Skip to main content
Springer logoLink to Springer
. 2025 Jun 10;38(3):247–260. doi: 10.1007/s00446-025-00488-6

Optimal message-passing with noisy beeps

Peter Davies-Peck 1,
PMCID: PMC12397199  PMID: 40894186

Abstract

Beeping models are models for networks of weak devices, such as sensor networks or biological networks. In these networks, nodes are allowed to communicate only via emitting beeps: unary pulses of energy. Listening nodes have only the capability of carrier sensing: they can only distinguish between the presence or absence of a beep, but receive no other information. The noisy beeping model further assumes listening nodes may be disrupted by random noise. Despite this extremely restrictive communication model, it transpires that complex distributed tasks can still be performed by such networks. In this paper we provide an optimal procedure for simulating general message passing in the beeping and noisy beeping models. We show that a round of Broadcast CONGEST can be simulated in O(Δlogn) rounds of the noisy (or noiseless) beeping model, and a round of CONGEST can be simulated in O(Δ2logn) rounds (where Δ is the maximum degree of the network). We also prove lower bounds demonstrating that no simulation can use asymptotically fewer rounds. This allows a host of graph algorithms to be efficiently implemented in beeping models. We present several example applications, including an O(logn)-round Broadcast CONGEST algorithm for maximal matching, which, when simulated using our method, immediately implies a near-optimal O(Δlog2n)-round maximal matching algorithm in the noisy beeping model. A preliminary version of this paper appeared in the proceedings of the 2023 ACM Symposium on Principles of Distributed Computing (PODC) [14].

Keywords: Message Passing, Beeping Model, Superimposed Codes

Introduction

Beeping models were first introduced by Cornejo and Kuhn [11] to model wireless networks of weak devices, such as sensor networks and biological networks [2]. These models are characterised by their very weak assumptions of communication capabilities: devices are assumed to communicate only via carrier sensing. That is, they have the ability to distinguish between the presence or absence of a signal, but not to gain any more information from the signal.

Models

The models we study all have the same basic structure: a network of devices is modeled as a graph with n nodes (representing the devices) and maximum degree Δ, where edges represent direct reachability between pairs of devices. We will assume that all nodes activate simultaneously, and therefore have shared global clock (some prior work on beeping models instead allow nodes to activate asynchronously). Time then proceeds in synchronous rounds, in which nodes can perform some local computation and then can communicate with neighboring devices. The defining characteristic of each model is the communication capability of the nodes.

Noiseless Beeping Model

In each round, each node chooses to either beep or listen. Listening nodes then hear a beep iff at least one of their neighbors beeped, and silence otherwise. Nodes do not receive any other information about the number or identities of their beeping neighbors.

Noisy Beeping Model

The noisy beeping model, introduced by Ashkenazi, Gelles, and Leshem [4], is similar to the noiseless version, except that the signal each listening node hears (beep or silence) is flipped, independently uniformly at random, with some probability ε(0,12).

Within these beeping models, our aim will be to simulate more powerful message-passing models, in which nodes have the ability to send longer messages to each other, and these messages are received without interference:

Broadcast CONGEST Model

In rounds of the Broadcast CONGEST model, nodes may send the same O(logn)-bit message to each of their neighboring nodes, and each node hears the messages from all of its neighbors.

CONGEST Model

The CONGEST model is similar to Broadcast CONGEST, but allows nodes to send (potentially) different O(logn)-bit messages to each of their neighboring nodes. Again, each node hears the messages from all of its neighbors.

The communication capabilities in the Broadcast CONGEST and CONGEST models are clearly much more powerful than that of either beeping model, and CONGEST in particular has a broad literature of efficient algorithms. Our aim in this work is to provide an efficient generic simulation of Broadcast CONGEST and CONGEST in the beeping models, so that these existing algorithms can be applied out-of-the-box to networks of weak devices.

Prior work

Beeping models

The (noiseless) beeping model was introduced by Cornejo and Kuhn [11], who also gave results for an interval coloring task used for synchronization. Classical local graph problems have been studied in the model, with Afek et al. [1] giving an O(log2n)-round maximal independent set algorithm, and Beauqier et al. [7] giving O(Δ2logn+Δ3)-round deterministic algorithms for maximal independent set and (Δ+1)-coloring.

Global communication problems (those requiring coordination across the entire network, and therefore with running times parameterized by the diameter D of the network) have also been studied. Single-source broadcast of a b-bit message can be performed in O(D+b) rounds using the simple tool of ‘beep waves’, introduced by Ghaffari and Haeupler [22] and formalized by Czumaj and Davies [12]. Leader election, another fundamental global problem, has seen significant study in the model. Ghaffari and Haeupler [22] gave a randomized algorithm requiring O(D+lognloglogn)·min{loglogn,lognD} rounds, while Förster, Seidel and Wattenhofer [19] gave an O(Dlogn)-round deterministic algorithm. Czumaj and Davies [13] gave a simple randomized algorithm with O(Dlogn) worst-case round complexity but O(D+logn) expected complexity. Finally, Dufoulon, Burman and Beauquier [15] settled the complexity of the problem with a deterministic algorithm with optimal O(D+logn) round complexity.

On other global problems, Czumaj and Davies [12] and Beauqier et al. [6] gave results for broadcasting from multiple sources, and Dufoulon, Burman and Beauqier [16] study synchronization primitives for the model variant where nodes activate asynchronously.

Message passing models

Message passing models, and CONGEST in particular, have seen a long history of study and have a rich literature of algorithms for problems including (among many others) local problems such as Δ+1-coloring[23], global problems such as minimum spanning tree[27], and approximation problems such as approximate maximum matching[3]. Broadcast CONGEST is less well-studied, though some dedicated algorithms have also been developed for it, e.g. [10]. There is an obvious way to simulate CONGEST algorithms in Broadcast CONGEST at an O(Δ)-factor overhead: nodes simply broadcast the messages for each of their neighbors in turn, appending the ID of the intended recipient. In general this is the best that can be done (as can be seen from our bounds on simulating beeping models), but for specific problems this Θ(Δ) complexity gap is often not necessary.

Simulating message passing with beeps

Two works have previously addressed the task of simulating message passing in beeping models. The first was by Beauquier et al. [7], and gave a generic simulation for CONGEST in the noiseless beeping model. Their algorithm required Δ6 setup rounds, and then Δ4logn beep-model rounds per round of CONGEST. This result was improved by Ashkenazi, Gelles, and Leshem [4], who introduced the noisy beeping model, and gave an improved simulation of CONGEST which requires O(Δ4logn) rounds of setup, and then simulates each CONGEST round in O(Δlogn·min{n,Δ2}) rounds of noisy beeps.

Our results

We give a randomized simulation of Broadcast CONGEST which requires O(Δlogn) rounds in the noisy beep model per round of Broadcast CONGEST, with no additional setup cost. We will call this per-round cost the overhead of simulation. This implies a simulation of CONGEST with O(Δ2logn) overhead in the noisy beep model. We therefore improve over the previous best result of [4] by reducing the overhead by a Θ(min{nΔ,Δ}) factor, and removing the large setup cost entirely. We prove that these bounds are tight for both Broadcast CONGEST and CONGEST by giving matching lower bounds (even for the noiseless beeping model). This has the potentially surprising implication that introducing noise into the beeping model does not asymptotically increase the complexity of message-passing simulation at all.

This simulation result allows many CONGEST and Broadcast CONGEST algorithms to be efficiently implemented with beeps. We give several example applications, including an O(logn)-round Broadcast CONGEST algorithm for the task of maximal matching, which via our simulation implies an O(Δlog2n)-round algorithm in the noisy beeping model. We show that this is almost optimal by demonstrating an Ω(Δlogn) lower bound (even in the noiseless model).

Our approach

We summarize our approach to simulating CONGEST in the noiseless beeping model (the noisy case will follow naturally, as we will see later). First, let us mention the general approach of the previous results of [7] and [4]: there, the authors use a coloring of G2 (i.e., a coloring such that no nodes within distance 2 in G receive the same color) to sequence transmissions. They iterate through the color classes, with nodes in each class transmitting their message (over a series of rounds, with a beep or silence representing each bit of the message). Since nodes have at most one neighbor in each color class, they hear that neighbor’s message undisrupted.

The disadvantage of such an approach is that the coloring of G2 requires a large setup time to compute, and also necessitates at least min{n,Δ2} color classes. This is the cause of the larger overhead in the simulation result of [4].

Instead of having nodes transmitting at different times, our solution is to have them all transmit at once, and use superimposed codes to ensure that the messages are decipherable. The definition of a classic superimposed code is as follows:

Definition 1

(Superimposed Codes) An (ak)-superimposed code of length b is a function C:{0,1}a{0,1}b such that any superimposition (bitwise OR) of at most k codewords is unique.

The connection between superimposed codes and beeping networks is that, if some subset of a node v’s neighbors all transmit a message simultaneously (using beeps to represent 1s and silence to represent 0s), then v (if it were to listen every round) would hear the bitwise OR superimposition of all the messages. If this superimposition is unique, then v is able to identify the set of messages that were transmitted (and this set contain precisely those messages with no 1 in a position where the superimposition has 0).

Superimposed codes of this form were first introduced by Kautz and Singleton [26], who showed a construction with b=O(k2a). This definition is equivalent to cover-free families of sets, which is the terminology used in much of the prior work. A lower bound b=Ω(k2alogk) was found by D’yachkov and Rykov [17], with a combinatorial proof later given by Ruszinkó [31], and another, simple proof given by Füredi [20]. The logk gap between upper and lower bounds remains open.

This presents a problem to applying such codes for message passing in the beep model. If all nodes are transmitting their message (of O(logn) bits) at once, then we would need to use an (O(logn),Δ)-superimposed code for the messages to be decodable. Using Kautz and Singleton’s construction [26] results in a length of O(Δ2logn) (and length corresponds directly to rounds in the beeping model). This would result in the same O(Δ2)-factor overhead as from using a coloring of G2, so would not improve over [4]. Furthermore, even if we were to find improved superimposed codes, the lower bound implies that any such improvement would be only minor.

To achieve codes with better length, we weaken the condition we require. Rather than requiring that all superimpositions of at most k codewords are unique, we only require that most are. Specifically, if the k codewords are chosen at random, then their superimposition will be unique (and hence decodable) with high probability. We show the existence of short codes with this weakened property. Constructions with similar properties (though not quite suitable for our uses) were also given in [18].

This raises a new problem: using these shorter codes, we can efficiently have all nodes send a random message to their neighbors, but how does this help us send a specific message?

Our answer is that if were to repeat the transmission (using the same random codewords for each node), then every node v would already know exactly when its neighbors should be beeping1, and in particular, v knows when a neighbor u should be beeping alone (i.e., not at the same time as any other neighbor of v). If u now beeps only in a subset of the rounds indicated by its codeword, then it can pass information to v in this way. So, our final algorithm uses a secondary distance code to specify what this subset should be in order to ensure that all neighbors of u can determine u’s message. The aim of this distance code is that codewords are sufficiently large Hamming distance apart that u’s neighbors can determine u’s message, even though they only hear a subset of the relevant bits, and these bits can be flipped by noise in the noisy model.

Notation

Our protocols will be heavily based on particular types of binary codes, which we will communicate in the beeping model via beeps and silence. In a particular round, in the noiseless beeping model, we will say that a node v receives a 1 if it either listens and hears a beep, or beeps itself. We will say that v receives a 0 otherwise. In the noisy model, what v hears will be this bit, flipped with probability ε.

We will use logic operators to denote operations between two strings: for s,s{0,1}a, ss{0,1}a is the logical And of the two strings, with 1 in each coordinate iff both s and s had 1 in that coordinate. Similarly, ss{0,1}a is the logical Or of the two strings, with 1 in each coordinate iff s or s (or both) had 1 in that coordinate.

Definition 2

We will use 1(s) to denote the number of 1s in a string s{0,1}a. We will say that a string s{0,1}a d-intersects another string s{0,1}a if 1(ss)d.

For a set of strings S{0,1}a, we will use (S) as shorthand for the superimposition sSs.

Finally, for a node v in a graph G=(V,E), we will use N(v) to denote the inclusive neighborhood of v, i.e. {uV:{u,v}E}{v}.

Binary codes

The novel type of superimposed code on which our algorithm is mainly based is defined as follows:

Definition 3

An (a,k,δ)-beep code of length b is a function C:{0,1}a{0,1}b such that:

  • all sC have 1(s)=δbk.

  • the number of size-k subsets SC whose superimpositions (S) 5δ2bk-intersect some sC\S is at most 2ak2-2a

(here we slightly abuse notation by using C to denote the set of codewords, i.e. the image C({0,1}a) of the beep code function).

In other words, all codewords have exactly δbk 1s, and only a 2-2a-fraction of the 2ak size-k subsets of codewords have a superimposition that 5δ2bk-intersects some other codeword. This first criterion is only a technicality to aid our subsequent application; the important point is the second, which, we will show, implies that a superimposition of k random codewords will, with probability at least 1-2-2a, be decodable (even under noise, since avoiding 5δ2bk-intersection will provide us with sufficient redundancy to be robust to noise). Note that for such a code to exist, δbk must be an integer, which we will guarantee in our construction.

Theorem 1

For any a,k,cN, there exists an (ak, 1/c)-beep code of length b=c2ka.

Proof

The proof will be by the probabilistic method: we will randomly generate a candidate code C, and then prove that it has the desired properties with high probability in 2a. Then, a code with such properties must exist, and the random generation process we use implies an efficient algorithm to find such a code with high probability (though checking the code is correct would require 2O(ak) computation).

To generate our candidate code, we choose each codeword independently, uniformly at random from the set of all b-bit strings with bck 1s. This clearly guarantees the first property.

For a fixed size-k set S of codewords, and a fixed codeword xC\S, we now analyze the probability that (S) 5bc2k-intersects x.

Clearly we have 1((S))k·bck=b/c. Consider the process of randomly choosing the positions of the 1s of x. The probability that any particular fixed set of 5bc2k positions receives all 1s in x is

bckb·bck-1b-1bck-5bc2kb-5bc2k<ck-5bc2k.

Taking a union bound over all possible size-5bc2k subsets of positions where (S) has 1s, the probability that (S) 5bc2k-intersects x is therefore at most

bc5bc2k·(ck)-5bc2keck55bc2k·(ck)-5bc2k5e-5c2kac2k2-4a.

Taking a union bound over all codewords sC\S, we find that the probability that (S) 5bc2k-intersects any such codeword is at most 2-3a. Then, the expected number of size-k sets S that 5bc2k-intersect any sC\S is at most 2ak2-3a. By the probabilistic method, there therefore exists a an (ak, 1/c)-beep code in which the number of size-k sets S that 5bc2k-intersect any sC\S is at most 2ak2-3a.

However, since we also want an efficient algorithm to find an (ak, 1/c)-beep code, we note that by Markov’s inequality the probability that more than 2ak2-2a size-k sets S that 5bc2k-intersect any sC\S is at most 2-a, and therefore the process of choosing codewords uniformly at random from all strings with bck 1s gives an (ak, 1/c)-beep code with probability at least 1-2-a.

Notice that, while the theorem holds for any cN, it is trivial for c2: in this case, codewords cannot 5bc2k-intersect any string, since they contain only bck 1s. Our application will set c to be a sufficiently large constant.

Our algorithm will also make use of distance codes. These codes have the simple criterion that every pair of codewords is sufficiently far apart by Hamming distance (which we will denote dH). Distance codes are an example of error-correcting codes, which have a wealth of prior research (see e.g. [25] for an extensive survey); here we just require a very simple object, for which we give a proof in a similar style to that of Theorem 1 for consistency:

Definition 4

An (a,δ)-distance code of length b is a function D:{0,1}a{0,1}b such that all pairs ssD have dH(s,s)δb.

Lemma 2

For any δ(0,12), aN, and cδ12(1-2δ)-2, there exists an (a,δ)-distance code of length b=cδa.

Proof

We randomly generate a candidate code by choosing each codeword’s entries independently uniformly at random from {0,1}. For any pair of codewords s,sD, the probability that they differ on any particular entry is 12. The expected distance is therefore b2, and by a Chernoff bound,

PrdH(s,s)δb=PrdH(s,s)2δEdH(s,s)e-(1-2δ)2EdH(s,s)2=e-(1-2δ)2cδa4.

Since cδ12(1-2δ)-2,

Prdist(s,s)δbe-3a2-4a.

Taking a union bound over all 2a222a pairs s,sD, we find that the probability that any pair has dist(s,s)δb is at most 2-2a. Therefore, the random generation process generates an (a,δ)-distance code with probability at least 1-2-2a.

This construction can also be checked relatively efficiently, since one need only check the distance of O(22a) codeword pairs, which can be performed in 2O(a) computation.

Simulation algorithm

We now arrive at our main simulation algorithm. We give an algorithm for simulating a single communication round in Broadcast CONGEST using O(Δlogn) rounds of the noisy beep model. What we mean by this simulation is that each node v begins with a γlogn-bit message mv to transmit to all neighbors (where γ is some constant, a parameter of the Broadcast CONGEST model), and by the end of our beeping procedure, all nodes should be able to output the messages of all their neighbors.

Let cε be a constant to be chosen based on ε, the noise constant. Our algorithm will make use of two codes (instantiations of those defined in the previous section):

  • a (γlogn,13)-distance code D of length cε2γlogn, given by Lemma 2 (so long as we choose cε108);

  • a (cεγlogn,Δ+1,1/cε)-beep code C of length cε3γ(Δ+1)logn given by Theorem 1 .

The codewords in the beep code C contain exactly cε2γlogn 1s. The purpose of using these two codes is to combine them in the following manner:

Notation 3

For a binary string s, let 1i(s) denote the position of the ith 1 in s (and Null if s contains fewer than i 1s).

Let CD:{0,1}cεγlogn×{0,1}γlogn{0,1}cε3γ(Δ+1)logn be the combined code defined as follows:

CD(r,m)j=1ifi[cε2γlogn],1i(C(r))=j,andD(m)i=10otherwise

That is, CD(rm) is the code given by writing the codeword D(m) in the positions where C(r) is 1 (and leaving the other positions as 0): see Figure 1.

Fig. 1.

Fig. 1

Combined code construction

The algorithm is then as follows (Algorithm 1):

Algorithm 1.

Algorithm 1

Simulation of a Broadcast CONGEST round in the noisy beeping model

So, each node picks a random codeword from the beep code, and transmits it bitwise using beeps and silence. By the properties of the beep code, with high probability the superimposition of messages each node receives will be decodable. Then, to actually convey the message mv, v uses the combined code, which transmits mv, encoded with a distance code, in the positions where the beep codeword rv used in the first round was 1. Neighbors u of v know when these positions are from the first round. Of course, there are some rounds when other neighbors of u will be beeping, some rounds when u must beep itself and cannot listen, and some rounds when the signal from v is flipped by noise. However, we will show that, by a combination of the properties of our two codes, there is sufficient redundancy to overcome all three of these obstacles, and allow u to correctly decode v’s message.

Decoding the code

In the first phase, each node v hears2 a string we will denote x~v, which is the string xv:=uN(v)C(ru) with each bit flipped with probability ε(0,12), and the aim is for v to decode this string in order to determine the set Rv:={ru:uN(v)}.

We first show that, before considering noise, with high probability the superimposition of random codewords chosen by each node’s inclusive neighborhood is decodable.

Lemma 4

With probability at least 1-n3-cεγ, for every node vV and every r{0,1}cεγlogn, C(r) does not 5cεγlogn-intersect ruRv\{r}C(ru).

Proof

First, we see that with probability at least 1-n22cεγlogn=1-n2-cεγ, all nodes choose different random strings. For the rest of the proof we condition on this event.

For each vV, r{0,1}cεγlogn, let Rv,r be a set of nodes’ random strings defined as follows: starting with Rv\{r} (which is a set of input messages of size at most Δ+1), add arbitrary rx from nodes x(N(v){r}) until the set is of size exactly Δ+1. Since we are conditioning on the event that all nodes generate different random strings, Rv,r is a set of Δ+1 distinct random strings from Δ+1 distinct nodes, none of which are r.

By the properties of a (cεγlogn,Δ+1,1/cε)-beep code, therefore, the probability that C(r) 5cεγlogn-intersects ruRv,rC(ru) is at most 2-2cεγlogn=n-2cεγ. If C(r) does not 5cεγlogn-intersect ruRv,wC(ru), then since Rv,r is a superset of Rv\{r}, C(r) also does not 5cεγlogn-intersect ruRv\{r}C(ru).

The number of possible pairs vV, r{0,1}cεγlogn is n1+cεγ. Taking a union bound over all of these, we find that C(r) does not 5cεγlogn-intersect ruRv\{r}C(ru) for any pair with probability at least 1-n1+cεγ-2cεγ=1-n1-cεγ by a union bound. Finally, removing the conditioning on the event that nodes’ random strings are all different, we reach the condition of the lemma with probability at least 1-n1-cεγ-n2-cεγ1-n3-cεγ.

Next we must analyze how noise affects the bitstrings that nodes hear. For any node v, let xv denote the string v heard, i.e., uN(v)C(ru), after each bit is flipped with probability ε(0,12). To decode the set Rv, v will take

R~v={r{0,1}cεγlognsuch that:C(r)does not2ε+14cε2γlogn-intersect¬x~v}.

That is, it includes all codewords which have fewer than 2ε+14cε2γlogn 1s in positions where x~v does not.

Notice that, in the absence of noise, all C(r) for rRv have zero 1s in positions where xv did not, and all C(r) for rRv have at least cε(cε-5)γlogn, since C(r) contains exactly cε2γlogn 1s and, by Lemma 4, fewer than 5cεγlogn of them intersect xv. So, the goal of our next lemma is to show that noise does not disrupt this by too much.

Lemma 5

For sufficiently large constant cε, with probability at least 1-n4-cεγ, for all nodes v, R~v=Rv.

Proof

Conditioning on the event of Lemma 4, all C(r) for rRv cε(cε-5)γlogn-intersect ¬xv. Then, for such an r to be in R~v, more than 1(C(r)¬xv)-2ε+14cε2γlogn of the intersection positions would have to be flipped by noise. The probability of this is clearly minimized when 1(C(r)¬xv) is as low as possible, i.e., cε(cε-5)γlogn. Then, cε(cε-5)γlogn-2ε+14cε2γlogn=(3-2ε4cε-5)cεγlogn positions must be flipped, and the expected number of such flipped positions is μ:=ε(cε-5)cεγlogn.

To show a low probability of failure, we need that the number of positions that must be flipped for r to be incorrectly categorized is more than its expectation. To do so, we bound the ratio of the two quantities:

(3-2ε4cε-5)cεγlognε(cε-5)cεγlogn=3-2ε4cε-5ε(cε-5)3-2ε4cε-5cε2sinceε(0,12)=32-ε-10cε.

We will set cε601-2ε. Then,

(3-2ε4cε-5)cεγlognε(cε-5)cεγlogn32-ε-1-2ε6=4-2ε3>1.

Now that we have bounded the ratio above 1, we can apply a Chernoff bound:

Pr1(C(r)¬x~v)<2ε+14cε2γlognPr#flipped positions>3-2ε4cε-5ε(cε-5)μexp(-3-2ε4cε-5ε(cε-5)-12μ/3)exp(-4-2ε3-12μ/3)=exp(-1-2ε2ε(cε-5)cεγlogn/27).

We will now further require that cε541-2ε2ε+5, which gives:

Pr1(C(r)¬x~v)<2ε+14cε2γlognexp(-2cεγlogn)n-2cεγ.

Conversely, for some rRv, C(r) does not 1-intersect ¬xv (since it is contained in the superimposition that produces xv). So, for it to 2ε+14cε2γlogn-intersect ¬x~v, at least 2ε+14cε2γlogn of the positions in which C(r) has a 1 (of which there are exactly cε2γlogn, by definition) would need to be flipped in x~v. The expected number of such flipped positions is μ:=εcε2γlogn. Since ε(0,12), have 2ε+14cε2γlogn>4ε4cε2γlogn=μ, so we can again apply a Chernoff bound:

Pr1(C(r)¬x~v)2ε+14cε2γlognPr#C(r)s1sflipped2ε+14cε2γlognexp(-2ε+14ε-12μ/3)=exp(-14ε-122εcε2γlogn/3).

Requiring that cε6ε14ε-12-2 again gives:

Pr1(C(r)¬x~v)2ε+14cε2γlognexp(-2cεγlogn)n-2cεγ.

So, each codeword is correctly placed in or out of R~v with probability at least 1-n-2cεγ. Taking a union bound over all 2cεγlogn codewords, we have R~v=Rv with probability at least 1-n-cεγ. Finally, taking another bound over all nodes vV and removing the conditioning on the event of Lemma 4 (which occurs with probability at least 1-n3-cεγ ) gives correct decoding at all nodes with probability at least 1-n4-cεγ. The lemma requires setting cεmax{6ε14ε-12-2,541-2ε2ε+5,601-2ε}.

We now analyze the second stage of the algorithm, in which nodes transmit their messages using the combined code, and show that this code allows the messages to be decoded.

Lemma 6

In the second phase of the algorithm, with probability at least 1-nγ+6-cεγ, all nodes v can successfully decode {mw:wN(v)} (so long as cε is at least a sufficiently large constant).

Proof

Conditioned on the event of Lemma 5, all nodes v now know Rv.

In the second stage of the algorithm, in the absence of noise v would hear the string wN(v)CD(rw,mw), which we will denote yv. To decode the message mw, for some wN(v), it examines the subsequence yv,w defined by (yv,w)j=(yv)i:1j(C(w))=i. We denote the noisy versions of these strings that v actually hears by y~v and y~v,w respectively. (Note that v does not know which neighbor w the strings rw and y~v,w belong to, but it can link them together, which is all that is required at this stage.) Node v decodes mw as the string m~w{0,1}γlogn minimizing dH(D(m~w),y~v,w). We must show that, with high probability, m~w=mw.

Conditioned on the event of Lemma 4, each C(rw) for wN(v) does not 5cεγlogn-intersect ruRv\{rw}C(ru). That is, there are at least (cε-5)cεγlogn positions in xv in which C(rw) has a 1 and no other C(ru) for uN(v) does. In these positions j, (yv,w)j=D(mw)j. So, in total,

dH(D(mw),yv,w)5cεγlogn.

Under noise, each of the positions in which yv,w matches D(mw) will be flipped with probability ε in y~v,w. So, denoting by μ the expectation EdH(D(mw),y~v,w), we have:

εcε2γlognμεcε2γlogn+5cεγlogn.

Meanwhile,by the property of a (γlogn,13)-distance code, for any mmw{0,1}γlogn,

dH(D(m),yv,w)dH(D(m),D(mw))-dH(D(mw),yv,w)13cε2γlogn-5cεγlogn.

To lower-bound EdH(D(m),y~v,w) (which we denote by μ), we see that μ=(1-ε)dH(D(m),yv,w)+ε(cε2γlogn-dH(D(m),yv,w)). Since ε>12, this is minimized when dH(D(m),yv,w) is as small as possible, i.e., 13cε2γlogn-5cεγlogn. Then,

μ(1-ε)(13cε2γlogn-5cεγlogn)+ε(cε2γlogn-(13cε2γlogn-5cεγlogn))=(13cε-23εcε-5+10ε+εcε)cεγlogn1+ε3cε2γlogn-5cεγlogn.

Since ε<12, we have 1+ε3>ε, and so we can see that for sufficiently large cε, μμ. So, it remains to show that dH(D(mw),y~v,w) and dH(D(m),y~v,w) are concentrated around their expectations.

We first show that, with high probability, dH(D(mw),y~v,w)1+4ε6cε2γlogn. Note that if we set cε601-2ε, then

1+4ε6cε=εcε+1-2ε6cε>εcε+5,

and so

1+4ε6cε2γlogn>εcε2γlogn+5cεγlognμ.

Then, we can apply a Chernoff bound:

PrdH(D(mw),y~v,w)1+4ε6cε2γlognPrdH(D(mw),y~v,w)μ·(1+4ε)cε6(εcε+5)exp(-(1+4ε)cε6εcε+30-12μ/2)=exp(-(1-2ε)cε-306εcε+302μ/2).

The expression (1-2ε)cε-306εcε+30 is increasing in cε. Therefore, if we ensure that cε30ε(1-2ε), we have

(1-2ε)cε-306εcε+3030ε-301801-2ε+30=1ε-161-2ε+1=(1-ε)(1-2ε)ε(7-2ε).

Then,

PrdH(D(mw),y~v,w)1+4ε6cε2γlognexp(-(1-ε)(1-2ε)ε(7-2ε)2μ/2)exp(-(1-ε)(1-2ε)ε(7-2ε)2cε2γlogn/2).

Finally, if we also ensure that cε6(1-ε)(1-2ε)ε(7-2ε)-2,

PrdH(D(mw),y~v,w)1+4ε6cε2γlognexp(-3cεγlogn)n-4cεγ.

We similarly wish to show that with high probability,

dH(D(m),y~v,w)>(1+4ε)6cε2γlogn

(for mmw). Again, since we have set cε601-2ε,

(1+4ε)6cε=1+ε3cε-1-2ε6cε<1+ε3cε-5

So,

1+4ε6cε2γlogn<1+ε3cε2γlogn-5cεγlognμ.

Then, we can apply a Chernoff bound:

PrdH(D(m),y~v,w)(1+4ε)6cε2γlognPrdH(D(m),y~v,w)μ·(1+4ε)cε6(1+ε3cε-5)exp(-1-(1+4ε)cε2(1+ε)cε-302μ/3)exp(-(1-2ε)cε-306εcε+302μ/3)exp(-(1-ε)(1-2ε)ε(7-2ε)2cε2γlogn/3)exp(-2cεγlogn)n-2cεγ.

Taking a union bound over all strings in {0,1}γlogn, we find that with probability at least 1-nγ-2cεγ, dH(D(mw),y~v,w)<1+4ε6cε2γlogn and dH(D(m),y~v,w)>(1+4ε)6cε2γlogn for all mmw. So, v successfully decodes mw. Another union bound over all wN(v) gives probability at least 1-nγ+1-2cεγ that v correctly decodes the entire set {mw:wN(v)}. Finally, removing the conditioning on the event of Lemma 5 and taking a further union bound over all nodes v, the probability that all nodes correctly decode their neighbors’ messages is at least 1-nγ+6-cεγ. We required that

cεmax30ε(1-2ε),6(1-ε)(1-2ε)ε(7-2ε)-2.

Lemma 6 shows that Algorithm 1 successfully simulates a Broadcast CONGEST communication round with high probability. By simulating all communication rounds in sequence, we can simulate any nO(1) Broadcast CONGEST in its entirety at an O(Δlogn) overhead. Note that essentially all Broadcast CONGEST (and CONGEST) algorithms are nO(1)-round, since this is sufficient to inform all nodes of the entire input graph. So the only problems with super-polynomial round complexities would be those in which nodes are given extra input of super-polynomial size. We are not aware of any such problems having been studied, and therefore Theorem 7 applies to all problems of interest.

Theorem 7

Any T=nO(1)-round Broadcast CONGEST algorithm can be simulated in the noisy beeping model in O(TΔlogn) rounds, producing the same output with with probability at least 1-n-2.

Proof

Each round of the Broadcast CONGEST algorithm, in which each node v broadcasts a γlogn-bit message to all of its neighbors, is simulated using Algorithm 1 with sufficiently large constant cε. By Lemma 6, each simulated communication round succeeds (has all nodes correctly decode the messages of their neighbors) with probability at least 1-nγ+6-cepsγ. Taking a union bound over all T rounds, and choosing cε sufficiently large, gives a probability of at least 1-n-2 that all simulated communication rounds succeed. In this case, the algorithm runs identically as it does in Broadcast CONGEST, and produces the same output. The running time of Algorithm 1 is O(Δlogn), so the overall running time is O(TΔlogn).

We then reach an O(Δ2logn)-overhead simulation for CONGEST.

Corollary 8

Any T=nO(1)-round CONGEST algorithm can be simulated in the noisy beeping model in O(TΔ2logn) rounds, producing the same output with with probability at least 1-n-2.

Proof

A T=nO(1)-round CONGEST algorithm can be simulated in O(TΔ) rounds in Broadcast CONGEST as follows: nodes first broadcast their IDs to all neighbors, and then each CONGEST communication round is simulated in Δ Broadcast CONGEST rounds by having each node v broadcast IDu,mvu to its neighbors, for every uN(v) in arbitrary order. Then, by Theorem 7, this algorithm can be simulated in O(TΔ2logn) rounds.

Lower bounds

We now show lower bounds on the number of rounds necessary to simulate Broadcast CONGEST and CONGEST, based on the hardness of a simple problem we call B-bit Local Broadcast. We define the B-bit Local Broadcast problem as follows:

Definition 5

(B-Bit Local Broadcast) Every node v is equipped with a unique identifier IDv[n]. Every node v receives as input {IDu,mvu:uN(v)}: that is, a set containing messages mvu{0,1}B for each of v’s neighbors u, coupled with the ID of u to identify the destination node. Each node v must output the set {IDu,muv:uN(v)} (i.e. the set of messages from each of its neighbors, coupled with their IDs).

Lemma 9

B-Bit Local Broadcast requires Ω(Δ2B) rounds in the beeping model (even without noise), for any algorithm succeeding with probability more than 2-12Δ2B.

Proof

The graph we use as our hard instance is as follows: we take the complete bipartite graph KΔ,Δ, and add n-2Δ isolated vertices. This graph then has n vertices and maximum degree Δ. Arbitrarily fix unique IDs in [n] for each node. We will only consider the nodes of KΔ,Δ to show hardness. Arbitrarily denote one part of the bipartition L and the other R. For nodes vL, we choose each mvu independently uniformly at random from {0,1}B. We set all other mxy to 0logn (so, in particular, the inputs for all nodes uR are identical).

Let R denote the concatenated strings of local randomness of all nodes in R (in any arbitrary fixed order). Then, the output of any node uR must be fully deterministically dependent on the node IDs (which are fixed), R, u’s input messages (which are identically fixed to be all 0s), and the pattern of beeps and silence of nodes in L (and note that all nodes in R hear the same pattern: a beep if any node in L beeps, and silence otherwise). An algorithm running for T rounds has 2T possible such patterns of beeps and silence.

So, the overall output of all nodes in R must be one of 2T possible distributions, where the distribution is over the randomness of R. The correct output for these nodes is uniformly distributed over 2Δ2B possibilities (the choices of input messages for L). The probability of a correct output is therefore at most 2T-Δ2B. So, any algorithm with T12Δ2B succeeds with probability at most 2-12Δ2B.

Having shown a lower bound on the problem in the beeping model, upper bounds in Broadcast CONGEST and CONGEST imply lower bounds on the overhead of simulation.

Lemma 10

B-Bit Local Broadcast can be solved deterministically in O(ΔB/logn) rounds of Broadcast CONGEST and in O(B/logn) rounds of CONGEST.

Proof

In Broadcast CONGEST, each node v simply broadcasts the strings IDu,mvu for each uN(v), taking O(ΔB/logn) rounds. In CONGEST, node v instead sends mvu to node u for each uN(v), taking O(B/logn) rounds.

Corollary 11

Any simulation of Broadcast CONGEST in the noiseless beeping model (and therefore also the noisy beeping model) has Ω(Δlogn) overhead. Any simulation of CONGEST in the noiseless (and noisy) beeping model has Ω(Δ2logn) overhead.

Applications

In this section, we list some of the applications of our result, simulating CONGEST and Broadcast CONGEST algorithms in the noisy beeping model.

Degree computation

Exact node degrees can trivially be computed in 1 round in Broadcast CONGEST: each node broadcasts its ID, and nodes then count the number of IDs they received. Applying Theorem 7 therefore gives an O(Δlogn)-round algorithm for degree computation in noisy beeping networks:

Theorem 12

Degree computation can be performed in O(Δlogn) rounds in the noisy beeping model, succeeding with high probability.

This improves significantly over the O(Δ2logn+log3n)-round algorithm obtained by applying the O(logn)-overhead simulation result of Ashkenazi, Gelles, and Leshem [4] to the algorithm of [9] in the noiseless beeping model with collision detection.

Distance-2 coloring

In vertex coloring, each node is required to output a color from some palette Φ such that no two adjacent nodes output the same color. It is a very well-studied problem in distributed computing, and the difficulty varies significantly depending on how many colors are in the palette. It is easy to see that a greedy coloring can always color using a palette of size Δ+1, though in a distibuted setting this is non-trivial and colorings using more colors can be computed faster.

Distance-2 vertex coloring has the stronger requirement that nodes within distance 2, rather than 1, must output different colors. Equivalently, this can be thought of as coloring G2, the square of the input graph. In this case, a greedy algorithm would require a palette size of at least Δ2+1 colors. Distance-2 coloring is often used as a synchronization procedure in wireless networks, since it ensure that any node has at most one neighbor of any color class. For example, it is an integral part previous simulation results in the beeping model [4, 7].

The faster prior result was by Ashkenazi, Gelles, and Leshem [4], who gave a randomized algorithm for distance-2 coloring noisy beeping networks using O(Δ2) colors in O(Δ2logn+log2n) rounds, based on simulating the algorithm of [9]. We improve this to O(Δlog3n), by simulating the following Broadcast CONGEST algorithm (Algorithm 2):

Algorithm 2.

Algorithm 2

Distance-2 Coloring in Broadcast CONGEST

(Note that nodes are counted as hearing messages even if they were themselves the sender.)

Lemma 13

Algorithm 2 computes a 2Δ2 (list)-coloring of G2 in O(log2n) rounds of Broadcast CONGEST, succeeding with high probability.

Proof

Firstly, if the algorithm terminates, then it produces a correct 2Δ2 (list)-coloring of G2. This is because whenever two nodes within distance 2 choose the same color c (either in the same or different iterations), each of their common neighbors (including themselves if they are in fact at distance 1) will broadcast COLLISIONc and prevent the latter of the two (or both, if the choices were in the same iteration) from outputting c.

Next, we show that the algorithm terminates within O(logn) iterations with high probability. Each node has at most Δ2 distance-2 neighbors (Δ at distance 1, and then a further Δ-1 for each of those distance-1 neighbors). Therefore, for a fixed node v, in any iteration, at most Δ2 total colors are either chosen by v’s distance-2 neighbors this iteration or have previously been output by such a distance-2 neighbor (since nodes that succeed and output a color then cease choosing colors). So, in any interation, v has a 12 probability of choosing a color which has not been output or chosen by one of its distance-2 neighbors. In this case, v will hear no COLLISIONc(v) messages and will successfully color itself. In expectation, therefore, at least 12 of the remaining uncolored nodes will color themselves in each iteration. So, after 3logn iterations, the expected number of remaining nodes is at most 1n2, and so there are no remaining uncolored nodes with high probability by Markov’s inequality.

Finally, we show that we need only allow 3logn rounds per iteration for broadcasting COLLISIONs, with high probability. We analze the probability that v has more than 3logn COLLISIONs to broadcast in each iteration. If this is the case, then v must a set SN(v){v} of size 3logn, such that all of the colors chosen by nodes in S were unique, but all were also chosen or previously output by nodes in N(v){v}\S. The number of choices for S is Δ+13lognΔ3logn, and the probability that each member of S chose a color causing v to detect a collision is at most Δ2Δ2=12Δ, even conditioned on the choices of the other nodes in S since by definition they must have chosen a different color. So, the probability that node v has more than 3logn COLLISIONs to broadcast is at most Δ3logn·12Δ3lognn-3. Taking a union bound over all n nodes and O(logn) iterations gives the statement.

Applying Theorem 7 therefore gives a running time of O(Δlog3n) in the noisy beeping model:

Theorem 14

2Δ2 (list)-coloring of G2 can be performed in O(Δlog3n) rounds in the noisy beeping model, succeeding with high probability.

This improves the previous complexity by a factor of Δlog2n, a major improvement for large Δ.

Maximal matching

In this section we give another example application of our simulation, to the problem of maximal matching. The problem is as follows: we assume each node has a unique O(logn)-bit ID. For a successful maximal matching, each node must either output the ID of another node, or Unmatched. The outputs must satisfy the following:

  • Symmetry: v outputs ID(u) iff u outputs ID(v). Since each node outputs at most one ID, this implies that the output indeed forms a matching.

  • Maximality: for every edge {u,v} in the graph, u and v do not both output Unmatched.

To our knowledge, no bespoke maximal matching algorithm has previously been designed for the beeping model (either noisy or noiseless) or for Broadcast CONGEST. So, the fastest existing beeping algorithm is obtained by simulating the best CONGEST algorithms using the simulation of [4]. Since an O(Δ+logn)-round CONGEST algorithm for maximal matching exists [29], the running time under [4]’s simulation is therefore O(Δ4logn+Δ3lognlogn).

We show an O(logn)-round Broadcast CONGEST algorithm for maximal matching, which our simulation then converts to an O(Δlog2n)-round algorithm in the noisy beeping model, thereby improving the running time by around a Δ3/logn factor.

The base of our algorithm is Luby’s algorithm for maximal independent set [28], which can be applied to produce a maximal matching (Algorithm 3).3

Algorithm 3.

Algorithm 3

Maximal Matching: Luby’s Algorithm

It is well-known (see [28]) that Luby’s algorithm produces a maximal matching in O(logn) rounds with high probability. To implement this in Broadcast CONGEST we must make some minor changes to account for the fact that it is nodes, not edges, that communicate (Algorithm 4).

The aim of the algorithm is as follows: if, in a particular round i, an edge {u,v} has a lower x({u,v}) value than all neighboring edges, the following process occurs. Its higher-ID endpoint (assume W.L.O.G. that this is u) first broadcasts PROPOSE{u,v},x({u,v}). The other endpoint v then broadcasts REPLY{u,v}. Node u then broadcasts CONFIRM{u,v}, and finally node v also broadcasts CONFIRM{u,v}. These CONFIRM messages cause nodes adjacent to u and v to be aware that u and v will be ceasing participation (because they have been matched), and so any edges to them can be discarded from the graph.

Algorithm 4.

Algorithm 4

Maximal Matching in Broadcast CONGEST

Lemma 15

If Algorithm 4 terminates (i.e. causes all nodes to cease participation), it outputs a maximal matching.

Proof

We first prove maximality. Nodes only cease participation when they are adjacent to an edge in MM, or when they have no remaining adjacent edges. Edges are only removed when they are adjacent to an edge in MM. So, upon termination, there are no edges in the original graph that are neither in MM nor adjacent to an edge in MM, and therefore MM is a maximal matching.

We now prove independence. Let {u,v} be an edge which is added to MM in round i, and assume W.L.O.G. that u is the higher-ID endpoint. It is clear that, since {u,v} is added to MM, we must have the behavior described above (u broadcasts PROPOSE{u,v},x({u,v}), v broadcasts REPLY{u,v}, u broadcasts CONFIRM{u,v}, v broadcasts CONFIRM{u,v}). Then, we can show that this excludes the possibility that any adjacent edge also joins MM in round i:

  1. u cannot act as the higher-ID endpoint of any other edge joining MM, since it only Proposes {u,v}.

  2. u cannot act as the lower-ID endpoint of any other edge joining MM, since it Confirms an edge it Proposed, and therefore cannot have broadcast any Reply.

  3. v cannot act as the higher-ID endpoint of any other edge joining MM, since it broadcasts a Reply and therefore does not CONFIRMev.

  4. v cannot act as the lower-ID endpoint of any other edge joining MM, since it only broadcasts Reply{u,v}, and does not Reply for any other edge.

So, no adjacent edge to {u,v} can join in round i. Furthermore, all nodes adjacent to u and v receive a CONFIRM{u,v} message and therefore all other edges adjacent to u and v are removed from the graph. So, no edge adjacent to {u,v} can be added to MM in future rounds either. This guarantees that MM is an independent set of edges.

Notation 16

We will use the notation ee to mean ee, i.e., e shares at least one endpoint with e (and can be e itself). We will denote |{eE:ee}| by d(e), i.e. the number of adjacent edges of e, including e itself.

Lemma 17

In any particular round i, the expected number of edges removed from the graph is at least m2.

This lemma refers to the current graph at round i, i.e. without all edges and nodes that have been removed in previous rounds, and m is accordingly the number of edges in the current graph.

Proof

It is easy to see that, as intended, an edge {u,v} is added to MM if it has a lower x({u,v}) value than all neighboring edges: its higher-ID endpoint (W.L.O.G. u), which sampled the value x({u,v}), will denote the edge as eu and Propose it, the x({u,v}) value will be lower than that for which v Proposed and so v will REPLY{u,v}, and u will not hear a lower-valued edge to Reply and will therefore CONFIRM{u,v}. v will also CONFIRM{u,v}, and all edges adjacent to {u,v} will be removed from the graph. There are d(u)+d(v)-1 such edges.

The probability that x({u,v})<x(e) for all e{u,v} with e{u,v} is 1d(u)+d(v)-1. So, the expected number of edges removed from the graph is at least 12{u,v}E(d(u)+d(v)-1)1d(u)+d(v)-1=m2 (where the 12 factor arises since each edge can be removed by either endpoint being matched, so is double-counted in the sum).

Lemma 18

Algorithm 4 performs maximal matching in O(logn) rounds of Broadcast CONGEST, succeeding with high probability.

Proof

By Lemma 15, Algorithm 4 produces a maximal matching if it terminates. Conditioning on the event that all sampled values are distinct, the algorithm removes at least half of the edges in the graph in each iteration in expectation. After 4logn iterations, therefore, the expected number of edges remaining is at most n2·n-4=n-2, and therefore by Markov’s inequaility, with probability at least 1-n-2 the number of edges remaining is 0 and the algorithm has terminated. Removing the conditioning on the event that sampled values are distinct, the algorithm terminates with probability at least 1-n-2-n-4.

Theorem 19

Maximal matching can be performed in O(Δlog2n) rounds in the noisy beeping model, succeeding with high probability.

Proof

Follows from applying Theorem 7 to Lemma 18 .

This is close to optimal, since we show an Ω(Δlogn) bound even in the noiseless model:

Theorem 20

Maximal matching requires Ω(Δlogn) rounds in the (noiseless) beeping model, to succeed with any constant probability.

Proof

Our hard ensemble of instances is as follows: the underlying graph will be KΔ,Δ, the complete bipartite graph with Δ vertices in each part. Each node’s ID will be drawn independently at random from [n4].

Arbitrarily naming the two parts of the graph left and right, we consider the outputs of nodes on the right. For a correct output to maximal matching, each node on the right must uniquely output the ID of a node on the left, and so the union of outputs of the right part must be the list of IDs of the right part. The number of possible such lists (even assuming that IDs are all unique and the IDs of the right side are fixed) is n4-ΔΔ12n4Δn42ΔΔn3Δ.

We note that each right node’s output must be dependent only on its ID, its local randomness, and the transcript of communication performed by left nodes during the course of the algorithm. Since the graph is a complete bipartite graph, in each round there are only two discernable possibilities for communication from the perspective of right-part nodes: either at least one left node beeps, or none do. So, the transcript for an r-round algorithm can be represented as a sequence {B,S}r, corresponding to hearing a beep or silence in each round. There are 2r such transcripts.

Therefore, the union of output from right nodes can be expressed as a function of the randomness of right-part nodes (both for their IDs and any local randomness used in the algorithm), and the transcript. Each transcript therefore induces a distribution of right-part outputs, over the randomness of right-part nodes.

There must be some set of left-part IDs such that under any transcript, the probability that the right-side nodes correctly output that set is at most 2r/n3Δ. So, if rΔlogn, then the probability that the right part produces a correct output on this instance is at most nΔ/n3Δ=o(1).

All-Pairs shortest paths

The All-Pairs Shortest Paths problem is another very well-studied graph problem, in which each node must output a minimum-distance path to every other node in the graph. The problem can be studied using either unweighted edges, in which case distance is standard graph distance, or with weighted edges, in which case the length of a path is the sum of all weights along that path.

Theorem 21

Unweighted All-Pairs Shortest Paths can be solved in O(nΔlogn) rounds, and weighted All-Pairs Shortest Paths can be solved in O~(nΔ2) rounds, in the noisy beeping model, succeeding with high probability.

Proof

For unweighted All-Pairs Shortest Paths, the O(n)-round algorithm of [24] can be simulated. This algorithm is written for CONGEST, but it can be seen that it in fact works unchanged in Broadcast CONGEST, and therefore can be simulated in O(nΔlogn) rounds using Theorem 7. For weighted All-Pairs Shortest Paths, the O~(n)-round CONGEST algorithm of Bernstein and Nanongkai [8] can be simulated in O~(nΔ2) rounds.

Conclusions

We have presented an optimal method for simulating Broadcast CONGEST and CONGEST in the noisy (and noiseless) beeping model. We have also presented several example applications, including a maximal matching algorithm which requires O(logn) rounds in Broadcast CONGEST, and which, using our simulation, can therefore be run in O(Δlog2n) rounds in the noisy beeping model.

While our general simulation method is optimal, there is still room for improvement for many specific problems in the beeping model, and the complexity picture has significant differences from the better-understood message passing models. For example, in CONGEST, the problems of maximal matching and maximal independent set have similar O(logΔ+logO(1)logn) randomized round complexity upper bounds [5, 21, 30], whereas in the beeping model, maximal independent set can be solved in logO(1)n rounds [1] while maximal matching requires Ω(Δlogn) (Theorem 20). In general, the question of which problems can be solved in O(logO(1)n) rounds in the beeping model, and which require poly(Δ) factors, remains mostly open.

Author Contributions

All work conducted by Peter Davies-Peck.

Funding

Peter Davies-Peck is supported by EPSRC New Investigator Award UKRI155.

Declarations

Competing interests

There are no other financial interests or conflicts of interest to disclose.

Footnotes

1

Technically, v does not know which neighbor corresponds to which codeword, but this is not required by our approach.

2

For simplicity of notation, we will assume that a node counts a round in which it itself beeped as ‘hearing’ a 1, and in the noisy model, flips this 1 with probability ε itself. Of course, in practice this is unnecessary, and having full information about its own message can only help a node.

3

Often this algorithm is stated with real values x(e) sampled from [0, 1]; however, since we must communicate these values using O(logn)-bit messages, we instead use integers from [n9]. It can be seen that with probability at least 1-n-4, no two of the values sampled during the algorithm are the same, so we can condition on this event for the rest of the analysis and avoid considering ties.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Afek, Y., Alon, N., Bar-Joseph, Z., Cornejo, A., Haeupler, B., Kuhn, F.: Beeping a maximal independent set. Distrib. Comput. 26(4), 195–208 (2013) [Google Scholar]
  • 2.Afek, Y., Alon, N., Barad, O., Hornstein, E., Barkai, N., Bar-Joseph, Ziv: A biological solution to a fundamental distributed computing problem. Science 331(6014), 183–185 (2011) [DOI] [PubMed] [Google Scholar]
  • 3.Ahmadi, M., Kuhn, F., Oshman, R.: Distributed approximate maximum matching in the CONGEST model. In 32nd International Symposium on Distributed Computing (DISC 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, (2018)
  • 4.Ashkenazi, Y., Gelles, R., Leshem, A.: Noisy beeping networks. Inf. Comput. 289, 104925 (2022) [Google Scholar]
  • 5.Barenboim, L., Elkin, M., Pettie, S., Schneider, J.: The locality of distributed symmetry breaking. J. ACM (JACM) 63(3), 1–45 (2016) [Google Scholar]
  • 6.Beauquier, J., Burman, J., Davies, P., Dufoulon, F.: Optimal multi-cast with beeps using group testing. In: Censor-Hillel, K., Flammini, M. (eds.) Structural Information and Communication Complexity, pp. 66–80. Springer, New York (2019) [Google Scholar]
  • 7.Beauquier, J., Burman, J., Dufoulon, F., Kutten, S.: Fast beeping protocols for deterministic mis and Inline graphic-coloring in sparse graphs. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pages 1754–1762, (2018)
  • 8.Bernstein, A., Nanongkai, D.: Distributed exact weighted all-pairs shortest paths in near-linear time. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, pages 334–342, (2019)
  • 9.Casteigts, A., Métivier, Y., Robson, J.M., Zemmari, A.: Design patterns in beeping algorithms: Examples, emulation, and analysis. Inf. Comput. 264, 32–51 (2019) [Google Scholar]
  • 10.Chechik, S., Mukhtar, D.: Reachability and shortest paths in the broadcast congest model. In 33rd International Symposium on Distributed Computing (DISC 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, (2019)
  • 11.Cornejo, A., Kuhn, F.: Deploying wireless networks with beeps. In International Symposium on Distributed Computing, pages 148–162. Springer, (2010)
  • 12.Czumaj, A., Davies, P.: Communicating with beeps. J. Parallel Distrib. Comput. 130, 98–109 (2019) [Google Scholar]
  • 13.Czumaj, A., Davies, P.: Leader election in multi-hop radio networks. Theoret. Comput. Sci. 792, 2–11 (2019) [Google Scholar]
  • 14.Davies, P.: Optimal message-passing with noisy beeps. In Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing, pages 300–309, (2023)
  • 15.Dufoulon, F., Burman, J., Beauquier, J.: Beeping a deterministic time-optimal leader election. In 32nd International Symposium on Distributed Computing (DISC 2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, (2018)
  • 16.Dufoulon, F., Burman, J., Beauquier, J.: Can uncoordinated beeps tell stories? In Proceedings of the 39th Symposium on Principles of Distributed Computing, PODC ’20, page 408–417, New York, NY, USA, (2020). Association for Computing Machinery
  • 17.D’yachkov, A.G., Rykov, V.V.: Bounds on the length of disjunctive codes. Problemy Peredachi Informatsii 18(3), 7–13 (1982) [Google Scholar]
  • 18.D’yachkov, A., Vorobyev, I., Polyanskii, N., Shchukin, V.: Almost cover-free codes and designs. Des. Codes Crypt. 82(1), 231–247 (2017) [Google Scholar]
  • 19.Förster, K.-T., Seidel, J., Wattenhofer, R.: Deterministic leader election in multi-hop beeping networks. In: Kuhn, F. (ed.) Distributed Computing, pp. 212–226. Springer, Berlin Heidelberg (2014) [Google Scholar]
  • 20.Füredi, Z.: Onr-cover-free families. J. Comb. Theory, Ser. A 73(1), 172–173 (1996) [Google Scholar]
  • 21.Ghaffari, M.: An improved distributed algorithm for maximal independent set. In Proceedings of the twenty-seventh annual ACM-SIAM symposium on Discrete algorithms, pages 270–277. SIAM, (2016)
  • 22.Ghaffari, M., Haeupler, B.: Near optimal leader election in multi-hop radio networks. In Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, pages 748–766. SIAM, (2013)
  • 23.Halldórsson, M.M., Kuhn, F., Maus, Y., Tonoyan, T.: Efficient randomized distributed coloring in congest. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2021, page 1180–1193, New York, NY, USA, (2021). Association for Computing Machinery
  • 24.Holzer, S., Wattenhofer, R.: Optimal distributed all pairs shortest paths and applications. In Proceedings of the 2012 ACM symposium on Principles of distributed computing, pages 355–364, (2012)
  • 25.Huffman, W.C., Pless, V.: Fundamentals of Error-Correcting Codes. Cambridge university press (2010) [Google Scholar]
  • 26.Kautz, W., Singleton, R.: Nonrandom binary superimposed codes. IEEE Trans. Inf. Theory 10(4), 363–377 (1964) [Google Scholar]
  • 27.King, V., Kutten, S., Thorup, M.: Construction and impromptu repair of an mst in a distributed network with o (m) communication. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, pages 71–80, (2015)
  • 28.Luby, M.: A simple parallel algorithm for the maximal independent set problem. SIAM J. Comput. 15(4), 1036–1053 (1986) [Google Scholar]
  • 29.Panconesi, A., Rizzi, R.: Some simple distributed algorithms for sparse networks. Distrib. Comput. 14(2), 97–100 (2001) [Google Scholar]
  • 30.Rozhoň, V., Ghaffari, M.: Polylogarithmic-time deterministic network decomposition and distributed derandomization. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, pages 350–363, (2020)
  • 31.Ruszinkó, M.: On the upper bound of the size of the r-cover-free families. J. Comb. Theory, Ser. A 66(2), 302–310 (1994) [Google Scholar]

Articles from Distributed Computing are provided here courtesy of Springer

RESOURCES