Next Article in Journal
Parallelized Swarm Intelligence Approach for Solving TSP and JSSP Problems
Next Article in Special Issue
Constant-Time Complete Visibility for Robots with Lights: The Asynchronous Case
Previous Article in Journal
Special Issue on Ensemble Learning and Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Ring Exploration with (H,S) View †

1
Graduate School of Information Science and Technology, Osaka University, 1-5 Yamadaoka, Suita, Osaka 565-0871, Japan
2
Nara Institute of Science and Technology, 8916-5 Takayamacho, Ikoma, Nara 630-0101, Japan
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in the proceedings of the 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2019), Pisa, Italy, 22–25 October 2019.
Algorithms 2020, 13(6), 141; https://doi.org/10.3390/a13060141
Submission received: 22 April 2020 / Revised: 8 June 2020 / Accepted: 9 June 2020 / Published: 12 June 2020

Abstract

:
The researches about a mobile entity (called agent) on dynamic networks have attracted a lot of attention in recent years. Exploration which requires an agent to visit all the nodes in the network is one of the most fundamental problems. While the exploration of dynamic networks with complete information or with no information about network changes has been studied, an agent with partial information about the network changes has not been considered yet despite its practical importance. In this paper, we consider the exploration of dynamic networks by a single agent with partial information about network changes. To the best of our knowledge, this is the very first work to investigate the exploration problem with such partial information. As a first step in this research direction, we focus on 1-interval connected rings as dynamic networks in this paper. We assume that the single agent has partial information called the ( H , S ) view by which it always knows whether or not each of the links within H hops is available in each of the next S time steps. In this setting, we show that H + S n and S n / 2 (n is the size of the network) are necessary and sufficient conditions to explore 1-interval connected rings. Moreover, we investigate the upper and lower bounds of the exploration time. It is proven that the exploration time is O ( n 2 ) for n / 2 S < 2 H 1 , O ( n 2 / H + n H ) for S max ( n / 2 , 2 H 1 ) , O ( n 2 / H + n log H ) for S n 1 , and Ω ( n 2 / H ) for any S where H = min ( H , n / 2 ) .

1. Introduction

More applications of dynamic networks have arisen in recent years, for example, wireless mobile ad hoc, transportation, inter vehicle, or social networks and so on, more important the researches about the dynamic networks have got. A network is dynamic if its topology may change with time (due to various reasons, e.g., faults or movements of nodes). In a dynamic network, existing methods designed for static networks (the topologies of which do not change with time) might no longer work. For this reason, the researchers have started to consider several problems on dynamic networks [1].
The exploration which requires a mobile entity called an agent (e.g., a software agent, a robot, or a vehicle) to visit all the nodes of the network is one of the most fundamental problems. The exploration is useful for solving fundamental tasks on the networks such as broadcast or network maintenance. It has been well-studied for static networks [2] and recently been studied for dynamic networks. In the previous works about the exploration of dynamic networks, two extreme cases are considered: an agent has the a priori complete knowledge about changes of all the links for all the future time steps [3,4,5,6,7]; or an agent can only see whether the links adjacent to its current node are present or not at the moment [8,9,10,11,12]. The former one models the situation where the network changes are completely predictable as the public transportation networks in which the network changes are introduced by totally scheduled movements of the nodes. The latter one models the situation where the network changes are caused by unscheduled events, for example, faults or unscheduled movements of the nodes.
Although the above two models are plausible and also theoretically important, the intermediate model, i.e., an agent with partial information or, in other words, capability to know link changes within some distance in the near future should be considered due to the following reasons: even in the totally scheduled situation (if exists), computing all the future changes often costs computation time and it is desirable to compute only the necessary information to solve a problem to save computing time or memories; the ability of an agent to monitor whether there are faults or environmental changes roughly depends on the quality (or costs) of its sensor and it can save some costs to compute only the necessary information for a problem. Moreover, such a model is so interesting from a theoretical viewpoint: how the amount of information available for an agent influences the solvability or the time complexity of problems.
In this paper, we consider the exploration of dynamic networks by a single agent with partial information about network changes. To the best of our knowledge, this is the very first work to investigate the exploration using such partial information. As a first step in this research direction, we focus on 1-interval connected rings as dynamic networks in this paper. To formalize the concept of partial information and analyze its influences, in this paper, we first propose the ( H , S ) view such that the agent with the view can see the link scheduling (when and which links disappear or appear) of the links within H hops from its location for S time steps from the current time. Then, we consider how the value of H or S influences the solvability or the time complexity of the exploration by a single agent of 1-interval connected rings in which at most one link is missing at each time step. While the 1-interval connected rings are probably too restrictive from a practical point of view, they are adequate targets to investigate in the novel direction as investigated in many works (e.g., in the field of mobile agents on dynamic networks, [7,10,13,14,15] consider 1-interval connected rings).

1.1. Related Works

To see various settings and exploration algorithms on static networks, there is a good survey [2], for example, a network with distinct node labeling or without node labeling (an anonymous network), exploration with termination or perpetual exploration, and from the point of the number of agents, exploration by a single agent or by multiple agents.
The literature of dynamic networks are surveyed in [1,16].
The recent works about mobile agents (or robots) on dynamic networks are summarized in [17] including exploration; gathering on 1-interval connected rings [13] which requires all the agents to gather at one node or at adjacent two nodes; dispersion [18] which stipulates that every node must be occupied by exactly one agent where the number of agents is the same as that of nodes on permuting rings in which the nodes may be permuted at each time step, i.e., the neighbors of a node may change at each time step while the topologies are rings or paths at each time step.
The following works consider the exploration of dynamic networks by multiple agents (or robots) without the knowledge of a link scheduling (or only with the ability to detect whether the adjacent links are present or not at the moment). In [10], the exploration for 1-interval connected rings is considered. The perpetual exploration (i.e., the exploration without termination) on connected-over-time rings is considered in [8,9]. In [11], the perpetual exploration on two kinds of temporal networks with arbitrary footprints is considered: connected-over-time graphs and 1-interval connected graphs with bounded missing links. The difference between with or without the ability to detect whether the adjacent links are present or not at the moment (called the link presence detection) is considered in [12] for an n × m dynamic torus which consists of n horizontal rings and m vertical rings each of which is a 1-interval connected ring. It is shown that the minimum number of agents with the link presence detection to explore the networks is a half of the minimum number of agents without the one to explore.
The following works consider the exploration of dynamic networks by an agent with the full knowledge of a link scheduling, i.e., the information about when and which links disappear or appear. In [7], the exploration is considered on T-interval connected rings where at most one link is missing at each time step and for any T successive time steps, there exists a common spanning connected component. It is shown that the optimal exploration time is 2 n 3 when T = 1 where n is the network size. In [6], the exploration on 1-interval connected cactuses is considered. They show that the graphs can be explored in 2 O ( log n ) time which is much less than the known upper bound for the general graph, O ( n 2 ) . In [3], the authors reveal the existence of the 1-interval connected graphs which have the exploration time Ω ( n 2 ) , proving the exploration time of arbitrary 1-interval connected graphs is Θ ( n 2 ) . In [5], it is shown that when the maximum degree at each time step is upper-bounded by d, the exploration time is reduced to O ( ( d n 2 log d ) / log n ) . In [4], the authors prove that the exploration time is reduced to O ( n 1.75 ) if an agent can move two hops in each time step.
Other problems are also considered on dynamic networks; patrolling on 1-interval connected rings [14] which requires the maximum length of the interval between two visits to a node to be minimized; compacting on 1-interval connected rings [15] which stipulates that all the agents in a network must be located in a continuous part of the ring and at each node there exists at most one agent.

1.2. Our Contributions

In this paper, we consider the exploration of 1-interval connected rings by a single agent with the ( H , S ) view (formalizing the proofs and the pseudo codes and extending the results given in [19]). Remind that the agent with the ( H , S ) view can see the link scheduling of the links within H hops ( 1 H n / 2 ) from its location for S time steps from the current time. To the best of our knowledge, this is the first work to generalize the agent capacity to see a link scheduling.
The results are summarized in Table 1. For the proposed model, we show that H + S n and S n / 2 (n is the size of networks) are the necessary and sufficient conditions to explore 1-interval connected rings by a single agent. We also show that in the case where the above conditions holds, the exploration can be achieved within O ( n 2 ) time if 2 H 1 > S or otherwise O ( n 2 / H + n H ) time where H = min ( H , n / 2 ) . This is a new addition to the contributions of the previous work [19]. Moreover, we show that when S n 1 , the exploration time can be reduced to O ( n 2 / H + n log H ) . This leads to O ( n log n ) time when H = Θ ( n / log n ) . Finally, we show a lower bound of the exploration time, Ω ( n 2 / H ) , for any S. This implies that we have tight bound Θ ( n 2 / H ) when H + S n , max ( n / 2 , 2 H 1 ) S , and H is O ( n 0.5 ) and when S n 1 and H = O ( n / log n ) .

2. Models and Terminologies

We consider a time variant ring R = ( V , E , ρ ) where G = ( V , E ) is a ring network, i.e.,  V = { v 0 , v 1 , , v n 1 } is a set of n nodes and E = { e 0 , e 1 , , e n 1 } is a set of n links such that e i = ( v i , v i + 1 mod n ) . The nodes of the network are anonymous. For simplicity, we omit mod n in the following. A function ρ : E × N { 0 , 1 } is called a link presence function such that ρ ( e , t ) is 1 (resp., 0) if link e is present (resp., missing) at time step (or step) t N . A network at each step t is denoted as R t = ( V , E t ) where E t = { e i E | ρ ( e i , t ) = 1 } . We assume that R is 1-interval connected, i.e., at each step t, a network R t is connected. In other words, at each step t, there is at most one missing link e i E such that e i E t .
We say the ascending (resp., descending) order of node indices is the right (resp., left) direction. Each port of e i has a globally consistent label at v i and v i + 1 which gives an entity on the ring a global direction (the right direction at v i and the left direction at v i + 1 ) of the ring. Given a connected component V V , the right (resp., left) extremity of V is the node v i V such that v i + 1 V (resp., v i 1 V ). If  | V | = 1 , the unique node in V is both the right extremity and the left extremity of V .
In the network, a single agent A is operational. Agent A knows the network size n, has computation capacity and its own memory, and can traverse at most one link in each step. In addition to them, A can get the view which contains information of presence of nearby links in near future as defined later. In a step t, A at a node, say v i , first decides which direction it moves and updates its memory depending on the current content of its memory and the view from v i . If the corresponding link is present at t, A succeeds to move and reaches a neighbor of v i by the end of t. Otherwise, A fails to move and stays at v i .
Informally speaking, the  ( H , S ) view that agent A can get shows which link is missing within H hops from the current node and within S steps in the future including the current step. Formally speaking, for  n / 2 H 1 and S 1 , A gets the ( H , S ) view β H , S ( i , s ) = { ( e j , t , ρ ( e j , t ) ) | i H j i + H 1 , s t s + S 1 } when A exists on v i at step s. For example, when H = 2 , S = 2 , and A exists on v 0 at step 5, A can see β 2 , 2 ( 0 , 5 ) = { ( e 1 , 5 , 0 ) , ( e 0 , 5 , 1 ) , ( e n 1 , 5 , 1 ) , ( e n 2 , 5 , 1 ) , ( e 1 , 6 , 1 ) , ( e 0 , 6 , 0 ) , ( e n 1 , 6 , 1 ) , ( e n 2 , 6 , 1 ) } . When no confusion arises, we simply write the view instead of writing the “ ( H , S ) view”.
It is assumed that a link scheduling (or ρ ( e i , t ) for every e i and every step t > 0 ) is decided by the adversary. The adversary knows the algorithm of A, has infinite computation capacity, and tries to prevent A from exploring the ring.
In this paper, we consider the exploration problem by a single agent A: A is required to visit all the nodes in the ring. A node is said to be explored by (resp., at) the t-th step when it is visited by A at the end of the ( t 1 )-th step or earlier (resp., at the end of the ( t 1 )-th step for the first time). In the similar manner, we say that A reaches a node at the t-th step when A visits the node at the end of the ( t 1 )-th step and that A explores a node v at the t-th step if v is unexplored at the start of the ( t 1 )-th step and A reaches v at the t-th step. The set of explored (resp., unexplored) nodes at the start of the t-th step is denoted by V t (resp., V t ¯ ). Without loss of generality, we assume A starts the exploration from v 0 .
In the following, we use “to move to right (resp., left)” instead of “to move in the right (resp., left) direction” for simplicity.

3. Impossibility Result

We show an impossibility result in this section. Specifically, we show that the exploration is impossible when H + S < n or S < n / 2 holds.
Lemma 1.
If H + S < n or S < n / 2 , a  deterministic single agent with the ( H , S ) view cannot explore 1-interval connected rings.
Proof. 
We first consider the condition S < n / 2 . We assume H = n / 2 . It suffices to show that the exploration is impossible when S = n / 2 1 . We assume for contradiction, that there is an algorithm by which A can explore any ring under any link scheduling when S = n / 2 1 . Since A can explore the ring, A starting from v 0 eventually reaches v n 1 (no matter whether the exploration is completed or not).
The adversary decides a link scheduling so that e n 1 (resp., e n 2 ) is missing when A exists on v 0 (resp., v n 2 ). The adversary first keeps showing a link scheduling where e n 1 is kept deleted for S steps from the current step until A moves to v n n / 2 . If A does not move to v n n / 2 and stays v i for 0 i < n n / 2 , e n 1 is kept deleted and A cannot reach v n 1 (A must pass through e n 1 or e n n / 2 1 to reach v n 1 from v 0 ), which is a contradiction. Thus, A eventually reaches v n n / 2 at some step, say t.
Then, the adversary deletes e n 2 from the ( t + S 1 )-th step (the ( t + n / 2 2 )-th step) until A moves to v n n / 2 1 . By the scheduling, since A reaches v n 2 at earliest at the ( t + n 2 ( n n / 2 ) )-th step (the ( t + n / 2 2 )-th step) from v n n / 2 , e n 2 starts to disappear when (or before) A reaches v n 2 and keeps disappearing unless A moves to v n n / 2 1 . Thus, if A does not move to v n n / 2 1 , A cannot reaches v n 1 . This is a contradiction.
This means that A moves to v n n / 2 1 after the t-th step. However, by the similar way, the adversary can prevent A from reaching v n 1 . This is a contradiction. Hence, when S < n / 2 , a single agent cannot explore 1-interval connected rings.
Secondly, we consider the condition H + S < n and S n / 2 . It is sufficient to show that A cannot explore the ring when S = n H 1 for 1 H n / 2 1 since H < n / 2 from the conditions. Again, we assume for contradiction, that there is an algorithm by which A can explore any ring under any link scheduling. Since A can explore the ring, A starting from v 0 eventually reaches v n 1 (no matter whether the exploration is completed or not).
The adversary first keeps showing a link scheduling where e n 1 is kept deleted for S steps from the current step until A moves to v H . If A does not move to v H and stays at v i for 0 i H 1 , e n 1 is kept deleted and A cannot reach v n 1 , which is a contradiction. Thus, A eventually reaches v H at some step, say t. After step t, depending on whether A reaches v H 1 before v n H 1 or not, the missing link is decided (Figure 1). Note that since H n / 2 1 , ( n H 1 ) ( H 1 ) 2 and there exists a node v i such that H i n H 2 . Moreover, A can see neither e n 1 nor e n 2 in its view when existing at v i for H i n H 2 .
If A reaches v H 1 before v n H 1 , the adversary keeps deleting e n 1 . By the link scheduling, unless A decides to reach v n H 1 from v H , e n 1 is kept deleted and A cannot reach v n 1 , which is a contradiction. This means that A eventually reaches v n H 1 . Let t be the last step before A reaches v n H 1 such that A exists at v H 1 at the start of t .
When A leaves v H 1 at the t -th step, the adversary makes a scheduling so that e n 2 starts and keeps disappearing from the ( t + n H 1 )-th step until A comes back to v n H 2 . This does not conflict with the link scheduling in the past view of A since at the t -th step, e n 1 is scheduled to be deleted for the next S = n H 1 steps and for the next n H 1 x steps at the ( t + x )-th step.
Since it takes at least n H 2 steps to reach v n 2 from v H , A reaches v n 2 at earliest at the ( t + n H 1 )-th step. However, at the ( t + n H 1 )-th step, e n 2 is missing and the adversary keeps deleting e n 2 until A reaches v n H 2 . Then, A cannot reach v n 1 unless moving to v n H 2 . However, by the similar way, the adversary can prevent A from reaching v n 1 . This is a contradiction. Hence, when H + S < n or S < n / 2 , a single agent cannot explore 1-interval connected rings. □

4. Possibility Result and Upper Bounds of Exploration Time

In this section, we prove the exploration is possible when H + S n and S n / 2 by giving an exploration algorithm by a single agent. In the following, we use H = min ( H , n / 2 ) . The algorithm also gives upper bounds of the exploration time, O ( n 2 / H + n H ) if 2 H 1 S or otherwise O ( n 2 ) . Note that S H since S n / 2 and H n / 2 .
We first introduce two operations ExpH ( t , v i ) and EXPONE ( t , v i ) that are used as building blocks to construct the exploration algorithm.
In the algorithms, Extremity ( t , v ) is a function which returns right if v is the right extremity of V t , left if v is the left extremity, or otherwise nil. Variable dir is used to store the direction and dir ¯ denotes the other direction (e.g., if dir is right, dir ¯ is left).
ExpH. ExpH ( t , v i ) described in Algorithm 1 is an algorithm by which A explores H nodes when A starts ExpH ( t , v i ) from v i at the t-th step under the assumption that v i is the right or left extremity of V t and 2 H + | V t | 1 min ( S + 1 , n ) . Note that in the following, when A executes ExpH ( t , v i ) , A is always on the right or left extremity of V t .
When starting the algorithm, A first sees if v i is the right extremity or the left one and stores right if v i is the right extremity or otherwise left in dir. If A can move H hops to dir by the ( t + 2 H + | V t | 2 )-th step according to the view, A does so (Figure 2b). Otherwise, A moves | V t | 1 + H hops to dir ¯ (Figure 2c). Notice that A can decide this condition because H H and 2 H + | V t | 2 S .
Algorithm 1 ExpH ( t , v i )
1: dir Extremity ( t , v i )
2: if A can move H hops to dir by the ( t + 2 H + | V t | 2 ) -th step then
3:  Move H hops to dir
4: else
5:   Move | V t | 1 + H hops to dir ¯
6: Wait until the ( t + 2 H + | V t | 2 )-th step
Lemma 2.
Suppose that at the t-th step, A exists at the right or left extremity, say v i , of  V t and starts ExpH ( t , v i ) . If 2 H + | V t | 1 min ( S + 1 , n ) , A explores H nodes by the t -th step (the end of ExpH ( t , v i ) ) and exists on the right or left extremity of V t at the t -th step where t = t + 2 H + | V t | 2 .
Proof. 
Without loss of generality, we assume v i is the right extremity of V t . Let m = | V t | , E r = { e i , e i + 1 , , e i + H 2 , e i + H 1 } , and  E l = { e i H m + 1 , e i H m + 2 , , e i 2 , e i 1 } . Note that since | E r | + | E l | = 2 H + m 1 and 2 H + m 1 n , E r E l = .
Now, consider the move of A. Since 2 H + m 1 S + 1 , i.e., 2 H + m 2 S , A can see whether it can move H hops to right by the ( t + 2 H + m 2 ) -th step or not.
If A can, A moves H hops to right and thus the lemma holds.
Otherwise, A can move at most H 1 hops to right by the ( t + 2 H + m 2 )-th step, which means during the 2 H + m 2 steps, there exists at least 2 H + m 2 ( H 1 ) = H + m 1 steps at each of which one of the links in E r is missing. Since at most one link is missing at each step and E r E l = , every link in E l exists at each of the H + m 1 steps. Thus, A succeeds to move H + m 1 hops to left and the lemma holds. □
EXPONE. EXPONE ( t , v i ) described in Algorithm 2 is an algorithm by which A explores at least one node or completes the exploration when A starts EXPONE ( t , v i ) from v i at the t-th step under the assumption that v i is the right or left extremity of V t . Note that in the following, when A executes EXPONE ( t , v i ) , A is always on the right or left extremity of V t .
When starting the algorithm, A first sees if v i is the right extremity or the left one and stores the direction in dir. Variables i and i are used to remember the dir neighbor of v i and the dir incident edge of v i respectively, e.g.,  i = i + 1 (resp., i = i 1 ) if dir is right (resp., left). Then, A stores max ( n H , n / 2 ) to S which is not larger than S and is used instead of S in the algorithm.
After that, if  e i appears by the ( t + S 1 )-th step, A waits at v i until e i appears and moves to v i when e i appears. Otherwise, for each 0 d H 1 , A moves one hop to dir ¯ at the ( t + d )-th step if e i is missing at the ( t + S 1 + d )-th step in its view (Figure 3a). If A sees e i appear at the ( t + S 1 + d )-th step in its view at the ( t + d )-th step, then A starts to move dir from the ( t + d )-th step, returns to v i , waits at v i until e i appears, and reaches v i through e i (Figure 3b). When d reaches H, i.e., A moves H hops to dir ¯ and e i is no longer included in the view of A, A starts to keep moving to dir ¯ until reaching v i and the exploration finishes when reaching v i (Figure 3c).
Algorithm 2 ExpOne ( t , v i )
1: dir Extremity ( t , v i )
2: if dir is right then
3:  i i + 1 , i i
4: else
5:  i i 1 , i i 1
6: d 0
7: S max ( n H , n / 2 )
8: while d < H ) do
9: if e i is always missing until the ( t + d + S 1 )-th step then
10:  Move one hop to dir ¯
11:   d d + 1
12: else
13:  Move d hops to dir (reach v i )
14:  Wait for e i to appear and pass through e i as soon as it appears
15:  Exit from the while loop
16: if ( d H ) then
17: Move n H 1 hops to dir ¯ (reach v i )
18: Wait until the ( t + n )-th step
Lemma 3.
Suppose that at the t-th step, A exists at the right (resp., left) extremity, say v i , of  V t and starts EXPONE ( t , v i ) . Then, A completes the exploration or reaches v i + 1 (resp., v i 1 ) by the ( t + n )-th step (the end of EXPONE ( t , v i ) ). In addition to that, A exists on the right or left extremity of V t + n at the ( t + n )-th step when the exploration has not been completed.
Proof. 
Without loss of generality, we assume v i is the right extremity of V t . As in Algorithm 2, let  S = max ( n H , n / 2 ) . We first show the lemma for the case e i appears by the ( t + d + S 1 )-th step in A’s view at the ( t + d ) -th step for 0 d H 1 .
For d = 0 , A can clearly reach v i + 1 by the ( t + S 1 )-th step.
For 1 d H 1 , when A sees e i appear for the first time at the ( t + d + S 1 )-th step in its view at the ( t + d )-th step, e i must appear at the ( t + d + S 1 )-th step and be missing at the t -th step for t + d t t + d + S 2 by the construction. This means that all the other links than e i are present at the t -th step ( t + d t t + d + S 2 ), and thus A can move for S 1 steps from v i d to right without interference by missing links until reaching v i .
Since d H 1 and H S , A always reaches v i by the ( t + d + S 1 )-th step at which e i appears. Then, A reaches v i + 1 as soon as e i appears. Since A moves at most H 1 hops to left, e i appears S steps after A starts to move to right, and  H 1 + S n from S = max ( n H , n / 2 ) , A reaches v i + 1 through e i by the ( t + n )-th step.
We then show for the other case, i.e., A reaches v i H at the ( t + H )-th step. When this happens, e i must be deleted for at least S 1 steps from the ( t + H )-th step and all the other links than e i are present in the S 1 steps. Thus, A can move for S 1 n H 1 steps from v i H to left without interference by missing links until reaching v i + 1 since S = max ( n H , n / 2 ) . Since H + n H 1 = n 1 , A reaches v i + 1 after n H 1 steps, i.e., at the ( t + n 1 )-th step, and the exploration is completed at the same time. □
Exploration algorithm. Algorithm 3 describes the exploration algorithm. Let S = min ( S , n 1 ) . The algorithm repeats ExpH ( t , v i ) for ( S + 1 H ) / H times (lines 2-6) and EXPONE ( t , v i ) for n H ( S + 1 H ) / H 1 times (lines 7-13). We call the part repeating ExpH ( t , v i ) (lines 2-6) the first part and the part repeating EXPONE ( t , v i ) the second part (lines 7-13). In the first part, H ( S + 1 H ) / H + 1 nodes are explored and, in the second part, the remaining n H ( S + 1 H ) / H 1 nodes are explored.
Algorithm 3 Exploration algorithm for H + S n
1: S min ( S , n 1 )
2: p 1 //starting the first part
3: while ( p ( S + 1 H ) / H ) do
4: Let t be the current step and v i be the current node
5: ExpH ( t , v i )
6:  p p + 1
7: p 1 //starting the second part
8: while ( p n H · ( S + 1 H ) / H 1 ) do
9: Let t be the current step and v i be the current node
10: EXPONE ( t , v i )
11: if Exploration is completed then
12:  Exit from the while loop
13:  p p + 1
Theorem 1.
For H + S n and S n / 2 , the exploration time of 1-interval connected rings by a single agent with the ( H , S ) view is upper-bounded by O ( n 2 / H + n H ) if 2 H 1 S or otherwise it is upper-bounded by  O ( n 2 ) .
Proof. 
It suffices to show that A with the ( H , S ) view completes exploration within O ( n 2 / H + n H ) steps if 2 H 1 S or otherwise O ( n 2 ) steps by executing Algorithm 3 when H + S n and S n / 2 .
We first consider the case where 2 H 1 S . In this case, since ( S + 1 H ) / H 1 , the first part is executed at least once. Consider the first part. Let t p be the step when A starts the p-th ExpH ( t , v i ) .
We show by induction that for 1 p ( S + 1 H ) / H , | V t p | = ( p 1 ) H + 1 and A explores H nodes by ExpH ( t p , v i ) .
For the base case, i.e.,  p = 1 , | V t 1 | is clearly 1 = ( p 1 ) H + 1 . This leads to that 2 H + | V t | 1 = 2 H min ( n , S + 1 ) . Then, by Lemma 2, A explores H nodes by ExpH ( t 1 , v i ) .
Now, for  k ( S + 1 H ) / H 1 , assume that | V t k | = ( k 1 ) H + 1 and A explores H nodes by ExpH ( t k , v i ) . Then, clearly | V t k + 1 | = ( k 1 ) H + 1 + H = k H + 1 . Since k ( S + 1 H ) / H 1 , 2 H + | V t k + 1 | 1 < n and 2 H + | V t k + 1 | 1 < S + 1 . Thus, A explores H nodes by ExpH ( t k + 1 , v i ) .
By Lemma 2, S = O ( n ) , and  H = Θ ( H ) , the exploration time of the first part is
p = 1 ( S + 1 H ) / H ( 2 H + | V t p | 2 ) = p = 1 ( S + 1 H ) / H ( ( p + 1 ) H 1 ) = O ( n 2 / H ) .
We then consider the second part. By Lemma 2, A exists at the right or left extremity of V t and | V t ¯ | = n H ( S + 1 H ) / H 1 = O ( H ) at the start of the second part. Thus, since A explores one node within n steps by Lemma 3, the exploration time of the second part is O ( n H ) .
As a result, the exploration time of Algorithm 3 is O ( n 2 / H + n H ) when 2 H 1 S .
When 2 H 1 > S , the first part is never executed and then the number of remaining nodes at the start of the second part is n 1 . Thus, in this case, the exploration time of Algorithm 3 is O ( n 2 ) . □
From Lemma 1 and Theorem 1, the following theorem holds.
Theorem 2.
If and only if H + S n and S n / 2 , a single agent with the ( H , S ) view can explore of 1-interval connected rings within finite time steps.

5. Upper Bound of Exploration Time for S N 1

In this section, we consider the upper bound of the exploration time when S n 1 . We show that the upper bound of the exploration time is reduced to O ( n 2 / H + n log H ) in this case by giving an exploration algorithm.
We first introduce a new operation ExpHalf ( t , v i ) that is used as a building block to construct the exploration algorithm.
ExpHalf. ExpHalf ( t , v i ) described in Algorithm 4 is an algorithm by which A explores | V t ¯ | / 2 nodes when A starts ExpHalf ( t , v i ) from v i at the t-th step under the assumption that v i is the right or left extremity of V t , | V t ¯ | 2 H , and  S n 1 . Note that in the following, when A executes ExpHalf ( t , v i ) , A is always on the right or left extremity of V t .
When starting the algorithm, A first sees if v i is the right extremity or the left one and stores right if v i is the right extremity or otherwise left in dir. If A can move | V t ¯ | / 2 hops to dir by the ( t + n 1 )-th step according to the view, A does so (Figure 4b). Otherwise, A moves n | V t ¯ | / 2 hops to dir ¯ (Figure 4c).
Algorithm 4 ExpHalf ( t , v i )
1: dir Extremity ( t , v i )
2: if A can move | V t ¯ | / 2 hops to dir by the ( t + n 1 )-th step then
3: Move | V t ¯ | / 2 hops to dir
4: else
5: Move n | V t ¯ | / 2 hops to dir ¯
6: Wait until the ( t + n 1 )-th step
Lemma 4.
Suppose that at the t-th step, A exists at the right or left extremity, say v i , of  V t and starts ExpHalf ( t , v i ) . If  | V t ¯ | 2 H and S n 1 , A can explore at least V t ¯ / 2 nodes by the t -th step (the end of ExpHalf ( t , v i ) ) and exists on the right or left extremity of V t at the t -th step where t = t + n 1 .
Proof. 
Without loss of generality, we assume v i is the right extremity of V t . Let m = | V t ¯ | , E r = { e i , e i + 1 , , e i + m / 2 1 , e i + m / 2 } , and  E l = { e i + m / 2 + 1 , e i + m / 2 + 2 , , e i 1 } .
Now, consider the move of A. Since S n 1 and m 2 H , A can see whether it can move m / 2 hops to right by the ( t + n 1 )-th step or not.
If A can move m / 2 hops, A moves m / 2 hops to right and thus the lemma holds.
Otherwise, A can move at most m / 2 1 hops to right by the ( t + n 1 )-th step, which means during the n 1 steps, there exist at least n 1 ( m / 2 1 ) = n m / 2 steps at each of which one of the links in E r is missing. Since at most one link is missing at each step and E r E l = , every link in E l exists at each of the n m / 2 steps. By this and | E l | = n m / 2 , A succeeds to reach v i + m / 2 by moving to left, which means at least m / 2 nodes are explored. □
Exploration algorithm. Algorithm 5 describes the exploration algorithm. The algorithm repeats ExpH ( t , v i ) for ( n H ) / H times (lines 1–5) and ExpHalf ( t , v i ) for log ( n H ( n H ) / H 1 ) times (lines 6–10). We call the part repeating ExpH ( t , v i ) (lines 1-5) the first part and the part repeating ExpHalf ( t , v i ) the second part (lines 6–10). In the first part, H ( n H ) / H + 1 nodes are explored and, in the second part, the remaining n H ( n H ) / H 1 nodes are explored.
Algorithm 5 Exploration algorithm for S n 1
1: p 1 //starting the first part
2: while ( p ( n H ) / H ) do
3: Let t be the current step and v i be the current node
4: ExpH ( t , v i )
5:  p p + 1
6: p 1 //starting the second part
7: while ( p log ( n H ( n H ) / H 1 ) ) do
8: Let t be the current step and v i be the current node
9: ExpHalf ( t , v i )
10:  p p + 1
Theorem 3.
For S n 1 , the exploration time of 1-interval connected rings by a single agent with the ( H , S ) view is upper-bounded by O ( n 2 / H + n log H ) .
Proof. 
It suffices to show that A completes exploration within O ( n 2 / H + n log H ) steps by Algorithm 5 when S n 1 . It is proven that the total exploration time of the first part is O ( n 2 / H ) and that of the second part is O ( n log H ) .
We first consider the first part. Note that, since 2 H n , 1 ( n H ) / H and thus the first part is always executed at least once. Let t p be the step when A starts the p-th ExpH ( t , v i ) . We can show that for 1 p ( n H ) / H , A can explore H nodes by ExpH ( t p , v i ) by induction and the exploration time of the first part is O ( n 2 / H ) as in the proof of Lemma 2.
We then consider the second part. By Lemma 2, A exists at the right or left extremity of V t and | V t ¯ | = n H ( n H ) / H 1 2 H at the start of the second part. Thus, since A explores a half of V t ¯ within n 1 steps by Lemma 4, the exploration time of the second part is O ( n log H ) . As a result, the exploration time of Algorithm 3 is O ( n 2 / H + n log H ) . □

6. Lower Bound of Exploration Time

A lower bound of the exploration time for any S is given in this section. The following theorem holds.
Theorem 4.
The exploration time of 1-interval connected rings by a single agent with the ( H , S ) view is lower-bounded by Ω ( n 2 / H ) .
Proof. 
We first show that, provided that A is at the right or left extremity, say v i , of V t at the t-th step where | V t | n 2 H + 1 , it takes at least | V t | + H 1 steps for A to explore H nodes from the circumstance under the following link scheduling: e i + H 1 (resp., e i H ) is deleted until the ( t + | V t | + H 1 )-th step if v i is the right (resp., left) extremity of V t . Without loss of generality, we assume that v i is the right extremity of V t in the following. Figure 5 depicts the situation.
Assume for contradiction that A explores the H nodes within | V t | + H 1 steps under the scheduling. Since e i + H 1 is missing until the ( t + | V t | + H 1 )-th step, A never reaches v i + H . Therefore, A must explore at least one node on the left side of V t . This and exploring H nodes take at least | V t | + H 1 steps; a contradiction.
Now, apply the above claim from the first step repeatedly. When applying the claim for the p-th time, | V t | = ( p 1 ) H + 1 and then it takes | V t | + H 1 = p H steps. Note that we can apply the claim while ( p 1 ) H + 1 n 2 H + 1 , i.e., p ( n H ) / H . We then derive the lower bound of the exploration time, p = 1 ( n H ) / H p H = Ω ( n 2 / H ) . □

