Abstract 1 Introduction 2 Network Model 3 Upper bounds 4 Fast transmission kernel 5 Experiments 6 Conclusions and future work References

On Reliability of the Extrema Propagation Technique in Random Environment

Jacek Cichoń ORCID Department of Fundamentals of Computer Science, Faculty of Information and Communication Technology, Wrocław University of Science and Technology, Poland Dawid Dworzański ORCID Department of Fundamentals of Computer Science, Faculty of Information and Communication Technology, Wrocław University of Science and Technology, Poland Karol Gotfryd ORCID Department of Fundamentals of Computer Science, Faculty of Information and Communication Technology, Wrocław University of Science and Technology, Poland
Abstract

We study the reliability of the following simple mechanism for spreading information in a communication network in the presence of random message loss. Initially, some nodes have information that they want to distribute throughout the network. Each node that has received the information tries to broadcast it to all its neighbors. However, due to interference or communication failures, each transmission between two nodes is broken independently with some fixed probability.

This transmission mechanism is the basis for the extrema propagation technique, proposed and analyzed in [2, 3, 10]. Extrema propagation is a simple but powerful method of spreading the extreme values stored by the nodes. In a fully reliable environment, only the number of rounds equal to the network diameter is required for all nodes to be informed. It was shown empirically in [2] that it also performs well in the presence of link failures and message loss. Extrema propagation is an algorithmic framework that was adopted for designing efficient method for distributed data aggregation, such as estimation of cardinalities, sums, and averages, estimation of data distribution via histograms and random sampling (cf. [3, 19]).

In this paper, we propose a formal network model in which random transmission failures occur and analyze the operation time of the extrema propagation technique for any connected network graph. We provide new general probabilistic upper bounds on the number of rounds needed to spread the extreme values that depend only on the number of nodes, the diameter of the network, and the probability of successful transmission. For some special families of graphs, we also derive specific, more accurate estimates. Our theoretical and experimental results confirm the reliability and efficiency of the extrema propagation technique in faulty or noisy environments.

Keywords and phrases:
wireless ad-hoc networks, extrema propagation, distributed data aggregation, fault tolerant aggregation, randomly evolving networks
Copyright and License:
[Uncaptioned image] © Jacek Cichoń, Dawid Dworzański, and Karol Gotfryd; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Networks Mobile ad hoc networks
; Computing methodologies Distributed algorithms ; Theory of computation Random network models ; Networks Network reliability
Editors:
Silvia Bonomi, Letterio Galletta, Etienne Rivière, and Valerio Schiavoni

1 Introduction

Extrema Propagation Technique (EPT), introduced in [3], is a simple but powerful method to find the maximal or minimal value of observations stored in nodes of the network. Here is a brief overview of this procedure. Assume that each node vV of a connected graph 𝒢=(V,E) has some real number Xv and suppose that the edges E of the graph 𝒢 describe communication links between nodes. In the initial round of the considered algorithm, each node copies the value Xv into the local variable Minv and sends it to all its neighbors. Then, in each subsequent round, each node stores all the values received from its neighbors, calculates its minimum Mv and if Mv<Minv, then sends Mv to all its neighbors and makes a substitution Minv=Mv. It is clear that after D rounds, where D denotes the diameter of the graph 𝒢, the algorithm stabilizes (no messages are sent over the network) and that Minv=M for all vV, where M=min{Xv:vV}.

The great advantage of this method is its ease of implementation. A trivial use of this method is to determine extreme values in sensor networks. Less trivial applications involve the use of systems of independent variables. For example, assume that the values (Xv)vV are independent random variables that have a uniform distribution in the interval [0,1]. Then the expected value of the random variable min{Xv:vV} is 1/(N+1), where N=|V|. This fact can be used to derive an estimator of the number of vertices in the network. Here is another observation: If (Xv)vV are independent random variables with exponential distribution with parameters (λv)vV, then the random variable M=min{Xv:vV} is also exponentially distributed with parameter λ=vVλv. This property can be used to derive an estimator of the sum of observed parameters {λv:vV}. These interesting applications were discussed and analyzed in [2, 6].

The upper limit on the EPT operation time given by the diameter of the communication graph is true assuming full connection reliability. However, communication interference may occur in real systems. The aim of this paper is to provide simple formulas for the upper estimate of the EPT operation time, assuming that communication interruptions of individual channels are independent and occur with the same probability. Our formulas depend only on the number of nodes, the diameter of the graph, and the probability of successful transmission.

EPT also has reasonable communication complexity. For example, in [10], it was shown that in specific random settings the average number of messages sent by any node is O(log|V|). However, it should be noted that these results are true assuming complete reliability of the connections. We will briefly expand on this topic in the last section of this paper.

The results shown in this paper are applicable to each of the examples discussed in [2, 6] in situations where random interferences may occur during message exchange.

1.1 Notation and basic facts

We say that a random variable X follows a geometric distribution (XGeo(p)) if X takes values in the set of positive integers and Pr(X=k)=(1p)k1p for each k1. If XGeo(p), then 𝐄(X)=1p and 𝐕𝐚𝐫(X)=1pp2. A random variable Y follows an exponential distribution with parameter λ>0 (XExp(λ)) if Y takes values in the set of positive reals and for each x, x0, we have Pr(Y>x)=exp(λx). If exp(λ)=1p, then Geo(p) can be regarded as a discrete version of the Exp(λ) distribution.

