This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

How to Spread a Rumor: Call Your Neighbors or Take a Walk?

George Giakkoupis
INRIA, Rennes, France
   Frederik Mallmann-Trenn
King’s College London, UK
   Hayk Saribekyan
University of Cambridge, UK
Abstract

We study the problem of randomized information dissemination in networks. We compare the now standard push-pull protocol, with agent-based alternatives where information is disseminated by a collection of agents performing independent random walks. In the visit-exchange protocol, both nodes and agents store information, and each time an agent visits a node, the two exchange all the information they have. In the meet-exchange protocol, only the agents store information, and exchange their information with each agent they meet.

We consider the broadcast time of a single piece of information in an nn-node graph for the above three protocols, assuming a linear number of agents that start from the stationary distribution. We observe that there are graphs on which the agent-based protocols are significantly faster than push-pull, and graphs where the converse is true. We attribute the good performance of agent-based algorithms to their inherently fair bandwidth utilization, and conclude that, in certain settings, agent-based information dissemination, separately or in combination with push-pull, can significantly improve the broadcast time.

The graphs considered above are highly non-regular. Our main technical result is that on any regular graph of at least logarithmic degree, push-pull and visit-exchange have the same asymptotic broadcast time. The proof uses a novel coupling argument which relates the random choices of vertices in push-pull with the random walks in visit-exchange. Further, we show that the broadcast time of meet-exchange is asymptotically at least as large as the other two’s on all regular graphs, and strictly larger on some regular graphs.

As far as we know, this is the first systematic and thorough comparison of the running times of these very natural information dissemination protocols.

1 Introduction

We investigate the problem of spreading information (or rumors) in a distributed network using randomized communication. The archetypal paradigm solution is the so-called, randomized rumor spreading protocol, where each informed node samples a random neighbor in each round, and sends the information to it. This is the push version of rumor spreading, introduced by Demers et al. in the 80’s [15], as a robust and lightweight protocol for distributed maintenance of replicated databases [15, 24].

The push-pull variant of rumor spreading, popularized by Karp et al. in 2000 [31], allows for bidirectional communication: In each round, every node calls a random neighbor and the two nodes exchange all information they have. push-pull was initially proposed as a way to reduce the message complexity of push on the complete graph [31]. It was subsequently observed that it is significantly faster than push in several families of graphs, including graph models of social networks [12, 17].

The above two protocols have been studied extensively over the past 15 years, and have also found several applications, including data aggregation [32, 8, 38], resource discovery [28], failure detection [42], and even efficient simulation of arbitrary distributed computations [10].

We compare the above well-established protocols for information spreading, with agent-based alternatives that have received almost no attention so far, even though they have very attractive properties, as we will see. These alternative protocols use a collection of agents performing independent random walks to disseminate information. In the visit-exchange protocol, both nodes and agents store information, and each time an agent visits a node, the two exchange all the information they have. In the meet-exchange protocol, only the agents store information, and exchange their information with each agent they meet.

Independent parallel random walks have been studied since the late 70s [1], mainly as a way to speed-up cover and hitting times and related graph problems [9, 2, 23, 21]. As far as we know, visit-exchange has not been studied before. For meet-exchange there is some limited previous work. It was studied for specific graph families, namely grids [39, 35] and random graphs [14]. Also, general bounds on the broadcast time of meet-exchange with respect to the meeting time were shown [16].

In this paper, we restrict our attention to the case where the number of agents in the network is linear in the number of nodes nn, and we assume that all agents start from the stationary distribution.

Under the assumption that there is a linear number of agents, the agent-based protocols have similar amount of communication as the rumor spreading protocols, both in terms of the (maximum) total number of messages sent per round, which is linear, and the total number of bits. One can think of the agents simply as tokens passed between nodes, along with the actual information (if there is any). Agents need not be labeled, so each node only needs to send a counter of the number of agents in each message.

The assumption that agents start from the stationary distribution makes sense in a setting where several pieces of information (or rumors) are generated frequently and distributed in parallel over time by the same set of agents, which execute perpetual independent random walks. As discussed later, our results for regular graphs hold also in the case where there is exactly one agent starting from each node.

One distinct advantage of the agent-based protocols is their locally fair use of bandwidth, i.e., all edges are used with the same frequency, since the random walks are independent and start from stationarity. Interestingly, the superiority of push-pull over push is commonly attributed to a similar fairness property: that nodes of larger degree contribute more to the dissemination — except that push-pull satisfies this property only for some graph topologies, and approximately, as we will see below. In the agent-based protocols, on the other hand, this property is satisfied in a very precise and exact way.

We will see that this fairness property results in a significant performance advantage of visit-exchange and meet-exchange over push and push-pull in certain families of graphs, on which the first two processes need only logarithmic time to spread an information, whereas the other two need polynomial time.

Contribution.

We compare the broadcast times of a single piece of information, originated at an arbitrary node ss of an nn-node graph G=(V,E)G=(V,E), when push (or push-pull), visit-exchange, and meet-exchange are used. In the first three, the broadcast time is the time until all vertices are informed, while in meet-exchange it is the time until all agents are informed. Also, for meet-exchange, we assume that the first agent to visit the source ss becomes informed, and from that point on, information is exchanged only between agents.111This is a technicality used to allow for direct comparison between the protocols, and has limited effect on our results. As mentioned before, we assume a linear number of agents, each starting from the stationary distribution.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Refer to caption
(d)
Refer to caption
(e)
Figure 1: (a) Star SnS_{n}, on which 𝔼[Tpush]=Ω(nlogn)\mathbb{E}\left[\,T_{\rm push}\,\right]=\Omega(n\log n) and all other processes take O(logn)O(\log n) time w.h.p. (b) Double-star Sn2S_{n}^{2}, on which 𝔼[Tppull]=Ω(n)\mathbb{E}\left[\,T_{\rm ppull}\,\right]=\Omega(n), and Tvisitx,Tmeetx=O(logn)T_{\rm visitx},T_{\rm meetx}=O(\log n) w.h.p. (c) Heavy binary tree BnB_{n} (leaves are connected to a clique), on which Tpush=O(logn)T_{\rm push}=O(\log n) w.h.p., 𝔼[Tvisitx]=Ω(n)\mathbb{E}\left[\,T_{\rm visitx}\,\right]=\Omega(n), and, for a leaf source, Tmeetx=O(logn)T_{\rm meetx}=O(\log n) w.h.p. (d) Siamese heavy binary tree DnD_{n}, on which Tpush=O(logn)T_{\rm push}=O(\log n) w.h.p., and 𝔼[Tvisitx],𝔼[Tmeetx]=Ω(n)\mathbb{E}\left[\,T_{\rm visitx}\,\right],\mathbb{E}\left[\,T_{\rm meetx}\,\right]=\Omega(n). (e) Cycle-of-stars-of-cliques (n1/3n^{1/3} stars with n1/3n^{1/3} leaves each, n1/3n^{1/3} nodes per clique), on which 𝔼[Tvisitx]=O(n2/3)\mathbb{E}\left[\,T_{\rm visitx}\,\right]=O(n^{2/3}) and 𝔼[Tmeetx]=Ω(n2/3logn)\mathbb{E}\left[\,T_{\rm meetx}\,\right]=\Omega(n^{2/3}\log n).

We observe that in general graphs, the broadcast times of the above protocols are incomparable: For any pair of protocols, there are examples of graphs where the first protocol is significantly faster than the other, by a polynomial factor in most cases. The examples we use, depicted in Fig. 1, are fairly simple, mainly trees or superpositions of trees with cliques.

The star graph in Fig. 1(a) is an example where push is known to take Ω(nlogn)\Omega(n\log n) rounds, as the center must contact all leaves. visit-exchange and meet-exchange, on the other hand, take only logarithmic time, as roughly half of the walks visit the center in each round, and a constant number visits each leaf on average.

In the star, push-pull is also (extremely) fast. The next example, the double-star in Fig. 1(b), is a graph where push-pull (and thus also push) is slow, whereas visit-exchange and meet-exchange are still fast. This demonstrates the advantages of the local fairness property we pointed out earlier, and the impact it can have on the broadcast time: Here push-pull selects the edge between the two stars only with probability O(1/n)O(1/n), which results in an expected broadcast time of Ω(n)\Omega(n). In visit-exchange and meet-exchange, on the other hand, the probability that some agent crosses the edge in a round is constant, resulting in a logarithmic broadcast time.

Fig. 1(c) and Fig. 1(d) illustrate examples where rumor spreading protocols have an advantage over agent-based protocols. In both examples push (and thus push-pull) has logarithmic broadcast time. For visit-exchange, at least linear time is needed: Since almost all the volume of the graph is concentrated on the leaves, it is likely that all agents are on the leaves at time zero, and then it takes linear time before the first walk reaches the root. For meet-exchange, we have that it is fast in the first example, as all walks meet quickly in the clique induced by the leaves. However, in the second example, where agents are roughly split between the two induced cliques, the broadcast times of both meet-exchange and visit-exchange is Ω(n)\Omega(n).

The above results suggest that in certain settings, agent-based information dissemination, separately or in combination with push-pull, can significantly improve the broadcast time. We stress that, even though the examples presented may seem contrived, they are intentionally simple to demonstrate the principle reasons that make the protocols perform differently, and we expect that similar result can be observed in a wide range of networks. In particular, we believe that the observations for the double-star example of Fig. 1(b), extend to more general tree-like topologies with high-degree internal nodes.

All examples we have discussed so far, involve highly non-regular graphs. Our main technical result concerns regular graphs, and can be stated somewhat informally as follows. (For the formal, stronger statements see Sections 5 and 6.)

Theorem 1.

For any dd-regular graph on nn vertices, where d=Ω(logn)d=\Omega(\log n), and any source vertex, the broadcast times of push and visit-exchange are asymptotically the same both in expectation and w.h.p.,222By with high probability (w.h.p.) we mean with probability at least 1nc1-n^{-c}, with some constant c>0c>0 that can be made arbitrary large, by adjusting the constants in the statement. modulo constant multiplicative factors.

Recall that push and push-pull have asymptotically the same broadcast times on regular graphs [27]. Note also that the broadcast times of push and push-pull on dd-regular graphs can vary from logarithmic, e.g., in random dd-regular graphs, to polynomial, e.g., in a path of dd-cliques where the broadcast time is Ω(n)\Omega(n).

The proof of Theorem 1 uses a novel coupling argument which relates the random choices of vertices in push, with the random walks in visit-exchange. Roughly speaking, for each node uu, we consider the list of neighbors that uu samples in push, and the list of neighbors to which informed agents move to in their next step after visiting uu in visit-exchange. Our coupling just sets the two lists to be identical for each uu. Even though the coupling is straightforward, its analysis is not. On the one direction of the proof, showing that the broadcast time of push is dominated by the broadcast time of visit-exchange, the main step is to bound the congestion, i.e., the number of agents encountered along a path, for all possible paths through which information travels. On the reverse direction, we focus only on the fastest path through which information reaches each node in push, and show that an equally fast path exists in visit-exchange. A useful trick we devise, to consider only every other round of visit-exchange in the coupling, simplifies the proof of this second direction. We expect that our proof ideas will be useful in other applications of multiple random walks as well.

In addition to Theorem 1, we observe that the broadcast time of meet-exchange is asymptotically at least as large as visit-exchange’s on any regular graph of at least logarithmic degree. The idea is that once all agents are informed it takes at most logarithmic time to cover the graph. It is probably surprising that the converse direction is not true, i.e., there are regular graphs where meet-exchange is strictly slower than visit-exchange. Fig. 1(e) presents one such example of a dd-regular graph, where d=n1/3d=n^{1/3}, for which a logarithmic-factor gap exists between the broadcast times of the two protocols.

Road-map.

In Section 2, we survey additional related work. In Section 3, we provide a formal description of the protocols we study. In Section 4, we analyze the broadcast times for the example graphs in Fig. 1. In Section 5, we prove the first direction of Theorem 1, namely, that push is at least as fast as visit-exchange; the other direction is proved in Section 6. The result that visit-exchange is at least as fast as meet-exchange on regular graphs is provided in Section 7. Finally, some open problems are discussed in Section 9.

2 Related work

The push variant of rumor spreading was first considered in [15]. It was subsequently analyzed on various graphs in [24], where also bounds with the degree and diameter were shown for general graphs. The push-pull variant was introduced in [31], and was studied initially on the complete graph. More recently, there has been a lot of work on showing that in several settings O(logn)O(\log n) rounds of rumor spreading suffice w.h.p. to broadcast information [18, 5, 19]. In addition, general bounds in terms of expansion parameters of the graph have been studied extensively, e.g., in [26, 11].

Another line of work compares synchronous and asynchronous versions of rumor spreading, where in the latter each node takes steps at the arrival times of an independent unit-rate Poisson process. In [41], it is shown that the asynchronous version of push has the same broadcast time as standard push on regular graphs. In [27, 4], tight bounds are given for the relation between the broadcast times of synchronous and asynchronous push-pull.

On the random walk literature, there has been some previous work on models related to meet-exchange, motivated mainly by the study of the spread of infectious diseases. The earliest work considering a process equivalent to meet-exchange is [16], which studies general graphs. It shows that the broadcast time of meet-exchange is at most O(logn)O(\log n) times larger than the meeting time of two random walks in the graph, and that this upper bound is tight. Later, the authors of [14] studied meet-exchange for the case of random regular graphs and knϵk\leq n^{\epsilon} random walks. They showed that the expected broadcast time is O(nlogk/k)O(n\log k/k). In [39], the 22-dimensional finite grid was studied and a broadcast time of Θ~(n/k)\tilde{\Theta}(n/\sqrt{k}) was shown for kk random walks. This work was extended to dd-dimensional grids in [35], where a tight lower bound up to a polylogarithmic factor was also shown.

The continuous variant of meet-exchange in the infinite grid was studied in [33, 34]. In these works the initial number of agents at each vertex is a Poisson random variable, with constant mean, and initially the information is placed at the origin. The authors prove a theorem for the asymptotic shape formed by the set of informed agents. A similar process is the frog model, where only the informed agents move, while the uninformed ones stay put until they are hit by an informed agent. This process has been studied for infinite grids [40, 3] and finite kk-ary trees [29].

Other superficially related processes include coalescing random walks [6, 30], and coalescing branching walks [36, 7]. See also [13] for a survey on multiple random walks.

3 Protocol Descriptions

We compare four information spreading protocols. The first two, push and push-pull, are standard versions of randomized rumor spreading. The other two, visit-exchange and meet-exchange, use a system of interacting agents performing independent random walks, and are less standardized. In push and push-pull, information is communicated between adjacent vertices, whereas in visit-exchange and meet-exchange information is passed between an agent and a vertex it visits, or between two agents when they meet. All protocols proceed in a sequence of synchronous rounds. They are applied on a connected undirected graph G=(V,E)G=(V,E) with |V|=n|V|=n vertices, and the information originates from an arbitrary source vertex sVs\in V.

Push.

In round zero, vertex ss becomes informed. In each round t1t\geq 1, every vertex uu that was informed in a previous round samples a random neighbor vv to send the information to, and if vv is not already informed, it becomes informed in this round. We denote by Tpush(G,s)T_{\rm push}(G,s) the number of rounds before all vertices are informed.

Push-Pull.

As in push, vertex ss is informed in round zero. In each round t1t\geq 1, every vertex uVu\in V (informed or not) samples a random neighbor vv to exchange information with, and if exactly one of uu and vv was informed before round tt, then the other vertex becomes informed as well. The number of rounds before all vertices are informed is denoted Tppull(G,s)T_{\rm ppull}(G,s).

Visit-Exchange.

Let AA be a set of agents. Every agent gAg\in A performs an independent simple random walk on GG, starting from a vertex sampled independently from the stationary distribution (i.e., each vertex vv is sampled with probability deg(v)/(2|E|)\deg(v)/(2|E|)). In round zero, vertex ss becomes informed, and every agent that is on vertex ss becomes informed as well. In each subsequent round t1t\geq 1, all agents do a single step of their random walk in parallel. If an agent that was informed in a previous round visits a vertex vv that is not yet informed, then vv becomes informed in this round. Also, if an agent gg that is not yet informed visits a vertex which got informed either in a previous round or in the current round (by some other informed agent), then gg becomes informed as well. We denote by Tvisitx(G,s)T_{\rm visitx}(G,s) the number of rounds before all vertices (and thus all agents) are informed.

Meet-Exchange.

As in visit-exchange, a set AA of agents perform independent random walks starting from the stationary distribution. In round zero, all agents that are on vertex ss become informed. If there is no agent on ss in round zero, then the first agent to visit ss after round zero becomes informed (if more than one agents visit ss simultaneously, they all get informed). After that point, vertex ss does not inform any other agent that visits ss. In each subsequent round tt, whenever two agent g,gg,g^{\prime} meet and exactly one of them was informed in a previous round, the other agent becomes informed as well. We denote by Tmeetx(G,s)T_{\rm meetx}(G,s) the number of rounds before all agents are informed.

If GG is a bipartite graph, then, depending on the initial positions of the agents, it is possible that some agents are never informed, thus Tmeetx(G,s)=T_{\rm meetx}(G,s)=\infty. To avoid this complication we will sometimes assume that the random walks of the agents are lazy, i.e., a walk stays put in a round with probability 1/21/2. This ensures that 𝔼[Tmeetx(G,s)]<\mathbb{E}\left[T_{\rm meetx}(G,s)\right]<\infty, for any connected graph GG.


We will collectively refer to Tpush(G,s)T_{\rm push}(G,s), Tppull(G,s)T_{\rm ppull}(G,s), Tvisitx(G,s)T_{\rm visitx}(G,s), and Tmeetx(G,s)T_{\rm meetx}(G,s) as the broadcast time of the corresponding protocol. We will sometimes omit graph GG and source vertex ss in this notation, when they are clear from the context.

4 Examples

In this section, we provide examples demonstrating that push or push-pull rumor spreading, visit-exchange, and meet-exchange can have very different broadcast times on the same graph. More precisely, we present graphs where rumor spreading takes polynomial time while visit-exchange and meet-exchange need only logarithmic time (Sections 4.1 and 4.2), and also graphs where the converse is true (Sections 4.3 and 4.4). We demonstrate a similar separation between visit-exchange and meet-exchange (Sections 4.4 and 4.5), but the gap is polynomial only in one direction, while in the other it is logarithmic. We do not know whether there exist graphs where visit-exchange is faster than meet-exchange by more than a logarithmic factor. In all examples below, we assume that the number of agents is |A|=αn=Θ(n)|A|=\alpha n=\Theta(n).

4.1 Star Graph

Let SnS_{n} denote an nn-leaf star, that is, a tree with one internal node (the center of the star), and nn leaves; see Fig. 1(a) for an illustration. This is an example of a graph where push is very slow, whereas all other processes are very fast.

Lemma 2.

For the graph SnS_{n} described above and any source vertex ss, (a) 𝔼[Tpush]=Ω(nlogn)\mathbb{E}\left[\,T_{\rm push}\,\right]=\Omega(n\log n), (b) Tppull2T_{\rm ppull}\leq 2, (c) Tvisitx=O(logn)T_{\rm visitx}=O(\log n), w.h.p., and (d) Tmeetx=O(logn)T_{\rm meetx}=O(\log n), w.h.p.

Proof.

(a): This bound is well-known. It follows from the observation that the center needs to sample each of the leaves (except possibly for one) before all vertices are informed. The time for that is the time needed to collect all nn coupons (except possibly for one) in a coupon collector’s problem, which is Θ(nlogn)\Theta(n\log n) in expectation.

(b): This bound is also well-known (and trivial). It takes one round to inform all vertices if ss is the source, and two rounds if ss is a leaf.

(c): For any pair of vertices v,uv,u, the probability that an agent located at vv visits uu within the next two rounds is at least 1/n1/n. Since agents do independent random walks, it follows from standard Chernoff bounds (Theorem 26) that, for any placement of the agents at round tt, at least one of the |A|=Θ(n)|A|=\Theta(n) agents will visit a given vertex uu by round t+O(logn)t+O(\log n) w.h.p. By this observation, it takes O(logn)O(\log n) rounds w.h.p. until the first agent gets informed (by visiting ss). If ss is not the center, then the center gets informed in the next round. After that it takes at most two rounds before all agents are informed, because an agent visits the center every other round. Finally, every leaf uu gets informed in an additional O(logn)O(\log n) rounds w.h.p., by the same observation we used above.

(d): Since the graph is bipartite, we assume that the random walks are lazy (i.e., in every round, each random walk stays put with probability 1/21/2). Similarly to (c), for any pair v,uv,u, the probability that an agent located at vv visits uu within the next two rounds is at least 1/(4n)1/(4n), thus for any placement of the agents at round tt, at least one agent visits uu by round t+O(logn)t+O(\log n) w.h.p. It follows that it takes O(logn)O(\log n) rounds w.h.p. until the first agent gets informed (by visiting ss); let gg^{\ast} denote that agent (or one of them, if there are many). We complete the proof by arguing that within an additional O(logn)O(\log n) rounds, w.h.p. every agent ggg\neq g^{\ast} meets with gg^{\ast} at the center vertex, and thus, all agents become informed within O(logn)O(\log n) rounds w.h.p. This follows from the observation that for any given placement of gg^{\ast} and gg, the probability they are both at the center vertex in the next round is exactly 1/41/4. Thus, a Chernoff bound yields that gg^{\ast} and gg will meet w.h.p. within O(logn)O(\log n) rounds. ∎

4.2 Double Star

In the star example above only the push version of randomized rumor spreading is slow, while push-pull is extremely fast. Next we present a graph where push-pull (and thus, push) is slow, while visit-exchange and meet-exchange are fast. Let Sn2S^{2}_{n} denote a double-star graph: two star graphs with n/2n/2 vertices with their centers connected by an edge; see Fig. 1(b).

Lemma 3.

For the graph Sn2S^{2}_{n} described above and any source vertex ss, (a) 𝔼[Tppull]=Ω(n)\mathbb{E}\left[\,T_{\rm ppull}\,\right]=\Omega(n), (b) Tvisitx=O(logn)T_{\rm visitx}=O(\log n), w.h.p., and (c) Tmeetx=O(logn)T_{\rm meetx}=O(\log n), w.h.p.

Proof.

(a): Let a,ba,b be the centers of the two stars. For push-pull to complete, aa must sample bb or bb must sample aa, at least once. The probability of that happening in a given round is at most 2/(n/2)2/(n/2). Thus, the expected number of rounds until push-pull completes is at least (n/2)/2(n/2)/2.

(b): Let u(t)\mathcal{E}_{u}(t) denote the event that at least |A|/8|A|/8 agents visit vertex u{a,b}u\in\{a,b\} in round tt. We consider the following modification to process visit-exchange.

Modification 1: For any round t0t\geq 0 and u{a,b}u\in\{a,b\}, if event u(t)\mathcal{E}_{u}(t) does not hold, then before round t+1t+1 we add a number of new and informed agents to the graph, at node uu, such that there are |A|/8|A|/8 agents at uu.

In visit-exchange, at any round tt, the expected number of agents that visit uu is greater than |A|/4|A|/4. It follows, [u(t)]1eΩ(|A|)=1eΩ(n)\mathbb{P}\left[\mathcal{E}_{u}(t)\right]\geq 1-e^{-\Omega(|A|)}=1-e^{-\Omega(n)} by a Chernoff bound. By applying a union bound for each u{a,b}u\in\{a,b\} and round tlog2nt\leq\log^{2}n, we get that, with probability at least 1eΩ(n)1-e^{-\Omega(n)}, the modified process is identical to the original visit-exchange for the first log2n\log^{2}n rounds. Since our goal is to prove that Tvisitx=O(logn)T_{\rm visitx}=O(\log n) w.h.p., it suffices to analyze the modified process.