7. Discussion

In this paper, we studied the exploration problem on dynamic networks with its partial information, where we focused on 1-interval connected rings as a first step. In this section, we discuss what happens when we consider other connectivity and/or general graphs.
When considering 1-interval connected rings, we yields the restriction that at most one link is missing at each step. By this restriction, an agent gets to know that all the links outside its view exist when a link in its view is missing and can make the action plan to visit an unvisited node using the information. It is interesting to investigate such conditions on the space and the time of a view (H and S in this paper) for more general graphs under some assumptions on the temporal connectivity and/or more general graphs. On the other hand, even under the assumption of 1-interval connectivity and/or the restriction on the number of missing links at each step, an agent cannot necessarily get the whole information of the temporal topology, which may prevent the agent from making the action plan to visit an unvisited node and makes the exploration problem more challenging.
We also conjecture that the space and the time of a view which are necessary and sufficient for an agent to explore depend on temporal diameter. Intuitively, temporal diameter is the maximum duration of the foremost path (the path with the least duration from a node to another node departing at specified time) in a dynamic network (see e.g., Section 4.6 of [1] for a formal definition). The fact that the temporal diameter of a 1-interval connected graph with n nodes is at most n 1 fits a possibility result of this paper, i.e., H + S n . To investigate the relation of temporal distance and the power of a view is one of the intriguing research directions.

8. Conclusions

In this paper, we introduced the ( H , S ) view which can be used to model some situations where an agent (or robot) can partly see their nearby environment or can predict the near-future changes of the environment. To the best of our knowledge, this is the first work considering such a model. For a single agent with the ( H , S ) view, we studied the exploration of 1-interval connected rings. We give some fundamental results, i.e., impossibility of the exploration for H + S < n or S < n / 2 , possibility of the exploration for H + S n and S n / 2 , and upper bounds and a lower bound of the exploration time for some cases.

Author Contributions

Conceptualization, T.G.; Funding acquisition, Y.S., F.O. and T.M.; Supervision, Y.S., F.O. and T.M.; Writing–original draft, T.G.; Writing–review & editing, Y.S., F.O. and T.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by JSPS KAKENHI Grant Numbers 17K19977, 18K11167, 20H04140 and 19H04085 and JST SICORP Grant Numbers JPMJSC1606 and JPMJSC1806.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

References

  1. Casteigts, A.; Flocchini, P.; Quattrociocchi, W.; Santoro, N. Time-varying graphs and dynamic networks. Int. J. Parallel Emergent Distrib. Syst. 2012, 27, 387–408. [Google Scholar] [CrossRef]
  2. Das, S. Graph explorations with mobile agents. In Distributed Computing by Mobile Entities; Springer: Berlin/Heidelberg, Germany, 2019; pp. 403–422. [Google Scholar]
  3. Erlebach, T.; Hoffmann, M.; Kammer, F. On temporal graph exploration. In Proceedings of the International Colloquium on Automata, Languages, and Programming, Kyoto, Japan, 6–10 July 2015; pp. 444–455. [Google Scholar]
  4. Erlebach, T.; Kammer, F.; Luo, K.; Sajenko, A.; Spooner, J.T. Two moves per time step make a difference. In Proceedings of the 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019), Patras, Greece, 9–12 July 2019. [Google Scholar]
  5. Erlebach, T.; Spooner, J.T. Faster exploration of degree-bounded temporal graphs. In Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science (MFCS 2018), Liverpool, UK, 27–31 August 2018. [Google Scholar]
  6. Ilcinkas, D.; Klasing, R.; Wade, A.M. Exploration of constantly connected dynamic graphs based on cactuses. In Proceedings of the International Colloquium on Structural Information and Communication Complexity, Takayama, Japan, 23–25 July 2014; pp. 250–262. [Google Scholar]
  7. Ilcinkas, D.; Wade, A.M. Exploration of the T-interval-connected dynamic graphs: The case of the ring. Theory Comput. Syst. 2018, 62, 1144–1160. [Google Scholar] [CrossRef] [Green Version]
  8. Bournat, M.; Datta, A.K.; Dbois, S. Self-stabilizing robots in highly dynamic environments. In Proceedings of the International Synposium on Stabilization, Safety, and Security of Distributed Systems, Lyon, France, 7–10 November 2016; pp. 54–69. [Google Scholar]
  9. Bournat, M.; Dubois, S.; Petit, F. Computability of perpetual exploration in highly dynamic rings. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems, Atlanta, GA, USA, 5–8 June 2017; pp. 794–804. [Google Scholar]
  10. Di Luna, G.A.; Dobrev, S.; Flocchini, P.; Santoro, N. Distributed exploration of dynamic rings. Distrib. Comput. 2018, 1–27. [Google Scholar] [CrossRef]
  11. Gotoh, T.; Flocchini, P.; Masuzawa, T.; Santoro, N. Tight bounds on distributed exploration of temporal graphs. In Proceedings of the 23rd International Conference on Principles of Distributed Systems (OPODIS 2019), Neuchatel, Switzerland, 17–19 December 2020. [Google Scholar]
  12. Gotoh, T.; Sudo, Y.; Ooshita, F.; Kakugawa, H.; Masuzawa, T. Group Exploration of Dynamic Tori. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems, Vienna, Austria, 2–5 July 2018; pp. 775–785. [Google Scholar]
  13. Di Luna, G.A.; Flocchini, P.; Pagli, L.; Prencipe, G.; Santoro, N.; Viglietta, G. Gathering in dynamic rings. Theor. Comput. Sci. 2020, 811, 79–98. [Google Scholar] [CrossRef]
  14. Das, S.; Di Luna, G.A.; Gasieniec, L.A. Patrolling on dynamic ring networks. In Proceedings of the International Conference on Current Trends in Theory and Practice of Informatics, Limassol, Cyprus, 20–24 January 2019; pp. 150–163. [Google Scholar]
  15. Das, S.; Di Luna, G.; Pagli, L.; Prencipe, G. Compacting and Grouping Mobile Agents on Dynamic Rings. In Proceedings of the International Conference on Theory and Applications of Models of Computation, Kitakyushu, Japan, 13–16 April 2019; pp. 114–133. [Google Scholar]
  16. Kuhn, F.; Oshman, R. Dynamic networks: Models and algorithms. ACM SIGACT News 2011, 42, 82–96. [Google Scholar] [CrossRef]
  17. Di Luna, G.A. Mobile Agents on Dynamic Graphs. In Distributed Computing by Mobile Entities; Springer: Berlin/Heidelberg, Germany, 2019; pp. 549–584. [Google Scholar]
  18. Agarwalla, A.; Augustine, J.; Moses, W.K., Jr.; Madhav, S.K.; Sridhar, A.K. Deterministic dispersion of mobile robots in dynamic rings. In Proceedings of the 19th International Conference on Distributed Computing and Networking, Varanasi, India, 4–7 January 2018; pp. 1–4. [Google Scholar]
  19. Gotoh, T.; Sudo, Y.; Ooshita, F.; Masuzawa, T. Exploration of Dynamic Ring Networks by a Single Agent with the H-hops and S-time Steps View. In Proceedings of the International Symposium on Stabilizing, Safety, and Security of Distributed Systems, Pisa, Italy, 22–25 October 2019; pp. 165–177. [Google Scholar]
Figure 1. Illustrating the proof of Theorem 1 for the case of H + S < n and S n / 2 .
Figure 1. Illustrating the proof of Theorem 1 for the case of H + S < n and S n / 2 .
Algorithms 13 00141 g001
Figure 2. The moves of A by ExpH ( t , v i ) where t = t + 2 H + | V t | 2 in the case where v i is the right extremity of V t . (a) At the start of ExpH ( t , v i ) , A exists on v i . (b) If A can reach v i + H by moving to right by the t -th step, A moves to right and reaches v i + H by the t -th step. (c) Otherwise, A moves to left and reaches v i | V t | + 1 H by the t -th step.
Figure 2. The moves of A by ExpH ( t , v i ) where t = t + 2 H + | V t | 2 in the case where v i is the right extremity of V t . (a) At the start of ExpH ( t , v i ) , A exists on v i . (b) If A can reach v i + H by moving to right by the t -th step, A moves to right and reaches v i + H by the t -th step. (c) Otherwise, A moves to left and reaches v i | V t | + 1 H by the t -th step.
Algorithms 13 00141 g002
Figure 3. The moves of A by EXPONE ( t , v i ) in the case where v i is the right extremity. (a) Unless A sees e i appear, A moves to left. (b) If A sees e i appear before reaching v i H , A starts to move to right and reaches v i + 1 . (c) If A reaches v i H without seeing e i appear, A keeps moving to left until reaching v i + 1 and finishes the exploration.
Figure 3. The moves of A by EXPONE ( t , v i ) in the case where v i is the right extremity. (a) Unless A sees e i appear, A moves to left. (b) If A sees e i appear before reaching v i H , A starts to move to right and reaches v i + 1 . (c) If A reaches v i H without seeing e i appear, A keeps moving to left until reaching v i + 1 and finishes the exploration.
Algorithms 13 00141 g003
Figure 4. The moves of A by ExpHalf ( t , v i ) where t = t + n 1 in the case where v i is the right extremity of V t . (a) At the start of ExpHalfmathsizesmall ( t , v i ) , A exists on v i . (b) If A can reach v i + | V t ¯ | / 2 by moving to right by the t -th step, A moves to right and reaches v i + | V t ¯ | / 2 by the t -th step. (c) Otherwise, A moves to left and reaches v i + | V t ¯ | / 2 by the t -th step.
Figure 4. The moves of A by ExpHalf ( t , v i ) where t = t + n 1 in the case where v i is the right extremity of V t . (a) At the start of ExpHalfmathsizesmall ( t , v i ) , A exists on v i . (b) If A can reach v i + | V t ¯ | / 2 by moving to right by the t -th step, A moves to right and reaches v i + | V t ¯ | / 2 by the t -th step. (c) Otherwise, A moves to left and reaches v i + | V t ¯ | / 2 by the t -th step.
Algorithms 13 00141 g004
Figure 5. The situation where A exists on v i at the t-th step ( v i is the right extremity of V t ). The adversary deletes e i + H 1 until the ( t + | V t | + H 1 )-th step in this situation.
Figure 5. The situation where A exists on v i at the t-th step ( v i is the right extremity of V t ). The adversary deletes e i + H 1 until the ( t + | V t | + H 1 )-th step in this situation.
Algorithms 13 00141 g005
Table 1. Upper and lower bounds of the exploration time in 1-interval connected rings where H = min ( H , n / 2 ) .
Table 1. Upper and lower bounds of the exploration time in 1-interval connected rings where H = min ( H , n / 2 ) .
H and SUpper BoundLower Bound
H + S < n or
S < n / 2
The exploration is impossible.
H + S n and
n / 2 S < 2 H 1
O ( n 2 ) Ω ( n 2 / H )
H + S n and
max ( n / 2 , 2 H 1 ) S < n 1
O ( n 2 / H + n H )
n 1 S O ( n 2 / H + n log H )

Share and Cite

MDPI and ACS Style

Gotoh, T.; Sudo, Y.; Ooshita, F.; Masuzawa, T. Dynamic Ring Exploration with (H,S) View. Algorithms 2020, 13, 141. https://doi.org/10.3390/a13060141

AMA Style

Gotoh T, Sudo Y, Ooshita F, Masuzawa T. Dynamic Ring Exploration with (H,S) View. Algorithms. 2020; 13(6):141. https://doi.org/10.3390/a13060141

Chicago/Turabian Style

Gotoh, Tsuyoshi, Yuichi Sudo, Fukuhito Ooshita, and Toshimitsu Masuzawa. 2020. "Dynamic Ring Exploration with (H,S) View" Algorithms 13, no. 6: 141. https://doi.org/10.3390/a13060141

APA Style

Gotoh, T., Sudo, Y., Ooshita, F., & Masuzawa, T. (2020). Dynamic Ring Exploration with (H,S) View. Algorithms, 13(6), 141. https://doi.org/10.3390/a13060141

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop