Tight Bounds on the Message Complexity of Distributed Tree Verification

Authors Shay Kutten , Peter Robinson , Ming Ming Tan



PDF
Thumbnail PDF

File

LIPIcs.OPODIS.2023.26.pdf
  • Filesize: 0.94 MB
  • 22 pages

Document Identifiers

Author Details

Shay Kutten
  • Technion - Israel Institute of Technology, Haifa, Israel
Peter Robinson
  • Augusta University, GA, USA
Ming Ming Tan
  • Augusta University, GA, USA

Cite AsGet BibTex

Shay Kutten, Peter Robinson, and Ming Ming Tan. Tight Bounds on the Message Complexity of Distributed Tree Verification. In 27th International Conference on Principles of Distributed Systems (OPODIS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 286, pp. 26:1-26:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.OPODIS.2023.26

Abstract

We consider the message complexity of verifying whether a given subgraph of the communication network forms a tree with specific properties both in the KT_ρ (nodes know their ρ-hop neighborhood, including node ids) and the KT₀ (nodes do not have this knowledge) models. We develop a rather general framework that helps in establishing tight lower bounds for various tree verification problems. We also consider two different verification requirements: namely that every node detects in the case the input is incorrect, as well as the requirement that at least one node detects. The results are stronger than previous ones in the sense that we assume that each node knows the number n of nodes in the graph (in some cases) or an α approximation of n (in other cases). For spanning tree verification, we show that the message complexity inherently depends on the quality of the given approximation of n: We show a tight lower bound of Ω(n²) for the case α ≥ √2 and a much better upper bound (i.e., O(n log n)) when nodes are given a tighter approximation. On the other hand, our framework also yields an Ω(n²) lower bound on the message complexity of verifying a minimum spanning tree (MST), which reveals a polynomial separation between ST verification and MST verification. This result holds for randomized algorithms with perfect knowledge of the network size, and even when just one node detects illegal inputs, thus improving over the work of Kor, Korman, and Peleg (2013). For verifying a d-approximate BFS tree, we show that the same lower bound holds even if nodes know n exactly, however, the lower bounds is sensitive to d, which is the stretch parameter. First, under the KT₀ assumption, we show a tight message complexity lower bound of Ω(n²) in the LOCAL model, when d ≤ n/(2+Ω(1)). For the KT_ρ assumption, we obtain an upper bound on the message complexity of O(nlog n) in the CONGEST model, when d ≥ (n-1)/max{2,ρ+1}, and use a novel charging argument to show that Ω((1/ρ)(n/ρ)^{1+c/ρ}) messages are required even in the LOCAL model for comparison-based algorithms. For the well-studied special case of KT₁, we obtain a tight lower bound of Ω(n²).

Subject Classification

ACM Subject Classification
  • Theory of computation → Distributed algorithms
Keywords
  • Distributed Graph Algorithm
  • Lower Bound

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Yehuda Afek, Shay Kutten, and Moti Yung. Memory-efficient self stabilizing protocols for general networks. In Distributed Algorithms: 4th International Workshop Bari, Italy, September 24-26, 1990 Proceedings 4, pages 15-28. Springer, 1991. URL: https://doi.org/10.1007/3-540-54099-7_2.
  2. Baruch Awerbuch, Amotz Bar-Noy, and Madan Gopal. Approximate distributed bellman-ford algorithms. IEEE Transactions on Communications, 42(8):2515-2517, 1994. URL: https://doi.org/10.1109/26.310604.
  3. Baruch Awerbuch, Oded Goldreich, Ronen Vainish, and David Peleg. A trade-off between information and communication in broadcast protocols. Journal of the ACM (JACM), 37(2):238-256, 1990. URL: https://doi.org/10.1145/77600.77618.
  4. Béla Bollobás. Extremal graph theory. Courier Corporation, 2004. Google Scholar
  5. Brandon Dixon, Monika Rauch, and Robert E Tarjan. Verification and sensitivity analysis of minimum spanning trees in linear time. SIAM Journal on Computing, 21(6):1184-1192, 1992. URL: https://doi.org/10.1137/0221070.
  6. Michael Elkin. Distributed approximation: a survey. ACM SIGACT News, 35(4):40-57, 2004. URL: https://doi.org/10.1145/1054916.1054931.
  7. Laurent Feuilloley, Pierre Fraigniaud, et al. Survey of distributed decision. Bulletin of EATCS, 1(119), 2016. URL: http://eatcs.org/beatcs/index.php/beatcs/article/view/411.
  8. Pierre Fraigniaud, Amos Korman, and David Peleg. Towards a complexity theory for local distributed computing. Journal of the ACM (JACM), 60(5):1-26, 2013. URL: https://doi.org/10.1145/2499228.
  9. Greg N Frederickson and Nancy A Lynch. Electing a leader in a synchronous ring. Journal of the ACM (JACM), 34(1):98-115, 1987. URL: https://doi.org/10.1145/7531.7919.
  10. Robert G. Gallager, Pierre A. Humblet, and Philip M. Spira. A distributed algorithm for minimum-weight spanning trees. ACM Transactions on Programming Languages and systems (TOPLAS), 5(1):66-77, 1983. URL: https://doi.org/10.1145/357195.357200.
  11. Dov Harel. A linear algorithm for finding dominators in flow graphs and related problems. In Proceedings of the seventeenth annual ACM symposium on Theory of computing, pages 185-194, 1985. URL: https://doi.org/10.1145/22145.22166.
  12. Monika Henzinger, Sebastian Krinninger, and Danupon Nanongkai. A deterministic almost-tight distributed algorithm for approximating single-source shortest paths. In Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, pages 489-498, 2016. URL: https://doi.org/10.1145/2897518.2897638.
  13. Shmuel Katz and Kenneth Perry. Self-stabilizing extensions for message-passing systems. In Proceedings of the ninth annual ACM symposium on Principles of distributed computing, pages 91-101, 1990. URL: https://doi.org/10.1145/93385.93405.
  14. Valerie King. A simpler minimum spanning tree verification algorithm. Algorithmica, 18:263-270, 1997. URL: https://doi.org/10.1007/BF02526037.
  15. Valerie King, Shay Kutten, and Mikkel Thorup. Construction and impromptu repair of an MST in a distributed network with o(m) communication. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, pages 71-80, 2015. URL: https://doi.org/10.1145/2767386.2767405.
  16. Valerie King, Chung Keung Poon, Vijaya Ramachandran, and Santanu Sinha. An optimal erew pram algorithm for minimum spanning tree verification. Information Processing Letters, 62(3):153-159, 1997. URL: https://doi.org/10.1016/S0020-0190(97)00050-1.
  17. Liah Kor, Amos Korman, and David Peleg. Tight bounds for distributed minimum-weight spanning tree verification. Theory of Computing Systems, 53(2):318-340, 2013. URL: https://doi.org/10.1007/S00224-013-9479-7.
  18. Amos Korman and Shay Kutten. Distributed verification of minimum spanning trees. In Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing, pages 26-34, 2006. URL: https://doi.org/10.1145/1146381.1146389.
  19. Amos Korman, Shay Kutten, and David Peleg. Proof labeling schemes. In Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing, pages 9-18, 2005. URL: https://doi.org/10.1145/1073814.1073817.
  20. Shay Kutten, Gopal Pandurangan, David Peleg, Peter Robinson, and Amitabh Trehan. On the complexity of universal leader election. J. ACM, 62(1):7:1-7:27, 2015. URL: https://doi.org/10.1145/2699440.
  21. Christoph Lenzen and Boaz Patt-Shamir. Fast routing table construction using small messages. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 381-390, 2013. URL: https://doi.org/10.1145/2488608.2488656.
  22. Martin Leucker and Christian Schallhart. A brief account of runtime verification. The journal of logic and algebraic programming, 78(5):293-303, 2009. URL: https://doi.org/10.1016/J.JLAP.2008.08.004.
  23. Ali Mashreghi and Valerie King. Time-communication trade-offs for minimum spanning tree construction. In Proceedings of the 18th International Conference on Distributed Computing and Networking, Hyderabad, India, January 5-7, 2017, page 8. ACM, 2017. URL: http://dl.acm.org/citation.cfm?id=3007775.
  24. Danupon Nanongkai. Distributed approximation algorithms for weighted shortest paths. In Proceedings of the forty-sixth annual ACM symposium on Theory of computing, pages 565-573, 2014. URL: https://doi.org/10.1145/2591796.2591850.
  25. Moni Naor, Merav Parter, and Eylon Yogev. The power of distributed verifiers in interactive proofs. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1096-115. SIAM, 2020. URL: https://doi.org/10.1137/1.9781611975994.67.
  26. Shreyas Pai, Gopal Pandurangan, Sriram V. Pemmaraju, Talal Riaz, and Peter Robinson. Symmetry breaking in the congest model: Time- and message-efficient algorithms for ruling sets. In Andréa W. Richa, editor, 31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017, Vienna, Austria, volume 91 of LIPIcs, pages 38:1-38:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. URL: https://doi.org/10.4230/LIPICS.DISC.2017.38.
  27. Shreyas Pai, Gopal Pandurangan, Sriram V Pemmaraju, and Peter Robinson. Can we break symmetry with o (m) communication? In PODC'21: Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, pages 247-257, 2021. URL: https://doi.org/10.1145/3465084.3467909.
  28. David Peleg. Distributed computing: A locality-sensitive approach. SIAM, 2000. Google Scholar
  29. David Peleg and Alejandro A Schäffer. Graph spanners. Journal of graph theory, 13(1):99-116, 1989. URL: https://doi.org/10.1002/JGT.3190130114.
  30. Atish Das Sarma, Stephan Holzer, Liah Kor, Amos Korman, Danupon Nanongkai, Gopal Pandurangan, David Peleg, and Roger Wattenhofer. Distributed verification and hardness of distributed approximation. SIAM Journal on Computing, 41(5):1235-1265, 2012. URL: https://doi.org/10.1137/11085178X.
  31. Robert Endre Tarjan. Applications of path compression on balanced trees. Journal of the ACM (JACM), 26(4):690-715, 1979. URL: https://doi.org/10.1145/322154.322161.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail