Almost Optimal Algorithms for Token Collision in Anonymous Networks

Authors Sirui Bai, Xinyu Fu , Xudong Wu, Penghui Yao , Chaodong Zheng



PDF
Thumbnail PDF

File

LIPIcs.DISC.2024.4.pdf
  • Filesize: 0.87 MB
  • 20 pages

Document Identifiers

Author Details

Sirui Bai
  • State Key Laboratory for Novel Software Technology, Nanjing University, China
Xinyu Fu
  • State Key Laboratory for Novel Software Technology, Nanjing University, China
Xudong Wu
  • State Key Laboratory for Novel Software Technology, Nanjing University, China
Penghui Yao
  • State Key Laboratory for Novel Software Technology, Nanjing University, China
  • Hefei National Laboratory, China
Chaodong Zheng
  • State Key Laboratory for Novel Software Technology, Nanjing University, China

Cite As Get BibTex

Sirui Bai, Xinyu Fu, Xudong Wu, Penghui Yao, and Chaodong Zheng. Almost Optimal Algorithms for Token Collision in Anonymous Networks. In 38th International Symposium on Distributed Computing (DISC 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 319, pp. 4:1-4:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024) https://doi.org/10.4230/LIPIcs.DISC.2024.4

Abstract

In distributed systems, situations often arise where some nodes each holds a collection of tokens, and all nodes collectively need to determine whether all tokens are distinct. For example, if each token represents a logged-in user, the problem corresponds to checking whether there are duplicate logins. Similarly, if each token represents a data object or a timestamp, the problem corresponds to checking whether there are conflicting operations in distributed databases. In distributed computing theory, unique identifiers generation is also related to this problem: each node generates one token, which is its identifier, then a verification phase is needed to ensure that all identifiers are unique.
In this paper, we formalize and initiate the study of token collision. In this problem, a collection of k tokens, each represented by some length-L bit string, are distributed to n nodes of an anonymous CONGEST network in an arbitrary manner. The nodes need to determine whether there are tokens with an identical value. We present near optimal deterministic algorithms for the token collision problem with Õ(D+k⋅L/log n) round complexity, where D denotes the network diameter. Besides high efficiency, the prior knowledge required by our algorithms is also limited. For completeness, we further present a near optimal randomized algorithm for token collision.

Subject Classification

ACM Subject Classification
  • Theory of computation → Distributed algorithms
Keywords
  • Token collision
  • anonymous networks
  • deterministic algorithms

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Scott Aaronson and Yaoyun Shi. Quantum lower bounds for the collision and the element distinctness problems. Journal of the ACM, 51(4):595-605, 2004. URL: https://doi.org/10.1145/1008731.1008735.
  2. Andris Ambainis. Quantum Walk Algorithm for Element Distinctness. SIAM Journal on Computing, 37(1):210-239, 2007. URL: https://doi.org/10.1137/S0097539705447311.
  3. Dana Angluin. Local and Global Properties in Networks of Processors (Extended Abstract). In Proceedings of the 12th Annual ACM Symposium on Theory of Computing, STOC, pages 82-93. ACM, 1980. URL: https://doi.org/10.1145/800141.804655.
  4. Hagit Attiya and Jennifer Welch. Distributed Computing: Fundamentals, Simulations, and Advanced Topics. Wiley, 2004. Google Scholar
  5. John Augustine, William K. Moses, and Gopal Pandurangan. Brief Announcement: Distributed MST Computation in the Sleeping Model: Awake-Optimal Algorithms and Lower Bounds. In Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, PODC, pages 51-53. ACM, 2022. URL: https://doi.org/10.1145/3519270.3538459.
  6. Ziv Bar-Yossef, T. S. Jayram, Ravi Kumar, and D. Sivakumar. An information statistics approach to data stream and communication complexity. Journal of Computer and System Sciences, 68(4):702-732, 2004. URL: https://doi.org/10.1016/J.JCSS.2003.11.006.
  7. Michael Ben-Or. Lower Bounds for Algebraic Computation Trees. In Proceedings of the 15th Annual ACM Symposium on Theory of Computing, STOC, pages 80-86. ACM, 1983. Google Scholar
  8. Joshua Brody, Amit Chakrabarti, Ranganath Kondapally, David P. Woodruff, and Grigory Yaroslavtsev. Beyond set disjointness: the communication complexity of finding the intersection. In ACM Symposium on Principles of Distributed Computing, PODC, pages 106-113. ACM, 2014. URL: https://doi.org/10.1145/2611462.2611501.
  9. Harry Buhrman, Christoph Dürr, Mark Heiligman, Peter Høyer, Frédéric Magniez, Miklos Santha, and Ronald de Wolf. Quantum Algorithms for Element Distinctness. SIAM Journal on Computing, 34(6):1324-1330, 2005. URL: https://doi.org/10.1137/S0097539702402780.
  10. Wan Fokkink and Jun Pang. Simplifying Itai-Rodeh Leader Election for Anonymous Rings. Electronic Notes in Theoretical Computer Science, 128(6):53-68, 2005. URL: https://doi.org/10.1016/J.ENTCS.2005.04.004.
  11. Mohsen Ghaffari, Christoph Grunau, and Václav Rozhoň. Improved deterministic network decomposition. In Proceedings of the 32nd Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 2904-2923. SIAM, 2021. URL: https://doi.org/10.1137/1.9781611976465.173.
  12. Dima Grigoriev, Marek Karpinski, Friedhelm Meyer auf der Heide, and Roman Smolensky. A Lower Bound for Randomized Algebraic Decision Trees. In Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, pages 612-619. ACM, 1996. URL: https://doi.org/10.1145/237814.238011.
  13. Johan Håstad and Avi Wigderson. The Randomized Communication Complexity of Set Disjointness. Theory of Computing, 3(1):211-219, 2007. URL: https://doi.org/10.4086/TOC.2007.V003A011.
  14. Alon Itai and Michael Rodeh. Symmetry breaking in distributed networks. Information and Computation, 88(1):60-87, 1990. URL: https://doi.org/10.1016/0890-5401(90)90004-2.
  15. Ralph E. Johnson and Fred B. Schneider. Symmetry and Similarity in Distributed Systems. In Proceedings of the 4th Annual ACM Symposium on Principles of Distributed Computing, PODC, pages 13-22. ACM, 1985. URL: https://doi.org/10.1145/323596.323598.
  16. Bala Kalyanasundaram and Georg Schnitger. The Probabilistic Communication Complexity of Set Intersection. SIAM Journal on Discrete Mathematics, 5(4):545-557, 1992. URL: https://doi.org/10.1137/0405044.
  17. Hsiang-Tsung Kung and John T. Robinson. On optimistic methods for concurrency control. ACM Transactions on Database Systems, 6(2):213-226, 1981. URL: https://doi.org/10.1145/319566.319567.
  18. Nathan Linial. Locality in Distributed Graph Algorithms. SIAM Journal on Computing, 21(1):193-201, 1992. URL: https://doi.org/10.1137/0221015.
  19. Thomas Neumann, Tobias Mühlbauer, and Alfons Kemper. Fast serializable multi-version concurrency control for main-memory database systems. In Proceedings of ACM SIGMOD International Conference on Management of Data, SIGMOD, pages 677-689. ACM, 2015. URL: https://doi.org/10.1145/2723372.2749436.
  20. M. Tamer Özsu and Patrick Valduriez. Principles of Distributed Database Systems. Springer, 4 edition, 2020. Google Scholar
  21. David Peleg. Distributed Computing: A Locality-Sensitive Approach. SIAM, 2000. Google Scholar
  22. Alexander A. Razborov. On the Distributional Complexity of Disjointness. Theoretical Computer Science, 106(2):385-390, 1992. URL: https://doi.org/10.1016/0304-3975(92)90260-M.
  23. Gerard Tel. Network orientation. International Journal of Foundations of Computer Science, 5(01):23-57, 1994. URL: https://doi.org/10.1142/S0129054194000037.
  24. Gerard Tel. Introduction to distributed algorithms. Cambridge university press, 2000. Google Scholar
  25. Andrew Chi-Chih Yao. Some Complexity Questions Related to Distributive Computing (Preliminary Report). In Proceedings of the 11th Annual ACM Symposium on Theory of Computing, STOC, pages 209-213. ACM, 1979. URL: https://doi.org/10.1145/800135.804414.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail