Skip to main content
Log in

Order optimal information spreading using algebraic gossip

  • Published:
Distributed Computing Aims and scope Submit manuscript

Abstract

In this paper we study gossip based information spreading with bounded message sizes. We use algebraic gossip to disseminate \(k\) distinct messages to all \(n\) nodes in a network. For arbitrary networks we provide a new upper bound for uniform algebraic gossip of \(O((k+\log n + D)\varDelta )\) rounds with high probability, where \(D\) and \(\varDelta \) are the diameter and the maximum degree in the network, respectively. For many topologies and selections of \(k\) this bound improves previous results, in particular, for graphs with a constant maximum degree it implies that uniform gossip is order optimal and the stopping time is \(\varTheta (k + D)\). To eliminate the factor of \(\varDelta \) from the upper bound we propose a non-uniform gossip protocol, TAG, which is based on algebraic gossip and an arbitrary spanning tree protocol \(\mathcal{S } \). The stopping time of TAG is \(O(k+\log n +d(\mathcal{S })+t(\mathcal{S }))\), where \(t(\mathcal{S })\) is the stopping time of the spanning tree protocol, and \(d(\mathcal{S })\) is the diameter of the spanning tree. We provide two general cases in which this bound leads to an order optimal protocol. The first is for \(k=\varOmega (n)\), where, using a simple gossip broadcast protocol that creates a spanning tree in at most linear time, we show that TAG finishes after \(\varTheta (n)\) rounds for any graph. The second uses a sophisticated, recent gossip protocol to build a fast spanning tree on graphs with large weak conductance. In turn, this leads to the optimally of TAG on these graphs for \(k=\varOmega (\text{ polylog }(n))\). The technique used in our proofs relies on queuing theory, which is an interesting approach that can be useful in future gossip analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. An event occurs with high probability (w.h.p. ) if its probability is at least \(1-O\left( \tfrac{1}{n}\right) \).

  2. Alternatively, this model can be seen as each node having a clock which ticks at the times of a rate 1 Poisson process and there is a total \(n\) clock ticks per round [4].

  3. Note that this implies that in the synchronous model a node can communicate with more than a single neighbor, if other nodes initiate communication with it.

  4. Wakes up—selected according to the time model for a communication action.

References

  1. Angelopoulos, S., Doerr, B., Huber, A., Panagiotou, K.: Tight bounds for quasirandom rumor spreading. Electron. J. Comb. 16(1), R102,1–R102,19 (2009)

    MathSciNet  Google Scholar 

  2. Borokhovich, M., Avin, C., Lotker, Z.: Tight bounds for algebraic gossip on graphs. In: 2010 IEEE International Symposium on Information Theory Proceedings (ISIT) (jun. 2010), pp. 1758–1762

  3. Borokhovich, M., Avin, C., Lotker, Z.: Bounds for algebraic gossip on graphs. Random Structures & Algorithms (2012). doi:10.1002/rsa.20480

  4. Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Randomized gossip algorithms. IEEE Trans. Inf. Theory 52(6), 2508–2530 (2006)

    Article  MathSciNet  Google Scholar 

  5. Boyd, S.P., Ghosh, A., Prabhakar, B., Shah, D.: Gossip algorithms: design, analysis and applications. In: IEEE International Conference on Computer Communications (INFOCOM) (2005), pp. 1653–1664

  6. Censor-Hillel, K., Haeupler, B., Kelner, J., Maymounkov, P.: Global computation in a poorly connected world: fast rumor spreading with no dependence on conductance. In: Proceedings of the 44th Symposium on Theory of Computing (New York, NY, USA, 2012), STOC ’12, ACM, pp. 961–970

  7. Censor-Hillel, K., Shachnai, H.: Fast information spreading in graphs with a large weak conductance. To appear in the 22nd ACM-SIAM Symposium on Discrete Algorithms (SODA), 2011

  8. Chaintreau, A., Fraigniaud, P., Lebhar, E.: Opportunistic spatial gossip over mobile social networks. In: WOSP ’08: Proceedings of the first workshop on Online social networks (New York, NY, USA, 2008), ACM, pp. 73–78

  9. Chen, H., Yao, D.: Fundamentals of queueing networks: performance, asymptotics, and optimization, first ed., vol. 46 of Applications of Mathematics. Springer, New York (2001)

  10. Deb, S., Médard, M., Choute, C.: Algebraic gossip: a network coding approach to optimal multiple rumor mongering. IEEE Trans. Inf. Theory 52(6), 2486–2507 (2006)

    Article  Google Scholar 

  11. Demers, A.J., Greene, D.H., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H.E., Swinehart, D.C., Terry, D.B.: Epidemic algorithms for replicated database maintenance. Oper. Syst. Rev. 22(1), 8–32 (1988)

    Article  Google Scholar 

  12. Doerr, B., Friedrich, T., Sauerwald, T.: Quasirandom rumor spreading. In: Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms (Philadelphia, PA, USA, 2008), SODA ’08, Society for Industrial and, Applied Mathematics, pp. 773–781

  13. Feige, U., Peleg, D., Raghavan, P., Upfal, E.: Randomized broadcast in networks. Random Struct. Algorithms 1(4), 447–460 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  14. Fernandess, Y., Malkhi, D.: On collaborative content distribution using multi-message gossip. J. Parallel Distrib. Comput. 67(12), 1232–1239 (2007)

    Article  MATH  Google Scholar 

  15. Georgiou, C., Gilbert, S., Guerraoui, R., Kowalski, D.R.: On the complexity of asynchronous gossip. In: PODC ’08: Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing (New York, NY, USA, 2008), ACM, pp. 135–144

  16. Grimmett, G.R., Stirzaker, D.R.: Probability and Random Processes, 3rd edn. Oxford University Press, New York (2001)

    Google Scholar 

  17. Haeupler, B.: Analyzing network coding gossip made easy. In: ACM Symposium on Theory of Computing (STOC) (2011), pp. 293–302

  18. Haeupler, B.: Tighter worst-case bounds on algebraic gossip. IEEE Commun. Lett. 16(8), 1274–1276 (2012)

    Article  Google Scholar 

  19. Ho, T., Koetter, R., Medard, M., Karger, D.R., Effros, M.: The benefits of coding over routing in a randomized setting. In: IEEE International Symposium on Information Theory (ISIT) (2003), p. 442

  20. Hofstad, R.V.D.: Random graphs and complex networks

  21. Karp, R.M., Schindelhauer, C., Shenker, S., Vöcking, B.: Randomized rumor spreading. In: Annual IEEE Symposium on Foundations of Computer Science (FOCS) (2000), pp. 565–574

  22. Kempe, D., Dobra, A., Gehrke, J.: Gossip-based computation of aggregate information. In: Annual IEEE Symposium on Foundations of Computer Science (FOCS) (2003), pp. 482–491

  23. Kempe, D., Kleinberg, J., Tardos, Éva: Maximizing the spread of influence through a social network. In: KDD ’03: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (New York, NY, USA, 2003), ACM, pp. 137–146

  24. Li, S.-Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theory 49(2), 371–381 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  25. Médard, M., Koetter, R.: Beyond routing: an algebraic approach to network coding. In: IEEE International Conference on Computer Communications (INFOCOM) (2002), pp. 122–130

  26. Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York (2005)

  27. Mosk-Aoyama, D., Shah, D.: Computing separable functions via gossip. In : PODC ’06: Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing (New York, NY, USA, 2006), ACM, pp. 113–122

  28. Mosk-Aoyama, D., Shah, D.: Information dissemination via network coding. In: IEEE International Symposium on Information Theory Proceedings (ISIT) (2006), pp. 1748–1752

  29. Ng, C.-H., Boon-Hee, S.: Queueing Modelling Fundamentals: With Applications in Communication Networks. Wiley Publishing, London (2008)

Download references

Acknowledgments

Keren Censor-Hillel was partially supported by NSF Award 0939370-CCF. Zvi Lotker and Michael Borokhovich were supported in part by a grant from the Israel Science Foundation (894/09). We would like to thank the anonymous reviewers who helped us to significantly improve the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Borokhovich.

Additional information

A preliminary version of this paper appeared in Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011, pp. 363–372.

Keren Censor-Hillel was partially supported by NSF Award 0939370-CCF.

Zvi Lotker and Michael Borokhovich were partially supported by a grant from the Israel Science Foundation (894/09).

The paper is a part of the PhD work of Michael Borokhovich.

Appendix

Appendix

1.1 Proof of Lemma 10

Lemma 10

(restated). For any connected graph \(G_n\) with \(n\) nodes, the sum of the degrees of the nodes along any shortest path between any two nodes \(v\) and \(u\) is at most \(3n\).

Proof

Without loss of generality, consider a BFS spanning tree of \(G\) rooted at some node \(v\), and some arbitrary leaf \(u\). We will find the maximum degree of the node located on the path \((v\rightarrow u)\) at distance \(i\) from the root \(v\). Clearly, such a node can be connected only to the following nodes:

  • Nodes that are located at distance \(i-1\) from the root. (It can not be connected to the nodes that are closer to the root (than \(i-1\)) since then, its distance from the root would be \(i-1\) which contradicts the given BFS execution).

  • Nodes that are at the same distance \(i\) from the root.

  • Nodes that are located at distance \(i+1\) from the root. (It can not be connected to the nodes that are farther from the root (than \(i+1\)) since then, their distance from the root would be \(i+1\) which contradicts the given BFS execution).

Let us define \(m_i\) as the number of nodes at distance \(i\) from the root. Clearly, \(\sum _{i=0}^{n-1}m_i=n\). (The node at distance \(0\) is the root \(v\)). The degree of a node (at distance \(i\) from the root) can be at most: \(d_i\le (m_{i-1}+m_{i}+m_{i+1})\). Thus, the sum of degrees on a path of length \(l\) from the root to a leaf is at most: \(d=\sum _{i=0}^{l}d_i\). Since \(l\le n-1,\, d=\sum _{i=0}^{l}d_i\le \sum _{i=0}^{n-1}d_i = \sum _{i=0}^{n-1}(m_{i-1}+m_{i}+m_{i+1}) \le 3n\). \(\square \)

1.2 Proof of Lemma 11

Lemma 11

(restated). Let \(X\) be a sum of \(m\) independent and identically distributed geometric random variables (each one with parameter \(p>0\)) and \(\text{ E }\left[ X\right] =\tfrac{m}{p}\). Then, for \(\alpha >1\):

$$\begin{aligned} \Pr \left( X \le \alpha \text{ E }\left[ X\right] \right) > 1-\left( \alpha e^{1-\alpha }\right) ^m. \end{aligned}$$
(26)

Proof

First, we will define \(Y\) as the sum of \(k\) independent Bernoulli random variables, i.e., \(Y=\sum _{i=1}^{k}Y_i\), where \(Y_i \sim Bernoulli(p)\). Let us notice that:

$$\begin{aligned} \Pr \left( X \le k\right) = \Pr \left( Y \ge m\right) \end{aligned}$$
(27)

The last is true since the event of observing at least \(m\) successes in a sequence of \(k\) Bernoulli trials implies that the sum of \(m\) independent geometric random variables is no more than \(k\). On the other hand, if the sum of \(m\) independent geometric random variables is no more than \(k\) it implies that \(m\) successes occurred no later than the \(k\)-th trial and thus \(Y\ge m\).

Now we will use a Chernoff bound for the sum of independent Bernoulli random variables presented in [26]: For any \(0<\delta < 1\) and \(\mu = \text{ E }\left[ Y\right] \):

$$\begin{aligned} \Pr \left( Y \le (1-\delta )\mu \right) \le \left( \frac{e^{-\delta }}{(1-\delta )^{1-\delta }}\right) ^\mu . \end{aligned}$$
(28)

Since \(\mu =\text{ E }\left[ Y\right] =kp\), and by letting \(\delta =\frac{kp-m}{kp}\) we obtain:

$$\begin{aligned} \Pr \left( Y \le (1-\delta )\mu \right)&= \Pr \left( Y \le m \right) \le \left( \frac{m}{e^{\frac{m-kp}{m}}kp}\right) ^{-m}.\quad \end{aligned}$$
(29)
$$\begin{aligned} \Pr \left( Y \ge m\right)&> 1-\left( \frac{m}{e^{\frac{m-kp}{m}}kp}\right) ^{-m}\quad \end{aligned}$$
(30)
$$\begin{aligned} \Pr \left( X \le k\right)&> 1- \left( \frac{m}{e^{\frac{m-kp}{m}}kp}\right) ^{-m} \end{aligned}$$
(31)

By substituting \(k=\alpha \tfrac{m}{p}=\alpha \text{ E }\left[ X\right] \) (where \(\alpha >1\)) we obtain:

$$\begin{aligned} \Pr \left( X \le \alpha \text{ E }\left[ X\right] \right) > 1-\left( \frac{e^{\alpha }}{e\alpha }\right) ^{-m} \end{aligned}$$
(32)

\(\square \)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Avin, C., Borokhovich, M., Censor-Hillel, K. et al. Order optimal information spreading using algebraic gossip. Distrib. Comput. 26, 99–117 (2013). https://doi.org/10.1007/s00446-013-0187-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00446-013-0187-y

Keywords

Navigation