In distributed computing amnesic flooding is a stateless distributed flooding algorithm that can be implemented as a broadcast protocol in synchronous distributed networks without the need to store messages or flags between communication rounds.[1] The algorithm is simple:

When a node receives a message, it forwards it to all of its neighbours it did not receive the message from. To initiate a broadcast on a network, a node simply sends the message to all of its neighbours.

The algorithm has been shown to terminate when the message begins at any subset of the network nodes [1][2][3] or any sequence thereof.[4]

For a subset of the nodes of a graph , then the time until an amnesiac flood terminates when started from is known to obey the following bounds: if is -bipartite and if it is not, where is the eccentricity of and is the diameter.[1] A graph is -bipartite, if the quotient graph of with contracted to a single node is bipartite.[1] This termination time is optimal for -bipartite graphs and is asymptotically optimal for single node initialisation on non-bipartite graphs.

This termination is robust with respect to the loss of edges and nodes, however it fails with delays on edges or the addition of new edges.[1][2]

Variants of Amnesiac Flooding

edit

Since its introduction, several variants of and related problems to amnesiac flooding have been studied. For example, a modified variant requiring the initial set to retain their knowledge of this membership and the message for a single round, but always requiring   rounds has been proposed.[5]

A dynamic version of amnesiac flooding has been introduced [4] considering the case where there are multiple different messages in the system and where each node can only send one message per round. This has been shown to terminate in the partial send case (  sends an arbitrary message to its neighbours that didn't send it any message last round) and the ranked-full send case (  sends the highest ranked message   to all of its neighbours that did not send it   last round).[4] However, the unranked-full send (  sends an arbitrary message   to all of its neighbours that did not send it   last round) does not necessarily terminate without additional stored information (such as the diameter of the graph [6]).

References

edit
  1. ^ a b c d e Hussak, Walter; Trehan, Amitabh (2023-06-01). "Termination of amnesiac flooding". Distributed Computing. 36 (2): 193–207. doi:10.1007/s00446-023-00448-y. ISSN 1432-0452.
  2. ^ a b Hussak, Walter; Trehan, Amitabh (2020). "On the Termination of Flooding". In Paul, Christophe; Bläser, Markus (eds.). 37th International Symposium on Theoretical Aspects of Computer Science, STACS 2020, March 10-13, 2020, Montpellier, France. LIPIcs. Vol. 154. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. pp. 17:1–17:13. doi:10.4230/LIPICS.STACS.2020.17.
  3. ^ Turau, Volker (2021). "Amnesiac Flooding: Synchronous Stateless Information Dissemination". In Bureš, Tomáš; Dondi, Riccardo; Gamper, Johann; Guerrini, Giovanna; Jurdziński, Tomasz; Pahl, Claus; Sikora, Florian; Wong, Prudence W.H. (eds.). 47th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2021, Bolzano-Bozen, Italy, January 25–29, 2021, Proceedings. Lecture Notes in Computer Science. Vol. 12607. Cham: Springer International Publishing. pp. 59–73. doi:10.1007/978-3-030-67731-2_5. ISBN 978-3-030-67731-2. S2CID 231705141.
  4. ^ a b c Hussak, Walter; Trehan, Amitabh (2020-09-12), Terminating cases of flooding, arXiv:2009.05776
  5. ^ Turau, Volker (2020). "Stateless Information Dissemination Algorithms". In Richa, Andrea Werneck; Scheideler, Christian (eds.). Structural Information and Communication Complexity. Lecture Notes in Computer Science. Vol. 12156. Cham: Springer International Publishing. pp. 183–199. doi:10.1007/978-3-030-54921-3_11. ISBN 978-3-030-54921-3.
  6. ^ Bayramzadeh, Zahra; Kshemkalyani, Ajay D.; Molla, Anisur Rahaman; Sharma, Gokarna (2021). "Weak Amnesiac Flooding of Multiple Messages". In Echihabi, Karima; Meyer, Roland (eds.). Networked Systems: 9th International Conference, NETYS 2021, Virtual Event, May 19–21, 2021, Proceedings. Lecture Notes in Computer Science. Cham: Springer International Publishing. pp. 88–94. doi:10.1007/978-3-030-91014-3_6. ISBN 978-3-030-91014-3. S2CID 244818918.