Skip to main content

How Much Memory Is Needed for Leader Election

  • Conference paper
Distributed Computing (DISC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6343))

Included in the following conference series:

Abstract

We study the minimum memory size with which nodes of a network have to be equipped, in order to solve deterministically the leader election problem. Nodes are unlabeled, but ports at each node have arbitrary fixed labelings which, together with the topology of the network, can create asymmetries to be exploited in leader election. We consider two versions of the leader election problem: strong LE in which exactly one leader has to be elected, if this is possible, while all nodes must terminate in a state “infeasible” otherwise, and weak LE, which differs from strong LE in that no requirement on the behavior of nodes is imposed, if leader election is impossible. Nodes are modeled as identical automata and we ask what is the minimum amount of memory of such an automaton to enable leader election.

We show that logarithmic memory is optimal for leader election in the class of arbitrary connected graphs. Weak LE can be achieved with O(logn) bits of memory for all connected graphs with at most n nodes and strong LE can be achieved with O(logn) bits of memory for all connected graphs with exactly n nodes (none of these assumptions can be entirely removed). On the other hand, we show that Ω(logn) bits of memory are necessary to enable leader election even for the class of rings. By contrast we show that strong LE can be accomplished in the class of trees of maximum degree Δ using only O(loglogΔ) bits of memory, without any additional information. This proves an exponential gap in memory requirements for leader election between the class of trees and the class of arbitrary graphs. Moreover, we prove that no automaton can solve the leader election problem for all trees, even in the weak form.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Attiya, H., Snir, M., Warmuth, M.: Computing on an Anonymous Ring. Journal of the ACM 35, 845–875 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  2. Attiya, H., Snir, M.: Better Computing on the Anonymous Ring. Journal of Algorithms 12, 204–238 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  3. Boldi, P., Vigna, S.: Computing anonymously with arbitrary knowledge. In: Proc. 18th ACM Symp. on Principles of Distributed Computing, pp. 181–188 (1999)

    Google Scholar 

  4. Burns, J.E.: A formal model for message passing systems, Tech. Report TR-91, Computer Science Department, Indiana University, Bloomington (September 1980)

    Google Scholar 

  5. Codenotti, B., Gemmell, P., Simon, J.: Symmetry breaking in anonymous networks: characterizations. In: Proc. 4th Israel Symposium on Theory of Computing and Systems ISTCS, pp. 16–26 (1996)

    Google Scholar 

  6. Cook, S.A., Rackoff, C.: Space Lower Bounds for Maze Threadability on Restricted Machines. SIAM J. Comput. 9, 636–652 (1980)

    Article  MATH  MathSciNet  Google Scholar 

  7. Czyzowicz, J., Kosowski, A., Pelc, A.: How to meet when you forget: Log-space rendezvous in arbitrary graphs, Proc. 29th ACM Symp. on Principles of Distributed Comp. PODC 2010 (2010)

    Google Scholar 

  8. Diks, K., Kranakis, E., Malinowski, A., Pelc, A.: Anonymous wireless rings. Theoretical Computer Science 145, 95–109 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  9. Dobrev, S., Pelc, A.: Leader election in rings with nonunique labels. Fundamenta Informaticae 59, 333–347 (2004)

    MATH  MathSciNet  Google Scholar 

  10. Flocchini, P., Kranakis, E., Krizanc, D., Luccio, F.L., Santoro, N.: Sorting Multisets in Anonymous Rings. In: Proc. of the IEEE International Parallel and Distributed Processing Symposium IPDPS, Cancun, Mexico, pp. 275–280 (2000)

    Google Scholar 

  11. Fraigniaud, P., Gavoille, C.: Routing in Trees. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 757–772. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Fraigniaud, P., Gavoille, C.: A Space Lower Bound for Routing in Trees. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, pp. 65–75. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Fraigniaud, P., Ilcinkas, D.: Digraphs Exploration with Little Memory. In: Diekert, V., Habib, M. (eds.) STACS 2004. LNCS, vol. 2996, pp. 246–257. Springer, Heidelberg (2004)

    Google Scholar 

  14. Fraigniaud, P., Pelc, A.: Deterministic rendezvous in trees with little memory. In: Taubenfeld, G. (ed.) DISC 2008. LNCS, vol. 5218, pp. 242–256. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Fraigniaud, P., Pelc, A.: Delays induce an exponential memory gap for rendezvous in trees. In: Proc. 22nd Ann. ACM Symposium on Parallel Algorithms and Architectures, SPAA 2010 (2010)

    Google Scholar 

  16. Fredrickson, G.N., Lynch, N.A.: Electing a leader in a synchronous ring. Journal of the ACM 34, 98–115 (1987)

    Article  Google Scholar 

  17. Haddar, M.A., Kacem, A.H., Métivier, Y., Mosbah, M., Jmaiel, M.: Electing a leader in the local computation model using mobile agents. In: Proc. 6th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2008, pp. 473–480 (2008)

    Google Scholar 

  18. Hirschberg, D.S., Sinclair, J.B.: Decentralized extrema-finding in circular configurations of processes. Communications of the ACM 23, 627–628 (1980)

    Article  MATH  MathSciNet  Google Scholar 

  19. Jurdzinski, T., Kutylowski, M., Zatopianski, J.: Efficient algorithms for leader election in radio networks. In: Proc., 21st ACM Symp. on Principles of Distr. Comp. (PODC 2002), pp. 51–57 (2002)

    Google Scholar 

  20. Kouckỳ, M.: Universal Traversal Sequences with Backtracking. J. Comput. Syst. Sci. 65, 717–726 (2002)

    Article  Google Scholar 

  21. Kowalski, D., Pelc, A.: Leader election in ad hoc radio networks: a keen ear helps. In: Albers, S., Marchetti-Spaccamela, A., Matias, Y., Nikoletseas, S., Thomas, W. (eds.) ICALP 2009. LNCS, vol. 5556, pp. 521–533. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  22. Kranakis, E.: Symmetry and Computability in Anonymous Networks: A Brief Survey. In: Proc. 3rd Int. Conf. on Structural Information and Communication Complexity, pp. 1–16 (1997)

    Google Scholar 

  23. Kranakis, E., Krizanc, D., van der Berg, J.: Computing Boolean Functions on Anonymous Networks. Information and Computation 114, 214–236 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  24. Kranakis, E., Krizanc, D., Morin, P.: Randomized Rendez-Vous with Limited Memory. In: Laber, E.S., Bornstein, C., Nogueira, L.T., Faria, L. (eds.) LATIN 2008. LNCS, vol. 4957, pp. 605–616. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  25. LeLann, G.: Distributed systems: Towards a formal approach. In: Gilchrist, B. (ed.) Information processing’77, pp. 155–160. North Holland, Amsterdam (1977)

    Google Scholar 

  26. Lindell, S.: A logspace algorithm for tree canonization. In: Proc. 24th ACM Symposium on Theory of Computing (STOC 1992), pp. 400–404 (1992)

    Google Scholar 

  27. Nakano, K., Olariu, S.: Uniform leader election protocols for radio networks. IEEE Transactions on Parallel Distributed Systems 13, 516–526 (2002)

    Article  Google Scholar 

  28. Norris, N.: Universal Covers of Graphs: Isomorphism to Depth N − 1 Implies Isomorphism to All Depths. Discrete Applied Mathematics 56(1), 61–74 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  29. Peterson, G.L.: An O(n logn) unidirectional distributed algorithm for the circular extrema problem. ACM Transactions on Programming Languages and Systems 4, 758–762 (1982)

    Article  MATH  Google Scholar 

  30. Reingold, O.: Undirected connectivity in log-space. Journal of the ACM 55, 1–24 (2008)

    Article  MathSciNet  Google Scholar 

  31. Sakamoto, N.: Comparison of Initial Conditions for Distributed Algorithms on Anonymous Networks. In: Proc. 18th ACM Symp. on Principles of Distributed Computing (PODC 1999), pp. 173–179 (1999)

    Google Scholar 

  32. Willard, D.E.: Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. on Computing 15, 468–477 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  33. Yamashita, M., Kameda, T.: Computing on anonymous networks. In: Proc. 7th ACM Symp. on Principles of Distributed Computing (PODC 1988), pp. 117–130 (1988)

    Google Scholar 

  34. Yamashita, M., Kameda, T.: Electing a leader when procesor identity numbers are not distinct. In: Bermond, J.-C., Raynal, M. (eds.) WDAG 1989. LNCS, vol. 392, pp. 303–314. Springer, Heidelberg (1989)

    Google Scholar 

  35. Yamashita, M., Kameda, T.: Computing on anonymous networks: Part I - characterizing the solvable cases. IEEE Trans. Parallel and Distributed Systems 7, 69–89 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fusco, E.G., Pelc, A. (2010). How Much Memory Is Needed for Leader Election. In: Lynch, N.A., Shvartsman, A.A. (eds) Distributed Computing. DISC 2010. Lecture Notes in Computer Science, vol 6343. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15763-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15763-9_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15762-2

  • Online ISBN: 978-3-642-15763-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics