Loading…

Counting in Practical Anonymous Dynamic Networks is Polynomial

Anonymous Dynamic Networks is a harsh computational environment due to changing topology and lack of identifiers. Computing the size of the network, a problem known as Counting, is particularly challenging because messages received cannot be tagged to a specific sender. Previous works on Counting in...

Full description

Saved in:
Bibliographic Details
Published in:arXiv.org 2016-03
Main Authors: Chakraborty, Maitri, Milani, Alessia, Mosteiro, Miguel A
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Chakraborty, Maitri
Milani, Alessia
Mosteiro, Miguel A
description Anonymous Dynamic Networks is a harsh computational environment due to changing topology and lack of identifiers. Computing the size of the network, a problem known as Counting, is particularly challenging because messages received cannot be tagged to a specific sender. Previous works on Counting in Anonymous Dynamic Networks do not provide enough guarantees to be used in practice. Indeed, they either compute only an upper bound on the network size that may be as bad as exponential, or guarantee only double-exponential running time, or do not terminate, or guarantee only eventual termination without running-time guarantees. Faster experimental protocols do not guarantee the correct count. Recently, we presented the first Counting protocol that computes the exact count with exponential running-time guarantees. The protocol requires the presence of one leader node and knowledge of any upper bound Delta on the maximum number of neighbors that any node will ever have. In the present work, we complement the latter theoretical study evaluating the performance of such protocol in practice. We tested a variety of network topologies that may appear in practice, including extremal cases such as trees, paths, and continuously changing topologies. We also tested networks that temporarily are not connected. Our simulations showed that the protocol is polynomial for all the inputs tested, paving the way to use it in practical applications where topology changes are predictable. The simulations also provided insight on the impact of topology changes on information dissemination. To the best of our knowledge, this is the first experimental study that shows the possibility of computing the exact count in polynomial time in a variety of Anonymous Dynamic Networks that are worse than expected in practice.
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2078044186</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2078044186</sourcerecordid><originalsourceid>FETCH-proquest_journals_20780441863</originalsourceid><addsrcrecordid>eNqNyrsKwjAUgOEgCBbtOxxwLqRJepkEqYqTdHAvoVRJTc_RXJC-vQ4-gNM_fP-CJULKPKuVECuWej9yzkVZiaKQCds1FDEYvINBaJ3ug-m1hT0SzhNFD4cZ9WR6uAzhTe7hwXhoyc5Ik9F2w5Y3bf2Q_rpm29Px2pyzp6NXHHzoRooOv9QJXtVcqbwu5X_XB9RXOI8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2078044186</pqid></control><display><type>article</type><title>Counting in Practical Anonymous Dynamic Networks is Polynomial</title><source>Publicly Available Content Database</source><creator>Chakraborty, Maitri ; Milani, Alessia ; Mosteiro, Miguel A</creator><creatorcontrib>Chakraborty, Maitri ; Milani, Alessia ; Mosteiro, Miguel A</creatorcontrib><description>Anonymous Dynamic Networks is a harsh computational environment due to changing topology and lack of identifiers. Computing the size of the network, a problem known as Counting, is particularly challenging because messages received cannot be tagged to a specific sender. Previous works on Counting in Anonymous Dynamic Networks do not provide enough guarantees to be used in practice. Indeed, they either compute only an upper bound on the network size that may be as bad as exponential, or guarantee only double-exponential running time, or do not terminate, or guarantee only eventual termination without running-time guarantees. Faster experimental protocols do not guarantee the correct count. Recently, we presented the first Counting protocol that computes the exact count with exponential running-time guarantees. The protocol requires the presence of one leader node and knowledge of any upper bound Delta on the maximum number of neighbors that any node will ever have. In the present work, we complement the latter theoretical study evaluating the performance of such protocol in practice. We tested a variety of network topologies that may appear in practice, including extremal cases such as trees, paths, and continuously changing topologies. We also tested networks that temporarily are not connected. Our simulations showed that the protocol is polynomial for all the inputs tested, paving the way to use it in practical applications where topology changes are predictable. The simulations also provided insight on the impact of topology changes on information dissemination. To the best of our knowledge, this is the first experimental study that shows the possibility of computing the exact count in polynomial time in a variety of Anonymous Dynamic Networks that are worse than expected in practice.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Computer simulation ; Computing time ; Counting ; Guarantees ; Information dissemination ; Network topologies ; Networks ; Polynomials ; Privacy ; Protocol (computers) ; Run time (computers) ; Upper bounds</subject><ispartof>arXiv.org, 2016-03</ispartof><rights>2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2078044186?