Skip to main content

Advertisement

Log in

Tight bounds for k-set agreement with limited-scope failure detectors

  • Spec Issue Disc 03
  • Published:
Distributed Computing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

In a system with limited-scope failure detectors, there are q disjoint clusters of processes such that some correct process in each cluster is never suspected by any process in that cluster. The failure detector class S x,q satisfies this property all the time, while ⋄S x,q satisfies it eventually. This paper gives the first tight bounds for the k-set agreement task in asynchronous message-passing models augmented with failure detectors from either the S x,q or ⋄S x,q classes. For S x,q , we show that any k-set agreement protocol that tolerates f failures must satisfy f < k + xq if q < k and f < x otherwise, where x is the combined size of the q disjoint clusters if q < k (or the k largest, otherwise). This result establishes for the first time that the protocol of Mostèfaoui and Raynal for the S x = S x,1 failure detector is optimal.

For ⋄S x,q , we show that any k-set agreement protocol that tolerates f failures must satisfy \( f \textless \hbox{min}(\frac{n+1}{2},k+x-q) \) if q < k and \( f \textless \hbox{min}(\frac{n+1}{2},x) \) otherwise, where n + 1 is the total number of processes. We give a novel protocol that matches our lower bound, disproving a conjecture of Mostèfaoui and Raynal for the ⋄S x = ⋄S x,1 failure detector.

Our lower bounds exploit techniques borrowed from Combinatorial Topology, demonstrating for the first time that this approach is applicable to models that encompass failure detectors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anceaume, E., Hurfin, M., Parvedy, P.R.: An efficient solution to the k-set agreement problem. Technical Report PI-1440, INRIA (2003)

  2. Attiya, H., Avidor, Z.: Wait-free n-set consensus when inputs are restricted. In: Malkhi, D. (ed.) Distributed Computing, 16th International Conference, DISC 2002, Toulouse, France, October 28-30, 2002 Proceedings, vol. 2508 of Lecture Notes in Computer Science, pp. 326–338. Springer (2002)

  3. Borowsky, E., Gafni, E.: Generalized flp impossibility result for t-resilient asynchronous computations. In: Proceedings of the 1993 ACM Symposium on Theory of Computing (1993)

  4. Chandra, T.D., Hadzilacos, V., Toueg, S.:The weakest failure detector for solving consensus. Journal of the ACM (JACM) 43(4), 685–722 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  5. Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Journal of the ACM (JACM) 43(2), 225–267 (1996)

    MathSciNet  Google Scholar 

  6. Chaudhuri, S.: Agreement is harder than consensus: set consensus problems in totally asynchronous systems. In: Proceedings of the Ninth Annual ACM Symosium on Principles of Distributed Computing, pp. 311–234 (1990)

  7. Chaudhuri, S., Herlihy, M.,Lynch, N.A., Tuttle, M.R.:Tight bounds for k-set agreement. Journal of the ACM (JACM) 47(5), 912–943 (2000)

    MathSciNet  Google Scholar 

  8. Gafni, E.: Round-by-round fault detectors (extended abstract): unifying synchrony and asynchrony. In: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pp. 143–152. ACM Press (1998)

  9. Herlihy, M., Rajsbaum, S.: Algebraic spans. Mathematical Structures in Computer Science 10(4), 549–573 (2000). Special Issue: Geometry and Concurrency.

    MathSciNet  MATH  Google Scholar 

  10. Herlihy, M., Rajsbaum, S., Tuttle, M.R.: Unifying synchronous and asynchronous message-passing models. In: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pp. 133–142. ACM Press (1998)

  11. Herlihy, M., Rajsbaum, S., Tuttle, M.R.: A new synchronous lower bound for set agreement. In: Proceedings of DISC 2001, pp. 136–150 (2001)

  12. Herlihy, M., Shavit, N.: The topological structure of asynchronous computability. Journal of the ACM (JACM) 46(6), 858–923 (1999)

    MathSciNet  MATH  Google Scholar 

  13. Mostèfaoui, A., Rajsbaum, S., Raynal, M., Roy, M.: Condition-based protocols for set agreement problems. In: Malkhi, D. (ed.) Distributed Computing, 16th International Conference, DISC 2002, Toulouse, France, October 28-30, 2002 Proceedings, vol. 2508 of Lecture Notes in Computer Science, pp. 48–62. Springer (2002)

  14. Mostèfaoui, A., Raynal, M.: k-set agreement with limited accuracy failure detectors. In: Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, pp. 143–152. ACM Press (2000)

  15. Munkres, J.R.: Elements Of Algebraic Topology. Addison Wesley, Reading MA (1984) ISBN 0-201-04586-9.

    MATH  Google Scholar 

  16. Saks, M., Zaharoglou, F.: Wait-free k-set agreement is impossible: The topology of public knowledge. SIAM Journal on Computing 29(5), 1449–1483 (2000)

    MathSciNet  MATH  Google Scholar 

  17. Spanier, E.H.: Algebraic Topology. Springer-Verlag, New York (1966)

    MATH  Google Scholar 

  18. Yang, J., Neiger, G., Gafni, E.: Structured derivations of consensus algorithms for failure detectors. In: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pp. 297–306. ACM Press (1998)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. D. Penso.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Herlihy, M., Penso, L.D. Tight bounds for k-set agreement with limited-scope failure detectors. Distrib. Comput. 18, 157–166 (2005). https://doi.org/10.1007/s00446-005-0141-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00446-005-0141-8

Keywords