Oshman

advertisement
The Role of Communication
Complexity in Distributed Computing
Rotem Oshman
Background: Distributed Computing
Distributed Computing
• Typical model:
– Local computation for free
– Charge for “communication”
Distributed Lower Bounds
• “All or nothing”:
– If 𝑝, π‘ž have not communicated, they know nothing
about each other
– If 𝑝, π‘ž communicated, they know everything
about each other
• Recently: interest in quantifying the amount
of communication
• Natural to use communication complexity
Shared Memory
• Processes communicate by accessing objects
in shared memory
– Read/write registers
– Read-modify-write: CAS, T&S, …
• Typically asynchronous:
– Schedule = sequence of process IDs
– Adversarially chosen
– Sometimes processes may crash
Shared Memory Lower Bounds
• “Covering arguments”
• Examples:
– Deterministic consensus impossible if one process
may fail [FLP’79]
– Mutual exclusion requires 𝑛 shared registers
[BL’90]
• Can we introduce a cell-probe-like model for
shared memory lower bounds?
Message Passing
• Processes communicate by sending messages
– Over some network graph, often complete
• Fully synchronous, fully asynchronous, or
anywhere in between
• Processes can crash, recover, cheat, lie,…
• Many successful applications of CC
Some differences…
Distributed Computing
Complexity #rounds (limited bandwidth)
measure
Comm. Complexity
total #bits
Problems
Search
Decision
Input
Number-In-Hand
Number-onForehead (usually)
Message-Passing Models
#rounds
total CC
LOCAL
SHARED BLACKBOARD
CONGEST
MESSAGE-PASSING
Talk Overview
I. Lower bound techniques
a. CONGEST (#rounds): reductions from 2-party
communication complexity
b. Total CC with private channels
II. Shared blackboard
a. Number-in-hand
b. “Not-quite-number-in-hand”
The CONGEST Model
• 𝑛 nodes communicate over a
network graph (small diameter)
• Computation proceeds in
synchronous rounds
• Each message = 𝐡 bits
• Several variants:
– Communication by unicast vs. local broadcast
– Arbitrary graph vs. complete graph
The CONGEST Model
• Arbitrary graph topology: strong lower bounds
– [Distributed Verification and Hardness of Distributed
Approximation, by Das Sarma, Holzer, Kor, Korman,
Nanongkai, Pandurangan, Peleg, Wattenhofer]
• Nearly-tight lower bound on MST approximation
• Non-tight lower bounds on all-pairs shortest path,
minimum cut, shortest s-t path, …
• Almost all lower bounds ≤ Ω
𝑛/𝐡
– Very few ٠𝑛/𝐡 bounds known, no super-linear
bounds
The CONGEST Model
• Complete graph topology, unicast:
– Known to be extremely powerful, e.g.,
• Sort 𝑛2 values in 𝑂 log log 𝑛 rounds
• MST construction in 𝑂 log ∗ 𝑛 rounds
– No explicit super-constant lower bound known
– [Drucker, Kuhn, O. ‘14]: even slightly superconstant lower bound ⇒ new ACC lower bound
• Complete graph topology, broadcast = shared
blackboard
CONGEST Lower Bounds for
Arbitrary Graphs
… by reduction from 2-party
disjointness
2-Party Reductions
• Textbook reduction [Kushilevitz Nisan]:
Given algorithm 𝐴 for solving task 𝑇…
𝑋
π‘Œ
Simulate 𝐴
Based
on 𝑋
𝑛 bits
Based
on π‘Œ
Solution for 𝑇 ⇨ answer for, e.g., Disjointness
2-Party Reductions
• More generally:
Given algorithm 𝐴 for solving task 𝑇…
π‘Œ
𝑋
Based
on 𝑋
Based
on π‘Œ
Solution for 𝑇 ⇨ answer for, e.g., Disjointness
Multi-Player NIH Communication
with Private Channels
The Message-Passing Model
•
•
•
•
π‘˜ players
Private channels
Private 𝑛-bit inputs 𝑋1 , … , π‘‹π‘˜
Private randomness
• Goal: compute 𝑓 𝑋1 , … , π‘‹π‘˜
• Cost: total communication
The Coordinator Model
• π‘˜ players, one coordinator
• The coordinator has no input
Message-Passing vs. Coordinator
≈
Secure multi-party
computation!
Message-Passing Lower Bounds
For π‘˜ players with 𝑛-bit inputs…
• Woodruff, Zhang ‘12: 𝐹𝑝 estimation
• Phillips, Verbin, Zhang ’12:
– Ω π‘˜π‘› for bitwise problems (AND/OR, MAJ, …)
• Woodruff, Zhang ‘13:
– Ω π‘˜π‘› for threshold and graph problems
• Braverman, Ellen, O., Pitassi, Vaikuntanathan
‘13: Ω π‘˜π‘› for disjointness
Symmetrization [Phillips, Verbin, Zhang ’12]
Lower bound for π‘˜-player problem π‘ƒπ‘˜ :
• Choose hard 2-player problem 𝑃2
• Fix hard distribution πœ‡2 for 𝑃2 , let 𝑋, π‘Œ ∼ πœ‡2
Bob: π‘Œ
“Smear” π‘Œ across π‘˜ − 1 players Alice: 𝑋
Symmetrization [Phillips, Verbin, Zhang ’12]
Lower bound for π‘˜-player problem π‘ƒπ‘˜ :
Bob: π‘Œ
“Smear” π‘Œ across π‘˜ − 1 players
Alice: 𝑋
– π‘˜-player distribution must be symmetric
– Answer to π‘ƒπ‘˜ ⇒ answer to 𝑃2
2
π‘˜
𝔼[ cost for 𝑃2 ] = ⋅ cost for π‘ƒπ‘˜
Symmetrization Example: Bitwise-XOR
• 2-party problem:
– Input: uniform independent 𝑋, π‘Œ ∈ 0,1
– Goal: Alice outputs Bob’s input, π‘Œ
𝑛
• Reduction:
– Sample uniform 𝑖 ∈ π‘˜ , Alice sets 𝑋𝑖 = 𝑋
– Bob chooses 𝑋−𝑖 uniformly s.t. ⊕𝑗≠𝑖 𝑋𝑗 = π‘Œ
– From ⊕π‘˜β„“=1 𝑋ℓ , Alice can reconstruct π‘Œ
Bob: π‘Œ
Alice: 𝑋
Set Disjointness
𝑋2
𝑋1
𝑋3
?
𝑋5
𝑋4
𝑛
π‘˜
𝑗
𝑋𝑖
DIS J 𝑛,π‘˜ =
𝑖=1 𝑗=1
Symmetrization vs. Disjointness
• Consider any symmetric distribution…
Bob: π‘Œ
Alice: 𝑋
• How many 0s in coord. 𝑗, given
𝑗
π‘˜
𝑖=1 𝑋𝑖
= 0?
– More than one ⇒ Bob probably sees a zero
• Ignore this coordinate
– Only one ⇒ Pr[ Alice got it ] ≈
– 2-party CC ≤ 𝑂
𝑛 log 𝑛
π‘˜
1
π‘˜
[BEOPV’13] Lower Bound Outline
𝑛
π‘˜
𝑗
𝑋𝑖
DIS J 𝑛,π‘˜ =
𝑖=1 𝑗=1
1. Direct sum: DIS J 𝑛,π‘˜ ≥ 𝑛 ⋅ ANDπ‘˜
2. One-bit lower bound: ANDπ‘˜ ≥ Ω π‘˜
Reduction from DISJ to
graph connectivity [Based on WZ’13]
(Players)
𝑝1
𝑋𝑖
1
(Elements)
2
𝑝2
3
4
π‘π‘˜
input graph
connected
⇔
⋃𝑋𝑖 = 𝑛
⇔
⋂𝑋𝑖 = ∅
5
6
𝑛 βˆ– ⋃𝑋𝑖
Number-In-Hand Shared
Blackboard
Why Should We Care?
• Some fundamental question still open
• Natural model for distributed computing
– Single-hop wireless network
– More generally, abstracts away network topology
– Related to MapReduce, etc. [Hegeman and
Pemmaraju’14]
Example: NIH Multi-Party Disjointness
• Trivial upper bound: 𝑂 π‘›π‘˜
– Also easy to get 𝑂 𝑛 log 𝑛 + π‘˜
• Simultaneous CC: Ω π‘›π‘˜
[Braverman,Ellen,O.,Pitassi,Vaikuntanathan’13]
– In π‘Ÿ rounds?
– Looks like for π‘˜ = 𝑛, Ω
π‘Ÿ
1+1/2
𝑛
[current work with Ran Raz]
• Unbounded rounds: Θ π‘› log π‘˜
Braverman]
[with Mark
“Not-Quite Number in Hand”
• In undirected networks, each edge is known to
both endpoints
• Distributed graph property testing:
– Players 1, … , 𝑛, input graph 𝐺 = 𝑛 , 𝐸
– Input to player 𝑖: its neighbors in 𝐺
– Goal: test if 𝐺 satisfies property 𝑃
• Example: subgraph detection [Drucker, Kuhn, O. ‘14]
Example: Lower Bound for 𝐢5
• Claim: 𝑅-round algorithm for 𝐢5 detection ⇒
solve DISJ𝑛2 in 𝑂 𝑅 ⋅ 𝑛 ⋅ 𝐡 bits
• Reduction outline:
– Alice and Bob get inputs 𝑋, π‘Œ ⊆ 𝑛 × π‘›
– Construct input graph 𝐺 on 5𝑛 nodes, such that
𝐺 contains 𝐢5 ⇔ 𝑋 ∩ π‘Œ ≠ ∅
– Simulate the run of 𝐢5 -detection algorithm on 𝐺
Construction of 𝐺 from 𝑋, π‘Œ
1
1
2
2
3
3
4
4
1
1
2
2
3
3
4
4
Construction of 𝐺 from 𝑋, π‘Œ
1
1
2
2
3
3
4
4
Top-bottom:
π’Š, 𝒋 ∈ 𝑿
Bottom-top:
𝒋, π’Š ∈ 𝒀
1
1
2
2
3
3
4
4
Construction of 𝐺 from 𝑋, π‘Œ
1
1
2
2
3
3
4
4
𝟐, πŸ’ ∈ 𝑿 ∩ 𝒀
1
1
2
2
3
3
4
4
Simulating the Algorithm
• Alice simulates 3𝑛 nodes, Bob simulates 2𝑛
• To simulate one round, each player:
– Locally computes message broadcast by each
node it simulates
– Sends all messages to the other player
– Cost: 𝑂 𝑛 ⋅ 𝐡 per round
• Total cost: 𝑂 𝑅𝑛𝐡
⇒𝑅=Ω
𝑛
𝐡
What About 𝐢4 ?
• More complicated….
Can contain 𝐢4 regardless of 𝑋
Solution: use
extremal 𝐢4 -free
graph 𝐹
Elements of DISJ
= edges of 𝐹
Upper Bound on Subgraph Detection
• Turán number: 𝑒π‘₯ 𝐻, 𝑛 = max # edges in 𝐻free graph on 𝑛 vertices
• Upper bound: solve 𝐻-subgraph detection in
𝑂
𝑒π‘₯ 𝐻,𝑛
𝑛𝐡
rounds
– Example: 𝑒π‘₯ 𝐢5 , 𝑛 = 𝑛2 /4, nearly tight
– Open problem: is this tight for all subgraphs?
Detecting Triangles
• Trivial upper bound: 𝑂
𝑛
𝐡
rounds
• Lower bound?
– 2-party (black box) reduction cannot prove it
– For each triangle, one player knows all 3 edges
Triangles to 3-Party NOF Disjointness
• [Ruzsa and Szemerédi ’76]: there is a tripartite
graph 𝐺 = (𝐴 ∪ 𝐡 ∪ 𝐢, 𝐸) where
– 𝐴 = 𝐡 = 𝑛, 𝐢 = 𝑛/2
– 𝐺 contains T = 𝑛2 /𝑒 𝑂 log 𝑛 triangles
– Each edge in 𝐸 belongs to exactly one triangle
• Reduce from 3-party NOF Disjointness on 𝑇
elements, each representing one triangle in 𝐺
Triangles to 3-Party NOF Disjointness
• Input: sets of triangles 𝑋, π‘Œ, 𝑍 ⊆ 𝑇
𝑍
• Let 𝑑(𝑒) be the unique triangle
edge 𝑒 belongs to
• Construct 𝐺 ′ ⊆ 𝐺, including:
𝐢
– 𝑒 ∈ 𝐴 × π΅ iff 𝑑 𝑒 ∈ 𝑍
– 𝑒 ∈ 𝐡 × πΆ iff 𝑑 𝑒 ∈ X
– 𝑒 ∈ 𝐴 × πΆ iff 𝑑 𝑒 ∈ π‘Œ
• Note: endpoints of each
edge agree on its inclusion!
𝑋
π‘Œ
𝐴
𝐡
Triangles to 3-Party NOF Disjointness
• Input: sets of triangles 𝑋, π‘Œ, 𝑍 ⊆ 𝑇
• Triangle appears in 𝐺 ′ ⇔ 𝑋 ∩ π‘Œ ∩ 𝑍 ≠ ∅
• Cost of simulation:
𝑍
𝐢
𝑋
– 𝑂(𝑛𝐡) bits per round
⇒ Round complexity of triangle detection
≥ 𝐢𝐢(DIS J 𝑇 )/(𝑛𝐡) for 3-party NOF
π‘Œ
𝐴
𝐡
3-Party NOF Disjointness
• Randomized CC:
– Sherstov’13: Ω
– We get nothing:
#elements
𝑇
𝑛𝑏
<1
• Deterministic CC:
– Rao and Yehudayoff’14: Ω #elements
⇒Ω
𝑛
𝐡⋅𝑒 𝑂
detection
log 𝑛
for deterministic triangle
Conclusion
#rounds
total CC
LOCAL
SHARED BLACKBOARD
CONGEST
MESSAGE-PASSING
Directions for Future Research
• Exploiting asynchrony and faults to get
stronger communication lower bounds
Example 1: Dynamic Networks
• Abstract model for dynamic networks:
– In each round π‘Ÿ we get a different graph 𝐺 π‘Ÿ
• [Kuhn, Lynch, O. ‘10]:
– Assume each 𝐺 π‘Ÿ is connected
– Any function can be deterministically computed in
𝑂 𝑛2 rounds using 𝑂 log 𝑛 -bit messages
– Lower bounds?
Example 1: Dynamic Networks
• For exchanging all inputs:
– Determistic, “routing-based” algorithms: Ω
[Haeupler, Kuhn’12]
– Randomized??
– Non-routing based??
𝑛2
log 𝑛
Example 2: Byzantine Consensus
• 𝑛 processes, synchronous message-passing
• Each process receives a bit
• Goal:
– Everyone outputs the same bit
– If everyone received 𝑏, the output is 𝑏
𝑛
3
• Byzantine faults: up to − πœ– processes may
behave arbitrarily
Example 2: Byzantine Consensus
• [King, Saia ‘10]: can solve with 𝑂(𝑛3/2 ) total
bits
• No general lower bound better than ٠𝑛
Download