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>780,784,25752,37011,44589</link.rule.ids></links><search><creatorcontrib>Chakraborty, Maitri</creatorcontrib><creatorcontrib>Milani, Alessia</creatorcontrib><creatorcontrib>Mosteiro, Miguel A</creatorcontrib><title>Counting in Practical Anonymous Dynamic Networks is Polynomial</title><title>arXiv.org</title><description>Anonymous Dynamic Networks is a harsh computational environment due to changing topology and lack of identifiers. Computing the size of the network, a problem known as Counting, is particularly challenging because messages received cannot be tagged to a specific sender. Previous works on Counting in Anonymous Dynamic Networks do not provide enough guarantees to be used in practice. Indeed, they either compute only an upper bound on the network size that may be as bad as exponential, or guarantee only double-exponential running time, or do not terminate, or guarantee only eventual termination without running-time guarantees. Faster experimental protocols do not guarantee the correct count. Recently, we presented the first Counting protocol that computes the exact count with exponential running-time guarantees. The protocol requires the presence of one leader node and knowledge of any upper bound Delta on the maximum number of neighbors that any node will ever have. In the present work, we complement the latter theoretical study evaluating the performance of such protocol in practice. We tested a variety of network topologies that may appear in practice, including extremal cases such as trees, paths, and continuously changing topologies. We also tested networks that temporarily are not connected. Our simulations showed that the protocol is polynomial for all the inputs tested, paving the way to use it in practical applications where topology changes are predictable. The simulations also provided insight on the impact of topology changes on information dissemination. To the best of our knowledge, this is the first experimental study that shows the possibility of computing the exact count in polynomial time in a variety of Anonymous Dynamic Networks that are worse than expected in practice.</description><subject>Computer simulation</subject><subject>Computing time</subject><subject>Counting</subject><subject>Guarantees</subject><subject>Information dissemination</subject><subject>Network topologies</subject><subject>Networks</subject><subject>Polynomials</subject><subject>Privacy</subject><subject>Protocol (computers)</subject><subject>Run time (computers)</subject><subject>Upper bounds</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNyrsKwjAUgOEgCBbtOxxwLqRJepkEqYqTdHAvoVRJTc_RXJC-vQ4-gNM_fP-CJULKPKuVECuWej9yzkVZiaKQCds1FDEYvINBaJ3ug-m1hT0SzhNFD4cZ9WR6uAzhTe7hwXhoyc5Ik9F2w5Y3bf2Q_rpm29Px2pyzp6NXHHzoRooOv9QJXtVcqbwu5X_XB9RXOI8</recordid><startdate>20160317</startdate><enddate>20160317</enddate><creator>Chakraborty, Maitri</creator><creator>Milani, Alessia</creator><creator>Mosteiro, Miguel A</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20160317</creationdate><title>Counting in Practical Anonymous Dynamic Networks is Polynomial</title><author>Chakraborty, Maitri ; Milani, Alessia ; Mosteiro, Miguel A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20780441863</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Computer simulation</topic><topic>Computing time</topic><topic>Counting</topic><topic>Guarantees</topic><topic>Information dissemination</topic><topic>Network topologies</topic><topic>Networks</topic><topic>Polynomials</topic><topic>Privacy</topic><topic>Protocol (computers)</topic><topic>Run time (computers)</topic><topic>Upper bounds</topic><toplevel>online_resources</toplevel><creatorcontrib>Chakraborty, Maitri</creatorcontrib><creatorcontrib>Milani, Alessia</creatorcontrib><creatorcontrib>Mosteiro, Miguel A</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chakraborty, Maitri</au><au>Milani, Alessia</au><au>Mosteiro, Miguel A</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Counting in Practical Anonymous Dynamic Networks is Polynomial</atitle><jtitle>arXiv.org</jtitle><date>2016-03-17</date><risdate>2016</risdate><eissn>2331-8422</eissn><abstract>Anonymous Dynamic Networks is a harsh computational environment due to changing topology and lack of identifiers. Computing the size of the network, a problem known as Counting, is particularly challenging because messages received cannot be tagged to a specific sender. Previous works on Counting in Anonymous Dynamic Networks do not provide enough guarantees to be used in practice. Indeed, they either compute only an upper bound on the network size that may be as bad as exponential, or guarantee only double-exponential running time, or do not terminate, or guarantee only eventual termination without running-time guarantees. Faster experimental protocols do not guarantee the correct count. Recently, we presented the first Counting protocol that computes the exact count with exponential running-time guarantees. The protocol requires the presence of one leader node and knowledge of any upper bound Delta on the maximum number of neighbors that any node will ever have. In the present work, we complement the latter theoretical study evaluating the performance of such protocol in practice. We tested a variety of network topologies that may appear in practice, including extremal cases such as trees, paths, and continuously changing topologies. We also tested networks that temporarily are not connected. Our simulations showed that the protocol is polynomial for all the inputs tested, paving the way to use it in practical applications where topology changes are predictable. The simulations also provided insight on the impact of topology changes on information dissemination. To the best of our knowledge, this is the first experimental study that shows the possibility of computing the exact count in polynomial time in a variety of Anonymous Dynamic Networks that are worse than expected in practice.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2016-03
issn 2331-8422
language eng
recordid cdi_proquest_journals_2078044186
source Publicly Available Content Database
subjects Computer simulation
Computing time
Counting
Guarantees
Information dissemination
Network topologies
Networks
Polynomials
Privacy
Protocol (computers)
Run time (computers)
Upper bounds
title Counting in Practical Anonymous Dynamic Networks is Polynomial
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T05%3A24%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Counting%20in%20Practical%20Anonymous%20Dynamic%20Networks%20is%20Polynomial&rft.jtitle=arXiv.org&rft.au=Chakraborty,%20Maitri&rft.date=2016-03-17&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2078044186%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_20780441863%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2078044186&rft_id=info:pmid/&rfr_iscdi=true