The Role of Communication Complexity in Distributed Computing Rotem Oshman Background: Distributed Computing Distributed Computing • Typical model: – Local computation for free – Charge for “communication” Distributed Lower Bounds • “All or nothing”: – If π, π have not communicated, they know nothing about each other – If π, π communicated, they know everything about each other • Recently: interest in quantifying the amount of communication • Natural to use communication complexity Shared Memory • Processes communicate by accessing objects in shared memory – Read/write registers – Read-modify-write: CAS, T&S, … • Typically asynchronous: – Schedule = sequence of process IDs – Adversarially chosen – Sometimes processes may crash Shared Memory Lower Bounds • “Covering arguments” • Examples: – Deterministic consensus impossible if one process may fail [FLP’79] – Mutual exclusion requires π shared registers [BL’90] • Can we introduce a cell-probe-like model for shared memory lower bounds? Message Passing • Processes communicate by sending messages – Over some network graph, often complete • Fully synchronous, fully asynchronous, or anywhere in between • Processes can crash, recover, cheat, lie,… • Many successful applications of CC Some differences… Distributed Computing Complexity #rounds (limited bandwidth) measure Comm. Complexity total #bits Problems Search Decision Input Number-In-Hand Number-onForehead (usually) Message-Passing Models #rounds total CC LOCAL SHARED BLACKBOARD CONGEST MESSAGE-PASSING Talk Overview I. Lower bound techniques a. CONGEST (#rounds): reductions from 2-party communication complexity b. Total CC with private channels II. Shared blackboard a. Number-in-hand b. “Not-quite-number-in-hand” The CONGEST Model • π nodes communicate over a network graph (small diameter) • Computation proceeds in synchronous rounds • Each message = π΅ bits • Several variants: – Communication by unicast vs. local broadcast – Arbitrary graph vs. complete graph The CONGEST Model • Arbitrary graph topology: strong lower bounds – [Distributed Verification and Hardness of Distributed Approximation, by Das Sarma, Holzer, Kor, Korman, Nanongkai, Pandurangan, Peleg, Wattenhofer] • Nearly-tight lower bound on MST approximation • Non-tight lower bounds on all-pairs shortest path, minimum cut, shortest s-t path, … • Almost all lower bounds ≤ Ω π/π΅ – Very few Ω π/π΅ bounds known, no super-linear bounds The CONGEST Model • Complete graph topology, unicast: – Known to be extremely powerful, e.g., • Sort π2 values in π log log π rounds • MST construction in π log ∗ π rounds – No explicit super-constant lower bound known – [Drucker, Kuhn, O. ‘14]: even slightly superconstant lower bound ⇒ new ACC lower bound • Complete graph topology, broadcast = shared blackboard CONGEST Lower Bounds for Arbitrary Graphs … by reduction from 2-party disjointness 2-Party Reductions • Textbook reduction [Kushilevitz Nisan]: Given algorithm π΄ for solving task π… π π Simulate π΄ Based on π π bits Based on π Solution for π β¨ answer for, e.g., Disjointness 2-Party Reductions • More generally: Given algorithm π΄ for solving task π… π π Based on π Based on π Solution for π β¨ answer for, e.g., Disjointness Multi-Player NIH Communication with Private Channels The Message-Passing Model • • • • π players Private channels Private π-bit inputs π1 , … , ππ Private randomness • Goal: compute π π1 , … , ππ • Cost: total communication The Coordinator Model • π players, one coordinator • The coordinator has no input Message-Passing vs. Coordinator ≈ Secure multi-party computation! Message-Passing Lower Bounds For π players with π-bit inputs… • Woodruff, Zhang ‘12: πΉπ estimation • Phillips, Verbin, Zhang ’12: – Ω ππ for bitwise problems (AND/OR, MAJ, …) • Woodruff, Zhang ‘13: – Ω ππ for threshold and graph problems • Braverman, Ellen, O., Pitassi, Vaikuntanathan ‘13: Ω ππ for disjointness Symmetrization [Phillips, Verbin, Zhang ’12] Lower bound for π-player problem ππ : • Choose hard 2-player problem π2 • Fix hard distribution π2 for π2 , let π, π ∼ π2 Bob: π “Smear” π across π − 1 players Alice: π Symmetrization [Phillips, Verbin, Zhang ’12] Lower bound for π-player problem ππ : Bob: π “Smear” π across π − 1 players Alice: π – π-player distribution must be symmetric – Answer to ππ ⇒ answer to π2 2 π πΌ[ cost for π2 ] = ⋅ cost for ππ Symmetrization Example: Bitwise-XOR • 2-party problem: – Input: uniform independent π, π ∈ 0,1 – Goal: Alice outputs Bob’s input, π π • Reduction: – Sample uniform π ∈ π , Alice sets ππ = π – Bob chooses π−π uniformly s.t. ⊕π≠π ππ = π – From ⊕πβ=1 πβ , Alice can reconstruct π Bob: π Alice: π Set Disjointness π2 π1 π3 ? π5 π4 π π π ππ DIS J π,π = π=1 π=1 Symmetrization vs. Disjointness • Consider any symmetric distribution… Bob: π Alice: π • How many 0s in coord. π, given π π π=1 ππ = 0? – More than one ⇒ Bob probably sees a zero • Ignore this coordinate – Only one ⇒ Pr[ Alice got it ] ≈ – 2-party CC ≤ π π log π π 1 π [BEOPV’13] Lower Bound Outline π π π ππ DIS J π,π = π=1 π=1 1. Direct sum: DIS J π,π ≥ π ⋅ ANDπ 2. One-bit lower bound: ANDπ ≥ Ω π Reduction from DISJ to graph connectivity [Based on WZ’13] (Players) π1 ππ 1 (Elements) 2 π2 3 4 ππ input graph connected ⇔ βππ = π ⇔ βππ = ∅ 5 6 π β βππ Number-In-Hand Shared Blackboard Why Should We Care? • Some fundamental question still open • Natural model for distributed computing – Single-hop wireless network – More generally, abstracts away network topology – Related to MapReduce, etc. [Hegeman and Pemmaraju’14] Example: NIH Multi-Party Disjointness • Trivial upper bound: π ππ – Also easy to get π π log π + π • Simultaneous CC: Ω ππ [Braverman,Ellen,O.,Pitassi,Vaikuntanathan’13] – In π rounds? – Looks like for π = π, Ω π 1+1/2 π [current work with Ran Raz] • Unbounded rounds: Θ π log π Braverman] [with Mark “Not-Quite Number in Hand” • In undirected networks, each edge is known to both endpoints • Distributed graph property testing: – Players 1, … , π, input graph πΊ = π , πΈ – Input to player π: its neighbors in πΊ – Goal: test if πΊ satisfies property π • Example: subgraph detection [Drucker, Kuhn, O. ‘14] Example: Lower Bound for πΆ5 • Claim: π -round algorithm for πΆ5 detection ⇒ solve DISJπ2 in π π ⋅ π ⋅ π΅ bits • Reduction outline: – Alice and Bob get inputs π, π ⊆ π × π – Construct input graph πΊ on 5π nodes, such that πΊ contains πΆ5 ⇔ π ∩ π ≠ ∅ – Simulate the run of πΆ5 -detection algorithm on πΊ Construction of πΊ from π, π 1 1 2 2 3 3 4 4 1 1 2 2 3 3 4 4 Construction of πΊ from π, π 1 1 2 2 3 3 4 4 Top-bottom: π, π ∈ πΏ Bottom-top: π, π ∈ π 1 1 2 2 3 3 4 4 Construction of πΊ from π, π 1 1 2 2 3 3 4 4 π, π ∈ πΏ ∩ π 1 1 2 2 3 3 4 4 Simulating the Algorithm • Alice simulates 3π nodes, Bob simulates 2π • To simulate one round, each player: – Locally computes message broadcast by each node it simulates – Sends all messages to the other player – Cost: π π ⋅ π΅ per round • Total cost: π π ππ΅ ⇒π =Ω π π΅ What About πΆ4 ? • More complicated…. Can contain πΆ4 regardless of π Solution: use extremal πΆ4 -free graph πΉ Elements of DISJ = edges of πΉ Upper Bound on Subgraph Detection • Turán number: ππ₯ π», π = max # edges in π»free graph on π vertices • Upper bound: solve π»-subgraph detection in π ππ₯ π»,π ππ΅ rounds – Example: ππ₯ πΆ5 , π = π2 /4, nearly tight – Open problem: is this tight for all subgraphs? Detecting Triangles • Trivial upper bound: π π π΅ rounds • Lower bound? – 2-party (black box) reduction cannot prove it – For each triangle, one player knows all 3 edges Triangles to 3-Party NOF Disjointness • [Ruzsa and Szemerédi ’76]: there is a tripartite graph πΊ = (π΄ ∪ π΅ ∪ πΆ, πΈ) where – π΄ = π΅ = π, πΆ = π/2 – πΊ contains T = π2 /π π log π triangles – Each edge in πΈ belongs to exactly one triangle • Reduce from 3-party NOF Disjointness on π elements, each representing one triangle in πΊ Triangles to 3-Party NOF Disjointness • Input: sets of triangles π, π, π ⊆ π π • Let π‘(π) be the unique triangle edge π belongs to • Construct πΊ ′ ⊆ πΊ, including: πΆ – π ∈ π΄ × π΅ iff π‘ π ∈ π – π ∈ π΅ × πΆ iff π‘ π ∈ X – π ∈ π΄ × πΆ iff π‘ π ∈ π • Note: endpoints of each edge agree on its inclusion! π π π΄ π΅ Triangles to 3-Party NOF Disjointness • Input: sets of triangles π, π, π ⊆ π • Triangle appears in πΊ ′ ⇔ π ∩ π ∩ π ≠ ∅ • Cost of simulation: π πΆ π – π(ππ΅) bits per round ⇒ Round complexity of triangle detection ≥ πΆπΆ(DIS J π )/(ππ΅) for 3-party NOF π π΄ π΅ 3-Party NOF Disjointness • Randomized CC: – Sherstov’13: Ω – We get nothing: #elements π ππ <1 • Deterministic CC: – Rao and Yehudayoff’14: Ω #elements ⇒Ω π π΅⋅π π detection log π for deterministic triangle Conclusion #rounds total CC LOCAL SHARED BLACKBOARD CONGEST MESSAGE-PASSING Directions for Future Research • Exploiting asynchrony and faults to get stronger communication lower bounds Example 1: Dynamic Networks • Abstract model for dynamic networks: – In each round π we get a different graph πΊ π • [Kuhn, Lynch, O. ‘10]: – Assume each πΊ π is connected – Any function can be deterministically computed in π π2 rounds using π log π -bit messages – Lower bounds? Example 1: Dynamic Networks • For exchanging all inputs: – Determistic, “routing-based” algorithms: Ω [Haeupler, Kuhn’12] – Randomized?? – Non-routing based?? π2 log π Example 2: Byzantine Consensus • π processes, synchronous message-passing • Each process receives a bit • Goal: – Everyone outputs the same bit – If everyone received π, the output is π π 3 • Byzantine faults: up to − π processes may behave arbitrarily Example 2: Byzantine Consensus • [King, Saia ‘10]: can solve with π(π3/2 ) total bits • No general lower bound better than Ω π