Collective communication operations play an important role in message-passing systems and have been extensively investigated. We study two widely used collective communication operations: gossiping and all-to-all personalized communication. We assume the multiport postal model of communication that
Communication Complexity of Gossiping by Packets
โ Scribed by Luisa Gargano; Adele A. Rescigno; Ugo Vaccaro
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 153 KB
- Volume
- 45
- Category
- Article
- ISSN
- 0743-7315
No coin nor oath required. For personal study only.
โฆ Synopsis
This paper considers the problem of gossiping with packets of limited size in a network with a cost function. We show that the problem of determining the minimum cost necessary to perform gossiping among a given set of participants with packets of limited size is NP-hard. We also give an approximate (with respect to the cost) gossiping algorithm. The ratio between the cost of an optimal algorithm and the approximate one is less than 1+2(k-1)/n, where n is the number of nodes participating in the gossiping process and k โค n-1 is the upper bound on the number of individual blocks of information that a packet can carry. We also analyze the communication time and communication complexity, i.e., the product of the communication cost and time, of gossiping algorithms.
๐ SIMILAR VOLUMES
We study the k-round two-party communication complexity of the pointer chasing problem for fixed k. C. Damm, S. Jukna and J. Sgall (1998, Comput. Complexity 7, 109 127) showed an upper bound of O(n log (k&1) n) for this problem. We prove a matching lower bound; this improves the lower bound of 0(n)
We consider the problem of finding a minimum-length schedule on m machines for a set of n unit-length tasks with a forest of intrees as precedence relation, and with unit interprocessor communication delays. First, we prove that this problem is NP-complete; second, we derive a linear time algorithm
Let k, n ยฅ N and f: {0, 1} n ร {0, 1} n Q {0, 1}. Assume Alice has x 1 , ..., x k ยฅ {0, 1} n , Bob has y 1 , ..., y k ยฅ {0, 1} n , and they want to compute municating as few bits as possible. The direct sum conjecture (henceforth DSC) n (log log(n))(log(n)) ) bits. This establishes a weak randomize
This paper addresses the routing problem with reliability requirements in packetswitched communication networks. In this problem, two classes of communicating node pairs are considered: less critical and highly critical node pairs. We develop a model which identifies a primary route for each less cr