Skip to main content
Top
Published in: Distributed Computing 5/2019

26-09-2018

Making asynchronous distributed computations robust to noise

Authors: Keren Censor-Hillel, Ran Gelles, Bernhard Haeupler

Published in: Distributed Computing | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider the problem of making distributed computations robust to noise, in particular to worst-case (adversarial) corruptions of messages. We give a general distributed interactive coding scheme which simulates any asynchronous distributed protocol while tolerating an optimal corruption of a \(\varTheta (1/n)\) fraction of all messages and incurring a moderate blowup of \(O(n\log ^2 n)\) in the communication complexity. Our result is the first fully distributed interactive coding scheme in which the topology of the communication network is not known in advance. Prior work required either a coordinating node to be connected to all other nodes in the network or assumed a synchronous network in which all nodes already know the complete topology of the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
To ease the readability, we write in parenthesis the functionality of each sent message, but we emphasize that messages in our construction contain no content at all, and the labels of Explore and Ack are given only for the analysis.
 
2
Throughout this work, all logarithms are taken to base 2.
 
3
While we focus here on deterministic protocols, our results also apply to randomized Monte-Carlo protocols.
 
4
This type of noise, commonly called insertion and deletion noise, is known to be more difficult to deal with in the interactive setting [8] and may be destructive for asynchronous protocols [14].
 
5
Note that additional messages may arrive from a sibling node as part of the BFS construction. Still, the next message arriving from the parent belongs to the coding scheme rather than to the BFS construction.
 
6
Later, in Sect. 5, we apply our root-triggered synchronizer to an input protocol on G which is fully-utilized on a spanning subgraph S of G.
 
7
E.g., when using an \(O(\log n)\)-spanner of size \(s=O(n)\) towards Corollary 13.
 
8
In Theorem 12 we allow \(\pi _{spanner}\) to be an asynchronous protocol. Note, however, that the same applies to synchronous protocols given as an inputs to our coding scheme: let every party speak at every round (sending dummies as needed); then redefine the protocol in an asynchronous model where each party sends the messages of a given round after receiving all the messages of a previous round. It follows that any synchronous protocol with time complexity \(\tau \) sending messages of size \(\sigma \) can be converted into an equivalent asynchronous protocol with message complexity \(O(\tau m)\) and communication complexity \(O(\tau m \sigma )\).
 
9
A different approach would be to add another bit that contains the parity of the message number. Then, the receiver will be able to distinguish whether a received bit is the continuation of a previous message, or the first bit of a new message.
 
10
By balancing the parts \(C_1\) and \(C_2\) in a weighted way one can obtain a slightly improved resilience of \(\mu _1\mu _2/(\mu _1+\mu _2)= \varTheta (1/(n+s))\) which is, however, asymptotically equivalent to \(\varTheta (1/s)\).
 
Literature
1.
go back to reference Alon, N., Braverman, M., Efremenko, K., Gelles, R., Haeupler, B.: Reliable communication over highly connected noisy networks. In: Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, PODC ’16, pp. 165–173 (2016). https://doi.org/10.1145/2933057.2933085 Alon, N., Braverman, M., Efremenko, K., Gelles, R., Haeupler, B.: Reliable communication over highly connected noisy networks. In: Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, PODC ’16, pp. 165–173 (2016). https://​doi.​org/​10.​1145/​2933057.​2933085
2.
go back to reference Attiya, H., Welch, J.: Distributed Computing: Fundamentals, Simulations and Advanced Topics. Wiley, New York (2004)CrossRef Attiya, H., Welch, J.: Distributed Computing: Fundamentals, Simulations and Advanced Topics. Wiley, New York (2004)CrossRef
4.
16.
go back to reference Gallager, R.G.: Distributed minimum hop algorithms. Technical report LIDS-P-1175, M.I.T. Laboratory for Information and Decision Systems (1982) Gallager, R.G.: Distributed minimum hop algorithms. Technical report LIDS-P-1175, M.I.T. Laboratory for Information and Decision Systems (1982)
19.
go back to reference Gelles, R., Kalai, Y.T.: Constant-rate interactive coding is impossible, even in constant-degree networks. In: C.H. Papadimitriou (ed.) 8th Innovations in Theoretical Computer Science Conference (ITCS 2017), Leibniz International Proceedings in Informatics (LIPIcs), vol. 67, pp. 21:1–21:13. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2017). https://doi.org/10.4230/LIPIcs.ITCS.2017.21 Gelles, R., Kalai, Y.T.: Constant-rate interactive coding is impossible, even in constant-degree networks. In: C.H. Papadimitriou (ed.) 8th Innovations in Theoretical Computer Science Conference (ITCS 2017), Leibniz International Proceedings in Informatics (LIPIcs), vol. 67, pp. 21:1–21:13. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2017). https://​doi.​org/​10.​4230/​LIPIcs.​ITCS.​2017.​21
21.
29.
go back to reference Lynch, N.A.: Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco (1996)MATH Lynch, N.A.: Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco (1996)MATH
39.
go back to reference Tel, G.: Introduction to Distributed Algorithms, pp. 414–420. Cambridge University Press, Cambridge (2000) Tel, G.: Introduction to Distributed Algorithms, pp. 414–420. Cambridge University Press, Cambridge (2000)
Metadata
Title
Making asynchronous distributed computations robust to noise
Authors
Keren Censor-Hillel
Ran Gelles
Bernhard Haeupler
Publication date
26-09-2018
Publisher
Springer Berlin Heidelberg
Published in
Distributed Computing / Issue 5/2019
Print ISSN: 0178-2770
Electronic ISSN: 1432-0452
DOI
https://doi.org/10.1007/s00446-018-0343-5

Other articles of this Issue 5/2019

Distributed Computing 5/2019 Go to the issue

Premium Partner