Counting in Anonymous Dynamic Networks under Worst-Case Adversary

In this paper we investigate the problem of counting the size of a network where processes are anonymous (i.e, they share the same identifier) and the network topology constantly changes controlled by an adversary able to look internal process states and add and remove edges in order to contrast the convergence of the algorithm to the correct count. It is easy to show that, if the adversary can generate graphs without any constraint on the connectivity (i.e. it can generate topologies where there exist nodes not able to influence the others), counting is impossible. In this paper we consider a synchronous round based computation and the dynamicity is governed by a worst-case adversary that generates a sequence of graphs, one for each round, with the only constraint that each graph must be connected (1-interval connectivity property). It has been conjectured that counting in a finite time against such adversary is impossible and the existing solutions consider that each process has some knowledge about network topologies generated by the adversary, i.e. at each round, each node has a degree lesser than D. Along the path of proving the validity (or not) of the conjecture, this paper presents an algorithm that counts in a finite time against the worst-case adversary assuming each process is equipped with an oracle. The latter provides a process at each round r with an estimation of the process degree in the graph generated by the adversary at round r. To the best of our knowledge, this is the first counting algorithm (terminating in a finite time) where processes exploit the minimal knowledge about the behavior of the adversary. Interestingly, such oracle can be implemented in a wide range of real systems.

[1]  Nancy A. Lynch,et al.  Distributed computation in dynamic networks , 2010, STOC '10.

[2]  Masafumi Yamashita,et al.  Computing on an anonymous network , 1988, PODC '88.

[3]  Dana Angluin,et al.  Local and global properties in networks of processors (Extended Abstract) , 1980, STOC '80.

[4]  Johannes Gehrke,et al.  Gossip-based computation of aggregate information , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[5]  Paul G. Spirakis,et al.  Brief Announcement: Naming and Counting in Anonymous Unknown Dynamic Networks , 2012, DISC.

[6]  Anne-Marie Kermarrec,et al.  Implementing a Register in a Dynamic Distributed System , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[7]  Anne-Marie Kermarrec,et al.  Peer to peer size estimation in large and dynamic networks: A comparative study , 2006, 2006 15th IEEE International Conference on High Performance Distributed Computing.

[8]  Paul G. Spirakis,et al.  Naming and Counting in Anonymous Unknown Dynamic Networks , 2012, SSS.

[9]  Roger Wattenhofer,et al.  Information dissemination in highly dynamic graphs , 2005, DIALM-POMC '05.

[10]  Sebastiano Vigna,et al.  Computing anonymously with arbitrary knowledge , 1999, PODC '99.

[11]  Faith Ellen,et al.  Relationships Between Broadcast and Shared Memory in Reliable Anonymous Distributed Systems , 2004, DISC.

[12]  Rajeev Motwani,et al.  The price of validity in dynamic networks , 2004, SIGMOD '04.

[13]  Yves Métivier,et al.  On Snapshots and Stable Properties Detection in Anonymous Fully Distributed Systems (Extended Abstract) , 2012, SIROCCO.

[14]  Ioannis Chatzigiannakis,et al.  Conscious and Unconscious Counting on Anonymous Dynamic Networks , 2014, ICDCN.

[15]  John Augustine,et al.  Towards robust and efficient computation in dynamic peer-to-peer networks , 2011, SODA.