Broadcasting Under Structural Restrictions
Abstract
In the Telephone Broadcast problem we are given a graph with a designated source vertex . Our goal is to transmit a message, which is initially known only to , to all vertices of the graph by using a process where in each round an informed vertex may transmit the message to one of its uninformed neighbors. The optimization objective is to minimize the number of rounds.
Following up on several recent works, we investigate the structurally parameterized complexity of Telephone Broadcast. In particular, we first strengthen existing NP-hardness results by showing that the problem remains NP-complete on graphs of bounded tree-depth and also on cactus graphs which are one vertex deletion away from being path forests. Motivated by this (severe) hardness, we study several other parameterizations of the problem and obtain FPT algorithms parameterized by vertex integrity (generalizing a recent FPT algorithm parameterized by vertex cover by Fomin, Fraigniaud, and Golovach [TCS 2024]) and by distance to clique, as well as FPT approximation algorithms parameterized by clique-cover and cluster vertex deletion. Furthermore, we obtain structural results that relate the length of the optimal broadcast protocol of a graph with its pathwidth and tree-depth. By presenting a substantial improvement over the best previously known bound for pathwidth (Aminian, Kamali, Seyed-Javadi, and Sumedha [ICALP 2025]) we exponentially improve the approximation ratio achievable in polynomial time on graphs of bounded pathwidth from to .
Keywords and phrases:
Parameterized Complexity, Structural Graph Parameters, Telephone BroadcastFunding:
Tatsuya Gima: JSPS KAKENHI Grant Numbers JP24K23847, JP25K03077.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Parameterized complexity and exact algorithmsFunding:
This work is partially supported by ANR project ANR-21-CE48-0022 (S-EX-AP-PE-AL).Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał SkrzypczakSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Broadcasting in graphs is a well-studied field, with one of the most basic models being the telephone model [25]: at the start of the broadcasting process exactly one vertex of the graph (the source vertex) is informed (i.e., knows the message), and at the beginning of each round each informed vertex can send the message to at most one of its uninformed neighbors which receives the message by the end of that round. To fix some notation, let be a connected graph on vertices and denote the source vertex. Then, denotes the minimum number of rounds needed to disseminate the message to all vertices of under the previously described model. As an example, if is a path and is one of the degree- vertices, then , while if is a complete graph, then . Notice that for any graph it holds that , and due to the previous examples there exist graphs for which those bounds are tight.
In this paper we study several structural parameterizations111Throughout the paper we assume that the reader is familiar with the basics of parameterized complexity, as given in standard textbooks [8]. of the Telephone Broadcast problem which asks, given a graph , a source vertex , and an integer , whether . In 1981, Slater, Cockayne, and Hedetniemi [33] introduced Telephone Broadcast and showed that it is NP-complete in general but polynomial-time solvable on trees. Among several results obtained in the intensive study of the problem, the most relevant to us are the very recent ones due to Fomin et al. [16], Tale [34], and Aminian et al. [2], described below.
Fomin, Fraigniaud, and Golovach [16] initiated the study of the parameterized complexity of Telephone Broadcast. They developed a -time algorithm, where is the number of vertices, as well as showed that the problem is fixed-parameter tractable parameterized by feedback edge set number, by vertex cover number, and by the number of vertices minus the number of rounds; notice that their first result, along with the fact that , further implies that the problem is FPT by the number of rounds and leads to an algorithm of double-exponential parametric dependence. Among other open questions they posed, they asked the complexity of Telephone Broadcast parameterized by other structural parameters and explicitly mentioned treewidth and feedback vertex set number.
Answering the previous question, Tale [34] showed that Telephone Broadcast is NP-complete on graphs of feedback vertex set number (and thus treewidth ). As a matter of fact, the proof shows NP-completeness on graphs of vertex deletion distance to path forest (and thus pathwidth ). Regarding the double-exponential dependence parameterized by the number of rounds , as discussed in [34], a result of Papadimitriou and Yannakakis [30] implies that Telephone Broadcast parameterized by does not admit an algorithm with parameter dependence better than double-exponential (under the ETH). Therefore, the bound obtained by the observation applied to the -time algorithm of [16] is essentially optimal.
In a very recent work, Aminian, Kamali, Seyed-Javadi, and Sumedha [2] studied Telephone Broadcast on cactus graphs and on graphs of bounded pathwidth. They showed that the problem is NP-complete on cactus graphs of pathwidth , while they presented a factor- approximation algorithm for cactus graphs. Furthermore, they established a connection between the pathwidth pw of the input graph and , by proving that for all it holds that . A consequence of this result is that the polynomial-time approximation algorithm of Elkin and Kortsarz [14] achieves an approximation ratio of for graphs of pathwidth pw, improving over the factor achieved in general graphs.
Our contribution.
Our aim in this paper is to thoroughly study Telephone Broadcast under the perspective of parameterized complexity; for an overview of our results and the relationship between the mentioned parameters we refer to Figure 1. First we show in Section 3 that the problem remains NP-complete even for very restricted families of graphs, namely (i) cactus graphs of vertex deletion distance to path forest (Theorem 1), and (ii) graphs of constant tree-depth (Theorem 5). The reduction employed in Theorem 1 follows along the lines of the one presented by Tale [34], starting from a variation of -Partition. However, by selecting a more appropriate variant of -Partition we are able to significantly simplify both the reduction itself and the constructed graph, thus improving over the initial result by Tale [34] and the subsequent one by Aminian et al. [2] (in the sense that graphs with vertex deletion distance from a path forest, as given in our reduction, are a strict subclass of the snowflake graphs given in [2]). More importantly, by modifying said reduction, we further prove that the problem remains NP-hard for graphs of constant tree-depth. Note that tree-depth is a parameter not covered by the previous reductions, which heavily relied on constructions of long paths (which inherently have large tree-depth).
Our negative results extend the intractability of the problem from bounded pathwidth to bounded tree-depth instances. It is therefore natural to ask which (more restrictive) parameterizations do render the problem tractable. We present several positive results in this direction in Section 4. In particular, in Theorem 6 we show that the problem is FPT parameterized by vertex integrity, which nicely complements the paraNP-hardness in case of parameterization by tree-depth. To obtain this result, we generalize some of the ideas employed by Fomin et al. [16] to show fixed-parameter tractability by vertex cover number. Next, in Theorem 9 we consider graphs which are vertex deletions away from being a clique and we develop a -time algorithm. Moving on, we consider the parameterization by both and the treewidth tw of the input graph, and in Theorem 12 we develop a single-exponential -time algorithm based on dynamic programming (contrast this with the fact that the problem is intractable when parameterized solely by treewidth and requires a double-exponential dependence when parameterized solely by ). As our last algorithmic results, in Section 5 we develop FPT approximation algorithms when parameterized by clique cover number and by cluster vertex deletion number. With these results we clearly trace the limits of tractability for sparse parameters (tree-depth, vertex integrity) but also improve our understanding of some dense graph parameters.
The algorithm is of particular note because it identifies a small island of tractability for Telephone Broadcast, namely, it implies that Telephone Broadcast is polynomial-time solvable for graphs of bounded treewidth (XP) whenever we are interested in a fast broadcast schedule (). This is interesting, because in general the problem seems quite intractable for most parameters and because all hardness reductions we mentioned construct instances which require a large (polynomial in ) number of rounds. This further motivates the question of which graph families may admit a schedule with few rounds, which, as we mention below, has been extensively studied and also has algorithmic implications in terms of approximation. Closing the paper, we improve our understanding of this (structural) question by more carefully studying the relationship between the minimum number of necessary rounds and the pathwidth and tree-depth of a graph. In particular, in Section 6 we show as a main result (Corollary 21) that . This bound exponentially improves over the corresponding bound of Aminian et al. [2] (who showed that ). As an immediate application (Corollary 22), by applying an algorithm of Elkin and Kortsarz [14], we obtain a polynomial-time algorithm with approximation ratio (compared to the ratio of given in [2]).
Related work.
There has been an extensive line of research with regards to broadcasting under the telephone model in graphs. The computational complexity of Telephone Broadcast has been studied for multiple classes of graphs, with the problem being polynomial-time solvable for trees [33], a subclass of cactus graphs [6], fully connected trees [19], generalized windmill graphs (which is equivalent to graphs of twin-cover number ) [1, 9], and unicyclic graphs [23], with the latter result having been generalized to the previously mentioned FPT algorithm parameterized by feedback edge set number by Fomin et al. [16]. On the other hand, Jansen and Müller [28] showed that Telephone Broadcast remains NP-complete on several restricted graph classes such as chordal and grid graphs. We also refer to some relevant surveys in [17, 26]. In another line of research, Grigni and Peleg [20] have provided bounds on the minimum number of edges and the minimum maxdegree for graphs with the property that for all .
The problem is also well-studied in terms of its polynomial-time approximability. Ravi [31] presented a -factor approximation algorithm, while Kortsarz and Peleg [29] presented (among other results) an algorithm that computes a broadcast protocol with at most rounds. Subsequently, Bar-Noy, Guha, Naor, and Schieber [3] improved the approximation ratio to , while Elkin and Kortsarz [12] provided a combinatorial approximation algorithm of the same approximation ratio, as opposed to the algorithms of [3, 31] that involve solving LPs, that additionally generalizes to directed graphs. The current best approximation ratio of is due to Elkin and Kortsarz [14]; as a matter of fact, the ratio of their algorithm is , thus whenever for some constant , they obtain a constant approximation ratio . Better approximation ratios are known for specific graph classes [4, 5, 22, 29], while there are also some inapproximability results [12, 32].
There are several related problems in the literature (see e.g. [35] or the survey [25]), and other models of communication have been considered, such as the open-line and open-path model [15, 29]. An important generalization of Telephone Broadcast that has been studied is the Telephone Multicast problem, where the objective is to minimize the number of rounds needed to inform a specific subset of vertices of the input graph. Most of the previously mentioned approximation algorithms ([3, 12, 14, 31]) generalize to this problem resulting in improved approximation ratios, while directed versions (and variations) of it have also been studied [13, 24].
2 Preliminaries
Throughout the paper we use standard graph notations [10], and we assume familiarity with the basic notions of parameterized complexity [8]. For , let , while .
All graphs considered are undirected without loops. Given a graph and a subset of its vertices , denotes the subgraph induced by while denotes . We denote the set of connected components of by . For two vertices , the distance between and in , denoted by , is the length of a - shortest path. For , denotes the distance between and in the connected component . The diameter of a connected graph , denoted by , is the maximum among the lengths of its shortest paths, i.e., .
For a connected graph and a source , denotes the minimum number of rounds for broadcasting a message from to all the other vertices.
A broadcast protocol, which represents how a message is broadcast from the originator , is a spanning tree rooted at together with a time-stamp function , informally indicating when an edge is used to transmit a message. More formally, we require that must be a proper coloring of the edges of with the additional property that for each the edge connecting to its parent must have minimum value assigned by over all edges incident on . We say that forwards the message to at time if is the parent of in the tree and .
Finally, we give a formal definition of Telephone Broadcast as follows.
3 NP-hardness Results
In this section we prove that Telephone Broadcast remains NP-complete even on very restricted families of graphs, namely on (i) cactus graphs that are distance- to path forest (Theorem 1) and (ii) graphs of constant tree-depth (Theorem 5). Our work builds upon previous work by Tale [34], who showed that the problem is NP-complete on graphs of distance- to path forest. We note that Theorem 1 improves and significantly simplifies both the initial result by Tale [34] as well as a recent result by Aminian et al. [2] who, via a long series of reductions, proved that Telephone Broadcast remains NP-complete on a special type of cactus graphs coined snowflake graphs.222Roughly speaking, snowflake graphs are those that are distance-1 to caterpillar forest, so they are a strict superclass of graphs which are distance- from path forests.
Since Telephone Broadcast clearly belongs to NP, it suffices to show the NP-hardness for each case. The starting point of both of our reductions is a restricted version of Numerical Matching with Target Sums. Given three multisets each containing positive integers such that , Numerical Matching with Target Sums asks to determine whether it is possible to partition the given numbers into triples such that each triple contains one , one , and one , with . Numerical Matching with Target Sums is known to be strongly NP-complete [18, SP17], even when all input numbers are distinct [27, Appendix], that is, when is a set of cardinality . Starting from such an instance, by first doubling all elements of and then adding to those of , one can show that the following restricted version of the problem is NP-complete as well.
The ideas behind both reductions of Theorems 1 and 5 are quite similar. We start by introducing the source vertex , and setting to be the maximum target sum. Then, for every target sum, we introduce a gadget on roughly that many vertices and connect both of its endpoints to . On a high level, if the target sum is due to , at rounds and the source is supposed to broadcast towards the said gadget; notice that it is therefore crucial that . To restrict the broadcasting of during the rest of the rounds, namely on round , we attach either a long path or a large star to that essentially forces it to broadcast towards it at round . Implementing the previous with the gadgets being long paths is sufficient for Theorem 1 to go through. For Theorem 5 however, we need to proceed in two steps and first reduce to the natural generalization of Telephone Broadcast where there are multiple source vertices before eventually reducing to Telephone Broadcast.
3.1 Cactus Graphs
We start with the hardness result for cactus graphs that are distance- to path forest.
Theorem 1.
Telephone Broadcast is NP-complete for cactus graphs that are distance- to path forest.
Proof.
Let be an instance of Restricted Numerical Matching with Target Sums, where , , and . We will construct an equivalent instance of Telephone Broadcast, where . Note that .
We construct the graph as follows:
-
Introduce a vertex ;
-
For every , introduce a path on vertices with endpoints and , and add edges and ;
-
For every , introduce a path on vertices, and add an edge from one of its endpoints to . Name the other endpoint (for , we name the single vertex of as instead).
This concludes the construction of . Notice that is a cactus graph, while is a collection of paths. Before proving the equivalence of the two instances, we first compute the size of graph .
Claim 2.
It holds that .
Proof.
Notice that is comprised of vertex , as well as the vertices present in and , for and . Consequently,
and the statement follows.
Claim 3.
If is a yes-instance of Restricted Numerical Matching with Target Sums, then is a yes-instance of Telephone Broadcast.
Proof.
Let be a partition of that certifies that is a yes-instance. Rename appropriately the elements of so that for all . Let denote the current round, and consider the following broadcast protocol.
-
If , then set to forward the message along the path . In the subsequent rounds, the path from to keeps propelling the message towards .
-
Otherwise, it holds that for some . If , then set to forward the message to , else if , then towards instead. In the subsequent rounds, the message keeps getting propelled along the path towards its other endpoint.
This completes the description of the protocol.
We now prove that every vertex of gets the message by the end of round . Regarding the vertices belonging to , notice that since forwards the message at round , and contains vertices, all vertices of receive the message by the end of round ; as a matter of fact, receives the message exactly on the last round .
It remains to argue for the vertices of . By the protocol, if , one endpoint of gets the message at round , while the other at round . These two vertices forward the message towards each other to convey it to all the vertices in the path connecting them. In that case, the number of vertices of that receive the message by round is at least , thus all of its vertices receive the message by the end of round .
Claim 4.
If is a yes-instance of Telephone Broadcast, then is a yes-instance of Restricted Numerical Matching with Target Sums.
Proof.
Assume there exists a broadcast protocol such that every vertex of receives the message by the end of round . We claim that the maximum number of vertices that have received the message after rounds of transmission is . To see this, notice that every vertex apart from has degree at most , thus it can broadcast the message at most once.333We assume that no vertex broadcasts the message towards its already informed neighbors. In that case, the number of vertices receiving the message at round is at most those that received the message at round plus due to .
Since due to Claim 2, it follows that this is indeed the case, thus every vertex apart from and those that are informed in the last round broadcasts the message exactly once. Consequently, every vertex of degree receives the message at the last round, thus broadcasts the message towards the path at round , for all .
At round , broadcasts the message towards some path , and this broadcast results in a total of vertices of path having received the message by round . Consequently, it follows that for every path , broadcasts towards and at rounds and , where . Since is odd, that is also the case for exactly one among and , thus contains an element from both and . In that case, certifies that is a yes-instance, since it is a partition of where , each contains a single element out of , , and , while . This completes the proof. By Claims 3 and 4, Theorem 1 follows.
3.2 Bounded Tree-depth
Now we show the hardness for graphs of tree-depth at most . To this end, we introduce a generalization of Telephone Broadcast as an intermediate problem, where instead of a unique vertex as the initial source, we have a set of vertices. We call the variant Telephone Broadcast with Multiple Sources and formalize it as follows, where is defined analogously to .
Our proof thus consists of the following two steps. First, we reduce Restricted Numerical Matching with Target Sums to Telephone Broadcast with Multiple Sources. On a high level, the reduction is similar to the one of Theorem 1, albeit with a few supplementary steps to bound the tree-depth. The main difference is that we use star-like structures equipped with multiple sources instead of paths. Next, we present a reduction from Telephone Broadcast with Multiple Sources to Telephone Broadcast that does not increase tree-depth too much; as a matter of fact, if this reduction is applied to a graph output by the first step, then the tree-depth does not increase at all. We again use star-like structures here.
We highlight that instead of independently presenting the two reductions in distinct theorems, we choose to present them in one, as doing so allows us to present a tighter bound on the tree-depth of the final graph.
Theorem 5.
() Telephone Broadcast is NP-complete for graphs of tree-depth at most .
4 Fixed-parameter Algorithms
4.1 FPT Algorithm Parameterized by Vertex Integrity
Let be a graph. The vertex integrity of , denoted , is the minimum integer such that there is a vertex set with . It is known that such a set can be computed by a fixed-parameter tractable algorithm parameterized by [11].
In this section, we present a fixed-parameter tractable algorithm for Telephone Broadcast parameterized by vertex integrity.
Theorem 6.
Telephone Broadcast is fixed-parameter tractable parameterized by vertex integrity.
Overview.
Our algorithm can be seen as a generalization of the fixed-parameter tractable algorithm parameterized by vertex cover number due to Fomin et al. [16]. Since the ideas are similar, let us present a brief overview of their algorithm. Let be a graph with a vertex cover of size . They first show that there is an optimal broadcast protocol such that all vertices in the vertex cover receive the message in the first rounds. Since a broadcast protocol with rounds involves at most vertices and the vertices in can be partitioned into classes of twins, one can guess which vertices are involved in the first rounds. After testing the feasibility of the guessed vertices, it only remains to check whether the completely informed vertex cover can send the message to the independent set within a given number of rounds. This problem can be solved in polynomial time by a reduction to the Bipartite Matching problem.
Our algorithm follows the same general strategy, however there are two obstacles one needs to overcome in order to generalize from vertex cover number to vertex integrity. Let be a set satisfying . The first and main obstacle is showing the existence of an optimal broadcast protocol in which the vertices in receive the message in the first few rounds. Unfortunately, there are instances that do not admit such optimal broadcast protocols (see Figure 2); what we show instead is that there is an optimal broadcast protocol in which the vertices in receive the message in the first and last few rounds. The second obstacle is that after the removal of , we have a set of small connected components instead of an independent set. To deal with this, we show that most of the components of receive the message from only once and do not send the message back to . This property allows us to handle these components of as single vertices forming an independent set in some sense.
Some definitions.
In the following, we fix a graph and a source vertex . We also fix a vertex set that minimizes the sum under the condition that . Such can be found by first finding a set minimizing , and then setting . Let . Note that .
We say that and in have the same type if admits an automorphism such that , , and for each . By the equivalence relation of having the same type, we partition into the equivalence classes . We can upper-bound , the number of types, by a function of ; e.g., , which is an upper bound of the number of labeled graphs formed by at most vertices, i.e., by the vertices in and a component . Observe that, in a broadcast protocol, two components of with the same type can be used interchangeably.
Let be a broadcast protocol for . We denote by the number of rounds in . For , let denote the arrival time at in ; that is, is the first round when some vertex in forwards the message to some vertex in . We call a leaf component of if no vertex of forwards the message to vertices of . We call the vertices in the leaf components unimportant and the rest of the vertices important. That is, the important vertices are those belonging to as well as in the non-leaf components of .
4.1.1 Optimal Broadcast Protocols with Nice Properties
We say that an optimal broadcast protocol for is -lazy if, among all optimal broadcast protocols, minimizes the total number of message-forwardings from .
Lemma 7.
() If is an -lazy optimal broadcast protocol for , then every leaf component with receives the message from exactly once.
Lemma 8.
() There is an -lazy optimal broadcast protocol such that all important vertices receive the message only in the first rounds and the last rounds.
4.1.2 The Algorithm Parameterized by Vertex Integrity
Now we present a fixed-parameter tractable algorithm parameterized by vertex integrity for finding an optimal broadcast protocol for . We first guess the number of rounds in an optimal broadcast protocol. This is possible as . If , then we apply the fixed-parameter algorithm parameterized by [16]. In the following, we assume that .
We find an optimal broadcast protocol for with rounds such that
-
every leaf component receives the message from exactly once, and
-
the important vertices receive the message only in the first rounds and the last rounds.
Such a protocol exists by Lemmas 7 and 8. As in the proof of Lemma 8, we also assume that no vertex takes a break in .
To describe the algorithm, we partition the set of rounds in into three subsets of consecutive rounds , , and . Note that as .
The algorithm works as follows.
-
0.
Guess and as follows:
-
and is the set of vertices in that receive the message in ;
-
with ;
-
with .
-
-
1.
Check if the combination of and is feasible: that is, the algorithm checks whether there is a partial broadcast protocol for with rounds that starts at and informs all vertices in and at least one vertex of each .
-
2.
Let . Check if can forward the message to each of in : that is, the algorithm checks whether there is a multi-source partial broadcast protocol for with rounds that starts at and informs exactly one vertex (equivalently, at least one vertex) of each .
-
3.
Check if the combination of and is feasible: that is, the algorithm checks whether there is a multi-source broadcast protocol for with rounds that starts at .
Correctness.
We first show that an optimal broadcast protocol for with rounds exists if and only if correctly guessed , , pass all three tests by the algorithm.
If an optimal broadcast protocol for with rounds exists, then there is one with the properties that we assumed in the algorithm. Let be such a protocol. We construct , , from as defined in the algorithm. Observe that at each round, at most components in may receive the message from , and thus holds. By the same reasoning, we have . Clearly, , , pass all three tests.
Conversely, assume that some , , pass all three tests by the algorithm. Let , , be the protocols found by the algorithm. Let be the protocol obtained by concatenating , , in this ordering. In , some vertices of the components in and may remain uninformed, while all other vertices receive the message. We modify to obtain a desired protocol. We first consider a component that has uninformed vertices in . In , at least one vertex in receives the message in and no vertex in sends or receives the message in . Thus, we can modify in such a way that the vertices in send and receive the message locally in and inform all vertices of using at most rounds in . Next we consider a component that has uninformed vertices in . Similarly to the previous case, we can modify locally in to inform all vertices of using at most round in . Now the obtained protocol is a broadcast protocol for with rounds.
Running time.
Now we show that the algorithm can be implemented as a fixed-parameter tractable algorithm parameterized by .
We first estimate the number of possible candidates for guessing , , and . For , we simply try all subsets of that contain . For (), it suffices to try all possibilities of how many components of each type are included in . Since the number of types is less than , the number of candidates for can be bounded from above by a function in ; i.e., for and for . In total, we test at most candidates for the combination of , , . Thus, it suffices to show that, for a fixed combination of , , , each of the three tests can be done with a fixed-parameter tractable algorithm parameterized by .
The first test can be done in time depending only on because the question is decidable and the target graph has at most vertices. In the same way, we can see that the third test can be done in time depending only on .
For the second test, we can use the polynomial-time subroutine that Fomin et al. [16] used for their algorithm parameterized by vertex cover number. The subroutine checks in polynomial time whether there is a multi-source broadcast protocol with a given number of rounds starting at a vertex cover. To use this subroutine, we construct a graph from by replacing each component in with a single vertex that is adjacent to the vertices in . Observe that the desired multi-source partial broadcast protocol for exists if and only if there is a multi-source broadcast protocol for with rounds starting at . Since is a vertex cover of , we can use the subroutine of Fomin et al. [16].
4.2 FPT Algorithm Parameterized by Distance to Clique
In this section we consider Telephone Broadcast parameterized by distance to clique , in which the input graph contains a subset of size such that is a clique. We call a modulator of and let . Computing a (smallest) modulator is equivalent to computing a (minimum) vertex cover and thus can be done in time [7, 21].
We show that, in these instances, the amount of information necessary to encode a solution is bounded, in that we can recreate a solution knowing the following about the vertices of the modulator: on which round each is informed, how many vertices each informs, as well as some details about the vertices that inform them (see Lemma 11 and the description below for details). We solve the problem by enumerating all possibilities for this information, and then recreating a matching solution in polynomial time.
Our approach is based on the following two facts: (i) , and (ii) to encode a solution we only need to know the information described above.
The rest of this section is dedicated to proving the following theorem.
Theorem 9.
Telephone Broadcast is fixed-parameter tractable parameterized by distance to clique , and can be solved in time .
We start by formalizing and proving the two facts mentioned above:
Lemma 10.
() Let be a connected graph and with such that is a clique of size . Then for all .
The lemma below formalizes the process of recreating a solution, that is, given restricted information about a broadcast protocol, computing a protocol that matches that information. For simplicity of presentation, the lemma lists in compact form the information that is needed about the broadcast protocol, and we provide additional explanation below the lemma.
Lemma 11.
() Let be an instance of Telephone Broadcast, be a modulator of of size , and be a broadcast protocol. We can construct in polynomial time a broadcast protocol with the same number of rounds as , given the following information about :
-
1.
, the number of rounds of ;
-
2.
for each , the round in which is informed;
-
3.
for each , the vertex that informs it (its informer), where a vertex in is identified by its neighborhood in as well as the set of vertices in it informs;
-
4.
for each informer , , its informer if it is in , or otherwise (representing either an informer in or that );
-
5.
for each , the number of vertices that it informs, that is, how many times it transmits the message to an uninformed vertex.
For Point 3, we do not need to know the exact vertex of the clique that informs a vertex , as there can be many clique vertices that are functionally equivalent. Instead, we identify vertices in by their neighborhood in ; if multiple vertices in share an informer, the first (in an arbitrary order) encodes it by its neighborhood, while the following simply indicate that they have the same informer as a previous vertex. We can thus encode the informer of using a number from to as follows. Take an arbitrary ordering of . If , is a (yet unused) vertex with neighborhood in given by the binary representation of ; if , is the vertex of with index (i.e. ); if , is the informer of the vertex of with index , that is, with ; and if , then . For Point 4, we need to know the informer of each ; however, if is in , the actual vertex is irrelevant, and thus we simply notate this case as ; we notate it similarly if , in which case it has no informer.
Let us see how this lemma can be applied to solve the problem.
The algorithm starts by computing a modulator of size at most . We remark that a modulator of is a vertex cover in , and thus the minimum modulator can be computed by employing any FPT algorithm for Vertex Cover (see e.g. [7, 21]) on .
Then, it simply enumerates the information required by Lemma 11; for each possibility it uses the procedure in the lemma to obtain a protocol. If there is a feasible solution to the problem, Lemma 11 guarantees that the algorithm obtains a valid protocol when it uses the correct information, and thus the algorithm is correct.
As to the running time, it is dominated by the enumeration of all the options for Lemma 11: there are possibilities for by Lemma 10, and the same number of possibilities for each , and each ; for each , there are options, corresponding to the vertices in , their informers (if vertices share an informer), or a new vertex from one of each neighborhood classes; for each , there are choices. Thus, the total number of possibilities is
As the procedure in Lemma 11 runs in polynomial time, the running time of the algorithm is FPT and bounded by . We can achieve the running time bound of by case distinction: if , then the bound follows by substitution; otherwise, we substitute and get a running time of .
4.3 Algorithm for Parameter Treewidth plus Time
In this section we show, via a dynamic programming algorithm, that Telephone Broadcast admits a single-exponential FPT algorithm if we parameterize by both treewidth and the target number of rounds . Let us first give an informal high-level overview of the main ideas.
The strategy of our algorithm will be to compute the proper edge-coloring which assigns a time-stamp to each edge used by an optimal protocol. Intuitively, it is natural that this leads to a complexity of the form , because for each vertex of a bag we need to keep track of the set of colors which have already been used on an edge incident on . We therefore store a subset of for each vertex of a bag. To facilitate the algorithm we will also keep track of some further information, notably including the time at which a vertex is informed by the protocol (but this only adds a further factor to the complexity). This extra information will allow us to infer the direction in which each edge is supposed to be used (that is, which endpoint transmits the message and which receives it) and verify that the protocol is consistent (that is, each vertex starts transmitting the message after receiving it).
Theorem 12.
() There is an algorithm which takes as input an -vertex graph , a vertex , an integer , and a nice tree decomposition of of width tw and determines whether in time .
5 Parameterized Approximation Results
In this section, we present FPT approximation algorithms parameterized by clique cover number and cluster vertex deletion number. Both parameters are more general than distance to clique. The precise parameterized complexity for the two parameters remains unsettled.
5.1 Clique Cover Number
For a graph , a partition of its vertex set into cliques is a clique cover. The minimum integer such that admits a clique cover with cliques is the clique cover number. The clique cover number of a graph is equal to the chromatic number of its complement. In this subsection, we show that the optimization version of Telephone Broadcast admits an FPT-AS (i.e., an -time -approximation algorithm for ) when parameterized by clique cover number .
Theorem 13.
() Given a connected -vertex graph , , and a clique cover of , one can find a broadcast protocol with at most rounds in time .
5.2 Cluster Vertex Deletion Number
For a graph , a set is a cluster vertex deletion if each connected component of is a complete graph. The cluster vertex deletion number of is the size of a minimum cluster vertex deletion set of .
Theorem 14.
() Given a connected graph with cluster vertex deletion number cvd and , one can find a broadcast protocol with at most rounds in time .
6 Lower Bounds with Respect to Structural Parameters
Here we present several results showcasing the relationship between the structure of the input graph and the minimum number of rounds required by any broadcast protocol to complete. On an intuitive level, graphs close to being stars or paths require a large (that is, polynomial in the size of the graph) number of rounds to broadcast the message, and the aim of this section is to quantify this intuition and provide corresponding lower bounds with respect to the tree-depth and the pathwidth of the input graph. We start with Lemmas 15, 16, and 17, which are essential building blocks in proving the main results of this section in Theorems 18 and 20. We note that Theorem 20 improves over an analogous lower bound recently obtained by Aminian et al. [2] and leads to Corollaries 21 and 22.
Lemma 15.
Given a connected graph and a non-empty set , for all it holds that .
Proof.
Let a component of be active when there exists a vertex belonging to it that has received the message. It holds that on every round the number of additional components of that become active is at most . In that case, if , then at least rounds are required in order to make all of the components of active. Notice that the lower bound holds in the case as well, since then, although there exists a component which is already active at the start, after the first round of the protocol no additional component of has become active.
Lemma 16.
Given a connected graph , for all it holds that .
Proof.
Consider a protocol of minimum broadcasting time as well as a shortest path in such that with and denoting its endpoints. For every it holds that , that is, every vertex of is at distance at most from ; if that were not the case cannot receive the message in time. Finally, since is a shortest path it holds that and the statement follows.
Lemma 17.
() Given a connected graph and a non-empty set , for all it holds that
We are now ready to proceed with the main result of this section concerning tree-depth.
Theorem 18.
Let be a connected graph with vertices of tree-depth td. Then, for all it holds that .
Proof.
Since is of tree-depth td, there exists an elimination tree of of height at most td. This is a rooted tree on the same vertex set, with denoting the root vertex, where every pair of vertices adjacent in adheres to the ancestor/descendant relation.
Notice that if , then the statement holds, unless is an isolated vertex. In the following, assume that . We will prove that there exists a vertex with at least children in . Assume that this is not the case. Then, it holds that
which is a contradiction. Consequently, there exists a vertex with at least children in .
Let contain the vertices present in the - path of , where . Then, has at least connected components, 1 per child of in , and the statement follows due to Lemma 15.
Prior to presenting Theorem 20 we need the following definition.
Definition 19 ([2, Proof overview of Theorem 5.2]).
A standard path decomposition is a path decomposition in which the vertices in each bag are not a subset of the vertices in the preceding or succeeding bag along the path.
Observe that in a standard path decomposition there are no two distinct bags with the vertices of the first one being a subset of the vertices of the second. We define the length of a path decomposition to be the number of its bags.
Theorem 20.
() Let be a connected graph with more than one vertex that admits a standard path decomposition of width pw and length . Then, for all it holds that .
Observe that one can easily transform a path decomposition into a standard path decomposition of the same width; it suffices to discard any bag whose vertices are a subset of another bag’s vertices. Furthermore, notice that in any path decomposition every vertex appears at least once. This, along with Theorem 20, leads to Corollary 21, which in turn, along with the approximation algorithm of Elkin and Kortsarz [14], leads to Corollary 22.
Corollary 21.
Let be a connected graph with vertices of pathwidth pw. Then, for all it holds that
Corollary 22.
There is a polynomial-time algorithm for Telephone Broadcast achieving an approximation ratio of , where pw denotes the pathwidth of the input graph.
7 Conclusion
In this paper we have given an extensive investigation of the complexity of the Telephone Broadcast problem with respect to many of the most prominent structural graph parameters. Let us also mention a few concrete open questions. First, with regards to dense graph parameters, we have presented an exact FPT algorithm parameterized by the vertex deletion distance to clique, but only approximation algorithms for the more general parameters cluster vertex deletion number and clique-cover number. Can these be improved to exact FPT algorithms?
Second, with respect to treewidth, even though the problem is NP-hard for graphs of treewidth , we showed that an XP algorithm is possible if we seek a fast broadcast schedule, that is, , because the problem admits an algorithm with parameter dependence (Theorem 12). Can this be improved to an FPT algorithm parameterized by treewidth, under this restriction on ? Note that treewidth is the only parameter for which this question is interesting, as for graphs of small pathwidth we have established that the broadcast time must be significantly higher than (Corollary 21).
Finally, the computational complexity of Telephone Broadcast on graph classes would be another interesting research direction. In particular, the complexity on split graphs remains open [28].
References
- [1] Akash Ambashankar and Hovhannes A. Harutyunyan. Broadcasting in stars of cliques and path-connected cliques. Algorithms, 18(2), 2025. doi:10.3390/a18020076.
- [2] Aida Aminian, Shahin Kamali, Seyed-Mohammad Seyed-Javadi, and Sumedha. On the complexity of telephone broadcasting: From cacti to bounded pathwidth graphs. In 52nd International Colloquium on Automata, Languages, and Programming, ICALP 2025, July 8-11, 2025, Aarhus, Denmark, LIPIcs. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2025.
- [3] Amotz Bar-Noy, Sudipto Guha, Joseph Naor, and Baruch Schieber. Message multicasting in heterogeneous networks. SIAM J. Comput., 30(2):347–358, 2000. doi:10.1137/S0097539798347906.
- [4] Puspal Bhabak and Hovhannes A. Harutyunyan. Constant approximation for broadcasting in -cycle graph. In Algorithms and Discrete Applied Mathematics - First International Conference, CALDAM 2015. Proceedings, volume 8959 of Lecture Notes in Computer Science, pages 21–32. Springer, 2015. doi:10.1007/978-3-319-14974-5_3.
- [5] Puspal Bhabak and Hovhannes A. Harutyunyan. Approximation algorithm for the broadcast time in k-path graph. J. Interconnect. Networks, 19(4):1950006:1–1950006:22, 2019. doi:10.1142/S0219265919500063.
- [6] Maja Cevnik and Janez Zerovnik. Broadcasting on cactus graphs. J. Comb. Optim., 33(1):292–316, 2017. doi:10.1007/S10878-015-9957-8.
- [7] Jianer Chen, Iyad A. Kanj, and Ge Xia. Improved upper bounds for vertex cover. Theor. Comput. Sci., 411(40-42):3736–3756, 2010. doi:10.1016/J.TCS.2010.06.026.
- [8] Marek Cygan, Fedor V. Fomin, Łukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
- [9] Peter Damaschke. A linear-time optimal broadcasting algorithm in stars of cliques. J. Graph Algorithms Appl., 28(1):385–388, 2024. doi:10.7155/JGAA.V28I1.2981.
- [10] Reinhard Diestel. Graph Theory, volume 173 of Graduate texts in mathematics. Springer, 2017. doi:10.1007/978-3-662-53622-3.
- [11] Pål Grønås Drange, Markus S. Dregi, and Pim van ’t Hof. On the computational complexity of vertex integrity and component order connectivity. Algorithmica, 76(4):1181–1202, 2016. doi:10.1007/S00453-016-0127-X.
- [12] Michael Elkin and Guy Kortsarz. A combinatorial logarithmic approximation algorithm for the directed telephone broadcast problem. SIAM J. Comput., 35(3):672–689, 2005. doi:10.1137/S0097539704440740.
- [13] Michael Elkin and Guy Kortsarz. An approximation algorithm for the directed telephone multicast problem. Algorithmica, 45(4):569–583, 2006. doi:10.1007/S00453-005-1196-4.
- [14] Michael Elkin and Guy Kortsarz. Sublogarithmic approximation for telephone multicast. J. Comput. Syst. Sci., 72(4):648–659, 2006. doi:10.1016/J.JCSS.2005.12.002.
- [15] Arthur M. Farley. Minimum-time line broadcast networks. Networks, 10(1):59–70, 1980. doi:10.1002/NET.3230100106.
- [16] Fedor V. Fomin, Pierre Fraigniaud, and Petr A. Golovach. Parameterized complexity of broadcasting in graphs. Theor. Comput. Sci., 997:114508, 2024. doi:10.1016/J.TCS.2024.114508.
- [17] Pierre Fraigniaud and Emmanuel Lazard. Methods and problems of communication in usual networks. Discret. Appl. Math., 53(1-3):79–133, 1994. doi:10.1016/0166-218X(94)90180-5.
- [18] M. R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979.
- [19] Mohammad Saber Gholami, Hovhannes A. Harutyunyan, and Edward Maraachlian. Optimal broadcasting in fully connected trees. J. Interconnect. Networks, 23(1):2150037:1–2150037:20, 2023. doi:10.1142/S0219265921500377.
- [20] Michelangelo Grigni and David Peleg. Tight bounds on minimum broadcast networks. SIAM J. Discret. Math., 4(2):207–222, 1991. doi:10.1137/0404021.
- [21] David G. Harris and N. S. Narayanaswamy. A faster algorithm for vertex cover parameterized by solution size. In 41st International Symposium on Theoretical Aspects of Computer Science, STACS 2024, volume 289 of LIPIcs, pages 40:1–40:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.STACS.2024.40.
- [22] Hovhannes A. Harutyunyan and Narek A. Hovhannisyan. Broadcasting in split graphs. In Algorithms and Complexity - 13th International Conference, CIAC 2023, Proceedings, volume 13898 of Lecture Notes in Computer Science, pages 278–292. Springer, 2023. doi:10.1007/978-3-031-30448-4_20.
- [23] Hovhannes A. Harutyunyan and Edward Maraachlian. On broadcasting in unicyclic graphs. J. Comb. Optim., 16(3):307–322, 2008. doi:10.1007/S10878-008-9160-2.
- [24] Daniel Hathcock, Guy Kortsarz, and R. Ravi. The telephone -multicast problem. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2024, volume 317 of LIPIcs, pages 21:1–21:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.APPROX/RANDOM.2024.21.
- [25] Sandra Mitchell Hedetniemi, Stephen T. Hedetniemi, and Arthur L. Liestman. A survey of gossiping and broadcasting in communication networks. Networks, 18(4):319–349, 1988. doi:10.1002/NET.3230180406.
- [26] Juraj Hromkovic, Ralf Klasing, Andrzej Pelc, Peter Ruzicka, and Walter Unger. Dissemination of Information in Communication Networks - Broadcasting, Gossiping, Leader Election, and Fault-Tolerance. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2005. doi:10.1007/B137871.
- [27] Heather Hulett, Todd G. Will, and Gerhard J. Woeginger. Multigraph realizations of degree sequences: Maximization is easy, minimization is hard. Oper. Res. Lett., 36(5):594–596, 2008. doi:10.1016/J.ORL.2008.05.004.
- [28] Klaus Jansen and Haiko Müller. The minimum broadcast time problem for several processor networks. Theor. Comput. Sci., 147(1&2):69–85, 1995. doi:10.1016/0304-3975(94)00230-G.
- [29] Guy Kortsarz and David Peleg. Approximation algorithms for minimum-time broadcast. SIAM J. Discret. Math., 8(3):401–427, 1995. doi:10.1137/S0895480193245923.
- [30] Christos H. Papadimitriou and Mihalis Yannakakis. The complexity of restricted spanning tree problems. J. ACM, 29(2):285–309, 1982. doi:10.1145/322307.322309.
- [31] R. Ravi. Rapid rumor ramification: Approximating the minimum broadcast time (extended abstract). In 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pages 202–213. IEEE Computer Society, 1994. doi:10.1109/SFCS.1994.365693.
- [32] Christian Schindelhauer. On the inapproximability of broadcasting time. In Approximation Algorithms for Combinatorial Optimization, Third International Workshop, APPROX 2000, Proceedings, volume 1913 of Lecture Notes in Computer Science, pages 226–237. Springer, 2000. doi:10.1007/3-540-44436-X_23.
- [33] Peter J. Slater, Ernest J. Cockayne, and Stephen T. Hedetniemi. Information dissemination in trees. SIAM J. Comput., 10(4):692–701, 1981. doi:10.1137/0210052.
- [34] Prafullkumar Tale. Telephone broadcast on graphs of treewidth two. Theor. Comput. Sci., 1045:115282, 2025. doi:10.1016/J.TCS.2025.115282.
- [35] Jinghan Xu and Zhiyuan Li. Broadcast graph is NP-complete. In Algorithms and Discrete Applied Mathematics - 11th International Conference, CALDAM 2025, Proceedings, volume 15536 of Lecture Notes in Computer Science, pages 343–357. Springer, 2025. doi:10.1007/978-3-031-83438-7_29.
