Skip to main content
Log in

Distributed computations in fully-defective networks

  • Published:
Distributed Computing Aims and scope Submit manuscript

A Correction to this article was published on 30 September 2023

This article has been updated

Abstract

We address fully-defective asynchronous networks, in which all links are subject to an unlimited number of alteration errors, implying that all messages in the network may be completely corrupted. Despite the possible intuition that such a setting is too harsh for any reliable communication, we show how to simulate any algorithm for a noiseless setting over any fully-defective setting, given that the network is 2-edge connected. We prove that if the network is not 2-edge connected, no non-trivial computation in the fully-defective setting is possible. The key structural property of 2-edge-connected graphs that we leverage is the existence of an oriented (non-simple) cycle that goes through all nodes (Robbins, Am. Math. Mon., 1939). The core of our technical contribution is presenting a construction of such a Robbins cycle in fully-defective networks, and showing how to communicate over it despite total message corruption. These are obtained in a content-oblivious manner, since nodes must ignore the content of received messages.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availability

All data generated or analyzed during this study are included in this published article.

Change history

Notes

  1. For instance, let \(P=(a\rightarrow b\rightarrow c \rightarrow b \rightarrow e)\), then \(a {\Rightarrow }^{} e\) is the path \((a\rightarrow b\rightarrow e)\) which is not a sub-path of P.

References

  1. Aggarwal, A., Dani, V., Hayes, T.P., Saia, J.: Sending a message with unknown noise. In: Proceedings of the 19th International Conference on Distributed Computing and Networking, ICDCN ’18. Association for Computing Machinery (2018). https://doi.org/10.1145/3154273.3154318

  2. Aggarwal, A., Dani, V., Hayes, T.P., Saia, J.: A scalable algorithm for multiparty interactive communication with private channels. In: Proceedings of the 21st International Conference on Distributed Computing and Networking, ICDCN 2020. Association for Computing Machinery (2020). https://doi.org/10.1145/3369740.3369771

  3. Alon, N., Braverman, M., Efremenko, K., Gelles, R., Haeupler, B.: Reliable communication over highly connected noisy networks. Distrib. Comput. 32(6), 505–515 (2019). https://doi.org/10.1007/s00446-017-0303-5

    Article  MathSciNet  MATH  Google Scholar 

  4. Barborak, M., Dahbura, A., Malek, M.: The consensus problem in fault-tolerant computing. ACM Comput. Surv. (CSur) 25(2), 171–220 (1993)

    Article  Google Scholar 

  5. Biely, M.: An optimal byzantine agreement algorithm with arbitrary node and link failures. In: Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems, vol. 1, pp. 146–151 (2003)

  6. Braverman, M., Efremenko, K., Gelles, R., Haeupler, B.: Constant-rate coding for multiparty interactive communication is impossible. J. ACM 65(1), 4:1-4:41 (2017). https://doi.org/10.1145/3050218

    Article  MathSciNet  MATH  Google Scholar 

  7. Censor-Hillel, K., Cohen, S., Gelles, R., Sela, G.: Distributed computations in fully-defective networks. In: PODC ’22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25-29, 2022, pp. 141–150 (2022). https://doi.org/10.1145/3519270.3538432

  8. Censor-Hillel, K., Gelles, R., Haeupler, B.: Making asynchronous distributed computations robust to noise. Distrib. Comput. 32(5), 405–421 (2019). https://doi.org/10.1007/s00446-018-0343-5

    Article  MathSciNet  MATH  Google Scholar 

  9. Dani, V., Movahedi, M., Saia, J., Young, M.: Interactive communication with unknown noise rate. In: Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015, Proceedings, Part II, pp. 575–587. Springer Berlin (2015). https://doi.org/10.1007/978-3-662-47666-6_46

  10. Dasgupta, P.: Agreement under faulty interfaces. Inf. Process. Lett. 65(3), 125–129 (1998). https://doi.org/10.1016/S0020-0190(97)00202-0

    Article  MathSciNet  MATH  Google Scholar 

  11. Dolev, D.: The byzantine generals strike again. J. Algorithms 3(1), 14–30 (1982). https://doi.org/10.1016/0196-6774(82)90004-9

    Article  MathSciNet  MATH  Google Scholar 

  12. Dubrova, E.: Fault-Tolerant Design. Springer, Berlin (2013). https://doi.org/10.1007/978-1-4614-2113-9

    Book  MATH  Google Scholar 

  13. Efremenko, K., Haramaty, E., Kalai, Y.T.: Interactive coding with constant round and communication blowup. In: 11th Innovations in Theoretical Computer Science Conference (ITCS 2020), Leibniz International Proceedings in Informatics (LIPIcs), vol. 151, pp. 7:1–7:34. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik (2020). https://doi.org/10.4230/LIPIcs.ITCS.2020.7

  14. Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985). https://doi.org/10.1145/3149.214121

    Article  MathSciNet  MATH  Google Scholar 

  15. Gelles, R.: Coding for interactive communication: a survey. Found Trends Theor. Comput. Sci. 13(1–2), 1–157 (2017). https://doi.org/10.1561/0400000079

    Article  MathSciNet  MATH  Google Scholar 

  16. Gelles, R., Iyer, S.: Interactive coding resilient to an unknown number of erasures. In: 23rd International Conference on Principles of Distributed Systems (OPODIS 2019), vol. 153, pp. 13:1–13:16. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik (2020). https://doi.org/10.4230/LIPIcs.OPODIS.2019.13

  17. Gelles, R., Kalai, Y.T.: Constant-rate interactive coding is impossible, even in constant-degree networks. IEEE Trans. Inf. Theory 65(6), 3812–3829 (2019). https://doi.org/10.1109/TIT.2019.2904576

    Article  MathSciNet  MATH  Google Scholar 

  18. Gelles, R., Kalai, Y.T., Ramnarayan, G.: Efficient multiparty interactive coding for insertions, deletions, and substitutions. In: Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, PODC ’19, pp. 137–146. ACM, New York (2019). https://doi.org/10.1145/3293611.3331621

  19. Gelles, R., Moitra, A., Sahai, A.: Efficient coding for interactive communication. IEEE Trans. Inf. Theory 60(3), 1899–1913 (2014). https://doi.org/10.1109/TIT.2013.2294186

    Article  MathSciNet  MATH  Google Scholar 

  20. Gong, L., Lincoln, P., Rushby, J.: Byzantine agreement with authentication: observations and applications in tolerating hybrid and link faults. In: Dependable Computing and Fault Tolerant Systems, vol. 10, pp. 139–158. IEEE Computer Society (1995). http://www.csl.sri.com/papers/dcca95/dcca95.pdf

  21. Gray, J.: Notes on data base operating systems. In: Operating Systems, Lecture Notes in Computer Science, vol. 60. Springer, Berlin (1978). https://doi.org/10.1007/3-540-08755-9_9

  22. Hitron, Y., Parter, M.: Broadcast CONGEST algorithms against adversarial edges. In: Gilbert, S. (ed.) 35th International Symposium on Distributed Computing, DISC 2021, October 4–8, 2021, Freiburg, Germany (Virtual Conference), LIPIcs, vol. 209, pp. 23:1–23:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2021). https://doi.org/10.4230/LIPIcs.DISC.2021.23

  23. Hitron, Y., Parter, M.: General CONGEST compilers against adversarial edges. In: Gilbert, S. (ed.) 35th International Symposium on Distributed Computing, DISC 2021, October 4–8, 2021, Freiburg, Germany (Virtual Conference), LIPIcs, vol. 209, pp. 24:1–24:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2021). https://doi.org/10.4230/LIPIcs.DISC.2021.24

  24. Hoza, W.M., Schulman, L.J.: The adversarial noise threshold for distributed protocols. In :Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 240–258 (2016). https://doi.org/10.1137/1.9781611974331.ch18

  25. Jain, A., Kalai, Y.T., Lewko, A.: Interactive coding for multiparty protocols. In: Proceedings of the 6th Conference on Innovations in Theoretical Computer Science, ITCS ’15, pp. 1–10 (2015). https://doi.org/10.1145/2688073.2688109

  26. Kazmierczak, A., Radhakrishnan, S.: An optimal distributed ear decomposition algorithm with applications to biconnectivity and outerplanarity testing. IEEE Trans. Parallel Distrib. Syst. 11(2), 110–118 (2000). https://doi.org/10.1109/71.841748

    Article  Google Scholar 

  27. Koren, I., Krishna, C.M. (eds.): (2020) Fault-Tolerant Systems, 2nd edn. Morgan Kaufmann, San Francisco (2020). https://doi.org/10.1016/B978-0-12-818105-8

    Book  MATH  Google Scholar 

  28. Lewko, A., Vitercik, E.: Balancing communication for multi-party interactive coding, arxiv:1503.06381 (2015)

  29. Lovasz, L.: Computing ears and branchings in parallel. In: 26th Annual Symposium on Foundations of Computer Science, pp. 464–467 (1985). https://doi.org/10.1109/SFCS.1985.16

  30. Parter, M., Yogev, E.: Low congestion cycle covers and their applications. In Chan, T.M. (ed.) Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2019, San Diego, California, USA, January 6–9, 2019, pp. 1673–1692. SIAM (2019). https://doi.org/10.1137/1.9781611975482.101

  31. Parter, M., Yogev, E.: Optimal short cycle decomposition in almost linear time. In: 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019), vol. 132, pp. 89:1–89:14. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik (2019). https://doi.org/10.4230/LIPIcs.ICALP.2019.89

  32. Pelc, A.: Reliable communication in networks with byzantine link failures. Networks 22(5), 441–459 (1992). https://doi.org/10.1002/net.3230220503

    Article  MATH  Google Scholar 

  33. Peleg, D.: Distributed computing: a locality-sensitive approach. Soc. Ind. Appl. Math. (2000). https://doi.org/10.1137/1.9780898719772

    Article  MATH  Google Scholar 

  34. Perry, K.J., Toueg, S.: Distributed agreement in the presence of processor and communication faults. IEEE Trans. Softw. Eng. SE–12(3), 477–482 (1986). https://doi.org/10.1109/TSE.1986.6312888

    Article  MATH  Google Scholar 

  35. Rajagopalan, S., Schulman, L.: A coding theorem for distributed computation. In: STOC ’94: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 790–799 (1994). https://doi.org/10.1145/195058.195462

  36. Ramachandran, V.: Parallel open ear decomposition applications to graph biconnectivity and triconnectivity. In: Reif, JH. (ed.) Synthesis of Parallel Algorithms, Chap. 7. Morgan Kaufmann Publishers Inc., San Francisco (1993) (ISBN: 978-1-55860-135-2)

  37. Raynal, M.: Fault-Tolerant Message-Passing Distributed Systems: An Algorithmic Approach. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94141-7

    Book  MATH  Google Scholar 

  38. Robbins, H.E.: A theorem on graphs, with an application to a problem of traffic control. Am. Math. Mon. (1939). https://doi.org/10.2307/2303897

    Article  MATH  Google Scholar 

  39. Santoro, N., Widmayer, P.: Distributed function evaluation in the presence of transmission faults. In: International Symposium on Algorithms, pp. 358–367. Springer (1990). https://doi.org/10.1007/3-540-52921-7_85

  40. Sayeed, H.M., Abu-Amara, M., Abu-Amara, H.: Optimal asynchronous agreement and leader election algorithm for complete networks with byzantine faulty links. Distrib. Comput. 9(3), 147–156 (1995). https://doi.org/10.1007/s004460050016

    Article  MathSciNet  MATH  Google Scholar 

  41. Schmid, U., Weiss, B., Keidar, I.: Impossibility results and lower bounds for consensus under link failures. SIAM J. Comput. 38(5), 1912–1951 (2009). https://doi.org/10.1137/S009753970443999X

    Article  MathSciNet  MATH  Google Scholar 

  42. Schmidt, J.M.: A simple test on 2-vertex- and 2-edge-connectivity. Inf. Process. Lett. 113(7), 241–244 (2013). https://doi.org/10.1016/j.ipl.2013.01.016

    Article  MathSciNet  MATH  Google Scholar 

  43. Schulman, L.J.: Communication on noisy channels: a coding theorem for computation. In: Annual IEEE Symposium on Foundations of Computer Science, pp. 724–733 (1992). https://doi.org/10.1109/SFCS.1992.267778

  44. Schulman, L.J.: Deterministic coding for interactive communication. In: STOC ’93: Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, pp. 747–756. ACM, New York (1993). https://doi.org/10.1145/167088.167279

  45. Siu, H.-S., Chin, Y.-H., Yang, W.-P.: Byzantine agreement in the presence of mixed faults on processors and links. IEEE Trans. Parallel Distrib. Syst. 9(4), 335–345 (1998). https://doi.org/10.1109/71.667895

    Article  Google Scholar 

  46. Tsin, Y.: On finding an ear decomposition of an undirected graph distributively. Inf. Process. Lett. 91(3), 147–153 (2004). https://doi.org/10.1016/j.ipl.2004.04.004

    Article  MathSciNet  MATH  Google Scholar 

  47. Whitney, H.: Non-separable and planar graphs. Trans. Am. Math. Soc. 34(2), 339–362 (1932)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement no. 755839. Ran Gelles is supported in part by the Israel Science Foundation (ISF) through Grant No. 1078/17 and the United States-Israel Binational Science Foundation (BSF) through Grant No. 2020277. Gal Sela is supported in part by the Israel Science Foundation (ISF) through Grant No. 1102/21.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed equally.

Corresponding author

Correspondence to Ran Gelles.

Ethics declarations

Conflict of interest

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

A preliminary version of this work appeared in PODC’22 [7].

The online published version of this article has been revised as the algorithm citations were incorrectly numbered and the author’s corrections for the same were missed out to be incorporated.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Censor-Hillel, K., Cohen, S., Gelles, R. et al. Distributed computations in fully-defective networks. Distrib. Comput. 36, 501–528 (2023). https://doi.org/10.1007/s00446-023-00452-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00446-023-00452-2

Navigation