Local versus Global Search in Channel Graphs

Previous studies of search in channel graphs has assumed that the search is global; that is, that the status of any link can be probed by the search algorithm at any time. We consider for the first time local search, for which only links to which an …

Authors: A. H. Hunter, Nicholas Pippenger

A channel graph is an acyclic directed graph G = (V, E), with vertices V and edges E, in which there exist a source vertex s ∈ V and a target vertex t ∈ V such that every vertex lies on a directed path from s to t. (Such a source and target, if they exist, are clearly unique.) The vertices other than the source and target are called links. A state of a channel graph is an assignment of a status (busy or idle) to each link of the graph. We shall extend such an assignment to all vertices by agreeing that the source and target are always idle. We shall deal in this paper with a particular probability distribution on the states of a channel graph. We choose a real number q, in the range 0 ≤ q ≤ 1, which we call the vacancy probability; its complement p = 1 -q is called the occupancy probability. We then define a random state of a channel graph to be one in which each link is independently idle with probability q (and thus busy with probability p). This probability distribution on states was introduced independently by Lee [L1] and Le Gall [L2, L3]. We shall say that a channel graph is linked in a given state if there exists a directed path from the source to the target consisting entirely of idle links. We shall say that a channel graph is blocked in a given state if there exists a cut between the source and the target consisting entirely of busy links. (Clearly, a channel graph in a given state is either linked or blocked, but not both.) If a channel graph G is in a random state with vacancy probability q, the linking probability will be denoted Q(G, q), and the complementary blocking probability will be denoted P (G, q) = 1 -Q(G, q). Consider now a search algorithm that seeks to determine whether a known channel graph, in an unknown random state with a known vacancy probability, is linked or blocked. The algorithm gathers information about the state of the graph by sequentially probing the status of links until all the links of either an idle path or a busy cut have been probed. (The algorithm may be adaptive, so that the decision as to which link to probe at a given step may depend on the outcomes of all previous probes.) Such an algorithm may be modeled as a decision tree. The elements of such a tree will be called nodes and arcs (to distinguish them from the vertices and edges of the channel graph). Each node is either a probe node, in which case it is labeled with the name of a link in the channel graph and has two outgoing arcs (one labeled "idle" and one labeled "busy") leading to other nodes, or a leaf, in which case it is labeled with one of the two possible outcomes ("linked" or "blocked") and has no outgoing arcs. There is a distinguished probe node, called the root, that has no incoming arcs; every other node has exactly one incoming arc. Execution of the algorithm begins at the root and proceeds in an obvious way, probing links and following the appropriate arcs, until it arrives at a leaf that announces the final result. There is an obvious notion of such an algorithm being correct: every trajectory from the root to a leaf labeled "linked" probes every link on a path from the source to the target in the channel graph and departs each of these probe nodes along the "idle" arc, and every trajectory from the root to a leaf labeled "blocked" probes every link on a cut between the source and the target in the channel graph and departs each of these probe nodes along the "busy" arc. This model of a search algorithm was introduced by Lin and Pippenger [L4], and subsequently used by Pippenger [P]. We shall denote by E(G, q) the minimum possible expected number of probes performed by any search algorithm that correctly searches the channel graph G with vacancy probability q. This formulation of the search problem considers algorithms to be deterministic, with only the state of the network being random. It is clear, however, that a formulation allowing randomized algorithms would yield the same function E(G, q): for a randomized algorithm may be regarded as a convex combination of deterministic algorithms (that is, as a probability distribution on decision trees, obtained by making all random choices at the outset), and at least one of these algorithms must use make an expected number of probes that is at most as large as that of the convex combination. In the definition of "search algorithm" given above, any node in the decision tree may probe any link in the channel graph, regardless of previous probes and their outcomes. We shall call this situation global search. This model is appropriate for circumstances in which all parts of the network being searched are directly accessible by the computer performing the search. It will be unrealistic, however, if the probes themselves require communication over the network being searched. An alternative appropriate to the latter circumstances is to allow a link to be probed only if it is accessible, meaning that all the links on some path from the source to that link have previously been probed and found to be idle. This situation will be called local search. We shall denote by E 1 (G, q) the minimum possible expected number of probes performed by any local search algorithm that correctly searches the channel graph G with vacancy probability q. We clearly have E(G, q) ≤ E 1 (G, q), and the main question explored in this paper is: how much larger than E(G, q) can E 1 (G, q) be? We shall see that the answer is: for some channel graphs G, and some values of the vacancy q, it can be exponentially larger. Preliminary versions of the results in this paper appeared in the first author's thesis [H2]. The graphs we shall study are called fully parallel graphs. Let T k be a complete binary tree of depth k, with root r and 2 k leaves, and with all edges directed from the root towards the leaves. Let T ′ k be a similar tree of depth k, with root r ′ and 2 k leaves, and with all edges directed from the leaves towards the root. The fully parallel channel graph F k is obtained by joining each leaf of T k to the corresponding leaf of T ′ k by an edge directed from the former to the latter. The source of F k is s = r and the target is t = r ′ . The vertices of F k will be partitioned into ranks: the vertices at depth j (0 ≤ j ≤ k) of T k will constitute rank j; the vertices at depth j (0 ≤ j ≤ k) of T ′ k will constitute rank 2k + 1 -j. Thus the source constitutes rank 0, and the target constitutes rank 2k + 1. An example is shown in Figure 1. Our results in this paper will show that global search of F k can be performed with an expected number of probes linear in k for any fixed q. We shall show, however, that local search of F k requires an expected number of probes exponential in k for 1/2 < q < 1, and we shall determine the precise rate of exponential growth for q in this range. Specifically, we shall present in Section 2 an algorithm bilat-search that performs global search in F k using an expected number of probes at most 4k for any fixed k and for all sufficiently large k. (For 0 ≤ q < 1/2, the expected number of probes is in fact bounded as k → ∞, but the bound depends on q. Because we are primarily interested in the contrast between linear and exponential growth as a function of k, we shall in what follows frequently replace constants that depend on q with factors of k or 1/k. This replacement will weaken our results slightly, but simplify them greatly, without affecting the contrast between linear and exponential growth, or between different rates of exponential growth.) We shall also present an algorithm unilat-search that performs local search in F k using an expected number of probes at most 4k max{1, min{(2q) k , 1/q k }} for any fixed q and for all sufficiently large k. The expected number of probes for this algorithm thus grows linearly for 0 ≤ q ≤ 1/2 and for q = 1, but grows exponentially in k for 1/2 < q < 1, with a base that increases as 2q from 1 to √ 2 as q increases from 1/2 to 1/ √ 2, then decreases as 1/q from √ 2 to 1 as q increases from 1/ √ 2 to 1. In Section 3, we shall present lower bounds that show that this rate of exponential growth is the best possible. Specifically, we shall show that any algorithm performing local search in F k must use an expected number of probes at least 1/kq k for 1/ √ 2 and for all sufficiently large k, and at least (2q) k /k 6 for 1/2 < q < 1/ √ 2 and for all sufficiently large k. (The factors 1/k and 1/k 6 are consequences of our desire to keep our proofs as simple as possible. We in fact conjecture that the algorithm unilat-search optimal not just in its rate of exponential growth, but in the stronger sense of using an expected number of probes exactly E 1 (F k , q).) In this section we shall obtain upper bounds to E(F k , q) and E 1 (G, q) by presenting and analyzing natural path search algorithms. The upper bound for the global case is actually a special case of a result by Lin and Pippenger [L4], but we shall give a simpler proof that can be adapted to the local case. The results in this section and the next depend on results that are well known in the theory of branching processes (see Harris [H1]). A branching process is a random process that begins with one individual in generation zero, and in which each individual independently contributes an identically distributed random number of offspring to the next generation. Let Z l denote the number of individuals in the l-th generation. If f (x) is the generating function for the number of offspring contributed by an individual, then the generating In this section we shall be concerned with the branching process for which the generating function for the number of offspring of an individual is f (x) = (1 -q 2 + q 2 x) 2 , describing the number of successes in two independent trials that each succeed with probability q 2 . This branching process governs the blocking probability P (F k , q) in the following way. Any path from the source to the target in F k that passes through a link v in T k also passes through the link v ′ in T ′ k , and conversely. Consider the tree T * k obtained from F k by identifying each vertex of T k with the corresponding vertex of T ′ k . The source and target of F k are identified to form the root of T * k , which we take to be idle. Let every other vertex of T * k be idle if and only if the corresponding links in T k and T ′ k are both idle (which occurs with probability q 2 ) and busy if and only if either of the corresponding links in T k and T ′ k are busy (which occurs with probability 1 -q 2 ). Then it is clear that P (F k , q) is equal to the probability that every path from the root to a leaf in T * k contains at least one busy vertex. This probability is just the probability that Z k = 0, which is the constant term f (k) (0) in f (k) (x). Thus we have the recurrence for k ≥ 1, with the initial condition P (F 0 , q) = 0. We have Thus the sequence P (F k , q) is non-decreasing in k. Since it is also bounded above by 1, it tends to a limit, which we shall denote P * , and we have P (F k , q) ≤ P * for all k ≥ 0. Letting k tend to infinity in (2.1), and noting that f (x) is continuous, we see that P * must be a fixed-point of f (x), specifically the smallest fixed-point greater than or equal to 0. Solving the quadratic equation f (P * ) = P * , we find that P * is equal to 1 for 0 ≤ q ≤ 1/ √ 2, and equal to (1 -q 2 ) 2 /q 4 for 1/ √ 2 ≤ q ≤ 1. Thus we have proved the following lemma. Lemma 2.1: For any 0 ≤ q ≤ 1 and k ≥ 0, we have (1 (Note that the two cases agree for q = 1/ √ 2.) Our upper bound for global path search in F k is based on the following recursive algorithm. It should be clear how, for a given value of k ≥ 0, it may be transformed into a decision tree of the form described in the introduction. The algorithm has been written to return true if its argument is linked and false if it is blocked. It would be straightforward to add data structures that would allow it to return an idle path or busy cut as appropriate. Since our main interest is in the cost of the search, however, we have only kept We assume short-circuiting conjunctions; that is, if f() evaluates to false, f() and g() is false and g() is not evaluated. From the algorithm we can easily write a recurrence for the expected number of probes it performs, which leads to the following recurrence for E(F k , q). We have for k ≥ 1, with the initial condition E(F 0 , q) = 0. In the right-hand side of the first line, the initial terms 1 + q + q 2 E(F k-1 , q) represents the expected cost of searching the first copy of F k-1 , the first expression in parentheses represents the probability that no path through the first copy is found, so that the second copy must be searched, and the second expression in parentheses (which is equal to the initial terms) represents the expected cost of searching the second copy. In the second line, we have factored out the expected cost of searching a copy, so the first expression in parentheses now represents the expected number of copies that must be searched. Using the bound from Lemma 2.1, we obtain (2.3) Substituting the bounds (2.3) into the recurrence (2.2), we obtain Applying the bounds 2(1 + q) ≤ 4 and 2q 2 ≤ 1 for 0 ≤ q ≤ 1/ √ 2 and (1 + q)/q 2 ≤ 4 for 1/ √ 2 ≤ q ≤ 1 yields the recurrence This recurrence, together with the initial condition E(F 0 , q) = 0, gives the following theorem. Theorem 2.2: For any 0 ≤ q ≤ 1 and k ≥ 0, we have To obtain an upper bound for local search, we transform the above algorithm as follows. unilat-search(F k : G): The difference between these algorithms lies in the order of the conditions in the conjunction (... and ... and ...). This change is necessary to keep the algorithm local; we may not probe target(G') until we have successfully found a path through G', using a recursive call. Thus, the algorithm is much more likely to make such a recursive call (with probability q instead of q 2 ) and its running time will grow much more quickly. As before, we may read off the recurrence for k ≥ 1, with the initial condition E 1 (F 0 , q) = 0. Using the bounds Q(F k-1 , q) ≤ 1 and P (F k-1 , q) ≤ P * together with Lemma 2.1 as before, we obtain Applying the bounds 2q ≤ 1 for 0 ≤ q ≤ 1/2 and 2/q 2 ≤ 4 for 1/ √ 2 ≤ q ≤ 1 yields the recurrence for k ≥ 1. This recurrence, together with the initial condition E 1 (F 0 , q) = 0 yields the following theorem. Theorem 2.3: For any 0 ≤ q ≤ 1 and k ≥ 0, we have In this section, we shall prove the following theorem. Theorem 3.1: For 1/2 < q < 1, we have for all sufficiently large k. This result will show that the exponential rates of growth in Theorem 2.3 are the best possible. To prove Theorem 3.1, we consider an optimal algorithm T for local search in F k with vacancy probability q, and define the random variable T to be the number of probes used by T . Since T is optimal, we have Ex[T ] = E 1 (F k , q), so it will suffice to show that Ex[T ] satisfies the lower bound of Theorem 3.1. Our lower bounds will be based on the following principle. If, at any point during the execution of the algorithm, we give the algorithm, at no cost, some information that it has not asked for, that gift can only decrease the expected number of probes it needs to make to complete its task. This principle can be formalized in terms of decision trees in the following way. We shall transform the original decision tree T into a modified decision tree T * . The tree T * will contain, in addition to internal nodes that make probes, internal gift nodes that branch according to the information given for free. We shall prune the tree below each gift node, eliminating probe nodes whose outcome is determined by the gift nodes above them. It is easy to show that this transformation preserves correctness and can only decrease the expected number of probes used: any state of the network corresponds to a path π from the root to a leaf L in T , and a path π * from the root to a leaf L * in T * ; the leaves L and L * will have the same label ("linked" or "blocked"), and any link of the network probed by node on π * will also be probed by a node on π. We shall not dwell further on this process of formalization; instead we shall proceed directly to an informal presentation of our lower bounds based on this principle. We shall begin by telling the algorithm, before it begins its execution, the status of all accessible links in ranks 1 through k, thereby informing it of which links in rank k + 1 are accessible. The accessible links in rank k + 1 will be called candidate links. The first probe by the algorithm will thus be to a candidate link. Whenever the algorithm probes a candidate link, we shall tell it the status of all accessible links on the path from that candidate link to the target. It follows that every probe by the algorithm will be to a candidate link. This process is illustrated in Figure 2. Each such probe either reveals an idle path from the probed candidate link to target (in which case the algorithm can announce "linked"), or discovers a busy link that blocks the paths from some subset of the candidate links to the target (in which case the algorithm need not probe these candidate links, since probing them could neither reveal an idle path to the target, nor discover a busy node that blocks any additional paths from candidate links to the target). The algorithm will thus probe a sequence of candidate links until it either reveals an idle path to the target or discovers a set of busy links that together block the paths from all candidate links to the target. It is clear that an optimal algorithm will never make a probe after the outcome of the search ("linked" or "blocked") has been determined, nor will it probe a candidate link after a busy link has already be discovered on the path from that candidate link to the target. t Figure 2. After probing the marked candidate link (gray), discovering the status of all accesible links above it (heavy for idle, dotted for busy), and pruning now-useless links (light), only candidate links are accessible. We can now prove the easier case, 1/ √ 2 < q < 1, of Theorem 3.1. Let I t be the event "T ≥ t" (so that the algorithm performs a t-th probe of a candidate link), and let J t be the event "the t-th probe reveals an idle path to the target" (so that the algorithm announces "linked" after the t-th probe). We have Pr[J t | I t ] = q k for any probe of a candidate link (since the path from any probed candidate link to the target contains k links, each of which is independently idle with probability q). Furthermore, by Lemma 2.1 we have Q(F k , q) = 1 -P (F k , q) ≥ 1 -(1 -q 2 ) 2 /q 4 ≥ 1/k for all sufficiently large k. Thus we have for all sufficiently large k. This proves Theorem 3.1 for the case 1/ √ 2 < q < 1. For the remaining case, 1/2 < q ≤ 1/ √ 2, we shall need to work with an additional branching process Y 0 , Y 1 , . . . Y l , . . ., for which Y 0 = 1 and the generating function for the number of offspring of an individual is g(x) = (1 -q + qx) 2 , describing the number of successes in two independent trials that each succeed with probability q. This branching process governs the number of accessible links in the successive ranks of T k : the number of links in rank 1 ≤ l ≤ k that are idle and accessible through an idle path from the source is Y l . In particular the set of candidate links has cardinality Y k . Let A denote the event "Y k < (2q) k /2k 2 ". Lemma 3.2: For fixed 1/2 < q ≤ 1, we have for all sufficiently large k. Proof: Let M = (2q) k /2k 2 . Then for any x ≤ 1 we have We bound the first factor by using the inequality (1 -δ) M ≥ 1 -M δ (which holds for 0 ≤ δ ≤ 1 and M ≥ 1), It will now suffice to show that for then we shall have completing the proof of the lemma. The function g(x) has two fixed points, at x = 1 and at x = (1 -q) 2 /q 2 < 1. Let γ = (1 -q) 2 /q 2 denote this smaller fixed point. Define G(y for all y ≥ 0, since 2(1 -q)y + (2q -1)y 2 2q + (1 -2q)y -y = -y(2q -1) 2 (y -1) 2 ≤ 0. Straightforward induction shows that From this we obtain, since H(y) and thus H (k) (y) are increasing functions of y for 0 ≤ y ≤ 1, Since G (k) (y) ≤ H (k) (y), we obtain Since γ < 1, this inequality establishes (3.1), and thus completes the proof of the lemma. ⊓ ⊔ For each link v in rank k -l of F k for some 0 ≤ l ≤ k -1, let X v denote the number of links in rank k that are accessible through idle paths from v. For each link v in rank k -l, let B v be the event X v > k 2 (2q) l ", and let B be the event "for some l in the range 0 ≤ l ≤ k -1 and some link v in rank k -l, X v > k 2 (2q) l ". Lemma 3.3: For fixed 1/2 < q ≤ 1, we have for all sufficiently large k. Proof: There are at most 2 • 2 k links in T k . Thus it will suffice to prove that for any one link v in rank k -l, for then, by Boole's inequality, we shall have for all sufficiently large k. Consider a fixed link v in rank k -l. Let M = k 2 (2q) l . Then for any x ≥ 1 we have Let δ = 1/k(2q) l . Then taking x = 1 + δ yields We bound the first factor by using the inequality log(1 + z) ≥ z -z 2 /2 (which holds for all z ≥ 0), obtaining (3.3) for all sufficiently large k. It will now suffice to show that g (l) (1 + δ) ≤ 2, (3.4) for all sufficiently large k, for this combined with (3.3) will yield (3.2), completing the proof of the lemma. Let G(δ) = g(1 + δ) -1 = 2qδ + q 2 δ 2 , and let Since G(δ) and H(δ) are both nondecreasing functions of δ for 0 ≤ δ < 1, a straightforward induction on l ≥ 0 shows that ≤ 2 for all sufficiently large k. This inequality establishes (3.4), and thus completes the proof of the lemma. ⊓ ⊔ Let C be the event "neither A nor B occurs". From Lemmas 2.2 and 2.3 we have Pr As before, let I t denote the event "T ≥ t". If the t-th probe of a candidate link discovers l accessible idle links on the path from the candidate link to the target (before reaching a busy link or the target), we shall associate with with that probe a "payoff" K t = k 2 (2q) l . The number L t of accessible idle links discovered on the path from the probed candidate link to the target has the distribution Pr[L t = l | I t ] = (1 -q)q l for 0 ≤ l ≤ k -1 and Pr[L t = k | I t ] = q k , and thus the payoff K t of the t-th probe has the distribution Pr We note that these distributions and expectations are independent of A, B and C. Let K = y≥1 K t denote the total payoff from all probes. If C occurs, and after T probes of candidate links the algorithm announces "linked" or "blocked", the total payoff from all probes of candidate links must satisfy K ≥ (2q) k /2k 2 . For if the algorithm announces "blocked", then (because A did not occur) there must have been at least (2q) k /2k 2 candidate links, and (because B did not occur) the number of candidate links whose paths to the target were found to be blocked by the t-th probe was at most the payoff K t (since the candidate links whose paths to the target blocked by a busy link in rank k + 1 + l are accessible through idle paths from a link in rank k -l). And if the algorithm announced "linked", the T -th probe must have revealed an idle path from a candidate link to the target, and this probe alone had payoff This completes the proof of Theorem 3.1 in the case 1/2 < q ≤ 1/ √ 2. We have presented a sequence F k of channel graphs for which global path search is easy, in the sense that its cost is O(k) for any vacancy probability q, as is shown by the natural bilateral depth-first search algorithm presented in Section 2. We have shown in Section 3 that the cost of local path search in F k is exponential in k for all 1/2 < q < 1. We have also presented in Section 2 a natural algorithm, unilateral depth-first search, that shows that the exponential rate of growth in shown in Section 3 is best possible, in the sense that it matches the exponential rate of growth of the cost of unilateral depth-first search. We conjecture that unilateral depth-first search is in fact optimal in the stronger sense of making the smallest possible expected number of probes for every k ≥ 0 and 0 ≤ q ≤ 1. The foregoing results may be summarized by saying that global search in F k is cheap, but local search is expensive. If, however, we consider "bilateral local search", wherein a link may be probed if either there is an idle path from the source to it, or an idle path from it to the target, then search in F k is again cheap, because the global search algorithm bilat-search probes only vertices meeting one of these conditions. Are there channel graphs in which global search is cheap, but even bilateral local search is expensive? The answer is "yes", as can be seen by considering the graph F k • F k obtained by connecting two copies of F k in series, with the target of the first copy identified with the source of the second copy to form a link u. Global search of F k • F k is cheap: we first probe u; if it is idle, we then search the first copy of F k ; and if that copy is linked, we search the second copy. Thus If, however, we condition on the link u being idle, and give this information for free to the search algorithm, then a path in F k • F k is the concatenation of two paths, one in each copy of F k , while a cut in F k • F k must include a cut in at least one copy of F k . Since F k is symmetric under reversal, every link probed by a bilateral local search in F k • F k can be probed in a "unilateral" local search of the first copy of F k , or in a "reverse unilateral" local search of the second copy. Thus the lower bound of Section 3 for unilateral

Original Paper

Loading high-quality paper...

Comments & Academic Discussion

Loading comments...

Leave a Comment