On the Role of Mobility and Network Coding on Multi-Message Gossip in Random Geometric Graphs

On the Role of Mobility and Network Coding on Multi-Message Gossip in Random Geometric Graphs

On the Role of Mobility and Network Coding on Multi-message Gossip in Random Geometric Graphs Gang Wang∗, Zun Lin∗ and Jie Wuy ∗School of Electrical and Information Engineering, Beihang University Beijing, China, 100191 yDepartment of Computer and Information Sciences, Temple University Philadelphia, PA, USA Email: [email protected], [email protected], [email protected] Abstract—In this paper, the performance of network coding- in the network [6]. A novel analytical approach to analyze based gossip algorithms—i.e. algebraic gossip algorithms—is the algebraic gossip algorithm based on Queuing Theory was analyzed on random geometric graphs under static and mobile proposed, which the convergence time in any graph for all-to- environments. The lower bounds for the convergence time of algebraic gossip algorithms are derived based on the conductance, all communications was bounded by O(n∆) rounds [7]. and these bounds are O(n log n log "−1 − log n log "−1) with Node mobility offers many opportunities for improving cer- 3=2 1=2 −1 node mobility and O (n −n ) log " without node mobility. tain aspects of a network’s performance, such as its capacity. log1=2 n Theoretical results show that algebraic gossip algorithms with Sarwate et al. showed that node mobility could further reduce 1=2 node mobility converge O n more quickly than without the convergence time for disseminating the information from log3=2 n node mobility, and O(log n) more quickly than a gossip algorithm randomized gossip [8]. [9] analyzed the influence of different with node mobility but without network coding. Finally, we assess mobility models on random gossip algorithms for single- and compare the convergence time of various gossip algorithms, message dissemination. A simple two-stage dissemination with both mobility and network coding. As corroborated by strategy that alternates between message flooding and random extensive numerical experimentation, integrated network coding gossip was proposed for mobile ad-hoc networks in [10], with mobility can significantly improve the convergence time of information dissemination in dynamic environments. and the convergence time of their algorithm was analyzed Index Terms—Network Coding, Algebraic Gossip, Mobility, under velocity-constrained mobility models. Their proposed Conductance, Random Geometric Graph. algorithm can approach the optimal bound within O(log n) rounds in terms of the convergence time, provided that the I. INTRODUCTION velocity is at least v = log n=k, where k is the number of With the increasing demand for sharing distributed in- users intending to share a unique message with others. formation on large-scale communication networks, efficient The above results show that both network coding and information dissemination in large dynamic networks has node mobility can reduce convergence time. However, it is emerged as an important research field. A random gossip still unclear whether integrating network coding with node algorithm is a simple and efficient algorithm for disseminating mobility will further improve the convergence time of gossip information over a wide range of distributed applications with algorithms. Wang et al. conducted a theoretical analysis on the the advantage of scalability, robustness, and effectiveness [1]. performance of multi-message algebraic gossip algorithms on Because network coding has many advantages in terms random geometric graphs (RGG) [11]. of improving the network performance [2], Deb et al. de- In this paper, we analyze the effect of network coding veloped an algebraic gossip algorithm by integrating gossip and mobility on gossip algorithms on random geometric with network coding, rather than a naive store-and-forward graphs. We assume that the nodes move in a decentralized mechanism, in order to rapidly disseminate all of the messages and distributed manner. During every timeslot, each node among all nodes [3]. The further generalized result was communicates with a neighbouring node that is randomly developed for an arbitrary graph in [4]. The performance of a chosen by an exchange algorithm. Regardless of whether uniform algebraic gossip algorithm was analyzed in [5] based network coding and node mobility are considered, we analyze on Projection Analysis method. Vasudevan et al. derived the four gossip algorithms: the Mobile Algebraic Gossip (MAG) uniform bound of the convergence time of algebraic gossip algorithm, the Static Algebraic Gossip (SAG) algorithm, the for an arbitrary graph, with an expected stopping time of Mobile Gossip (MG) algorithm, and the Static Gossip (SG) O(nlog2n) rounds, where n denotes the number of nodes algorithm. Based on the concept of k-conductance and mo- bile k-conductance in graph theory, we uniformly derive the • Exchange: A message is transmitted from Node A to bounds for the convergence time of these gossip algorithms Node B and, at the same time, another message is in random geometric graphs, which is a basic and important transmitted from Node B to Node A. topology for representing mobile networks. Our results show At timeslot t, the adjacency matrix A(t) of an RGG is that when both network coding and node mobility are jointly defined as follows: Auv(t) = 1, for u 6= v, if nodes u and utilized, the bounds for the convergence time can be improved v are neighbours; otherwise A (t) = 0. Let N (t) = fv 2 1=2 uv u O( n ) by a magnitude of log3=2 n compared to when only network f1; 2; : : : ; ng : Auv(t) 6= 0g to denote the set of neighbouring coding is used, and by a magnitude of O(log n) compared to nodes of node u, and du(t) = jNu(t)j to denote the degree when only node mobility is considered. The extensive numer- of node u, i.e. the number of its neighbouring nodes. The ical results confirm the theoretical results, which means that definition for the transitional probability matrix of the nodes integrating network coding with node mobility in information is given by [13]: dissemination improves the performance significantly. 8 1 2 if v = u The remainder of the paper is organized as follows. In < 1 Puv = 2d if v 2 Nu (1) Section II, we introduce the network model, algorithm, and : 0 otherwise protocols. Our main theoretical results and the essential proofs are provided in Section III, as well as the simulation results where Nu is the set of nodes neighbouring u. When node v and a detailed analysis of other algorithms. Finally, conclu- neighbours node u, Equation (1) ensures that the neighbours sions are drawn in Section V. are selected randomly and uniformly. B. Mobile Algebraic Gossip Algorithm II. MODEL AND PROTOCOL A mobile algebraic gossip algorithm was proposed in [11], A. Network Model and its information-dissemination process is described in Al- Consider a random geometric graph consisting of n nodes, gorithm 1. Here, Ei(t) represents the positional information denoted by the set of V = f1; 2; : : : ; ng [12]. The n nodes for node i at timeslot t, and Pij(t) denotes the transitional are distributed independently and uniformly at random in the probability between nodes i and j at timeslot t. Moreover, l l-dimensional space R . Two nodes (u; v) are connected if and Ai(t) is the random linear network-coded coefficient matrix only if the distance between them is less than or equal to a used by node i in timeslot t, and S(t) denotes the set of threshold r, i.e. d(u; v) ≤ r, where r is the threshold for this messages that node i has at timeslot t. transmission radius. The probability of connection between the nodes clearly depends on their Euclidean distance. Algorithm 1 Mobile Algebraic Gossip Algorithm Each message is represented by a r-dimensional vector with 1: Suppose that during the t-th timeslot, node i is assigned elements from the finite field Fq of size q. All the additions and to disseminate its message, its location Ei(t), its encoded the multiplications in the following description are assumed coefficient matrix Ai(t), and its message set S(t). to be over Fq. We divide the time into timeslots. Initially, at 2: Node i moves to the next location Ei(t+1) according to a timeslot t = 0, each node has only one message indexed by mobility model at the (t+1)-th timeslot. It then randomly the elements in the set M = fm1; m2; : : : ; mng, and node i chooses one of its neighbours j 2 N(i) and computes the stores the message mi, i = 1; 2; ··· ; n. transitional probability Pij(t + 1). Finally, it updates its We assume that each node in the network intends to transitional probability from Pij(t) to Pij(t + 1). disseminate its message to all other nodes in the network. 3: Node i generates random coded coefficients in a finite field In gossip algorithms, a round is defined as the length of time G(p). Here, p is a prime number that is used to encode all during which nodes exchange their messages with each other. of the node’s own messages into a coded message, before Assume that the overall time is divided into a number of sending it to node j. Meanwhile, node j finishes its coding rounds, and one round is divided into n consecutive timeslots. operation and sends its coded message to node i. In a timeslot, only one node can be scheduled to spread its 4: Node i updates its encoded coefficient matrix Ai(t + 1) message to one of its neighbouring nodes, which is selected and its message set S(t + 1) in the same way as node j. randomly and independently with a probability of p = 1=d, 5: Steps 1–4 are repeated. where d denotes the node’s degree. Three types of gossip algorithms (viz.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us