Abstract
We address fully-defective asynchronous networks, in which all links are subject to an unlimited number of alteration errors, implying that all messages in the network may be completely corrupted. Despite the possible intuition that such a setting is too harsh for any reliable communication, we show how to simulate any algorithm for a noiseless setting over any fully-defective setting, given that the network is 2-edge connected. We prove that if the network is not 2-edge connected, no non-trivial computation in the fully-defective setting is possible. The key structural property of 2-edge-connected graphs that we leverage is the existence of an oriented (non-simple) cycle that goes through all nodes (Robbins, Am. Math. Mon., 1939). The core of our technical contribution is presenting a construction of such a Robbins cycle in fully-defective networks, and showing how to communicate over it despite total message corruption. These are obtained in a content-oblivious manner, since nodes must ignore the content of received messages.
Similar content being viewed by others
Data availability
All data generated or analyzed during this study are included in this published article.
Change history
30 September 2023
A Correction to this paper has been published: https://doi.org/10.1007/s00446-023-00457-x
Notes
For instance, let \(P=(a\rightarrow b\rightarrow c \rightarrow b \rightarrow e)\), then \(a {\Rightarrow }^{} e\) is the path \((a\rightarrow b\rightarrow e)\) which is not a sub-path of P.
References
Aggarwal, A., Dani, V., Hayes, T.P., Saia, J.: Sending a message with unknown noise. In: Proceedings of the 19th International Conference on Distributed Computing and Networking, ICDCN ’18. Association for Computing Machinery (2018). https://doi.org/10.1145/3154273.3154318
Aggarwal, A., Dani, V., Hayes, T.P., Saia, J.: A scalable algorithm for multiparty interactive communication with private channels. In: Proceedings of the 21st International Conference on Distributed Computing and Networking, ICDCN 2020. Association for Computing Machinery (2020). https://doi.org/10.1145/3369740.3369771
Alon, N., Braverman, M., Efremenko, K., Gelles, R., Haeupler, B.: Reliable communication over highly connected noisy networks. Distrib. Comput. 32(6), 505–515 (2019). https://doi.org/10.1007/s00446-017-0303-5
Barborak, M., Dahbura, A., Malek, M.: The consensus problem in fault-tolerant computing. ACM Comput. Surv. (CSur) 25(2), 171–220 (1993)
Biely, M.: An optimal byzantine agreement algorithm with arbitrary node and link failures. In: Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems, vol. 1, pp. 146–151 (2003)
Braverman, M., Efremenko, K., Gelles, R., Haeupler, B.: Constant-rate coding for multiparty interactive communication is impossible. J. ACM 65(1), 4:1-4:41 (2017). https://doi.org/10.1145/3050218
Censor-Hillel, K., Cohen, S., Gelles, R., Sela, G.: Distributed computations in fully-defective networks. In: PODC ’22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25-29, 2022, pp. 141–150 (2022). https://doi.org/10.1145/3519270.3538432
Censor-Hillel, K., Gelles, R., Haeupler, B.: Making asynchronous distributed computations robust to noise. Distrib. Comput. 32(5), 405–421 (2019). https://doi.org/10.1007/s00446-018-0343-5
Dani, V., Movahedi, M., Saia, J., Young, M.: Interactive communication with unknown noise rate. In: Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015, Proceedings, Part II, pp. 575–587. Springer Berlin (2015). https://doi.org/10.1007/978-3-662-47666-6_46
Dasgupta, P.: Agreement under faulty interfaces. Inf. Process. Lett. 65(3), 125–129 (1998). https://doi.org/10.1016/S0020-0190(97)00202-0
Dolev, D.: The byzantine generals strike again. J. Algorithms 3(1), 14–30 (1982). https://doi.org/10.1016/0196-6774(82)90004-9
Dubrova, E.: Fault-Tolerant Design. Springer, Berlin (2013). https://doi.org/10.1007/978-1-4614-2113-9
Efremenko, K., Haramaty, E., Kalai, Y.T.: Interactive coding with constant round and communication blowup. In: 11th Innovations in Theoretical Computer Science Conference (ITCS 2020), Leibniz International Proceedings in Informatics (LIPIcs), vol. 151, pp. 7:1–7:34. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik (2020). https://doi.org/10.4230/LIPIcs.ITCS.2020.7
Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985). https://doi.org/10.1145/3149.214121
Gelles, R.: Coding for interactive communication: a survey. Found Trends Theor. Comput. Sci. 13(1–2), 1–157 (2017). https://doi.org/10.1561/0400000079
Gelles, R., Iyer, S.: Interactive coding resilient to an unknown number of erasures. In: 23rd International Conference on Principles of Distributed Systems (OPODIS 2019), vol. 153, pp. 13:1–13:16. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik (2020). https://doi.org/10.4230/LIPIcs.OPODIS.2019.13
Gelles, R., Kalai, Y.T.: Constant-rate interactive coding is impossible, even in constant-degree networks. IEEE Trans. Inf. Theory 65(6), 3812–3829 (2019). https://doi.org/10.1109/TIT.2019.2904576
Gelles, R., Kalai, Y.T., Ramnarayan, G.: Efficient multiparty interactive coding for insertions, deletions, and substitutions. In: Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, PODC ’19, pp. 137–146. ACM, New York (2019). https://doi.org/10.1145/3293611.3331621
Gelles, R., Moitra, A., Sahai, A.: Efficient coding for interactive communication. IEEE Trans. Inf. Theory 60(3), 1899–1913 (2014). https://doi.org/10.1109/TIT.2013.2294186
Gong, L., Lincoln, P., Rushby, J.: Byzantine agreement with authentication: observations and applications in tolerating hybrid and link faults. In: Dependable Computing and Fault Tolerant Systems, vol. 10, pp. 139–158. IEEE Computer Society (1995). http://www.csl.sri.com/papers/dcca95/dcca95.pdf
Gray, J.: Notes on data base operating systems. In: Operating Systems, Lecture Notes in Computer Science, vol. 60. Springer, Berlin (1978). https://doi.org/10.1007/3-540-08755-9_9
Hitron, Y., Parter, M.: Broadcast CONGEST algorithms against adversarial edges. In: Gilbert, S. (ed.) 35th International Symposium on Distributed Computing, DISC 2021, October 4–8, 2021, Freiburg, Germany (Virtual Conference), LIPIcs, vol. 209, pp. 23:1–23:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2021). https://doi.org/10.4230/LIPIcs.DISC.2021.23
Hitron, Y., Parter, M.: General CONGEST compilers against adversarial edges. In: Gilbert, S. (ed.) 35th International Symposium on Distributed Computing, DISC 2021, October 4–8, 2021, Freiburg, Germany (Virtual Conference), LIPIcs, vol. 209, pp. 24:1–24:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2021). https://doi.org/10.4230/LIPIcs.DISC.2021.24
Hoza, W.M., Schulman, L.J.: The adversarial noise threshold for distributed protocols. In :Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 240–258 (2016). https://doi.org/10.1137/1.9781611974331.ch18
Jain, A., Kalai, Y.T., Lewko, A.: Interactive coding for multiparty protocols. In: Proceedings of the 6th Conference on Innovations in Theoretical Computer Science, ITCS ’15, pp. 1–10 (2015). https://doi.org/10.1145/2688073.2688109
Kazmierczak, A., Radhakrishnan, S.: An optimal distributed ear decomposition algorithm with applications to biconnectivity and outerplanarity testing. IEEE Trans. Parallel Distrib. Syst. 11(2), 110–118 (2000). https://doi.org/10.1109/71.841748
Koren, I., Krishna, C.M. (eds.): (2020) Fault-Tolerant Systems, 2nd edn. Morgan Kaufmann, San Francisco (2020). https://doi.org/10.1016/B978-0-12-818105-8
Lewko, A., Vitercik, E.: Balancing communication for multi-party interactive coding, arxiv:1503.06381 (2015)
Lovasz, L.: Computing ears and branchings in parallel. In: 26th Annual Symposium on Foundations of Computer Science, pp. 464–467 (1985). https://doi.org/10.1109/SFCS.1985.16
Parter, M., Yogev, E.: Low congestion cycle covers and their applications. In Chan, T.M. (ed.) Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2019, San Diego, California, USA, January 6–9, 2019, pp. 1673–1692. SIAM (2019). https://doi.org/10.1137/1.9781611975482.101
Parter, M., Yogev, E.: Optimal short cycle decomposition in almost linear time. In: 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019), vol. 132, pp. 89:1–89:14. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik (2019). https://doi.org/10.4230/LIPIcs.ICALP.2019.89
Pelc, A.: Reliable communication in networks with byzantine link failures. Networks 22(5), 441–459 (1992). https://doi.org/10.1002/net.3230220503
Peleg, D.: Distributed computing: a locality-sensitive approach. Soc. Ind. Appl. Math. (2000). https://doi.org/10.1137/1.9780898719772
Perry, K.J., Toueg, S.: Distributed agreement in the presence of processor and communication faults. IEEE Trans. Softw. Eng. SE–12(3), 477–482 (1986). https://doi.org/10.1109/TSE.1986.6312888
Rajagopalan, S., Schulman, L.: A coding theorem for distributed computation. In: STOC ’94: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 790–799 (1994). https://doi.org/10.1145/195058.195462
Ramachandran, V.: Parallel open ear decomposition applications to graph biconnectivity and triconnectivity. In: Reif, JH. (ed.) Synthesis of Parallel Algorithms, Chap. 7. Morgan Kaufmann Publishers Inc., San Francisco (1993) (ISBN: 978-1-55860-135-2)
Raynal, M.: Fault-Tolerant Message-Passing Distributed Systems: An Algorithmic Approach. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94141-7
Robbins, H.E.: A theorem on graphs, with an application to a problem of traffic control. Am. Math. Mon. (1939). https://doi.org/10.2307/2303897
Santoro, N., Widmayer, P.: Distributed function evaluation in the presence of transmission faults. In: International Symposium on Algorithms, pp. 358–367. Springer (1990). https://doi.org/10.1007/3-540-52921-7_85
Sayeed, H.M., Abu-Amara, M., Abu-Amara, H.: Optimal asynchronous agreement and leader election algorithm for complete networks with byzantine faulty links. Distrib. Comput. 9(3), 147–156 (1995). https://doi.org/10.1007/s004460050016
Schmid, U., Weiss, B., Keidar, I.: Impossibility results and lower bounds for consensus under link failures. SIAM J. Comput. 38(5), 1912–1951 (2009). https://doi.org/10.1137/S009753970443999X
Schmidt, J.M.: A simple test on 2-vertex- and 2-edge-connectivity. Inf. Process. Lett. 113(7), 241–244 (2013). https://doi.org/10.1016/j.ipl.2013.01.016
Schulman, L.J.: Communication on noisy channels: a coding theorem for computation. In: Annual IEEE Symposium on Foundations of Computer Science, pp. 724–733 (1992). https://doi.org/10.1109/SFCS.1992.267778
Schulman, L.J.: Deterministic coding for interactive communication. In: STOC ’93: Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, pp. 747–756. ACM, New York (1993). https://doi.org/10.1145/167088.167279
Siu, H.-S., Chin, Y.-H., Yang, W.-P.: Byzantine agreement in the presence of mixed faults on processors and links. IEEE Trans. Parallel Distrib. Syst. 9(4), 335–345 (1998). https://doi.org/10.1109/71.667895
Tsin, Y.: On finding an ear decomposition of an undirected graph distributively. Inf. Process. Lett. 91(3), 147–153 (2004). https://doi.org/10.1016/j.ipl.2004.04.004
Whitney, H.: Non-separable and planar graphs. Trans. Am. Math. Soc. 34(2), 339–362 (1932)
Acknowledgements
This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement no. 755839. Ran Gelles is supported in part by the Israel Science Foundation (ISF) through Grant No. 1078/17 and the United States-Israel Binational Science Foundation (BSF) through Grant No. 2020277. Gal Sela is supported in part by the Israel Science Foundation (ISF) through Grant No. 1102/21.
Author information
Authors and Affiliations
Contributions
All authors contributed equally.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no competing interests to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
A preliminary version of this work appeared in PODC’22 [7].
The online published version of this article has been revised as the algorithm citations were incorrectly numbered and the author’s corrections for the same were missed out to be incorporated.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Censor-Hillel, K., Cohen, S., Gelles, R. et al. Distributed computations in fully-defective networks. Distrib. Comput. 36, 501–528 (2023). https://doi.org/10.1007/s00446-023-00452-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00446-023-00452-2