A Loosely Self-stabilizing Protocol for Randomized Congestion Control with Logarithmic Memory

09/10/2019
by   Michael Feldmann, et al.
0

We consider congestion control in peer-to-peer distributed systems. The problem can be reduced to the following scenario: Consider a set V of n peers (called clients in this paper) that want to send messages to a fixed common peer (called server in this paper). We assume that each client v ∈ V sends a message with probability p(v) ∈ [0,1) and the server has a capacity of σ∈N, i.e., it can recieve at most σ messages per round and excess messages are dropped. The server can modify these probabilities when clients send messages. Ideally, we wish to converge to a state with ∑ p(v) = σ and p(v) = p(w) for all v,w ∈ V. We propose a loosely self-stabilizing protocol with a slightly relaxed legimate state. Our protocol lets the system converge from any initial state to a state where ∑ p(v) ∈[σ±ϵ] and |p(v)-p(w)| ∈ O(1/n). This property is then maintained for Ω(n^c) rounds in expectation. In particular, the initial client probabilities and server variables are not necessarily well-defined, i.e., they may have arbitrary values. Our protocol uses only O(W + n) bits of memory where W is length of node identifers, making it very lightweight. Finally we state a lower bound on the convergence time an see that our protocol performs asymptotically optimal (up to some polylogarithmic factor).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/27/2019

Privacy-Preserving Distributed Learning with Secret Gradient Descent

In many important application domains of machine learning, data is a pri...
research
08/22/2022

Bounding the Optimal Length of Pliable Index Coding via a Hypergraph-based Approach

In pliable index coding (PICOD), a number of clients are connected via a...
research
07/30/2020

Implications of Dissemination Strategies on the Security of Distributed Ledgers

This paper describes a simulation study on security attacks over Distrib...
research
09/21/2018

Privacy in Index Coding: k-Limited-Access Schemes

In the traditional index coding problem, a server employs coding to send...
research
03/31/2021

Arbitrary Length k-Anonymous Dining-Cryptographers Communication

Dining-cryptographers networks (DCN) can achieve information-theoretical...
research
07/09/2020

Serverless Electronic Mail

We describe a simple approach to peer-to-peer electronic mail that would...
research
02/07/2018

Partisan: Enabling Cloud-Scale Erlang Applications

In this work, we present an alternative distribution layer for Erlang, n...

Please sign up or login with your details

Forgot password? Click here to reset