexity

Basic

intu-

the communication

The

in the bit

the

to discrepancy

of our solution

n and

sured

be-

“almost

the overhead

of m,

relationships

if

even

average dis-

i.e.,

that

in this

simple

also

of broadcast

inputs,

of neighbor

pipelining

is the

maximum

be proportional

processors

differs

Define

following

complexity

processors’

be no possibility

and the complexity

algorithms, the

tion

in

{6’i}.

is to study

of broadcast

Wi

bi, the

and the

be stressed

input

w, which

of the object.

should

of bits

at pi,

input

discrepancy

crepancy

6i of the

description

description

discrepancy

by each proces-

pi be the number

the broadcaster’s

correct

of

held

complexity

is at

any deterministic bits,

even if there

least

protocol

fl(n

+

would

are no discrep-

ancies bounds

Organization

1.7

at all.

The comparison

of our protocols

is given

in Figure

and lower

The

1.

rest

lows.

of the

In

1.6

Applications

to

topology

3, we present

One application network

of our work

problem

of Topology

task is at the heart protocols

can each

of its

adjacent

i.e.,

but

each processor

is based

on the

tions

and reconnection

cates

implementation

ert heless,

the

is efficient

in

though

not

tially

status

this global

of

network

of this

tion

of

strategy.

and

protocols for

it is possible

of the problem Knowledge fectively

to those

Namely,

Broadcast

Partial

model,

have since

found

their

hash function

introduc-

[WC79].

X = {h : A ~

many

B}

A fam-

is called

a

if for any al # a2 c A holds:

= 61 and

1 = 62] = — [B[2

h(a2)

the probability

ble choices

essenup-

formly

sig-

sal hash functions.

complexities with

chosen

problem

are many as follows.

B = 2P.

(Note

uni-

~. families

of simple

One example

structed

and

Let

univer-

can be con-

p be a prime

and let

IBI = p.) Then

ef-

to the

solution update

from

over the possi-

is randomly

Partial

Update,

Knowledge

is taken

of h, which

for

is a family

the

In

problem,

the

hash

protocol

of universal above

function

hash

example requires

functions.

the only

encoding two

of a

elements

2P, and also p, therefore

we can describe

and time.

such

a hash

only

pointing

bits.

(Note

overheads out

are presented the

in the

charges

a message

functions

from

whereas

presented

any

a topology

or equal

It is worth ity results

to

is most

the

the former

one can construct munication

where

(al-

observation

of Topology

given

with

lower

that is the

to relate

4.

functions

hash

bl, b2 c 13 the following

There

of Broadcasting

reducing

latter.

Nev-

topology

purposes

on the

procedure

leads

of [ACK90]

our

bounds

in Section

and Wegman

Prob[h(al)

[ACK90].

A consequence

(algorithm

the lower

parti-

communication

time),

bound

upper

applications

by Carter

universal and

compli-

broadcast

terms

our

hash

interesting

link

strategy.

significantly

resulting in

Update

recurring

In Section

Universal

Universal

is

of [ACK90]

communication-optimal

nificant

which

of the

2.1

link

of the protocol

Incremental

theory.

Preliminaries

2

status

each

algorithm

and coding

are established

ily of functions

possibility

with

of the

with

update

The

that

Ini-

information.

The topology

date

as follows. whether

purpose

neces-

universal

network The

is unaware

The

problem

some

This

ACG+90].

is aware

links,

links.

to supply

practical

BGJ+85,

processor

is up or down, of other

Update.

be formulated

tially,

status

of many

[MRR80,

problem

is to the classical

quote

as fol-

use concerning

Finally,

AVERAGE).

paper

is structured

2 we

for later

hash functions

update

paper

section

sary results

of the

that

results

our complex-

in

[ACK90]

complexity

one complexity

of size O(log

corn=

depend

in the bit complexity

message

only

in both

hash

are

units

on A.)

function,

represented

model for

Another

n) bits.

following. 156

function that

the

using encoding

Later,

when

it is assumed with

O(log

way to view We

are

IBI)

O(log

using that

a universal it

can

be

bits.

the parameters

interested

IB 1)

of h does not

is the

is a family

of

— Algorithm Full

Communication

broadcast

(folklore)

Update

[ACK90]

Incr.

Our

nm n+

Our

lower

bound

hash functions

lowing

property:

ments,

the

function

c

%,

probability

e = l/[131, of hash

distinct

them

c.

to

From

hash function

y 1/[ 13\.

we conclude

functions

that

and lower

2.1

1. The check bit trail

there

is a family

encoding

3. The

size is

theoretic

back-

encoding and

order

slightly

ground

basic

later

results

from

code Cm,d : {O, 1}~ that

transforms a codeword

The

codes

ing codeword check bits. the

code

c~,d(~).

c~,d The

attaches lengths bit

by lC@(~)

A code the original word

Cm,d(w)

The

trail

word

following

ties possessed

is a mapping

The

only

w ~ {O, 1 }~

about

is the

words

in

are stanthe

the

BCH

codes,

by the

code

encoding,

are

m.

extend to

our

the

codeword

[,

in the se-

we first

extend

than states

if

decoded

bits

will

After

the

to later

to be check-bit

properties

2~ –

input

m, d are omitted

d are clear

from

(e.g., size.

the

input

bits

and

the decodon in the codes

that

2.1.

The

in Theorem

subscripts

1.

be removed.

Cm,d referred

are meant

satisfy

be d-correcting the

codes

paper

U33PeCtiVelY.

from

the padding

All

7rL).

cc)de

appropriate

ing,

by

The

of length

a word

w by

and that

we need to comment

the encoding.

perform

that

is O(d log

to 2~ – 1 – [C~,d(w)]

differs

theorem

When

of r

to

zeros)

have

codes can

time

trail

that

have

can

will

of BCH

then

are denoted

in no more

simply padding

bit

codes

we

so they

use of arbitrary

BCH

We

time

It is well known

in polynomial

of check property

by

operations

theorem,

w ~ {O, l}m

w can be correctly z that

=

require

of check bits that

of the entire

to

result-

is a “trail”

I and lc~,d(~)

word

any

show

be accomplished

A

to be of the form

to

Cm,d is said

from

decoding

respectively)

and encoding

length

namely,

the trail

le~,d(~)l

in ‘m and d.

modify

the

paper

p c {O, 1}’

Denote

on

O G {O, l}~+r.

in this

ti is assumed

and the check qUt31

word =

based theory.

{O, l}~+r

codes,

where

are

coding

c~,d(w)

considered

“check-bit”

O = wl[p,

s

on

an input

into dard

and

e~’d$

to

the decoding some

is of length

all the above properties.

developed

m/3,

the 1o1-

2. The code 6’m,d is d-correcting.

choosing

polynomial

tools

d

Suggest Documents