2018
DOI: 10.1016/j.jpdc.2018.02.007
|View full text |Cite
|
Sign up to set email alerts
|

A self-stabilizing memory efficient algorithm for the minimum diameter spanning tree under an omnipotent daemon

Abstract: Routing protocols are at the core of distributed systems performances, especially in the presence of faults. A classical approach to this problem is to build a spanning tree of the distributed system. Numerous spanning tree construction algorithms depending on the optimized metric exist (total weight, height, distance with respect to a particular process,. . .) both in fault-free and faulty environments. In this paper, we aim at optimizing the diameter of the spanning tree by constructing a minimum diameter sp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…On the other hand, growing and merging trees is the main technique for designing self-stabilizing leader election algorithms in networks, as the leader is often the root of an inward tree [3,4,2,9]. To the best of our knowledge, all algorithms that do not assume a pre-existing leader [3,4,2,8] for tree-construction use Ωplog nq bits per node. This high space-complexity is due to the implementation of two main techniques, used by all algorithms, and recalled below.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, growing and merging trees is the main technique for designing self-stabilizing leader election algorithms in networks, as the leader is often the root of an inward tree [3,4,2,9]. To the best of our knowledge, all algorithms that do not assume a pre-existing leader [3,4,2,8] for tree-construction use Ωplog nq bits per node. This high space-complexity is due to the implementation of two main techniques, used by all algorithms, and recalled below.…”
Section: Introductionmentioning
confidence: 99%
“…To make the token visit all the nodes we need to build a spanning tree beforehand, and we make the token traverse the tree. We use the same spanning tree construction and token circulation as in [5], inspired by the tree algorithm of [8] and the token algorithm of [17]. Indeed, these algorithms ensure to stabilize to a token circulation on a spanning tree in O(n) rounds using only O(log n) bits under our settings.…”
Section: Mst Construction Algorithmmentioning
confidence: 99%
“…In S, this assumption makes the design of algorithms much more challenging, which often require the use of node identifiers or the construction of an underlying vertex coloring. Token circulation algorithms for S are proposed in [2,1,4]. All these algorithms work over tree topologies and use Θ(log n) bits of memory per node.…”
Section: Introductionmentioning
confidence: 99%