Transcript Oshman
The Role of Communication Complexity in Distributed Computing Rotem Oshman Background: Distributed Computing Distributed Computing • Typical model: – Local computation for free – Charge for “communication” Distributed Lower Bounds • “All or nothing”: – If 𝑝, 𝑞 have not communicated, they know nothing about each other – If 𝑝, 𝑞 communicated, they know everything about each other • Recently: interest in quantifying the amount of communication • Natural to use communication complexity Shared Memory • Processes communicate by accessing objects in shared memory – Read/write registers – Read-modify-write: CAS, T&S, … • Typically asynchronous: – Schedule = sequence of process IDs – Adversarially chosen – Sometimes processes may crash Shared Memory Lower Bounds • “Covering arguments” • Examples: – Deterministic consensus impossible if one process may fail [FLP’79] – Mutual exclusion requires 𝑛 shared registers [BL’90] • Can we introduce a cell-probe-like model for shared memory lower bounds? Message Passing • Processes communicate by sending messages – Over some network graph, often complete • Fully synchronous, fully asynchronous, or anywhere in between • Processes can crash, recover, cheat, lie,… • Many successful applications of CC Some differences… Distributed Computing Complexity #rounds (limited bandwidth) measure Comm. Complexity total #bits Problems Search Decision Input Number-In-Hand Number-onForehead (usually) Message-Passing Models #rounds total CC LOCAL SHARED BLACKBOARD CONGEST MESSAGE-PASSING Talk Overview I. Lower bound techniques a. CONGEST (#rounds): reductions from 2-party communication complexity b. Total CC with private channels II. Shared blackboard a. Number-in-hand b. “Not-quite-number-in-hand” The CONGEST Model • 𝑛 nodes communicate over a network graph (small diameter) • Computation proceeds in synchronous rounds • Each message = 𝐵 bits • Several variants: – Communication by unicast vs. local broadcast – Arbitrary graph vs. complete graph The CONGEST Model • Arbitrary graph topology: strong lower bounds – [Distributed Verification and Hardness of Distributed Approximation, by Das Sarma, Holzer, Kor, Korman, Nanongkai, Pandurangan, Peleg, Wattenhofer] • Nearly-tight lower bound on MST approximation • Non-tight lower bounds on all-pairs shortest path, minimum cut, shortest s-t path, … • Almost all lower bounds ≤ Ω 𝑛/𝐵 – Very few Ω 𝑛/𝐵 bounds known, no super-linear bounds The CONGEST Model • Complete graph topology, unicast: – Known to be extremely powerful, e.g., • Sort 𝑛2 values in 𝑂 log log 𝑛 rounds • MST construction in 𝑂 log ∗ 𝑛 rounds – No explicit super-constant lower bound known – [Drucker, Kuhn, O. ‘14]: even slightly superconstant lower bound ⇒ new ACC lower bound • Complete graph topology, broadcast = shared blackboard CONGEST Lower Bounds for Arbitrary Graphs … by reduction from 2-party disjointness 2-Party Reductions • Textbook reduction [Kushilevitz Nisan]: Given algorithm 𝐴 for solving task 𝑇… 𝑋 𝑌 Simulate 𝐴 Based on 𝑋 𝑛 bits Based on 𝑌 Solution for 𝑇 ⇨ answer for, e.g., Disjointness 2-Party Reductions • More generally: Given algorithm 𝐴 for solving task 𝑇… 𝑌 𝑋 Based on 𝑋 Based on 𝑌 Solution for 𝑇 ⇨ answer for, e.g., Disjointness Multi-Player NIH Communication with Private Channels The Message-Passing Model • • • • 𝑘 players Private channels Private 𝑛-bit inputs 𝑋1 , … , 𝑋𝑘 Private randomness • Goal: compute 𝑓 𝑋1 , … , 𝑋𝑘 • Cost: total communication The Coordinator Model • 𝑘 players, one coordinator • The coordinator has no input Message-Passing vs. Coordinator ≈ Secure multi-party computation! Message-Passing Lower Bounds For 𝑘 players with 𝑛-bit inputs… • Woodruff, Zhang ‘12: 𝐹𝑝 estimation • Phillips, Verbin, Zhang ’12: – Ω 𝑘𝑛 for bitwise problems (AND/OR, MAJ, …) • Woodruff, Zhang ‘13: – Ω 𝑘𝑛 for threshold and graph problems • Braverman, Ellen, O., Pitassi, Vaikuntanathan ‘13: Ω 𝑘𝑛 for disjointness Symmetrization [Phillips, Verbin, Zhang ’12] Lower bound for 𝑘-player problem 𝑃𝑘 : • Choose hard 2-player problem 𝑃2 • Fix hard distribution 𝜇2 for 𝑃2 , let 𝑋, 𝑌 ∼ 𝜇2 Bob: 𝑌 “Smear” 𝑌 across 𝑘 − 1 players Alice: 𝑋 Symmetrization [Phillips, Verbin, Zhang ’12] Lower bound for 𝑘-player problem 𝑃𝑘 : Bob: 𝑌 “Smear” 𝑌 across 𝑘 − 1 players Alice: 𝑋 – 𝑘-player distribution must be symmetric – Answer to 𝑃𝑘 ⇒ answer to 𝑃2 2 𝑘 𝔼[ cost for 𝑃2 ] = ⋅ cost for 𝑃𝑘 Symmetrization Example: Bitwise-XOR • 2-party problem: – Input: uniform independent 𝑋, 𝑌 ∈ 0,1 – Goal: Alice outputs Bob’s input, 𝑌 𝑛 • Reduction: – Sample uniform 𝑖 ∈ 𝑘 , Alice sets 𝑋𝑖 = 𝑋 – Bob chooses 𝑋−𝑖 uniformly s.t. ⊕𝑗≠𝑖 𝑋𝑗 = 𝑌 – From ⊕𝑘ℓ=1 𝑋ℓ , Alice can reconstruct 𝑌 Bob: 𝑌 Alice: 𝑋 Set Disjointness 𝑋2 𝑋1 𝑋3 ? 𝑋5 𝑋4 𝑛 𝑘 𝑗 𝑋𝑖 DIS J 𝑛,𝑘 = 𝑖=1 𝑗=1 Symmetrization vs. Disjointness • Consider any symmetric distribution… Bob: 𝑌 Alice: 𝑋 • How many 0s in coord. 𝑗, given 𝑗 𝑘 𝑖=1 𝑋𝑖 = 0? – More than one ⇒ Bob probably sees a zero • Ignore this coordinate – Only one ⇒ Pr[ Alice got it ] ≈ – 2-party CC ≤ 𝑂 𝑛 log 𝑛 𝑘 1 𝑘 [BEOPV’13] Lower Bound Outline 𝑛 𝑘 𝑗 𝑋𝑖 DIS J 𝑛,𝑘 = 𝑖=1 𝑗=1 1. Direct sum: DIS J 𝑛,𝑘 ≥ 𝑛 ⋅ AND𝑘 2. One-bit lower bound: AND𝑘 ≥ Ω 𝑘 Reduction from DISJ to graph connectivity [Based on WZ’13] (Players) 𝑝1 𝑋𝑖 1 (Elements) 2 𝑝2 3 4 𝑝𝑘 input graph connected ⇔ ⋃𝑋𝑖 = 𝑛 ⇔ ⋂𝑋𝑖 = ∅ 5 6 𝑛 ∖ ⋃𝑋𝑖 Number-In-Hand Shared Blackboard Why Should We Care? • Some fundamental question still open • Natural model for distributed computing – Single-hop wireless network – More generally, abstracts away network topology – Related to MapReduce, etc. [Hegeman and Pemmaraju’14] Example: NIH Multi-Party Disjointness • Trivial upper bound: 𝑂 𝑛𝑘 – Also easy to get 𝑂 𝑛 log 𝑛 + 𝑘 • Simultaneous CC: Ω 𝑛𝑘 [Braverman,Ellen,O.,Pitassi,Vaikuntanathan’13] – In 𝑟 rounds? – Looks like for 𝑘 = 𝑛, Ω 𝑟 1+1/2 𝑛 [current work with Ran Raz] • Unbounded rounds: Θ 𝑛 log 𝑘 Braverman] [with Mark “Not-Quite Number in Hand” • In undirected networks, each edge is known to both endpoints • Distributed graph property testing: – Players 1, … , 𝑛, input graph 𝐺 = 𝑛 , 𝐸 – Input to player 𝑖: its neighbors in 𝐺 – Goal: test if 𝐺 satisfies property 𝑃 • Example: subgraph detection [Drucker, Kuhn, O. ‘14] Example: Lower Bound for 𝐶5 • Claim: 𝑅-round algorithm for 𝐶5 detection ⇒ solve DISJ𝑛2 in 𝑂 𝑅 ⋅ 𝑛 ⋅ 𝐵 bits • Reduction outline: – Alice and Bob get inputs 𝑋, 𝑌 ⊆ 𝑛 × 𝑛 – Construct input graph 𝐺 on 5𝑛 nodes, such that 𝐺 contains 𝐶5 ⇔ 𝑋 ∩ 𝑌 ≠ ∅ – Simulate the run of 𝐶5 -detection algorithm on 𝐺 Construction of 𝐺 from 𝑋, 𝑌 1 1 2 2 3 3 4 4 1 1 2 2 3 3 4 4 Construction of 𝐺 from 𝑋, 𝑌 1 1 2 2 3 3 4 4 Top-bottom: 𝒊, 𝒋 ∈ 𝑿 Bottom-top: 𝒋, 𝒊 ∈ 𝒀 1 1 2 2 3 3 4 4 Construction of 𝐺 from 𝑋, 𝑌 1 1 2 2 3 3 4 4 𝟐, 𝟒 ∈ 𝑿 ∩ 𝒀 1 1 2 2 3 3 4 4 Simulating the Algorithm • Alice simulates 3𝑛 nodes, Bob simulates 2𝑛 • To simulate one round, each player: – Locally computes message broadcast by each node it simulates – Sends all messages to the other player – Cost: 𝑂 𝑛 ⋅ 𝐵 per round • Total cost: 𝑂 𝑅𝑛𝐵 ⇒𝑅=Ω 𝑛 𝐵 What About 𝐶4 ? • More complicated…. Can contain 𝐶4 regardless of 𝑋 Solution: use extremal 𝐶4 -free graph 𝐹 Elements of DISJ = edges of 𝐹 Upper Bound on Subgraph Detection • Turán number: 𝑒𝑥 𝐻, 𝑛 = max # edges in 𝐻free graph on 𝑛 vertices • Upper bound: solve 𝐻-subgraph detection in 𝑂 𝑒𝑥 𝐻,𝑛 𝑛𝐵 rounds – Example: 𝑒𝑥 𝐶5 , 𝑛 = 𝑛2 /4, nearly tight – Open problem: is this tight for all subgraphs? Detecting Triangles • Trivial upper bound: 𝑂 𝑛 𝐵 rounds • Lower bound? – 2-party (black box) reduction cannot prove it – For each triangle, one player knows all 3 edges Triangles to 3-Party NOF Disjointness • [Ruzsa and Szemerédi ’76]: there is a tripartite graph 𝐺 = (𝐴 ∪ 𝐵 ∪ 𝐶, 𝐸) where – 𝐴 = 𝐵 = 𝑛, 𝐶 = 𝑛/2 – 𝐺 contains T = 𝑛2 /𝑒 𝑂 log 𝑛 triangles – Each edge in 𝐸 belongs to exactly one triangle • Reduce from 3-party NOF Disjointness on 𝑇 elements, each representing one triangle in 𝐺 Triangles to 3-Party NOF Disjointness • Input: sets of triangles 𝑋, 𝑌, 𝑍 ⊆ 𝑇 𝑍 • Let 𝑡(𝑒) be the unique triangle edge 𝑒 belongs to • Construct 𝐺 ′ ⊆ 𝐺, including: 𝐶 – 𝑒 ∈ 𝐴 × 𝐵 iff 𝑡 𝑒 ∈ 𝑍 – 𝑒 ∈ 𝐵 × 𝐶 iff 𝑡 𝑒 ∈ X – 𝑒 ∈ 𝐴 × 𝐶 iff 𝑡 𝑒 ∈ 𝑌 • Note: endpoints of each edge agree on its inclusion! 𝑋 𝑌 𝐴 𝐵 Triangles to 3-Party NOF Disjointness • Input: sets of triangles 𝑋, 𝑌, 𝑍 ⊆ 𝑇 • Triangle appears in 𝐺 ′ ⇔ 𝑋 ∩ 𝑌 ∩ 𝑍 ≠ ∅ • Cost of simulation: 𝑍 𝐶 𝑋 – 𝑂(𝑛𝐵) bits per round ⇒ Round complexity of triangle detection ≥ 𝐶𝐶(DIS J 𝑇 )/(𝑛𝐵) for 3-party NOF 𝑌 𝐴 𝐵 3-Party NOF Disjointness • Randomized CC: – Sherstov’13: Ω – We get nothing: #elements 𝑇 𝑛𝑏 <1 • Deterministic CC: – Rao and Yehudayoff’14: Ω #elements ⇒Ω 𝑛 𝐵⋅𝑒 𝑂 detection log 𝑛 for deterministic triangle Conclusion #rounds total CC LOCAL SHARED BLACKBOARD CONGEST MESSAGE-PASSING Directions for Future Research • Exploiting asynchrony and faults to get stronger communication lower bounds Example 1: Dynamic Networks • Abstract model for dynamic networks: – In each round 𝑟 we get a different graph 𝐺 𝑟 • [Kuhn, Lynch, O. ‘10]: – Assume each 𝐺 𝑟 is connected – Any function can be deterministically computed in 𝑂 𝑛2 rounds using 𝑂 log 𝑛 -bit messages – Lower bounds? Example 1: Dynamic Networks • For exchanging all inputs: – Determistic, “routing-based” algorithms: Ω [Haeupler, Kuhn’12] – Randomized?? – Non-routing based?? 𝑛2 log 𝑛 Example 2: Byzantine Consensus • 𝑛 processes, synchronous message-passing • Each process receives a bit • Goal: – Everyone outputs the same bit – If everyone received 𝑏, the output is 𝑏 𝑛 3 • Byzantine faults: up to − 𝜖 processes may behave arbitrarily Example 2: Byzantine Consensus • [King, Saia ‘10]: can solve with 𝑂(𝑛3/2 ) total bits • No general lower bound better than Ω 𝑛