We say that a random variable X follows a distribution MGeo(n,p) if there exists a family Y1,,Yn of independent random variables such that YiGeo(p) for each i{1,,n} and X=max{Y1,,Yn}. Using elementary arguments it can be showed that if XMGeo(n,p) then

𝐄(X)=k=1n(nk)(1)k+11qk, (1)

where q=1p. The special case of this equation applied to n=2 tells us that if XMGeo(2,p), then 𝐄(X)=1p(212p). From Eq. (1) it is possible to determine the asymptotics of 𝐄(X) for small values of n.

Similarly, we define the distribution MExp(n,λ): it is a maximum of n independent copies of random variables with distribution Exp(λ). It is quite easy to derive a closed formula for the expected value of a random variable with MExp(n,λ) distribution: it equals Hn/λ, where Hn denotes the n-th harmonic number. Formulas for expected values of random variables with MGeo(n,p) for arbitrary n are much more complicated (see, for example, [24]). But the above-mentioned connection between geometric distribution and exponential distribution gives the following upper and lower bounds for a random variable XMGeo(n,p) (see [15] for details):

Hnln11p𝐄(X)Hnln11p+1, (2)

which will be sufficient for our purposes. Recall that Hn=logn+γ+O(1n), where γ=0.5772 is the Euler-Mascheroni constant. We also notice that (ln11p)1=1p12+O(p) is as p0.

The difference between the exact value of 𝐄(X) and the number Hn/ln(1/(1p)) was investigated by several authors (see, e.g., [15, 28]). It appears that there are no limit distributions for this difference and that it has an oscillatory behavior. Among others, it was shown that asymptotically the difference is 12+O(p2) as p0.

We will use the following version of the geometric-arithmetic mean inequality:

x1xn((x1++xn)/n)n,n,x1,,xn0 (3)

as well as the Bernoulli inequality:

(1+x)n1+nxif n and x,x>1. (4)

1.2 Related work

The extrema propagation technique (EPT), briefly described at the beginning of this section, was proposed and analyzed in [2, 3]. It is a fast and robust probabilistic method for estimating sums and cardinalities in distributed environments. It can be used in scenarios where neither the network topology nor its size is known to the nodes. The extreme propagation technique is efficient in terms of its message complexity. As shown in [10], the average number of messages sent by any station in any network with n nodes is of order O(logn). EPT is one of the main building blocks of algorithms for distributed calculation of approximate histograms of sensory values, average estimation (including averaging of time-series data), and distributed random sampling, as discussed in [9, 19, 25].

The authors in [3] show that appropriately adjusted variants of the basic EPT procedure will also perform well in unreliable or noisy environments, where message loss, slow connections, and link failures occur. In recent years, the problem of fault-tolerant distributed data aggregation has received much attention. Many novel and efficient algorithms for both synchronous and asynchronous settings that are resistant to transmission loss or changes in network topology caused by node or link failures have been proposed and analyzed. The most important techniques are surveyed, among others, in [21, 22]. Examples are flow-updating [1, 23], the push-flow algorithm [16], some variants of the push-sum protocol for distributed consensus and average estimation [17, 20], or methods for estimating the distribution of sensory values [5, 27].

The probabilistic model of message loss or link failures proposed by us in Sect. 2 is closely related to the concept of dynamic networks. That is, wireless networks or other distributed systems whose topology varies over time, as nodes enter or leave the network, and some communication links are active only in some time intervals. There is a vast body of literature on highly dynamic distributed systems, in which some formal models based on randomly evolving graphs are introduced and protocols for fast information dissemination (including variations of randomized rumor spreading) and efficient data aggregation are proposed and analyzed; see, e.g., [4, 8, 12, 18, 26] and references therein. In [7] the authors surveyed existing formal models for dynamic networks and introduced the concept of time-varying graphs, which unifies many of the classical models. They also analyzed the most important properties of this framework.

In [13, 14] the idea of edge-Markovian dynamic graphs was introduced and discussed. This framework allows for modeling stochastic time dependence in communication networks. In an edge-Markovian dynamic graph each edge follows an independent two-state Markov chain switching between being active and non-active. The authors also analyzed the rate at which the information is spread across such networks. The study in [14] considered only complete graphs, resulting in tight asymptotic bounds for a wide range of parameters in such graphs.

1.3 Organization of the paper

The rest of this paper is organized as follows. The formal model of networks and communication along with some illustrative examples is presented in Sect. 2. In Sect. 3 we formulate and prove our main results that provide probabilistic upper bounds on the time of information propagation and discuss their accuracy. In Sect. 4 we derive more precise estimates for certain families of graphs. The results of the experimental evaluation of the accuracy of proposed estimates are presented in Sect. 5. In Sect. 6 we conclude our work and suggest some directions for future research.

2 Network Model

Let 𝒢=(V,E) be a graph, and p(0,1). By Bin(𝒢,p) we denote the discrete-time stochastic process defined as a double-indexed sequence (Xe,t), where eE and t{1,2,}, of pairwise independent Bernoulli random variables with probability of success p. Unless otherwise stated, we assume that all network graphs considered in this paper are simple, finite, and connected.

The process Bin(𝒢,p) can be described as a sequence (𝒢t) of graphs where

𝒢t=(V,{eE:Xe,t=1}).

Fix a process =Bin(𝒢,p) and a non-empty subset A of V. We define the process of flooding the information from the set A as follows: we put A0=A and

At+1=At{yV:(xAt)({x,y}EX{x,y},t=1}.

The set At consists of nodes that have been informed (activated) up to time t (inclusive), assuming that at each time instant each transmission between two nodes is successful independently with probability p. We are interested in the probabilistic properties of flooding time with source A, defined as the random variable

T(𝒢,A,p)=min{t:At=V},

i.e. T(𝒢,A,p) is the first moment when all nodes of the graph 𝒢 are informed, given that at time 0 the initially informed nodes form the set A (source).

We will now discuss a certain property of the proposed model, which we will use repeatedly in future considerations. That is, suppose that 𝒢=(V,E) is a graph. Let 𝒳=(Xe,t) be a sequence of random binary variables from Bin(𝒢,p). Let EE and 𝒢=(V,E). Let 𝒳=(Xe,t) be the restriction of 𝒳 to the edges of E. Let (At) be the flooding process defined by 𝒳 and let (At) be the flooding process defined by 𝒳. Then, by an easy induction argument we have AtAt for all t1. Therefore, T(𝒢,A,p)T(𝒢,A,p). So, for example, if (V,E) is a spanning tree of a connected graph (V,E), then the value of 𝐄(T(𝒢,A,p)) is an upper bound on 𝐄(T(𝒢,A,p)).

Example 2.1.

Fix a positive integer n. Consider the star graph 𝒮=(V,E) with V={0,,n} and E={{0,k}:k{1,,n}}. Consider the process Bin(𝒮,p) and the set A={0}. Notice that in this case we can look independently at the process of disseminating information from vertex 0 to vertex k for each k{1,,n} and that each such process has a geometric distribution with parameter p. Therefore, the random variable T(𝒮,A,p) has the distribution MGeo(n,p), so

𝐄(T(𝒮,{0},p))=Hnln11p+ϵn

for some ϵn[0,1]. From this formula, we deduce that when n is fixed and p0 then we get 𝐄(T(𝒮,{0},p))=Hn(1p12)+O(p)+ϵn.

Example 2.2.

Fix a positive integer n. Consider the following graph 𝒢=(V,E) where V={0,,n,n+1} and E={{0,k}:k{1,,n}}{{k,n+1}:k{1,,n}} (we will call this graph a double star graph; see Fig. 1). Consider the process Bin(𝒢,p) and sets A={0} and B={0,n+1}. We will estimate the expected flooding time 𝐄(T), where T=T(𝒢,A,p).

Let T1=min{t:X{1,n+1},t=1(s<t)(X{0,1},s=1)}. It is clear that 𝐄(T1)=2/p. The random variable T1 can be interpreted as the first moment when node n+1 was informed by node 1 (may be because this node was informed by another node before this time). From time T1 our process behaves similarly to the process of flooding the information in 𝒢 from the set B, hence it is similar to the process of Example 2.1 with probability p replaced by 1(1p)2 (each of at most n uninformed nodes can be activated independently either by 0 or n+1). Therefore

𝐄(T) =t2𝐄(T|T1=t)Pr(T1=t)t2(t+𝐄(TB))Pr(T1=t)
=𝐄(T1)+𝐄(TB)=2p+𝐄(TB)

from which we conclude that

𝐄(T)Hn2ln11p+2p+ϵn

for some ϵn[0,1]. If n is fixed and p0 then 𝐄(T)=Hn(12p14)+2p+1+O(p). Therefore, for large values of n, the considered process runs approximately twice as fast as the process for the star graph.

Figure 1: A double star graph with n+2 vertices from Example 2.2.

3 Upper bounds

In this section, we prove the main results of our paper – new upper bounds on the time of information propagation in any connected communication graph (Theorems 3.4 and 3.5). These bounds depend only on some global characteristics of the network, i.e., the number of nodes, its diameter, and probability of successful transmission. We also discuss their precision and applications. Before formulation of these results, we formulate two auxiliary lemmas.

Lemma 3.1.

Let 𝒮 be a star graph with vertices {0,1,,n} and root 0 (as in Example 2.1). Let η,p(0,1) and denote q=1p. Then

Pr(T(𝒮,{0},p)t)1η

if and only if

t1ln(1/q)ln11(1η)1/n.

Proof.

Let E denote the event {T(𝒮,{0},p)t}, that is, “all the vertices are active after t steps”. Then Pr(E)=(1qt)n. Therefore,

((1qt)n1η)(1qt(1η)1/n)(qt1(1η)1/n)
(tlnqln(1(1η)1/n))(t1lnqln(1(1η)1/n)).

Lemma 3.2.

Let η(0,1) and n1 be an integer. Then

11(1η)1/nnη.

Proof.

Let x=1(1η)1/n. Observe that x(0,1). Then η=1(1x)n. From the Bernoulli inequality (4) we get (1x)n1nx, so 1(1x)nnx. Therefore (1(1x)n)11/(nx), so

nη=n1(1x)nnnx=1x=11(1η)1/n.

Directly from Lemmas 3.1 and 3.2 we get the following result.

Corollary 3.3.

Let 𝒮 be the star graph with root 0 and vertices {0,1,,n} and let η,p(0,1). Then

t1ln(1/q)ln(nη)Pr(T(𝒮,{0},p)t)1η,

where q=1p.

We now formulate and prove our main results characterizing the probabilistic upper bounds on the flooding time in any connected network graph with a single source node.

Theorem 3.4.

Suppose that 𝒢=(V,E) is a connected graph with n+1 vertices, where n>0 and diameter D. Let aV. Then for every ε(0,1) we have

Pr(T(𝒢,{a},p)Dln(nε)ln(11p))1ε.

Proof.

Fix a connected graph 𝒢=(V,E) with n+1 vertices. Let d denote the distance function in this graph (that is, the length of the shortest path between the vertices). Fix a vertex aV and let L=max{d(a,v):vV} be the eccentricity of a. Clearly LD.

Let Ei={yV:d(a,y)=i} and ni=|Ei| for i=0,,L. Notice that i=1Lni=n. Fix ε(0,1) and let η(0,1) be such that

(1η)L=1ε. (5)

From the Bernoulli inequality (4) we get

εLη. (6)

Consider the process Bin(𝒢,p) that starts with A0={a} and assume that at time ti we have EiAti (that is, all nodes at distance i from a have been informed up to time ti). Letting q=1p, from Corollary 3.3 we deduce that at time

ti+1=ti+1ln(1/q)ln(ni+1η)

we have Pr(Ei+1Ati+1)1η for any i=1,,L. In fact, each node in Ei+1 is connected to some informed node in Ei, and the bound of the star graph carries over to this case. Let

T=i=0L11ln(1/q)ln(ni+1η)

and notice that

Pr(T(𝒢,{a},p)T)(1η)L=1ε.

We have

T =1ln(1/q)i=1Lln(niη)=1ln(1/q)ln(i=1Lniη)
1ln(1/q)ln(i=1LniLη)L=Lln(1/q)ln(nLη)
Lln(1/q)ln(nε)Dln(1/q)ln(nε)

(we used the geometric-arithmetic mean inequality (3) in the second line and inequality (6) in the third line). Therefore,

Pr(T(𝒢,{a},p)Dln(1/q)ln(nε))Pr(T(𝒢,{a},p)T)1ε.

Theorem 3.5.

Suppose that 𝒢=(V,E) is a connected graph with n+1 vertices, where n>0. Let aV and L=max{d(a,v):vV}. Then

𝐄(T(𝒢,{a},p))LlnneLln11p+L.

Proof.

The proof is based on a similar reasoning as in the case of Theorem 3.4. Let Ti=min{t:EiAt}, Ri=TiTi1 and T=i=1LRi. From Example 2.1 we can deduce that 𝐄(Ri)Hniln(1/(1p))+1. Using the inequality Hnlnn+1 and letting q=1p, we have

E(T) i=1L(Hniln(1/q)+1)1ln(1/q)i=1L(lnni+1)+L
=1ln(1/q)(ln(i=1Lni)+L)+L1ln(1/q)(Llni=1LniL+L)+L
=1ln(1/q)(LlnnL+L)+L=LlnneLln(1/q)+L.

The upper bound on the expected flooding time given by Theorem 3.5 depends on the eccentricity L of the initially informed vertex a. However, one can easily derive a generalized version that holds for all vertices in a given graph.

Corollary 3.6.

Suppose that 𝒢=(V,E) is a connected graph with n+1 vertices, where n>0, and diameter D. Then for any aV

𝐄(T(𝒢,{a},p))DlnneDln11p+D. (7)

Proof.

The eccentricity L of any given vertex aV is bounded above by the diameter D. Since the function f(x)=xln(nex) is monotonically increasing on the interval (0,n], the bound (7) holds for every aV.

Example 3.7.

Let us consider once again the star graph 𝒮 from Example 2.1 with n+1 vertices and the source A={0}. We then have L=1, so from Theorem 3.5 we get

𝐄(T(𝒮,{0},p))ln(n)+1ln11p+1.

As shown in Example 2.1, 𝐄(T(𝒮,{0},p))=Hnln(1/(1p))+ϵn for some ϵn[0,1], thus the upper bound is almost tight in this case.

Example 3.8.

Let 𝒫n be the path graph with n+1 vertices {0,1,,n} and edges {{i,i+1}:0in1}. The upper bound from Theorem 3.5 gives

𝐄(T(𝒫n,{0},p))nln11p+n.

Using the inequality ln(1/(1p))p (when p[0,1)) we obtain the formula np+n which is consistent with the exact value np of the expectation of a random variable with a negative binomial distribution with parameters n and p up to a constant factor n.

The above examples confirm that the upper estimate of the expected flooding time is relatively accurate. However, the next example shows that in some cases this bound is quite far from the actual value.

Example 3.9.

Let 𝒦n denote the complete graph with n vertices. Let 𝒢n=𝒦n+1 and let a be some fixed vertex. From Theorem 3.5 we get

𝐄(T(𝒢n,{a},p))lnn+1ln11p+1,

but in Theorem 4.1 we will show that limn𝐄(T(𝒢n,{a},p))=2.

4 Fast transmission kernel

The upper bound from Eq. (7) for the flooding time for some dense graphs is poor. In fact, it was derived by splitting the graph into layers Ei consisting of vertices at distance i from the source, 1iL, and summing up the times required to inform all nodes from Ei+1 after all nodes from Ei have been informed, as if none of them had received the information up to that time and was connected to only one node from Ei (as mentioned in Sect. 2, the analysis can be restricted to some spanning tree rooted at the source node). This is an overestimate, especially in dense graphs, in which the information is disseminated much faster. In the extreme case, for the complete graph 𝒦n+1, it gives 𝐄(T(𝒦n+1,{a},p))lnn+1ln11p+1. However, it can be shown that for fixed p and large n we have 𝐄(𝒦n,{a},p)2.

Theorem 4.1.

Let 𝒦n+1 denote the complete graph with vertices V={0,,n} and let p(0,1). Then

limn𝐄(T(𝒦n,{0},p))=2.

Here is an imprecise explanation of the above result: notice that 𝐄(|A1|)=1+np and that 𝐄(|A2|||A1|=k)=(n+1)(1(1p)k)+k(1p)k; moreover if k=np then (1p)kenp2, so if np2 then 𝐄(|A2|)n+1. Notice that this result can be summarized as follows: for fixed p and large n, the graph 𝒦n behaves like the cycle graph 𝒞3. Now we will present a refinement of the above heuristic.

Proof.

Let Vn={1,,n}, Tn=𝐄(T(𝒦n+1,{0},p)) and denote q=1p. Let X0={0}, X1={y:X{0,y},1=1} and X2={y:(xX0X1)(X{x,y},2=1)}(X0X1). We will use the inequality 𝐄(Tn)Hnln(1/q)+1. It holds because a complete graph contains a star graph and we can use the bound from Eq. (2). We will bound expected values from two sides.

Notice that Pr(X1=Vn)=pn, so Pr(Tn=1)=pn, hence

𝐄(Tn) =𝐄(Tn|X1=Vn)Pr(X1=Vn)+𝐄(Tn|X1Vn)Pr(X1Vn)
=pn+𝐄(Tn|X1Vn)(1pn)pn+2(1pn)=2pn,

hence lim infn𝐄(Tn)2.

Next, we note that

𝐄(Tn)=𝐄(Tn||X1|np2)Pr(|X1|np2)+𝐄(Tn||X1|>np2)Pr(|X1|>np2).

For the first term of this formula, we see 𝐄(|X1|)=np. From the Chebyshev inequality applied to the binomial distribution, we get Pr(|X1|12np)4qnp. Thus, we get

limn𝐄(Tn||X1|np2)Pr(|X1|np2)limn((Hnln(1/q)+1)4qnp)=0.

For the second term we notice that

𝐄(Tn||X1|>np2)Pr(|X1|>np2)=k>(np)/2𝐄(Tn||X1|=k)Pr(|X1|=k).

Fix k>np2 and suppose that |X1|=k. Then |X2| follows the binomial distribution Bin(nk,1(1p)k+1). Let Zk=nk|X2|. Then 𝐄(Zk)=(nk)(1p)k+1. The function f(x)=(nx)(1p)x+1 decreases on the interval [0,n], so for k>np2 we have

𝐄(Zk)n(1p/2)(1p)(np/2)+1,

so from the Markov inequality we get

Pr(Zk>0)=Pr(Zk1)n(1p/2)(1p)(np/2)+1.

Notice that if Zk=0 then Tn=2. Hence,

𝐄(Tn||X1|=k)=
𝐄(Tn||X1|=kZk=0)Pr(Zk=0)+𝐄(Tn||X1|=kZk>0)Pr(Zk>0)
2Pr(Zk=0)+(Hnln(1/q)+1)Pr(Zk>0)2+(Hnln(1/q)+1)n(1p/2)(1p)np/2,

which implies that

k>(np)/2𝐄(Tn||X1|=k)Pr(|X1|=k)
k>(np)/2(2+(Hnln(1/q)+1)n(1p/2)(1p)np/2)Pr(|X1|=k)=
(2+(Hnln(1/q)+1)n(1p/2)(1p)np/2)Pr(|X1|>np2),

so

lim supn𝐄(Tn)=lim supn𝐄(Tn||X1|>np2)Pr(|X1|>np2)
limn(2+(Hnln(1/q)+1)n(1p/2)(1p)np/2)Pr(|X1|>np2)=2.

The stochastic process from Theorem 4.1 can be modeled as a Markov chain with the absorbing state as the state in which all nodes are informed. Using a formula for the expected number of steps before absorption, we calculated exact numerical values for p=0.1. The results are shown in Fig. 2.

Figure 2: Values of 𝐄(T(𝒦n,{0},0.1)) for n from 2 to 1500. The results converge to 2, as stated in Theorem 4.1. The first three values are 10, 10.2493 and 9.62651.
Example 4.2.

Fix L>1 and consider a graph 𝒢 with vertices divided into L blocks B1,,BL, each of cardinality 2, and one additional vertex s. We add two edges between s and the vertices in B1 and connect each vertex in Bi with each vertex in Bi+1, i=1,,L1. This graph, which we call a double path graph, has n=2L+1 vertices and diameter L (see Fig. 3). From Eq. (7) we get the following bound:

𝐄(T(𝒢,{s},p))L(1+ln2)ln11p+L.

Notice that for fixed L and small p this is close to 1.69L/p. However, in this case, we can easily get a much better upper bound. That is, the time T0 needed to spread the information from node s to both nodes of the first block B1 is bounded above by a random variable with distribution MGeo(2,p), so from Eq. (1) we get 𝐄(T0)=1p(212p). Next, assuming that both nodes in Bi are informed, the time Ti needed to spread the information to both nodes in Bi+1 is bounded above by a random variable with distribution MGeo(2,1(1p)2), so 𝐄(Ti)1p(2p)(211+(1p)2). Putting all this inequalities together we get

𝐄(T(𝒢,{s},p))1p(212p)+L1p(2p)(211+(1p)2).

This upper bound for large L and small p is close to 34(L+1)/p.

Figure 3: A double path graph with n=2L+1 vertices from Example 4.2.
Example 4.3.

For the process from Example 2.2, Eq. (7) gives us the following bound:

T(𝒢,A,p)2ln((n+1)e/2)ln(1/(1p))+2.

For small p this is close to 2ln((n+1)e/2)/pln((n+1)e/2)+2, whereas the bound from Example 2.2 is close to (Hn/2+2)/p+1Hn/4.

The examples given above show that in many cases we are able to derive upper bounds on the time of information propagation in a graph better than those that are formulated in the universal Theorems 3.4 and 3.5.

In many natural examples of communication graphs, dense fragments can be distinguished, in which the transfer of information, even in the presence of interference or random faults, is relatively fast. Such fragments can be complete graphs or, for example, fairly dense subsets similar to the graph in Example 4.2. They can be called fast communication kernels. In the following, we formulate a theorem that makes it easier to estimate the flooding time of information in such graphs.

Theorem 4.4.

Let 𝒢=(V,E) be a connected graph with diameter D, V=V1V2, n1=|V1| and V1V2=. Let 𝒢2=(V2,E[V2]2). Suppose that

  1. 1.

    (vV1)(d(v,V2)l)

  2. 2.

    (vV2)(𝐄(T(𝒢2,{v},p))T)

Then for all vV we have

𝐄(T(𝒢,{v},p))Dp(2+ln(n1eD))+T.

Proof.

Let us consider vV1 and let T1 be the random variable denoting the time needed to reach the set V2 by a process of spreading information from the source v. Let P be a path from v to some node from V2. The expected time to send the information only along the path P is equal to l/p, where l is the length of P. So 𝐄(T1)l/pD/p. The time T2 needed to spread the information throughout the whole set V2 from the reached node is bonded by T. At time T1+T2 we may treat all nodes of V2 as a single node, so for the bound on the remaining time T3 we may use Theorem 3.5, getting 𝐄(T3)D(ln(n1e/D)ln(1/(1p))+1). Finally, using the inequality ln(1/(1p))p we obtain the final inequality.

Example 4.5.

Consider the graph which consists of a complete graph 𝒦n with k disjoint path of length bounded by D connected by a single vertex with 𝒦n. If k=1 then this graph is called a lollipop graph. From Theorem 4.1 and Theorem 4.4 we deduce that for large n the upper bound is close to Dp(3+lnk)+2.

5 Experiments

We conducted a series of experiments that exemplify our results. We compare the estimate of expected value of the flooding time acquired from experiments with general bounds from Theorem 3.5 and specific bounds derived for a given problem. To compare bounds, we used the relative error of the bound and the estimate of the expected value of the flooding time, defined as the ratio of the difference between them to the estimate of the expected value of the flooding time. We choose a small value of p as 0.1 to simulate a noisy environment in which a significant fraction of messages are lost.

For the path graph from Example 3.8 we can compare the bound from Theorem 3.5 with the exact value of E(T). In Figure 4 we see that the bound as well as E(T) grow linearly as the number of nodes n. The relative error is independent of n and reaches a maximum at p=0.833587 of δ=0.298426.

(a) Expected value of flooding time(p=0.1).
(b) Relative error of bound.
Figure 4: Comparison of the bounds from Theorem 3.5, the analysis from Example 3.8 and the expected value of flooding time for the path graph for n from 2 to 1000. The Relative error of bound is independent of n.

For the double path graph from Example 4.2 we set the value of p to 0.1 and average over 1000 simulation runs for values of n from 2 to 1000, the results are shown in Figure 5. We compare two bounds, the first from Theorem 3.5 and the second from the theoretical analysis presented in Example 4.2. We can observe in Fig. 4(a) that both estimates grow linearly as the number of nodes n increases, but the specific upper bound acquired in Example 4.2 has a lower slope. Relative errors stabilize for larger n.

(a) Expected value of flooding time.
(b) Relative error of bounds.
Figure 5: Results of experiments for the double path graph; simulation was run 1000 times for each n from 2 to 1000. Value of p was set to 0.1.

We performed similar experiments for the double star graph from Example 2.2 (the average is taken over 10 000 runs). The results are shown in Fig. 6. In this case, the estimate from Theorem 3.5 is worse than the upper bound derived in Example 2.2. However, note that both bounds capture the logarithmic asymptotic of the experimental data.

(a) Expected value of flooding time.
(b) Relative error of bounds.
Figure 6: Results of experiments for the model described in Example 2.2. Simulation was conducted 10 000 times for each n from 2 to 1000. Value of p was set to 0.1.

6 Conclusions and future work

In this work, we showed simple upper bounds for the necessary number of rounds needed to broadcast information in the connected graph in the case when the transmission disruption probabilities are the same and independent. These formulas are easy to use because they depend only on the diameter of the graph, the number of its vertices, the probability of error-free transmission, and the desired accuracy. We also showed in Sect. 4 how in some situations it is possible to obtain better upper bounds in non-uniform networks.

The upper bounds given in Sect. 3 use very little information about the graph structure. The examples considered by us suggest that the quality of these constraints depends on the density of the graphs. One of the goals of further research is to find simple formulas, similar to those in Section 3, that take into account another characteristic of the graph such as the minimum and maximum degrees of vertices.

The basic implementation of EPT-based algorithms is very simple for interference-free communication. It is based on the following simple idea: If in one round you hear a number smaller than the minimum observed so far, then in the next round send it to all your neighbors. This approach obviously fails if the communication is not completely error-free. A trivial but correct solution to this problem is to broadcast the observed minimum to all neighbors until the last round of the algorithm. The sufficient number of rounds can be determined using Theorem 3.4. We plan to use methods from [11] to improve this elementary idea.

Another possible direction of future research is to consider more complex models of transmission failures that, e.g., do not assume the full independence of communication errors or allow different probabilities of successful transmission for different edges. Such models can be better-suited for describing real-world systems, in which interference may occur in some fragment of the network at the same time (so transmission failures are spatially or temporally correlated), or different parts of the system may have different physical properties (e.g., certain areas may be affected by stronger disturbances). We expect that the methods from this paper can also be applied to these situations.

References

  • [1] Paulo Sérgio Almeida, Carlos Baquero, Martín Farach-Colton, Paulo Jesus, and Miguel A. Mosteiro. Fault-tolerant aggregation: Flow-Updating meets Mass-Distribution. Distributed Computing, 30(4):281–291, August 2017. doi:10.1007/s00446-016-0288-5.
  • [2] Carlos Baquero, Paulo Sérgio Almeida, Raquel Menezes, and Paulo Jesus. Extrema Propagation: Fast Distributed Estimation of Sums and Network Sizes. IEEE Trans. Parallel Distrib. Syst., 23:668–675, 2012. doi:10.1109/TPDS.2011.209.
  • [3] Carlos Baquero, Paulo Sérgio Almeida, and Raquel Menezes. Fast Estimation of Aggregates in Unstructured Networks. In Fifth International Conference on Autonomic and Autonomous Systems, ICAS 2009, pages 88–93. IEEE Computer Society, 2009. doi:10.1109/ICAS.2009.31.
  • [4] Hervé Baumann, Pierluigi Crescenzi, and Pierre Fraigniaud. Parsimonious flooding in dynamic graphs. In Proceedings of the 28th ACM Symposium on Principles of Distributed Computing, PODC ’09, pages 260–269, New York, NY, USA, 2009. Association for Computing Machinery. doi:10.1145/1582716.1582757.
  • [5] Miguel Borges, Paulo Jesus, Carlos Baquero, and Paulo Sérgio Almeida. Spectra: Robust Estimation of Distribution Functions in Networks. In Karl Michael Göschka and Seif Haridi, editors, Distributed Applications and Interoperable Systems, Proceedings, DAIS 2012, pages 96–103. Springer, Berlin, Heidelberg, 2012. doi:10.1007/978-3-642-30823-9_8.
  • [6] Jorge C. S. Cardoso, Carlos Baquero, and Paulo Sérgio Almeida. Probabilistic Estimation of Network Size and Diameter. In 2009 Fourth Latin-American Symposium on Dependable Computing, LADC ’09, pages 33–40. IEEE Computer Society, September 2009. doi:10.1109/LADC.2009.19.
  • [7] Arnaud Casteigts, Paola Flocchini, Walter Quattrociocchi, and Nicola Santoro. Time-varying graphs and dynamic networks. International Journal of Parallel, Emergent and Distributed Systems, 27(5):387–408, 2012. doi:10.1080/17445760.2012.668546.
  • [8] Arnaud Casteigts, Michael Raskin, Malte Renken, and Viktor Zamaraev. Sharp Thresholds in Random Simple Temporal Graphs. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 319–326, 2022. doi:10.1109/FOCS52979.2021.00040.
  • [9] Jacek Cichoń and Karol Gotfryd. Average Counting via Approximate Histograms. ACM Trans. Sen. Netw., 14(2):8:1–8:32, March 2018. doi:10.1145/3177922.
  • [10] Jacek Cichoń, Jakub Lemiesz, and Marcin Zawada. On Message Complexity of Extrema Propagation Techniques. In Xiang-Yang Li, Symeon Papavassiliou, and Stefan Rührup, editors, Proceedings of the 11th International Conference on Ad-Hoc, Mobile, and Wireless Networks, volume 7363 of ADHOC-NOW 2012, pages 1–13, Berlin, Heidelberg, 2012. Springer. doi:10.1007/978-3-642-31638-8_1.
  • [11] Jacek Cichoń, Maciej Gębala, and Marcin Zawada. Fault tolerant protocol for data collecting in wireless sensor networks. In 2017 IEEE Symposium on Computers and Communications (ISCC), pages 483–486, 2017. doi:10.1109/ISCC.2017.8024575.
  • [12] Andrea Clementi, Pierluigi Crescenzi, Carola Doerr, Pierre Fraigniaud, Francesco Pasquale, and Riccardo Silvestri. Rumor spreading in random evolving graphs. Random Struct. Algorithms, 48(2):290–312, March 2016. doi:10.1002/rsa.20586.
  • [13] Andrea Clementi, Angelo Monti, Francesco Pasquale, and Riccardo Silvestri. Information Spreading in Stationary Markovian Evolving Graphs. IEEE Trans. Parallel Distributed Syst., 22(9):1425–1432, 2011. doi:10.1109/TPDS.2011.33.
  • [14] Andrea E.F. Clementi, Claudio Macci, Angelo Monti, Francesco Pasquale, and Riccardo Silvestri. Flooding Time in edge-Markovian Dynamic Graphs. In Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing, PODC ’08, pages 213–222, New York, NY, USA, 2008. Association for Computing Machinery. doi:10.1145/1400751.1400781.
  • [15] Bennett Eisenberg. On the expectation of the maximum of IID geometric random variables. Statistics & Probability Letters, 78(2):135–143, 2008. doi:10.1016/j.spl.2007.05.011.
  • [16] Wilfried Gansterer, Gerhard Niederbrucker, Hana Straková, and Stefan Schulze Grotthoff. Scalable and fault tolerant orthogonalization based on randomized distributed data aggregation. Journal of Computational Science, 4:480–488, November 2013. doi:10.1016/j.jocs.2013.01.006.
  • [17] Balázs Gerencsér and Julien M. Hendrickx. Push-Sum With Transmission Failures. IEEE Transactions on Automatic Control, 64(3):1019–1033, 2019. doi:10.1109/TAC.2018.2836861.
  • [18] George Giakkoupis, Thomas Sauerwald, and Alexandre Stauffer. Randomized Rumor Spreading in Dynamic Graphs. In Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias, editors, 41st International Colloquium on Automata, Languages and Programming (ICALP), pages 495–507. Springer Berlin Heidelberg, 2014. doi:10.1007/978-3-662-43951-7_42.
  • [19] Karol Gotfryd and Jacek Cichoń. On distributed data aggregation and the precision of approximate histograms. Journal of Parallel and Distributed Computing, 180:104722, 2023. doi:10.1016/j.jpdc.2023.104722.
  • [20] Christoforos N. Hadjicostis and Themistoklis Charalambous. Average Consensus in the Presence of Delays in Directed Graph Topologies. IEEE Transactions on Automatic Control, 59(3):763–768, 2014. doi:10.1109/TAC.2013.2275669.
  • [21] Paulo Jesus. Robust Distributed Data Aggregation. LAP LAMBERT Academic Publishing, 2016.
  • [22] Paulo Jesus, Carlos Baquero, and Paulo Sergio Almeida. A Survey of Distributed Data Aggregation Algorithms. Commun. Surveys Tuts., 17(1):381–404, January 2015. doi:10.1109/COMST.2014.2354398.
  • [23] Paulo Jesus, Carlos Baquero, and Paulo Sérgio Almeida. Flow updating: Fault-tolerant aggregation for dynamic networks. Journal of Parallel and Distributed Computing, 78:53–64, 2015. doi:10.1016/j.jpdc.2015.02.003.
  • [24] Barry H. Margolin and Herbert S. Winokur, Jr. Exact Moments of the Order Statistics of the Geometric Distribution and their Relation to Inverse Sampling and Reliability of Redundant Systems. Journal of the Americam Statistical Assiociation, 62(319):915–925, September 1997. doi:10.2307/2283679.
  • [25] Saptadi Nugroho, Alexander Weinmann, Christian Schindelhauer, and Andreas Christ. Averaging Emulated Time-Series Data Using Approximate Histograms in Peer to Peer Networks. In Highlights in Practical Applications of Agents, Multi-Agent Systems, and Trust-worthiness. The PAAMS Collection, pages 339–346, Cham, 2020. Springer International Publishing. doi:10.1007/978-3-030-51999-5_28.
  • [26] Ali Pourmiri and Bernard Mans. Tight Analysis of Asynchronous Rumor Spreading in Dynamic Networks. In Proceedings of the 39th Symposium on Principles of Distributed Computing, PODC ’20, pages 263–272, New York, NY, USA, 2020. Association for Computing Machinery. doi:10.1145/3382734.3405720.
  • [27] Jan Sacha, Jeff Napper, Corina Stratan, and Guillaume Pierre. Adam2: Reliable Distribution Estimation in Decentralised Environments. In Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems, ICDCS ’10, pages 697–707, Washington, DC, USA, 2010. IEEE Computer Society. doi:10.1109/ICDCS.2010.16.
  • [28] Wojciech Szpankowski and Vernon Rego. Yet another application of a binomial recurrence order statistics. Computing, 43(4):401–410, 1990. doi:10.1007/BF02241658.