Explore and repair graphs with black holes using mobile entities

In this paper, we study the problem of mobile entities that synchronously have to explore and repair a graph with faulty nodes, usually called black-holes, that destroy any entering entity. We consider the scenario where the destruction of an entity by means of a black-hole also affects all the entities within a fixed range r (in terms of number of edges), while the black-hole disappears. Clearly, if there are b black-holes in the graph, then k � b entities are necessary to remove all of them from that graph. We ask for the minimum number of synchronous steps needed to make safe all the graph.The results of this paper are both theoretical and experimental, and can be summarized as follows. From the theoretical point of view, first we show that the problem is NP-hard even for b = k = 1 . Then, we provide a general lower bound holding when r � 0 and a higher one for the case of r 0 . We then consider the case of r � 1 . We propose an optimal solution holding when k is unbounded, that is, an infinite number of robots is available. Then, we provide three different exploration strategies, named snake, scout, and parallel-scout, respectively, for the case of bounded k, that is, the number of robots is fixed a priori. The three strategies are then analyzed according to the time complexity with respect to the lower bound. From the experimental point of view, we implemented the three strategies and tested them on different scenarios with the aim of assessing their practical performance. The experiments confirm the theoretical analysis and show that parallel-scout is always by far the best exploration strategy in practice.

[1]  Éric Fusy,et al.  Uniform random sampling of planar graphs in linear time , 2007, Random Struct. Algorithms.

[2]  Nicola Santoro,et al.  Black hole search in common interconnection networks , 2006 .

[3]  Xiaohui Zhang,et al.  Fast periodic graph exploration with constant memory , 2007, J. Comput. Syst. Sci..

[4]  Colin Cooper,et al.  Locating and repairing faults in a network with mobile agents , 2010, Theor. Comput. Sci..

[5]  Mattia D'Emidio,et al.  Exploring and Making Safe Dangerous Networks Using Mobile Entities , 2013, ADHOC-NOW.

[6]  Alfredo Navarra,et al.  Graph Decomposition for Memoryless Periodic Exploration , 2011, Algorithmica.

[7]  Nicola Santoro,et al.  Ping Pong in Dangerous Graphs: Optimal Black Hole Search with Pebbles , 2011, Algorithmica.

[8]  Nicola Santoro,et al.  Computing Without Communicating: Ring Exploration by Asynchronous Oblivious Robots , 2007, OPODIS.

[9]  Euripides Markou,et al.  Black Hole Search and Exploration in Unoriented Tori with Synchronous Scattered Finite Automata , 2012, OPODIS.

[10]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[11]  Leszek Gasieniec,et al.  Memory Efficient Anonymous Graph Exploration , 2008, WG.

[12]  Alfredo Navarra,et al.  Synchronous black hole search in directed graphs , 2011, Theor. Comput. Sci..

[13]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[14]  Jaikumar Radhakrishnan,et al.  Greed is good: Approximating independent sets in sparse and bounded-degree graphs , 1997, Algorithmica.

[15]  Nicola Santoro,et al.  Time Optimal Algorithms for Black Hole Search in Rings , 2010, Discret. Math. Algorithms Appl..

[16]  Euripides Markou,et al.  Searching for a Black Hole in Synchronous Tree Networks , 2007, Comb. Probab. Comput..

[17]  Eiji Miyano,et al.  Distance-$$d$$ independent set problems for bipartite and chordal graphs , 2014, J. Comb. Optim..

[18]  Nicola Santoro,et al.  Exploring an unknown dangerous graph using tokens , 2013, Theor. Comput. Sci..

[19]  Nicola Santoro,et al.  Mobile Search for a Black Hole in an Anonymous Ring , 2007, Algorithmica.

[20]  Béla Bollobás,et al.  Random Graphs , 1985 .

[21]  Nicola Santoro,et al.  Searching for a black hole in arbitrary networks: optimal mobile agents protocols , 2006, Distributed Computing.

[22]  Alfredo Navarra,et al.  Graph Decomposition for Improving Memoryless Periodic Exploration , 2009, MFCS.

[23]  Nicola Santoro,et al.  Decontaminating a Network from a Black Virus , 2014, Int. J. Netw. Comput..

[24]  Euripides Markou,et al.  Approximation bounds for Black Hole Search problems , 2008, Networks.

[25]  Nicola Santoro,et al.  Time Optimal Algorithms for Black Hole Search in Rings , 2010, COCOA.

[26]  Jurek Czyzowicz,et al.  Black Hole Search in Directed Graphs , 2009, SIROCCO.

[27]  Nicola Santoro,et al.  Improved Bounds for Optimal Black Hole Search with a Network Map , 2004, SIROCCO.