Abstract
Beeping models are models for networks of weak devices, such as sensor networks or biological networks. In these networks, nodes are allowed to communicate only via emitting beeps: unary pulses of energy. Listening nodes have only the capability of carrier sensing: they can only distinguish between the presence or absence of a beep, but receive no other information. The noisy beeping model further assumes listening nodes may be disrupted by random noise. Despite this extremely restrictive communication model, it transpires that complex distributed tasks can still be performed by such networks. In this paper we provide an optimal procedure for simulating general message passing in the beeping and noisy beeping models. We show that a round of Broadcast CONGEST can be simulated in rounds of the noisy (or noiseless) beeping model, and a round of CONGEST can be simulated in rounds (where is the maximum degree of the network). We also prove lower bounds demonstrating that no simulation can use asymptotically fewer rounds. This allows a host of graph algorithms to be efficiently implemented in beeping models. We present several example applications, including an -round Broadcast CONGEST algorithm for maximal matching, which, when simulated using our method, immediately implies a near-optimal -round maximal matching algorithm in the noisy beeping model. A preliminary version of this paper appeared in the proceedings of the 2023 ACM Symposium on Principles of Distributed Computing (PODC) [14].
Keywords: Message Passing, Beeping Model, Superimposed Codes
Introduction
Beeping models were first introduced by Cornejo and Kuhn [11] to model wireless networks of weak devices, such as sensor networks and biological networks [2]. These models are characterised by their very weak assumptions of communication capabilities: devices are assumed to communicate only via carrier sensing. That is, they have the ability to distinguish between the presence or absence of a signal, but not to gain any more information from the signal.
Models
The models we study all have the same basic structure: a network of devices is modeled as a graph with n nodes (representing the devices) and maximum degree , where edges represent direct reachability between pairs of devices. We will assume that all nodes activate simultaneously, and therefore have shared global clock (some prior work on beeping models instead allow nodes to activate asynchronously). Time then proceeds in synchronous rounds, in which nodes can perform some local computation and then can communicate with neighboring devices. The defining characteristic of each model is the communication capability of the nodes.
Noiseless Beeping Model
In each round, each node chooses to either beep or listen. Listening nodes then hear a beep iff at least one of their neighbors beeped, and silence otherwise. Nodes do not receive any other information about the number or identities of their beeping neighbors.
Noisy Beeping Model
The noisy beeping model, introduced by Ashkenazi, Gelles, and Leshem [4], is similar to the noiseless version, except that the signal each listening node hears (beep or silence) is flipped, independently uniformly at random, with some probability .
Within these beeping models, our aim will be to simulate more powerful message-passing models, in which nodes have the ability to send longer messages to each other, and these messages are received without interference:
Broadcast CONGEST Model
In rounds of the Broadcast CONGEST model, nodes may send the same -bit message to each of their neighboring nodes, and each node hears the messages from all of its neighbors.
CONGEST Model
The CONGEST model is similar to Broadcast CONGEST, but allows nodes to send (potentially) different -bit messages to each of their neighboring nodes. Again, each node hears the messages from all of its neighbors.
The communication capabilities in the Broadcast CONGEST and CONGEST models are clearly much more powerful than that of either beeping model, and CONGEST in particular has a broad literature of efficient algorithms. Our aim in this work is to provide an efficient generic simulation of Broadcast CONGEST and CONGEST in the beeping models, so that these existing algorithms can be applied out-of-the-box to networks of weak devices.
Prior work
Beeping models
The (noiseless) beeping model was introduced by Cornejo and Kuhn [11], who also gave results for an interval coloring task used for synchronization. Classical local graph problems have been studied in the model, with Afek et al. [1] giving an -round maximal independent set algorithm, and Beauqier et al. [7] giving -round deterministic algorithms for maximal independent set and -coloring.
Global communication problems (those requiring coordination across the entire network, and therefore with running times parameterized by the diameter D of the network) have also been studied. Single-source broadcast of a b-bit message can be performed in rounds using the simple tool of ‘beep waves’, introduced by Ghaffari and Haeupler [22] and formalized by Czumaj and Davies [12]. Leader election, another fundamental global problem, has seen significant study in the model. Ghaffari and Haeupler [22] gave a randomized algorithm requiring rounds, while Förster, Seidel and Wattenhofer [19] gave an -round deterministic algorithm. Czumaj and Davies [13] gave a simple randomized algorithm with worst-case round complexity but expected complexity. Finally, Dufoulon, Burman and Beauquier [15] settled the complexity of the problem with a deterministic algorithm with optimal round complexity.
On other global problems, Czumaj and Davies [12] and Beauqier et al. [6] gave results for broadcasting from multiple sources, and Dufoulon, Burman and Beauqier [16] study synchronization primitives for the model variant where nodes activate asynchronously.
Message passing models
Message passing models, and CONGEST in particular, have seen a long history of study and have a rich literature of algorithms for problems including (among many others) local problems such as -coloring[23], global problems such as minimum spanning tree[27], and approximation problems such as approximate maximum matching[3]. Broadcast CONGEST is less well-studied, though some dedicated algorithms have also been developed for it, e.g. [10]. There is an obvious way to simulate CONGEST algorithms in Broadcast CONGEST at an -factor overhead: nodes simply broadcast the messages for each of their neighbors in turn, appending the ID of the intended recipient. In general this is the best that can be done (as can be seen from our bounds on simulating beeping models), but for specific problems this complexity gap is often not necessary.
Simulating message passing with beeps
Two works have previously addressed the task of simulating message passing in beeping models. The first was by Beauquier et al. [7], and gave a generic simulation for CONGEST in the noiseless beeping model. Their algorithm required setup rounds, and then beep-model rounds per round of CONGEST. This result was improved by Ashkenazi, Gelles, and Leshem [4], who introduced the noisy beeping model, and gave an improved simulation of CONGEST which requires rounds of setup, and then simulates each CONGEST round in rounds of noisy beeps.
Our results
We give a randomized simulation of Broadcast CONGEST which requires rounds in the noisy beep model per round of Broadcast CONGEST, with no additional setup cost. We will call this per-round cost the overhead of simulation. This implies a simulation of CONGEST with overhead in the noisy beep model. We therefore improve over the previous best result of [4] by reducing the overhead by a factor, and removing the large setup cost entirely. We prove that these bounds are tight for both Broadcast CONGEST and CONGEST by giving matching lower bounds (even for the noiseless beeping model). This has the potentially surprising implication that introducing noise into the beeping model does not asymptotically increase the complexity of message-passing simulation at all.
This simulation result allows many CONGEST and Broadcast CONGEST algorithms to be efficiently implemented with beeps. We give several example applications, including an -round Broadcast CONGEST algorithm for the task of maximal matching, which via our simulation implies an -round algorithm in the noisy beeping model. We show that this is almost optimal by demonstrating an lower bound (even in the noiseless model).
Our approach
We summarize our approach to simulating CONGEST in the noiseless beeping model (the noisy case will follow naturally, as we will see later). First, let us mention the general approach of the previous results of [7] and [4]: there, the authors use a coloring of (i.e., a coloring such that no nodes within distance 2 in G receive the same color) to sequence transmissions. They iterate through the color classes, with nodes in each class transmitting their message (over a series of rounds, with a beep or silence representing each bit of the message). Since nodes have at most one neighbor in each color class, they hear that neighbor’s message undisrupted.
The disadvantage of such an approach is that the coloring of requires a large setup time to compute, and also necessitates at least color classes. This is the cause of the larger overhead in the simulation result of [4].
Instead of having nodes transmitting at different times, our solution is to have them all transmit at once, and use superimposed codes to ensure that the messages are decipherable. The definition of a classic superimposed code is as follows:
Definition 1
(Superimposed Codes) An (a, k)-superimposed code of length b is a function such that any superimposition (bitwise OR) of at most k codewords is unique.
The connection between superimposed codes and beeping networks is that, if some subset of a node v’s neighbors all transmit a message simultaneously (using beeps to represent s and silence to represent s), then v (if it were to listen every round) would hear the bitwise OR superimposition of all the messages. If this superimposition is unique, then v is able to identify the set of messages that were transmitted (and this set contain precisely those messages with no in a position where the superimposition has ).
Superimposed codes of this form were first introduced by Kautz and Singleton [26], who showed a construction with . This definition is equivalent to cover-free families of sets, which is the terminology used in much of the prior work. A lower bound was found by D’yachkov and Rykov [17], with a combinatorial proof later given by Ruszinkó [31], and another, simple proof given by Füredi [20]. The gap between upper and lower bounds remains open.
This presents a problem to applying such codes for message passing in the beep model. If all nodes are transmitting their message (of bits) at once, then we would need to use an -superimposed code for the messages to be decodable. Using Kautz and Singleton’s construction [26] results in a length of (and length corresponds directly to rounds in the beeping model). This would result in the same -factor overhead as from using a coloring of , so would not improve over [4]. Furthermore, even if we were to find improved superimposed codes, the lower bound implies that any such improvement would be only minor.
To achieve codes with better length, we weaken the condition we require. Rather than requiring that all superimpositions of at most k codewords are unique, we only require that most are. Specifically, if the k codewords are chosen at random, then their superimposition will be unique (and hence decodable) with high probability. We show the existence of short codes with this weakened property. Constructions with similar properties (though not quite suitable for our uses) were also given in [18].
This raises a new problem: using these shorter codes, we can efficiently have all nodes send a random message to their neighbors, but how does this help us send a specific message?
Our answer is that if were to repeat the transmission (using the same random codewords for each node), then every node v would already know exactly when its neighbors should be beeping1, and in particular, v knows when a neighbor u should be beeping alone (i.e., not at the same time as any other neighbor of v). If u now beeps only in a subset of the rounds indicated by its codeword, then it can pass information to v in this way. So, our final algorithm uses a secondary distance code to specify what this subset should be in order to ensure that all neighbors of u can determine u’s message. The aim of this distance code is that codewords are sufficiently large Hamming distance apart that u’s neighbors can determine u’s message, even though they only hear a subset of the relevant bits, and these bits can be flipped by noise in the noisy model.
Notation
Our protocols will be heavily based on particular types of binary codes, which we will communicate in the beeping model via beeps and silence. In a particular round, in the noiseless beeping model, we will say that a node v receives a if it either listens and hears a beep, or beeps itself. We will say that v receives a otherwise. In the noisy model, what v hears will be this bit, flipped with probability .
We will use logic operators to denote operations between two strings: for , is the logical And of the two strings, with in each coordinate iff both s and had in that coordinate. Similarly, is the logical Or of the two strings, with in each coordinate iff s or (or both) had in that coordinate.
Definition 2
We will use to denote the number of s in a string . We will say that a string d-intersects another string if .
For a set of strings , we will use as shorthand for the superimposition .
Finally, for a node v in a graph , we will use N(v) to denote the inclusive neighborhood of v, i.e. .
Binary codes
The novel type of superimposed code on which our algorithm is mainly based is defined as follows:
Definition 3
An -beep code of length b is a function such that:
all have .
the number of size-k subsets whose superimpositions -intersect some is at most
(here we slightly abuse notation by using C to denote the set of codewords, i.e. the image of the beep code function).
In other words, all codewords have exactly s, and only a -fraction of the size-k subsets of codewords have a superimposition that -intersects some other codeword. This first criterion is only a technicality to aid our subsequent application; the important point is the second, which, we will show, implies that a superimposition of k random codewords will, with probability at least , be decodable (even under noise, since avoiding -intersection will provide us with sufficient redundancy to be robust to noise). Note that for such a code to exist, must be an integer, which we will guarantee in our construction.
Theorem 1
For any , there exists an (a, k, 1/c)-beep code of length .
Proof
The proof will be by the probabilistic method: we will randomly generate a candidate code C, and then prove that it has the desired properties with high probability in . Then, a code with such properties must exist, and the random generation process we use implies an efficient algorithm to find such a code with high probability (though checking the code is correct would require computation).
To generate our candidate code, we choose each codeword independently, uniformly at random from the set of all b-bit strings with s. This clearly guarantees the first property.
For a fixed size-k set S of codewords, and a fixed codeword , we now analyze the probability that -intersects x.
Clearly we have . Consider the process of randomly choosing the positions of the 1s of x. The probability that any particular fixed set of positions receives all 1s in x is
Taking a union bound over all possible size- subsets of positions where has 1s, the probability that -intersects x is therefore at most
Taking a union bound over all codewords , we find that the probability that -intersects any such codeword is at most . Then, the expected number of size-k sets S that -intersect any is at most . By the probabilistic method, there therefore exists a an (a, k, 1/c)-beep code in which the number of size-k sets S that -intersect any is at most .
However, since we also want an efficient algorithm to find an (a, k, 1/c)-beep code, we note that by Markov’s inequality the probability that more than size-k sets S that -intersect any is at most , and therefore the process of choosing codewords uniformly at random from all strings with s gives an (a, k, 1/c)-beep code with probability at least .
Notice that, while the theorem holds for any , it is trivial for : in this case, codewords cannot -intersect any string, since they contain only 1s. Our application will set c to be a sufficiently large constant.
Our algorithm will also make use of distance codes. These codes have the simple criterion that every pair of codewords is sufficiently far apart by Hamming distance (which we will denote ). Distance codes are an example of error-correcting codes, which have a wealth of prior research (see e.g. [25] for an extensive survey); here we just require a very simple object, for which we give a proof in a similar style to that of Theorem 1 for consistency:
Definition 4
An -distance code of length b is a function such that all pairs have .
Lemma 2
For any , , and , there exists an -distance code of length .
Proof
We randomly generate a candidate code by choosing each codeword’s entries independently uniformly at random from . For any pair of codewords , the probability that they differ on any particular entry is . The expected distance is therefore , and by a Chernoff bound,
Since ,
Taking a union bound over all pairs , we find that the probability that any pair has is at most . Therefore, the random generation process generates an -distance code with probability at least .
This construction can also be checked relatively efficiently, since one need only check the distance of codeword pairs, which can be performed in computation.
Simulation algorithm
We now arrive at our main simulation algorithm. We give an algorithm for simulating a single communication round in Broadcast CONGEST using rounds of the noisy beep model. What we mean by this simulation is that each node v begins with a -bit message to transmit to all neighbors (where is some constant, a parameter of the Broadcast CONGEST model), and by the end of our beeping procedure, all nodes should be able to output the messages of all their neighbors.
Let be a constant to be chosen based on , the noise constant. Our algorithm will make use of two codes (instantiations of those defined in the previous section):
a -distance code D of length , given by Lemma 2 (so long as we choose );
a -beep code C of length given by Theorem 1 .
The codewords in the beep code C contain exactly s. The purpose of using these two codes is to combine them in the following manner:
Notation 3
For a binary string s, let denote the position of the in s (and Null if s contains fewer than i s).
Let be the combined code defined as follows:
That is, CD(r, m) is the code given by writing the codeword D(m) in the positions where C(r) is (and leaving the other positions as ): see Figure 1.
Fig. 1.

Combined code construction
The algorithm is then as follows (Algorithm 1):
Algorithm 1.
Simulation of a Broadcast CONGEST round in the noisy beeping model
So, each node picks a random codeword from the beep code, and transmits it bitwise using beeps and silence. By the properties of the beep code, with high probability the superimposition of messages each node receives will be decodable. Then, to actually convey the message , v uses the combined code, which transmits , encoded with a distance code, in the positions where the beep codeword used in the first round was . Neighbors u of v know when these positions are from the first round. Of course, there are some rounds when other neighbors of u will be beeping, some rounds when u must beep itself and cannot listen, and some rounds when the signal from v is flipped by noise. However, we will show that, by a combination of the properties of our two codes, there is sufficient redundancy to overcome all three of these obstacles, and allow u to correctly decode v’s message.
Decoding the code
In the first phase, each node v hears2 a string we will denote , which is the string with each bit flipped with probability , and the aim is for v to decode this string in order to determine the set .
We first show that, before considering noise, with high probability the superimposition of random codewords chosen by each node’s inclusive neighborhood is decodable.
Lemma 4
With probability at least , for every node and every , C(r) does not -intersect .
Proof
First, we see that with probability at least , all nodes choose different random strings. For the rest of the proof we condition on this event.
For each , , let be a set of nodes’ random strings defined as follows: starting with (which is a set of input messages of size at most ), add arbitrary from nodes until the set is of size exactly . Since we are conditioning on the event that all nodes generate different random strings, is a set of distinct random strings from distinct nodes, none of which are r.
By the properties of a -beep code, therefore, the probability that C(r) -intersects is at most . If C(r) does not -intersect , then since is a superset of , C(r) also does not -intersect .
The number of possible pairs , is . Taking a union bound over all of these, we find that C(r) does not -intersect for any pair with probability at least by a union bound. Finally, removing the conditioning on the event that nodes’ random strings are all different, we reach the condition of the lemma with probability at least .
Next we must analyze how noise affects the bitstrings that nodes hear. For any node v, let denote the string v heard, i.e., , after each bit is flipped with probability . To decode the set , v will take
That is, it includes all codewords which have fewer than 1s in positions where does not.
Notice that, in the absence of noise, all C(r) for have zero 1s in positions where did not, and all C(r) for have at least , since C(r) contains exactly 1s and, by Lemma 4, fewer than of them intersect . So, the goal of our next lemma is to show that noise does not disrupt this by too much.
Lemma 5
For sufficiently large constant , with probability at least , for all nodes v, .
Proof
Conditioning on the event of Lemma 4, all C(r) for -intersect . Then, for such an r to be in , more than of the intersection positions would have to be flipped by noise. The probability of this is clearly minimized when is as low as possible, i.e., . Then, positions must be flipped, and the expected number of such flipped positions is .
To show a low probability of failure, we need that the number of positions that must be flipped for r to be incorrectly categorized is more than its expectation. To do so, we bound the ratio of the two quantities:
We will set . Then,
Now that we have bounded the ratio above 1, we can apply a Chernoff bound:
We will now further require that , which gives:
Conversely, for some , C(r) does not 1-intersect (since it is contained in the superimposition that produces ). So, for it to -intersect , at least of the positions in which has a 1 (of which there are exactly , by definition) would need to be flipped in . The expected number of such flipped positions is . Since , have , so we can again apply a Chernoff bound:
Requiring that again gives:
So, each codeword is correctly placed in or out of with probability at least . Taking a union bound over all codewords, we have with probability at least . Finally, taking another bound over all nodes and removing the conditioning on the event of Lemma 4 (which occurs with probability at least ) gives correct decoding at all nodes with probability at least . The lemma requires setting .
We now analyze the second stage of the algorithm, in which nodes transmit their messages using the combined code, and show that this code allows the messages to be decoded.
Lemma 6
In the second phase of the algorithm, with probability at least , all nodes v can successfully decode (so long as is at least a sufficiently large constant).
Proof
Conditioned on the event of Lemma 5, all nodes v now know .
In the second stage of the algorithm, in the absence of noise v would hear the string , which we will denote . To decode the message , for some , it examines the subsequence defined by . We denote the noisy versions of these strings that v actually hears by and respectively. (Note that v does not know which neighbor w the strings and belong to, but it can link them together, which is all that is required at this stage.) Node v decodes as the string minimizing . We must show that, with high probability, .
Conditioned on the event of Lemma 4, each for does not -intersect . That is, there are at least positions in in which has a 1 and no other for does. In these positions j, . So, in total,
Under noise, each of the positions in which matches will be flipped with probability in . So, denoting by the expectation , we have:
Meanwhile,by the property of a -distance code, for any ,
To lower-bound (which we denote by ), we see that . Since , this is minimized when is as small as possible, i.e., . Then,
Since , we have , and so we can see that for sufficiently large , . So, it remains to show that and are concentrated around their expectations.
We first show that, with high probability, . Note that if we set , then
and so
Then, we can apply a Chernoff bound:
The expression is increasing in . Therefore, if we ensure that , we have
Then,
Finally, if we also ensure that ,
We similarly wish to show that with high probability,
(for ). Again, since we have set ,
So,
Then, we can apply a Chernoff bound:
Taking a union bound over all strings in , we find that with probability at least , and for all . So, v successfully decodes . Another union bound over all gives probability at least that v correctly decodes the entire set . Finally, removing the conditioning on the event of Lemma 5 and taking a further union bound over all nodes v, the probability that all nodes correctly decode their neighbors’ messages is at least . We required that
Lemma 6 shows that Algorithm 1 successfully simulates a Broadcast CONGEST communication round with high probability. By simulating all communication rounds in sequence, we can simulate any Broadcast CONGEST in its entirety at an overhead. Note that essentially all Broadcast CONGEST (and CONGEST) algorithms are -round, since this is sufficient to inform all nodes of the entire input graph. So the only problems with super-polynomial round complexities would be those in which nodes are given extra input of super-polynomial size. We are not aware of any such problems having been studied, and therefore Theorem 7 applies to all problems of interest.
Theorem 7
Any -round Broadcast CONGEST algorithm can be simulated in the noisy beeping model in rounds, producing the same output with with probability at least .
Proof
Each round of the Broadcast CONGEST algorithm, in which each node v broadcasts a -bit message to all of its neighbors, is simulated using Algorithm 1 with sufficiently large constant . By Lemma 6, each simulated communication round succeeds (has all nodes correctly decode the messages of their neighbors) with probability at least . Taking a union bound over all T rounds, and choosing sufficiently large, gives a probability of at least that all simulated communication rounds succeed. In this case, the algorithm runs identically as it does in Broadcast CONGEST, and produces the same output. The running time of Algorithm 1 is , so the overall running time is .
We then reach an -overhead simulation for CONGEST.
Corollary 8
Any -round CONGEST algorithm can be simulated in the noisy beeping model in rounds, producing the same output with with probability at least .
Proof
A -round CONGEST algorithm can be simulated in rounds in Broadcast CONGEST as follows: nodes first broadcast their IDs to all neighbors, and then each CONGEST communication round is simulated in Broadcast CONGEST rounds by having each node v broadcast to its neighbors, for every in arbitrary order. Then, by Theorem 7, this algorithm can be simulated in rounds.
Lower bounds
We now show lower bounds on the number of rounds necessary to simulate Broadcast CONGEST and CONGEST, based on the hardness of a simple problem we call B-bit Local Broadcast. We define the B-bit Local Broadcast problem as follows:
Definition 5
(B-Bit Local Broadcast) Every node v is equipped with a unique identifier . Every node v receives as input : that is, a set containing messages for each of v’s neighbors u, coupled with the ID of u to identify the destination node. Each node v must output the set (i.e. the set of messages from each of its neighbors, coupled with their IDs).
Lemma 9
B-Bit Local Broadcast requires rounds in the beeping model (even without noise), for any algorithm succeeding with probability more than .
Proof
The graph we use as our hard instance is as follows: we take the complete bipartite graph , and add isolated vertices. This graph then has n vertices and maximum degree . Arbitrarily fix unique IDs in [n] for each node. We will only consider the nodes of to show hardness. Arbitrarily denote one part of the bipartition L and the other R. For nodes , we choose each independently uniformly at random from . We set all other to (so, in particular, the inputs for all nodes are identical).
Let denote the concatenated strings of local randomness of all nodes in R (in any arbitrary fixed order). Then, the output of any node must be fully deterministically dependent on the node IDs (which are fixed), , u’s input messages (which are identically fixed to be all s), and the pattern of beeps and silence of nodes in L (and note that all nodes in R hear the same pattern: a beep if any node in L beeps, and silence otherwise). An algorithm running for T rounds has possible such patterns of beeps and silence.
So, the overall output of all nodes in R must be one of possible distributions, where the distribution is over the randomness of . The correct output for these nodes is uniformly distributed over possibilities (the choices of input messages for L). The probability of a correct output is therefore at most . So, any algorithm with succeeds with probability at most .
Having shown a lower bound on the problem in the beeping model, upper bounds in Broadcast CONGEST and CONGEST imply lower bounds on the overhead of simulation.
Lemma 10
B-Bit Local Broadcast can be solved deterministically in rounds of Broadcast CONGEST and in rounds of CONGEST.
Proof
In Broadcast CONGEST, each node v simply broadcasts the strings for each , taking rounds. In CONGEST, node v instead sends to node u for each , taking rounds.
Corollary 11
Any simulation of Broadcast CONGEST in the noiseless beeping model (and therefore also the noisy beeping model) has overhead. Any simulation of CONGEST in the noiseless (and noisy) beeping model has overhead.
Applications
In this section, we list some of the applications of our result, simulating CONGEST and Broadcast CONGEST algorithms in the noisy beeping model.
Degree computation
Exact node degrees can trivially be computed in 1 round in Broadcast CONGEST: each node broadcasts its ID, and nodes then count the number of IDs they received. Applying Theorem 7 therefore gives an -round algorithm for degree computation in noisy beeping networks:
Theorem 12
Degree computation can be performed in rounds in the noisy beeping model, succeeding with high probability.
This improves significantly over the -round algorithm obtained by applying the -overhead simulation result of Ashkenazi, Gelles, and Leshem [4] to the algorithm of [9] in the noiseless beeping model with collision detection.
Distance-2 coloring
In vertex coloring, each node is required to output a color from some palette such that no two adjacent nodes output the same color. It is a very well-studied problem in distributed computing, and the difficulty varies significantly depending on how many colors are in the palette. It is easy to see that a greedy coloring can always color using a palette of size , though in a distibuted setting this is non-trivial and colorings using more colors can be computed faster.
Distance-2 vertex coloring has the stronger requirement that nodes within distance 2, rather than 1, must output different colors. Equivalently, this can be thought of as coloring , the square of the input graph. In this case, a greedy algorithm would require a palette size of at least colors. Distance-2 coloring is often used as a synchronization procedure in wireless networks, since it ensure that any node has at most one neighbor of any color class. For example, it is an integral part previous simulation results in the beeping model [4, 7].
The faster prior result was by Ashkenazi, Gelles, and Leshem [4], who gave a randomized algorithm for distance-2 coloring noisy beeping networks using colors in rounds, based on simulating the algorithm of [9]. We improve this to , by simulating the following Broadcast CONGEST algorithm (Algorithm 2):
Algorithm 2.
Distance-2 Coloring in Broadcast CONGEST
(Note that nodes are counted as hearing messages even if they were themselves the sender.)
Lemma 13
Algorithm 2 computes a (list)-coloring of in rounds of Broadcast CONGEST, succeeding with high probability.
Proof
Firstly, if the algorithm terminates, then it produces a correct (list)-coloring of . This is because whenever two nodes within distance 2 choose the same color c (either in the same or different iterations), each of their common neighbors (including themselves if they are in fact at distance 1) will broadcast and prevent the latter of the two (or both, if the choices were in the same iteration) from outputting c.
Next, we show that the algorithm terminates within iterations with high probability. Each node has at most distance-2 neighbors ( at distance 1, and then a further for each of those distance-1 neighbors). Therefore, for a fixed node v, in any iteration, at most total colors are either chosen by v’s distance-2 neighbors this iteration or have previously been output by such a distance-2 neighbor (since nodes that succeed and output a color then cease choosing colors). So, in any interation, v has a probability of choosing a color which has not been output or chosen by one of its distance-2 neighbors. In this case, v will hear no messages and will successfully color itself. In expectation, therefore, at least of the remaining uncolored nodes will color themselves in each iteration. So, after iterations, the expected number of remaining nodes is at most , and so there are no remaining uncolored nodes with high probability by Markov’s inequality.
Finally, we show that we need only allow rounds per iteration for broadcasting s, with high probability. We analze the probability that v has more than s to broadcast in each iteration. If this is the case, then v must a set of size , such that all of the colors chosen by nodes in S were unique, but all were also chosen or previously output by nodes in . The number of choices for S is , and the probability that each member of S chose a color causing v to detect a collision is at most , even conditioned on the choices of the other nodes in S since by definition they must have chosen a different color. So, the probability that node v has more than s to broadcast is at most . Taking a union bound over all n nodes and iterations gives the statement.
Applying Theorem 7 therefore gives a running time of in the noisy beeping model:
Theorem 14
(list)-coloring of can be performed in rounds in the noisy beeping model, succeeding with high probability.
This improves the previous complexity by a factor of , a major improvement for large .
Maximal matching
In this section we give another example application of our simulation, to the problem of maximal matching. The problem is as follows: we assume each node has a unique -bit ID. For a successful maximal matching, each node must either output the ID of another node, or Unmatched. The outputs must satisfy the following:
Symmetry: v outputs ID(u) iff u outputs ID(v). Since each node outputs at most one ID, this implies that the output indeed forms a matching.
Maximality: for every edge in the graph, u and v do not both output Unmatched.
To our knowledge, no bespoke maximal matching algorithm has previously been designed for the beeping model (either noisy or noiseless) or for Broadcast CONGEST. So, the fastest existing beeping algorithm is obtained by simulating the best CONGEST algorithms using the simulation of [4]. Since an -round CONGEST algorithm for maximal matching exists [29], the running time under [4]’s simulation is therefore .
We show an -round Broadcast CONGEST algorithm for maximal matching, which our simulation then converts to an -round algorithm in the noisy beeping model, thereby improving the running time by around a factor.
The base of our algorithm is Luby’s algorithm for maximal independent set [28], which can be applied to produce a maximal matching (Algorithm 3).3
Algorithm 3.
Maximal Matching: Luby’s Algorithm
It is well-known (see [28]) that Luby’s algorithm produces a maximal matching in rounds with high probability. To implement this in Broadcast CONGEST we must make some minor changes to account for the fact that it is nodes, not edges, that communicate (Algorithm 4).
The aim of the algorithm is as follows: if, in a particular round i, an edge has a lower value than all neighboring edges, the following process occurs. Its higher-ID endpoint (assume W.L.O.G. that this is u) first broadcasts . The other endpoint v then broadcasts . Node u then broadcasts , and finally node v also broadcasts . These messages cause nodes adjacent to u and v to be aware that u and v will be ceasing participation (because they have been matched), and so any edges to them can be discarded from the graph.
Algorithm 4.
Maximal Matching in Broadcast CONGEST
Lemma 15
If Algorithm 4 terminates (i.e. causes all nodes to cease participation), it outputs a maximal matching.
Proof
We first prove maximality. Nodes only cease participation when they are adjacent to an edge in MM, or when they have no remaining adjacent edges. Edges are only removed when they are adjacent to an edge in MM. So, upon termination, there are no edges in the original graph that are neither in MM nor adjacent to an edge in MM, and therefore MM is a maximal matching.
We now prove independence. Let be an edge which is added to MM in round i, and assume W.L.O.G. that u is the higher-ID endpoint. It is clear that, since is added to MM, we must have the behavior described above (u broadcasts , v broadcasts , u broadcasts , v broadcasts ). Then, we can show that this excludes the possibility that any adjacent edge also joins MM in round i:
u cannot act as the higher-ID endpoint of any other edge joining MM, since it only Proposes .
u cannot act as the lower-ID endpoint of any other edge joining MM, since it Confirms an edge it Proposed, and therefore cannot have broadcast any Reply.
v cannot act as the higher-ID endpoint of any other edge joining MM, since it broadcasts a Reply and therefore does not .
v cannot act as the lower-ID endpoint of any other edge joining MM, since it only broadcasts Reply, and does not Reply for any other edge.
So, no adjacent edge to can join in round i. Furthermore, all nodes adjacent to u and v receive a message and therefore all other edges adjacent to u and v are removed from the graph. So, no edge adjacent to can be added to MM in future rounds either. This guarantees that MM is an independent set of edges.
Notation 16
We will use the notation to mean , i.e., shares at least one endpoint with e (and can be e itself). We will denote by d(e), i.e. the number of adjacent edges of e, including e itself.
Lemma 17
In any particular round i, the expected number of edges removed from the graph is at least .
This lemma refers to the current graph at round i, i.e. without all edges and nodes that have been removed in previous rounds, and m is accordingly the number of edges in the current graph.
Proof
It is easy to see that, as intended, an edge is added to MM if it has a lower value than all neighboring edges: its higher-ID endpoint (W.L.O.G. u), which sampled the value , will denote the edge as and Propose it, the value will be lower than that for which v Proposed and so v will , and u will not hear a lower-valued edge to Reply and will therefore . v will also , and all edges adjacent to will be removed from the graph. There are such edges.
The probability that for all with is . So, the expected number of edges removed from the graph is at least (where the factor arises since each edge can be removed by either endpoint being matched, so is double-counted in the sum).
Lemma 18
Algorithm 4 performs maximal matching in rounds of Broadcast CONGEST, succeeding with high probability.
Proof
By Lemma 15, Algorithm 4 produces a maximal matching if it terminates. Conditioning on the event that all sampled values are distinct, the algorithm removes at least half of the edges in the graph in each iteration in expectation. After iterations, therefore, the expected number of edges remaining is at most , and therefore by Markov’s inequaility, with probability at least the number of edges remaining is 0 and the algorithm has terminated. Removing the conditioning on the event that sampled values are distinct, the algorithm terminates with probability at least .
Theorem 19
Maximal matching can be performed in rounds in the noisy beeping model, succeeding with high probability.
Proof
Follows from applying Theorem 7 to Lemma 18 .
This is close to optimal, since we show an bound even in the noiseless model:
Theorem 20
Maximal matching requires rounds in the (noiseless) beeping model, to succeed with any constant probability.
Proof
Our hard ensemble of instances is as follows: the underlying graph will be , the complete bipartite graph with vertices in each part. Each node’s ID will be drawn independently at random from .
Arbitrarily naming the two parts of the graph left and right, we consider the outputs of nodes on the right. For a correct output to maximal matching, each node on the right must uniquely output the ID of a node on the left, and so the union of outputs of the right part must be the list of IDs of the right part. The number of possible such lists (even assuming that IDs are all unique and the IDs of the right side are fixed) is .
We note that each right node’s output must be dependent only on its ID, its local randomness, and the transcript of communication performed by left nodes during the course of the algorithm. Since the graph is a complete bipartite graph, in each round there are only two discernable possibilities for communication from the perspective of right-part nodes: either at least one left node beeps, or none do. So, the transcript for an r-round algorithm can be represented as a sequence , corresponding to hearing a beep or silence in each round. There are such transcripts.
Therefore, the union of output from right nodes can be expressed as a function of the randomness of right-part nodes (both for their IDs and any local randomness used in the algorithm), and the transcript. Each transcript therefore induces a distribution of right-part outputs, over the randomness of right-part nodes.
There must be some set of left-part IDs such that under any transcript, the probability that the right-side nodes correctly output that set is at most . So, if , then the probability that the right part produces a correct output on this instance is at most .
All-Pairs shortest paths
The All-Pairs Shortest Paths problem is another very well-studied graph problem, in which each node must output a minimum-distance path to every other node in the graph. The problem can be studied using either unweighted edges, in which case distance is standard graph distance, or with weighted edges, in which case the length of a path is the sum of all weights along that path.
Theorem 21
Unweighted All-Pairs Shortest Paths can be solved in rounds, and weighted All-Pairs Shortest Paths can be solved in rounds, in the noisy beeping model, succeeding with high probability.
Proof
For unweighted All-Pairs Shortest Paths, the O(n)-round algorithm of [24] can be simulated. This algorithm is written for CONGEST, but it can be seen that it in fact works unchanged in Broadcast CONGEST, and therefore can be simulated in rounds using Theorem 7. For weighted All-Pairs Shortest Paths, the -round CONGEST algorithm of Bernstein and Nanongkai [8] can be simulated in rounds.
Conclusions
We have presented an optimal method for simulating Broadcast CONGEST and CONGEST in the noisy (and noiseless) beeping model. We have also presented several example applications, including a maximal matching algorithm which requires rounds in Broadcast CONGEST, and which, using our simulation, can therefore be run in rounds in the noisy beeping model.
While our general simulation method is optimal, there is still room for improvement for many specific problems in the beeping model, and the complexity picture has significant differences from the better-understood message passing models. For example, in CONGEST, the problems of maximal matching and maximal independent set have similar randomized round complexity upper bounds [5, 21, 30], whereas in the beeping model, maximal independent set can be solved in rounds [1] while maximal matching requires (Theorem 20). In general, the question of which problems can be solved in rounds in the beeping model, and which require factors, remains mostly open.
Author Contributions
All work conducted by Peter Davies-Peck.
Funding
Peter Davies-Peck is supported by EPSRC New Investigator Award UKRI155.
Declarations
Competing interests
There are no other financial interests or conflicts of interest to disclose.
Footnotes
Technically, v does not know which neighbor corresponds to which codeword, but this is not required by our approach.
For simplicity of notation, we will assume that a node counts a round in which it itself beeped as ‘hearing’ a , and in the noisy model, flips this with probability itself. Of course, in practice this is unnecessary, and having full information about its own message can only help a node.
Often this algorithm is stated with real values x(e) sampled from [0, 1]; however, since we must communicate these values using -bit messages, we instead use integers from . It can be seen that with probability at least , no two of the values sampled during the algorithm are the same, so we can condition on this event for the rest of the analysis and avoid considering ties.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Afek, Y., Alon, N., Bar-Joseph, Z., Cornejo, A., Haeupler, B., Kuhn, F.: Beeping a maximal independent set. Distrib. Comput. 26(4), 195–208 (2013) [Google Scholar]
- 2.Afek, Y., Alon, N., Barad, O., Hornstein, E., Barkai, N., Bar-Joseph, Ziv: A biological solution to a fundamental distributed computing problem. Science 331(6014), 183–185 (2011) [DOI] [PubMed] [Google Scholar]
- 3.Ahmadi, M., Kuhn, F., Oshman, R.: Distributed approximate maximum matching in the CONGEST model. In 32nd International Symposium on Distributed Computing (DISC 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, (2018)
- 4.Ashkenazi, Y., Gelles, R., Leshem, A.: Noisy beeping networks. Inf. Comput. 289, 104925 (2022) [Google Scholar]
- 5.Barenboim, L., Elkin, M., Pettie, S., Schneider, J.: The locality of distributed symmetry breaking. J. ACM (JACM) 63(3), 1–45 (2016) [Google Scholar]
- 6.Beauquier, J., Burman, J., Davies, P., Dufoulon, F.: Optimal multi-cast with beeps using group testing. In: Censor-Hillel, K., Flammini, M. (eds.) Structural Information and Communication Complexity, pp. 66–80. Springer, New York (2019) [Google Scholar]
-
7.Beauquier, J., Burman, J., Dufoulon, F., Kutten, S.: Fast beeping protocols for deterministic mis and
-coloring in sparse graphs. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pages 1754–1762, (2018)
- 8.Bernstein, A., Nanongkai, D.: Distributed exact weighted all-pairs shortest paths in near-linear time. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, pages 334–342, (2019)
- 9.Casteigts, A., Métivier, Y., Robson, J.M., Zemmari, A.: Design patterns in beeping algorithms: Examples, emulation, and analysis. Inf. Comput. 264, 32–51 (2019) [Google Scholar]
- 10.Chechik, S., Mukhtar, D.: Reachability and shortest paths in the broadcast congest model. In 33rd International Symposium on Distributed Computing (DISC 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, (2019)
- 11.Cornejo, A., Kuhn, F.: Deploying wireless networks with beeps. In International Symposium on Distributed Computing, pages 148–162. Springer, (2010)
- 12.Czumaj, A., Davies, P.: Communicating with beeps. J. Parallel Distrib. Comput. 130, 98–109 (2019) [Google Scholar]
- 13.Czumaj, A., Davies, P.: Leader election in multi-hop radio networks. Theoret. Comput. Sci. 792, 2–11 (2019) [Google Scholar]
- 14.Davies, P.: Optimal message-passing with noisy beeps. In Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing, pages 300–309, (2023)
- 15.Dufoulon, F., Burman, J., Beauquier, J.: Beeping a deterministic time-optimal leader election. In 32nd International Symposium on Distributed Computing (DISC 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, (2018)
- 16.Dufoulon, F., Burman, J., Beauquier, J.: Can uncoordinated beeps tell stories? In Proceedings of the 39th Symposium on Principles of Distributed Computing, PODC ’20, page 408–417, New York, NY, USA, (2020). Association for Computing Machinery
- 17.D’yachkov, A.G., Rykov, V.V.: Bounds on the length of disjunctive codes. Problemy Peredachi Informatsii 18(3), 7–13 (1982) [Google Scholar]
- 18.D’yachkov, A., Vorobyev, I., Polyanskii, N., Shchukin, V.: Almost cover-free codes and designs. Des. Codes Crypt. 82(1), 231–247 (2017) [Google Scholar]
- 19.Förster, K.-T., Seidel, J., Wattenhofer, R.: Deterministic leader election in multi-hop beeping networks. In: Kuhn, F. (ed.) Distributed Computing, pp. 212–226. Springer, Berlin Heidelberg (2014) [Google Scholar]
- 20.Füredi, Z.: Onr-cover-free families. J. Comb. Theory, Ser. A 73(1), 172–173 (1996) [Google Scholar]
- 21.Ghaffari, M.: An improved distributed algorithm for maximal independent set. In Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, pages 270–277. SIAM, (2016)
- 22.Ghaffari, M., Haeupler, B.: Near optimal leader election in multi-hop radio networks. In Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, pages 748–766. SIAM, (2013)
- 23.Halldórsson, M.M., Kuhn, F., Maus, Y., Tonoyan, T.: Efficient randomized distributed coloring in congest. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2021, page 1180–1193, New York, NY, USA, (2021). Association for Computing Machinery
- 24.Holzer, S., Wattenhofer, R.: Optimal distributed all pairs shortest paths and applications. In Proceedings of the 2012 ACM symposium on Principles of distributed computing, pages 355–364, (2012)
- 25.Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge university press (2010) [Google Scholar]
- 26.Kautz, W., Singleton, R.: Nonrandom binary superimposed codes. IEEE Trans. Inf. Theory 10(4), 363–377 (1964) [Google Scholar]
- 27.King, V., Kutten, S., Thorup, M.: Construction and impromptu repair of an mst in a distributed network with o (m) communication. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, pages 71–80, (2015)
- 28.Luby, M.: A simple parallel algorithm for the maximal independent set problem. SIAM J. Comput. 15(4), 1036–1053 (1986) [Google Scholar]
- 29.Panconesi, A., Rizzi, R.: Some simple distributed algorithms for sparse networks. Distrib. Comput. 14(2), 97–100 (2001) [Google Scholar]
- 30.Rozhoň, V., Ghaffari, M.: Polylogarithmic-time deterministic network decomposition and distributed derandomization. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, pages 350–363, (2020)
- 31.Ruszinkó, M.: On the upper bound of the size of the r-cover-free families. J. Comb. Theory, Ser. A 66(2), 302–310 (1994) [Google Scholar]