In the modified process, since there is at least a linear number of agents at each u{a,b}u\in\{a,b\} before each round, it is straightforward to show that, w.h.p.: if s{a,b}s\notin\{a,b\} and ss is adjacent, say, to aa, it takes O(logn)O(\log n) rounds before aa gets informed (if s=as=a, aa is informed at round zero); then in O(logn)O(\log n) additional rounds bb gets informed; and finally in O(logn)O(\log n) extra rounds all leaves are informed.

(c): We assume that the walks are lazy, as the graph is bipartite. We apply to meet-exchange the same modification we made to visit-exchange in part (b). We also make a second modification. Let u(t)\mathcal{E}_{u}^{\prime}(t) denote the event that at least one of the agents at vertex u{a,b}u\in\{a,b\} stays put in round tt.

Modification 2: For any round t0t\geq 0 and u{a,b}u\in\{a,b\}, if event u(t)\mathcal{E}_{u}^{\prime}(t) does not hold, then before round t+1t+1 we add a new and informed agent to the graph, at node uu.

Once again, it is easy to show that with probability at least 1eΩ(n)1-e^{-\Omega(n)}, the modified process is identical to meet-exchange in the first log2n\log^{2}n rounds, thus we can analyze the modified process.

Similarly to part (b), we have that the following hold w.h.p. for the modified process. If s{a,b}s\notin\{a,b\} and ss is adjacent, say, to aa, it takes O(logn)O(\log n) rounds before some agent visits ss, thus gets informed, and then visits aa. From that point on, by our second modification, there is always some informed agent at aa. Then in O(logn)O(\log n) additional rounds some informed agent visits bb, and again there is always an informed agent at bb, thereafter. Finally, in O(logn)O(\log n) extra rounds every agent that is not already informed visits one of a,ba,b and thus gets informed. ∎

4.3 Heavy Binary Tree

Next we describe a graph where visit-exchange is slow, while the other processes are fast. Let BnB_{n} denote a heavy binary tree, which is constructed by adding an edge between every pair of leaves of a balanced binary tree with nn vertices. Even though BnB_{n} is not a tree, we will refer to the leaves of the original binary tree as the leaves of BnB_{n}. The set of leaves of BnB_{n} induces a clique of l=n/2l=\lceil n/2\rceil vertices. See Fig. 1(c) for an illustration.

Lemma 4.

For the graph BnB_{n} described above and any source vertex ss, (a) Tpush=O(logn)T_{\rm push}=O(\log n), w.h.p., and (b) 𝔼[Tvisitx]=Ω(n)\mathbb{E}\left[\,T_{\rm visitx}\,\right]=\Omega(n). If the source ss is a leaf, then (c) Tmeetx=O(logn)T_{\rm meetx}=O(\log n), w.h.p.

Proof.

(a): First, we bound the number of rounds until some internal node is informed. This is zero if ss is an internal node, so suppose ss is a leaf. The number of rounds before all leaves are informed is O(logn)O(\log n) w.h.p. This follows from the well-known logarithmic bound on the push broadcast time on a clique, and the fact that random failures of transmission with probability 1/l1/l (corresponding to the case when a leaf samples its parent) do not change the broadcast time asymptotically [22]. Once all leaves are informed, it takes at most O(logn)O(\log n) additional rounds, w.h.p., until the first internal node is informed, because there are ll leaves and, in each round, each leaf samples its parent with probability 1/l1/l. Once some internal node becomes informed, then all internal nodes become informed after at most O(logn)O(\log n) rounds w.h.p. This follows from the observation that the broadcast time of push on BnB_{n} starting from an internal node is dominated by the broadcast time on a balanced binary tree with nn vertices. Since the binary tree has bounded degree and logarithmic diameter, the broadcast time of push is O(logn)O(\log n) w.h.p. [24]. Adding all these logarithmic bounds and applying a union bound proves (a).

(b): Since agents are initially distributed according to the stationary distribution, it follows that a given agent visits the root vertex with probability 2/(2|E|)8/n22/(2|E|)\leq 8/n^{2} at any given round. Therefore, the expected number of times agents visit the root during the first n2/(16|A|)n^{2}/(16|A|) rounds of visit-exchange is at most 1/21/2. It follows that with probability at least 1/21/2 no agent visits the root in any of the rounds tt, 0t<n2/(16|A|)=Θ(n)0\leq t<n^{2}/(16|A|)=\Theta(n). From this it is immediate that the expected number of rounds before the first agent visits the root is at least Ω(n)\Omega(n); this implies (b).

(c): Let (t)\mathcal{E}(t) denote the event that at most r=clognr=c\log n agents visit internal nodes at round tt, where c>0c>0 is a large enough constant. We apply the following modification to meet-exchange.

Modification: For any round t0t\geq 0, if (t)\mathcal{E}(t) does not hold, then before round t+1t+1 we move all agents that are at internal nodes to leaf nodes. (It is not important to which leaves we move the agents.)

Since the random walks of the |A|=Θ(n)|A|=\Theta(n) agents start from the stationary distribution, the expected number of agents that visit internal nodes at any given round tt is O(1)O(1). Furthermore, since the random walks are independent, a Chernoff bound gives that event (t)\mathcal{E}(t) holds w.h.p. (where the probability is controlled by the choice of cc). By a union bound, event 0t<log2n(t)\bigcap_{0\leq t<\log^{2}n}\mathcal{E}(t) holds also w.h.p. It follows that w.h.p. the modified process is identical to the original one in the first log2n\log^{2}n rounds. Next we analyze this modified process.

Let t0t^{\ast}\geq 0 be the first round when some agent visits source ss, and let gg^{\ast} be an agent that visits ss in that round, and thus gets informed. We have that t=O(logn)t^{\ast}=O(\log n) w.h.p., because by the modification above, there are Ω(n)\Omega(n) agents on leaf nodes before each round, thus the probability at least one agent visits leaf ss in any given round is Ω(1)\Omega(1).

For each gAg\in A, we denote by tgt_{g} the round when gg gets informed. In particular, tg=tt_{g^{\ast}}=t^{\ast}. Also, let It={g:tgt}I_{t}=\{g\colon t_{g}\leq t\} be the set of informed agents after round tt.

Next we show that at least 2r2r agents are informed by some round t+O(logn)t^{\ast}+O(\log n).

Claim 5.

W.h.p., min{k:|It+k|2r}=O(logn)\min\{k\colon|I_{t^{\ast}+k}|\geq 2r\}=O(\log n).

Proof.

Recall that α=|A|/n\alpha=|A|/n is a constant, and let r=5r/α=Θ(logn).r^{\prime}=5r/\alpha=\Theta(\log n). For any agent gg, let g\mathcal{E}_{g} be the event that gg visits only leaf vertices in rounds t+1,,t+rt^{\ast}+1,\ldots,t^{\ast}+r^{\prime}. Suppose that gg is at a leaf before round t+1t^{\ast}+1. Then

[g]=(11/l)r1r/l.\mathbb{P}\left[\mathcal{E}_{g}\right]=(1-1/l)^{r^{\prime}}\geq 1-r^{\prime}/l.

Also,

[tgt+rg,g]1(1l2(l1)2)rr2(l1),\mathbb{P}\left[t_{g}\leq t^{\ast}+r^{\prime}\mid\mathcal{E}_{g},\mathcal{E}_{g^{\ast}}\right]\geq 1-\left(1-\frac{l-2}{(l-1)^{2}}\right)^{r^{\prime}}\geq\frac{r^{\prime}}{2(l-1)},

where (l2)/(l1)2(l-2)/(l-1)^{2} is the probability that gg and gg^{\ast} visit the same leaf at a given round, assuming that they are at different leaves before the round, and that they both visit leaves at that round. Using the fact that at least |A|r1|A|-r-1 agents ggg\neq g^{\ast} are on leaves before round t+1t^{\ast}+1 (due to the modification above), we obtain for the number of informed agents after round t+rt^{\ast}+r^{\prime},

𝔼[|It+r|g]1+(|A|r1)(1rl)r2(l1)1+4r,\mathbb{E}\left[\,|I_{t^{\ast}+r^{\prime}}|\mid\mathcal{E}_{g^{\ast}}\,\right]\geq 1+(|A|-r-1)\cdot\left(1-\frac{r^{\prime}}{l}\right)\cdot\frac{r^{\prime}}{2(l-1)}\geq 1+4r,

where the extra 11 accounts for gg^{\ast}. We can thus apply a Chernoff bound to obtain

[|It+r|2rg]11/n,\mathbb{P}\left[|I_{t^{\ast}+r^{\prime}}|\geq 2r\mid\mathcal{E}_{g^{\ast}}\right]\geq 1-1/n,

for cc large enough. From that and [g]1r/l=1O(logn/n)\mathbb{P}\left[\mathcal{E}_{g^{\ast}}\right]\geq 1-r^{\prime}/l=1-O(\log n/n), it follows

[|It+r|2r]=1O(logn/n).\mathbb{P}\left[|I_{t^{\ast}+r^{\prime}}|\geq 2r\right]=1-O(\log n/n). (1)

We can amplify the above probability as follows. Suppose that |It+r|<2r|I_{t^{\ast}+r^{\prime}}|<2r. Consider the first round tt+rt^{\prime}\geq t^{\ast}+r^{\prime} such that gg^{\ast} is at a leaf vertex before round t+1t^{\prime}+1. Then t=t+r+O(logn)t^{\prime}=t^{\ast}+r^{\prime}+O(\log n), w.h.p. The reason is that from any internal vertex, an agent reaches a leaf after at most O(logn)O(\log n) rounds w.h.p., by the properties of a biased random walk on the line [25, Section 14.2], as the probability of the agent moving closer to the root in a round is 1/31/3, while the probability of moving closer to the leaf level is 2/32/3.

We can now apply the same argument as in the proof of (1), using tt^{\prime} in place of tt^{\ast}, to obtain [|It+r|2r|It|<2r]=1O(logn/n).\mathbb{P}\left[|I_{t^{\prime}+r^{\prime}}|\geq 2r\mid|I_{t^{\prime}}|<2r\right]=1-O(\log n/n). Repeating the argument a constant ii number of times, we obtain that [|It+r′′|2r]=1O(logn/n)i,\mathbb{P}\left[|I_{t^{\prime}+r^{\prime\prime}}|\geq 2r\right]=1-O(\log n/n)^{i}, for some r′′=Θ(logn)r^{\prime\prime}=\Theta(\log n). ∎

Next we argue that once 2r2r agents have been informed, at least half of the agents (or n/2n/2 if |A|>n|A|>n) are informed after O(logn)O(\log n) additional rounds.

Claim 6.

There is a constant ϵ>0\epsilon>0, such that if 2r|It|min{n,|A|}/22r\leq|I_{t}|\leq\min\{n,|A|\}/2, then

[|It+1|(1+ϵ)|It|It]1/2.\mathbb{P}\left[|I_{t+1}|\geq(1+\epsilon)\cdot|I_{t}|\mid I_{t}\right]\geq 1/2.
Proof.

Suppose that |It|=k[2r,min{n,|A|}/2]|I_{t}|=k\in[2r,\min\{n,|A|\}/2]. By the modification we have made, at least krk/2k-r\geq k/2 informed agents are on leaf nodes before round t+1t+1; let BB be the set of these agents. Let LL be the set of leaves visited by at least one informed agent in round t+1t+1. By a Chernoff bound,

[|L|k/8]=1eΩ(k),\mathbb{P}\left[|L|\geq k/8\right]=1-e^{-\Omega(k)},

because for each agent gg among the first k/2k/2 agents in BB, the probability that in round t+1t+1, gg visits a leaf that no other agents among the first k/2k/2 agents in BB visit in the round, is at least 1(k/2)/l1/21-(k/2)/l\geq 1/2.

Given |L||L|, consider an agent gg which is at a leaf before round t+1t+1 and is not yet informed. The probability that gg visits a leaf in LL in round t+1t+1, and thus gets informed, is at least |L|/l|L|/l. There are at least |A|rk|A|-r-k such agents, and therefore, the expected number of agents that get informed in round t+1t+1 is at least (|A|rk)|L|/l16ϵ|L|(|A|-r-k)\cdot|L|/l\geq 16\epsilon|L| for a sufficiently small constant ϵ>0\epsilon>0. Since the agents move independently, by a Chernoff bound we obtain

[|It+1|k+16ϵ|L|/2|L|k/8][|It+1|(1+ϵ)k|L|k/8]=1eΩ(k).\mathbb{P}\left[|I_{t+1}|\geq k+16\epsilon|L|/2\mid|L|\geq k/8\right]\geq\mathbb{P}\left[|I_{t+1}|\geq(1+\epsilon)k\mid|L|\geq k/8\right]=1-e^{-\Omega(k)}.

The claim then follows by combining the two equations we have shown above. ∎

By applying Claim 6 repeatedly, for a logarithmic number of rounds, we obtain that if |It|2r|I_{t}|\geq 2r, then w.h.p,

min{k:|It+k|min{n,|A|}/2}=O(logn).\min\{k\colon|I_{t+k}|\geq\min\{n,|A|\}/2\}=O(\log n).

Next we argue that once min{n,|A|}/2\min\{n,|A|\}/2 agents have been informed, the remaining agents are informed after O(logn)O(\log n) additional rounds.

Claim 7.

If |It|min{n,|A|}/2|I_{t}|\geq\min\{n,|A|\}/2 and tg>tt_{g}>t, then tg=t+O(logn)t_{g}=t+O(\log n) w.h.p.

Proof.

We saw in the proof of Claim 5, that if gg is on an internal node after round tt, it will reach a leaf after at most O(logn)O(\log n) rounds w.h.p. Suppose now that gg is at a leaf vertex before round t+1t^{\prime}+1, for some ttt^{\prime}\geq t. As we saw earlier, the probability that gg visits leaves in all rounds t+1,,t+rt^{\prime}+1,\ldots,t^{\prime}+r^{\prime}, where r=lognr^{\prime}=\log n, is at least 1r/l1-r^{\prime}/l. For a given round in which gg visits a leaf, let qq be the probability that no informed agent visits the same leaf. Since there are at least min{n,|A|}/2r\min\{n,|A|\}/2-r informed agents at leaf vertices before each round,

q1l1+(11l)min{n,|A|}/2rβ<1,q\leq\frac{1}{l-1}+\left(1-\frac{1}{l}\right)^{\min\{n,|A|\}/2-r}\leq\beta<1,

for a constant β\beta that depends on α\alpha. This bound follows from the observation that qq is maximized when all min{n,|A|}/2r\min\{n,|A|\}/2-r informed agents are on the same leaf before the round. It follows

[tg>t+r]r/l+qr=O(nγ),\mathbb{P}\left[t_{g}>t^{\prime}+r^{\prime}\right]\leq r^{\prime}/l+q^{r^{\prime}}=O(n^{-\gamma}),

for some constant γ>0\gamma>0. By repeating the argument a constant number of times we obtain the claim for an arbitrary high probability. ∎

Combining all the above results we complete the proof of (c). ∎

4.4 Siamese Heavy Binary Trees

We consider now an example where both random walk based processes are slow, while rumor spreading is fast. Let DnD_{n} denote a graph obtained by taking two copies of the graph BnB_{n} described above and merging the two roots into a single root vertex; see Fig. 1(d).

Lemma 8.

For the graph DnD_{n} described above and any source vertex ss, (a) Tpush=O(logn)T_{\rm push}=O(\log n), w.h.p., (b) 𝔼[Tvisitx]=Ω(n)\mathbb{E}\left[\,T_{\rm visitx}\,\right]=\Omega(n), and (c) 𝔼[Tmeetx]=Ω(n)\mathbb{E}\left[\,T_{\rm meetx}\,\right]=\Omega(n).

Proof.

Parts (a) and (b) follow from the same arguments used to prove the corresponding bounds in Lemma 4. For (c), we observe that w.h.p. at least one agent will start from each of the two trees. Then, for the information to pass from agents on the one tree to agents on the other, some agent must reach the root, which requires Ω(n)\Omega(n) rounds in expectation, as we showed in the proof of Lemma 4(b). ∎

4.5 Cycle of Stars of Cliques

Finally, we present a graph on which visit-exchange is faster than meet-exchange, by a logarithmic factor. We note that this graph is (almost) regular, unlike the highly non-regular graphs we considered in the previous sections. We leave open the question whether there are graphs on which visit-exchange is asymptotically faster than meet-exchange by a polynomial factor.

Lemma 9.

There is a graph G=(V,E)G=(V,E) with |V|=Θ(n)|V|=\Theta(n) such that for any source vertex sVs\in V, (a) 𝔼[Tvisitx]=O(n2/3)\mathbb{E}\left[\,T_{\rm visitx}\,\right]=O(n^{2/3}), and (b) 𝔼[Tmeetx]=Ω(n2/3logn)\mathbb{E}\left[\,T_{\rm meetx}\,\right]=\Omega(n^{2/3}\log n).

Proof Sketch.

An example of a graph GG with the above properties is a cycle-of-stars-of-cliques, obtained as follows: Consider a cycle graph of length n1/3n^{1/3}, consisting of vertices cic_{i}, i{1,,n1/3}i\in\{1,\ldots,n^{1/3}\}. For each ii consider a new set of n1/3n^{1/3} vertices li,jl_{i,j}, j{1,,n1/3}j\in\{1,\ldots,n^{1/3}\}, and connect cic_{i} to each li,jl_{i,j}. Finally, for each jj consider a new set of n1/3n^{1/3} vertices qi,j,kq_{i,j,k}, k{1,,n1/3}k\in\{1,\ldots,n^{1/3}\}, add an edge between each pair qi,j,k,qi,j,kq_{i,j,k},q_{i,j,k^{\prime}}, and also between li,jl_{i,j} and all qi,j,kq_{i,j,k}. See Fig. 1(e) for an illustration of this graph. We denote by Qi,jQ_{i,j} the (n1/3+1)(n^{1/3}+1)-clique induced by the vertex set {li,j}{qi,j,1qi,j,n1/3}\{l_{i,j}\}\cup\{q_{i,j,1}\ldots q_{i,j,n^{1/3}}\}.

The core-idea is that since vertices cic_{i} are not informed in meet-exchange, the information advances from cic_{i} to its neighboring ring vertices ci1c_{i-1} and ci+1c_{i+1} slower than in visit-exchange. Below we give a sketch of the analysis. To make it rigorous, one needs to use techniques similar to those in the other proofs of the paper, namely, bounding above and below the number of agents at subgraphs of GG. The number of rounds we refer to below are all in expectation.

(a): Suppose that the source vertex ss is in clique Qi,jQ_{i,j}. Then it takes O(logn)O(\log n) rounds until all vertices of the clique are informed. After that, vertex cic_{i} gets informed in O(n1/3)O(n^{1/3}) additional rounds, which is the average time it takes for the first agent to cross the edge from li,jl_{i,j} to cic_{i}, since a constant number of agents visit each vertex on average. From cic_{i}, the information passes to ci1c_{i-1} and ci+1c_{i+1} in O(n1/3)O(n^{1/3}) rounds after cic_{i} is informed. Thus, it takes O(n2/3)O(n^{2/3}) rounds before all ring nodes cic_{i^{\prime}} are informed. Once cic_{i^{\prime}} is informed, it takes O(n1/3logn)O(n^{1/3}\log n) rounds (by coupon collector’s) until all cliques Qi,jQ_{i^{\prime},j^{\prime}} are informed. It follows that the total broadcast time is O(n2/3)O(n^{2/3}).333Alternatively, one can prove the statement assuming push instead of visit-exchange, and then apply Theorem 1, since graph GG is (almost) regular.

(b): Suppose again that the source ss is in clique Qi,jQ_{i,j}. We first lower bound the number of rounds until at least Ω(n1/3)\Omega(n^{1/3}) informed agents visit cic_{i}, which is the average number of agents until one of them moves to either ci1c_{i-1} or ci+1c_{i+1}. It takes Ω(n1/3)\Omega(n^{1/3}) rounds until the first informed agent visits cic_{i}. This agent will move to another clique Qi,jQ_{i,j^{\prime}} with probability 1O(n1/3)1-O(n^{-1/3}). After that, the next informed agent visiting cic_{i} can come from Qi,jQ_{i,j} or Qi,jQ_{i,j^{\prime}}, and, therefore, the expected number of rounds until such a visit is halved. In general once \ell of the n1/3n^{1/3} cliques Qi,Q_{i,*} have received an informed agent, cic_{i} is visited by informed agents at the rate of once every n1/3/n^{1/3}/\ell rounds. It follows that it takes Θ(n1/3logn)\Theta(n^{1/3}\cdot\log n) rounds before cic_{i} has been visited by Ω(n1/3)\Omega(n^{1/3}) informed agents, and therefore, at least that many rounds are necessary until an informed agent moves to either ci1c_{i-1} or ci+1c_{i+1}. Therefore, it takes Ω(n2/3logn)\Omega(n^{2/3}\cdot\log n) rounds before all nodes on the ring are informed. ∎

5 Bounding TpushT_{\rm push} by TvisitxT_{\rm visitx} on Regular Graphs

In this section, we prove the following theorem, which upper bounds the broadcast time of push in a regular graph by the broadcast time of visit-exchange.

Theorem 10.

For any constants ε,α,λ>0\varepsilon,\alpha,\lambda>0, there is a constant c>0c>0, such that for any dd-regular graph G=(V,E)G=(V,E) with |V|=n|V|=n and dεlognd\geq\varepsilon\log n, and for any source vertex sVs\in V, the broadcast times of push and visit-exchange, with |A|αn|A|\leq\alpha n agents, satisfy

[Tpushck][Tvisitxk]nλ,\mathbb{P}\left[T_{\rm push}\leq ck\right]\geq\mathbb{P}\left[T_{\rm visitx}\leq k\right]-n^{-\lambda},

for any k0k\geq 0.

From Theorem 10, it is immediate that if TvisitxTT_{\rm visitx}\leq T w.h.p., then Tpush=O(T)T_{\rm push}=O(T) w.h.p. Moreover, using Theorem 10 and the known O(nlogn)O(n\log n) upper bound on TpushT_{\rm push} which holds w.h.p. [24], one can easily obtain that 𝔼[Tpush]=O(𝔼[Tvisitx])\mathbb{E}\left[\,T_{\rm push}\,\right]=O(\mathbb{E}\left[\,T_{\rm visitx}\,\right]).

Proof Overview of Theorem 10.

The proof uses the following coupling of processes push and visit-exchange: For each vertex uu, let πu(1),πu(2),\langle\pi_{u}(1),\pi_{u}(2),\ldots\rangle be the sequence of neighbors that uu samples in push after getting informed. Similarly, for visit-exchange, consider all moves of informed agents from uu to its neighbor vertices in chronological order, and let pu(1),pu(2),\langle p_{u}(1),p_{u}(2),\ldots\rangle be the destination vertices in those moves (we order moves in the same round by, say, agent ID). We couple the two processes by setting πu(i)=pu(i)\pi_{u}(i)=p_{u}(i), for all u,iu,i.

The intuition for this coupling is that in visit-exchange, at most a constant number of agents in expectation visits each vertex uu in a round (since the graph is regular and |A|=O(n)|A|=O(n)), and thus the same number of agents leaves uu per round in expectation. The coupling ensures that for each informed agent that moves from uu to a neighbor vv, vertex uu samples the same neighbor vv in push. Thus, if we had a constant upper bound cc on the actual number (rather than the expected number) of visits to each vertex on each round, then the coupling would immediately yield TpushcTvisitxT_{\rm push}\leq c\cdot T_{\rm visitx} for the coupled processes. In reality, however, a super-constant number of agents may visit a vertex in a round, and, moreover, the number of visits depends on the past history of the process.

An basic idea we use to tackle dependencies on the past history is to consider a tweaked version of visit-exchange, called t-visit-exchange. The only difference between this process and visit-exchange, is that it arbitrarily removes some agents after each round to ensure that the neighborhood of any vertex contains at most O(d)O(d) agents. For d=Ω(logn)d=\Omega(\log n) and |A|=O(n)|A|=O(n), we have that in the first poly(n)\mathrm{poly}(n) rounds the two processes are identical w.h.p. Therefore, we can consider t-visit-exchange in our proofs. The benefit we get is that since the neighborhood of any vertex uu contains O(d)O(d) agents in round tt, at round t+1t+1 the number of agents that visit uu will be bounded by the binomial distribution Bin(Θ(d),1/d)\operatorname{Bin}(\Theta(d),1/d), independently of the past.

To prove the theorem is suffices to show that under our coupling, with probability at least 1nλ1-n^{-\lambda}, if TvisitxkT_{\rm visitx}\leq k then TpushckT_{\rm push}\leq ck. Further, we will assume that kk is at least Ω(logn)\Omega(\log n); for k=O(logn)k=O(\log n) the theorem is obtained by showing that Tvisitx=Ω(logn)T_{\rm visitx}=\Omega(\log n) w.h.p.

To show that w.h.p. TvisitxkT_{\rm visitx}\leq k implies TpushckT_{\rm push}\leq ck, we consider all possible paths of length kk through which information travels in visit-exchange, and for each path we count the total number of (non-distinct) agents encountered along this path, called the congestion of the path. Formally, we use the notion of a canonical walk θ\theta, which is represented by a sequence of vertices θ=(θ0,θ1,,θk)\theta=(\theta_{0},\theta_{1},\ldots,\theta_{k}) starting from θ0=s\theta_{0}=s: In each round 1tk1\leq t\leq k, the walk either stays put and θt=θt1\theta_{t}=\theta_{t-1}, or it follows one of the agents gg that leave θt1\theta_{t-1} in round tt, and, in that case, θt\theta_{t} is the new vertex that gg moves to. For any round tt, we count the agents that are in θt\theta_{t}. The sum of these counts, for 0t<k0\leq t<k is the congestion Q(θ)Q(\theta) of the walk θ\theta.

The congestion of a canonical walk is used to bound the time needed for information to travel along the same path in the coupled push process. Intuitively, larger congestion implies longer travel time for push, for the following reason. Suppose there are mm agents in uu at some round after it is informed by visit-exchange. The coupled push process, using the same random decisions for the choice of neighbors as visit-exchange, will take mm rounds to “go through” these mm agents.

To relate the congestion of canonical walks with the time it takes for information to spread in push, we introduce C-counters: For each vertex uu, we maintain a counter CuC_{u}. The counter is initialized in the round tut_{u} in which uu becomes informed in visit-exchange. Its initial value is the value of the C-counter of the neighbor from which the first informed agent arrived to uu. In each subsequent round t>tut>t_{u}, CuC_{u} increases by the number of agents that visited uu in round t1t-1. C-counters have the following two properties: If τu\tau_{u} is the round when uu gets informed in push then τuCu(tu)\tau_{u}\leq C_{u}(t_{u}); and for any ttut\geq t_{u}, there is a canonical walk θ\theta of length tt such that Cu(t)=Q(θ)C_{u}(t)=Q(\theta). Therefore, to show that w.h.p. TvisitxkT_{\rm visitx}\leq k implies TpushckT_{\rm push}\leq ck, it suffices to show that the maximum congestion of all canonical walks of length kk is at most ckck w.h.p.

We can bound the congestion of a single canonical walk of length kk using the property of t-visit-exchange that the number of agents at a node is bounded by a binomial distribution with constant mean. This results in the desired bound of ckck for a single walk with probability at least 1ak1-a^{-k}, for some constant a>1a>1. We would like to take a union bound over all canonical walks, which would give the desired result. For this to work, however, we should also bound the total number of canonical walks of length kk by at most ak/nλa^{k}/n^{\lambda}.

We bound the number of canonical walks of length kk by introducing a set of descriptors for these walks. A descriptor is represented by a matrix, which, together with a given execution of visit-exchange, uniquely defines a canonical walk. Additionally, the set of descriptors suffices to encode all canonical walks, and therefore, it is at least as large as the set of all walks. Thus, we can use a bound on the number of descriptors that can be computed by a simple combinatorial argument involving the number of elements used in the matrix, and the values they can take. A naive construction of descriptors, however, is too wasteful giving us a much larger bound than the ak/nλa^{k}/n^{\lambda} we need. A key idea here is that the majority of the descriptors represent walks only in executions that happen with low probability. So, we construct a set of concise descriptors that can describe all canonical walks in a random execution w.h.p. We show that the size of the set of concise descriptors can be bounded by ak/nλa^{k}/n^{\lambda}, as desired. Next we give the details of the proof.

5.1 Notation and Coupling Description

For each vertex uVu\in V, we denote by τu\tau_{u} the round when uu gets informed in push. For i1i\geq 1, let πu(i)\pi_{u}(i) be the iith vertex that uu samples, i.e., the vertex it samples in round τu+i\tau_{u}+i. Note that τπu(i)τu+i\tau_{\pi_{u}(i)}\leq\tau_{u}+i. In visit-exchange, we denote by tut_{u} the round when vertex uu gets informed. For any agent gAg\in A and t0t\geq 0, we denote by xg(t)x_{g}(t), the vertex that gg visits in round tt. Thus, {xg(t)}t0\{x_{g}(t)\}_{t\geq 0} is a random walk on GG. Let Zu(t)Z_{u}(t) be the set of all agents that visit uu in round tt, i.e.,

Zu(t)={gA:xg(t)=u}.Z_{u}(t)=\{g\in A\colon x_{g}(t)=u\}.

Thus, Zu(t)Z_{u}(t) is also the set of agents that depart from uu in round t+1t+1. Consider all visits to uu in rounds ttut\geq t_{u}, in chronological order, ordering visits in the same round with respect to a predefined total order over agents. For each i1i\geq 1, consider the agent gg that does the iith such visit, and let pu(i)p_{u}(i) be the vertex that gg visits next. Formally, let Xu={(t,g):ttu,xg(t)=u},X_{u}=\{(t,g)\colon t\geq t_{u},x_{g}(t)=u\}, and order its elements such that (t,g)<(t,g)(t,g)<(t^{\prime},g^{\prime}) if t<tt<t^{\prime}, or t=tt=t^{\prime} and g<gg<g^{\prime}. If (t,g)(t,g) is the iith smallest element in XuX_{u}, then pu(i)=xg(t+1)p_{u}(i)=x_{g}(t+1).

Coupling.

We couple processes push and visit-exchange by setting πu(i)=pu(i)\pi_{u}(i)=p_{u}(i). Formally, let {wu(i)}uV,i1\{w_{u}(i)\}_{u\in V,i\geq 1}, be a collection of independent random variables, where wu(i)w_{u}(i) takes a uniformly random value from the set Γ(u)\Gamma(u) of uu’s neighbors. Then, for every uVu\in V and i1i\geq 1, we set πu(i)=pu(i)=wu(i).\pi_{u}(i)=p_{u}(i)=w_{u}(i).

5.2 Upper Bound on Agents and Tweaked Visit-Exchange

We will use the next simple bound on the number of agents that visit a given set SS of vertices in some round tt of visit-exchange. The proof is by a simple Chernoff bound, and relies on the assumption that agents execute independent walks starting from stationarity.

Lemma 11.

For any SVS\subseteq V, t0t\geq 0, and β2e|A|/n\beta\geq 2e\cdot|A|/n,

[vS|Zv(t)|β|S|]12β|S|.\mathbb{P}\left[\sum_{v\in S}|Z_{v}(t)|\leq\beta\cdot|S|\right]\geq 1-2^{-\beta\,|S|}.
Proof.

Since each random walk starts from stationarity, and GG is a regular graph, it follows that for any agent gAg\in A, [xg(t)S]=|S|/n\mathbb{P}\left[x_{g}(t)\in S\right]=|S|/n. Thus, the expected number of agents that visit SS in round tt is |A||S|/nβ|S|/(2e).|A|\cdot|S|/n\leq\beta\cdot|S|/(2e). Then, by the independence of the random walks, we can use a standard Chernoff bound to show that the number of agents that visit SS at tt is at most β|S|\beta\cdot|S| with probability at least 12β|S|1-2^{-\beta\cdot|S|}. ∎

We remark that Lemma 11 holds also in the case where |A|=n|A|=n and exactly one walk starts from each vertex. This implies that Theorem 10 holds in the above case as well, because the rest of the proof does not require any assumptions about the initial distribution of agents.

In parts of the analysis, we will use a “tweaked” variant of visit-exchange, called t-visit-exchange, defined as follows. Let

γ2e|A|/n\gamma\geq 2e\cdot|A|/n (2)

be a (sufficiently large) constant to be specified later. If in some round t0t\geq 0, there is a vertex uVu\in V for which the following condition does not hold:

vΓ(u)|Zv(t)|γd,\sum_{v\in\Gamma(u)}|Z_{v}(t)|\leq\gamma\cdot d, (3)

then before round t+1t+1, we remove a minimal set of agents from the graph in such a way that the above condition holds for all vertices uu, when counting just the remaining agents.

It follows from Lemma 11 that if constant γ\gamma is large enough, and d=Ω(logn)d=\Omega(\log n), then w.h.p. the modified process is identical to the original in the first polynomial number of rounds.

Lemma 12.

The probability that Eq.(3) holds simultaneously for all uVu\in V and 0t<k0\leq t<k is at least 1kn2γd1-kn\cdot 2^{-\gamma d}.

Proof.

The claim follows by applying Lemma 11, for each 0t<k0\leq t<k and each pair u,Su,S, where uVu\in V and S=Γ(u)S=\Gamma(u), and then combining the results using a union bound. ∎

We use the same definitions and notations for both visit-exchange and t-visit-exchange.

5.3 C-Counters

Recall that tut_{u} is the round when vertex uu gets informed in visit-exchange. If usu\neq s, this is the first round when some informed agent visits uu. We are interested in the neighbor vv of uu from which that agent arrived. Note that tv<tut_{v}<t_{u}. Note also that there may be more than one such neighbors vv, if more than one informed agent visit uu at round tut_{u}. For each uVu\in V, let

Su={vΓ(u):tv<tu,Zv(tu1)Zu(tu)},S_{u}=\{v\in\Gamma(u)\colon t_{v}<t_{u},\,Z_{v}(t_{u}-1)\cap Z_{u}(t_{u})\neq\emptyset\},

i.e., SuS_{u} contains all neighbors vv of uu for which some informed agent moved from vv to uu in round tut_{u}. Next, for each t0t\geq 0, we define the counter variable

Cu(t)={0,if t<tu or t=tu=0minvSuCv(t),if t=tu>0Cu(t1)+|Zu(t1)|,if t>tu.C_{u}(t)=\begin{cases}0,&\text{if $t<t_{u}$ or $t=t_{u}=0$}\\ \min_{v\in S_{u}}C_{v}(t),&\text{if $t=t_{u}>0$}\\ C_{u}(t-1)+|Z_{u}(t-1)|,&\text{if $t>t_{u}$}.\end{cases} (4)

That is, CuC_{u} is initialized in round tut_{u} to the minimum counter value of the neighbors in SuS_{u} (or to zero if u=su=s), and Cu(t)Cu(tu)C_{u}(t)-C_{u}(t_{u}) is the number of visits to uu from round tut_{u} until round t1t-1, or equivalently, the number of departures of agents from uu in rounds tu+1t_{u}+1 up to tt.

Lemma 13.

For any uVu\in V, τuCu(tu)\tau_{u}\leq C_{u}(t_{u}).

Proof.

Consider the following path through which information reaches uu in visit-exchange. The path is (v0,v1,,vk)(v_{0},v_{1},\ldots,v_{k}), where v0=sv_{0}=s, vk=uv_{k}=u, and for each 0<jk0<j\leq k, we have vj1Svjv_{j-1}\in S_{v_{j}} and Cvj1(tvj)=minvSvjCv(tvj)=Cvj(tvj)C_{v_{j-1}}(t_{v_{j}})=\min_{v\in S_{v_{j}}}C_{v}(t_{v_{j}})=C_{v_{j}}(t_{v_{j}}). We prove by induction on 0jk0\leq j\leq k that

τvjCvj(tvj).\tau_{v_{j}}\leq C_{v_{j}}(t_{v_{j}}). (5)

This holds for j=0j=0, because v0=sv_{0}=s, ts=0t_{s}=0, and τs=0=Cs(0)\tau_{s}=0=C_{s}(0). Let 0<jk0<j\leq k, and suppose that τvj1Cvj1(tvj1)\tau_{v_{j-1}}\leq C_{v_{j-1}}(t_{v_{j-1}}); we will show that τvjCvj(tvj)\tau_{v_{j}}\leq C_{v_{j}}(t_{v_{j}}). We have

Cvj(tvj)\displaystyle C_{v_{j}}(t_{v_{j}}) =Cvj1(tvj),by the path property\displaystyle=C_{v_{j-1}}(t_{v_{j}}),\quad\text{by the path property}
=Cvj1(tvj1)+tvj1t<tvj|Zvj1(t)|,by recursive application of (4)\displaystyle=C_{v_{j-1}}(t_{v_{j-1}})+\sum_{t_{v_{j-1}}\leq t<t_{v_{j}}}|Z_{v_{j-1}}(t)|,\quad\text{by recursive application of~\eqref{eq:Cu}}
τvj1+tvj1t<tvj|Zvj1(t)|,by the induction hypothesis.\displaystyle\geq\tau_{v_{j-1}}+\sum_{t_{v_{j-1}}\leq t<t_{v_{j}}}|Z_{v_{j-1}}(t)|,\quad\text{by the induction hypothesis.}

Let =min{i:pvj1(i)=vj}\ell=\min\{i\colon p_{v_{j-1}}(i)=v_{j}\}, let gg be the agent that does the \ellth visit to vj1v_{j-1} since round tvj1t_{v_{j-1}}, and let rr be the round when that visit takes place, thus xg(r)=vj1x_{g}(r)=v_{j-1} and xg(r+1)=vjx_{g}(r+1)=v_{j}. By the minimality of \ell, r+1r+1 is the first round when some informed agent moves to vjv_{j} from vj1v_{j-1}. Since vj1Svjv_{j-1}\in S_{v_{j}}, it follows that r+1=tvjr+1=t_{v_{j}}. Then

tvj1tr|Zvj1(t)|=tvj1t<tvj|Zvj1(t)|.\ell\leq\sum_{t_{v_{j-1}}\leq t\leq r}|Z_{v_{j-1}}(t)|=\sum_{t_{v_{j-1}}\leq t<t_{v_{j}}}|Z_{v_{j-1}}(t)|.

Also, from the coupling, πvj1()=pvj1()=vj\pi_{v_{j-1}}(\ell)=p_{v_{j-1}}(\ell)=v_{j}, which implies

τvjτvj1+.\tau_{v_{j}}\leq\tau_{v_{j-1}}+\ell.

Combining all the above we obtain Cvj(tvj)τvj1+τvj,C_{v_{j}}(t_{v_{j}})\geq\tau_{v_{j-1}}+\ell\geq\tau_{v_{j}}, completing the inductive proof of (5). Applying (5) for j=kj=k, we obtain τuCu(tu)\tau_{u}\leq C_{u}(t_{u}). ∎

5.4 Canonical Walks and Congestion

Let θ=(θ0,θ1,,θk)\theta=(\theta_{0},\theta_{1},\ldots,\theta_{k}), where θ0=s\theta_{0}=s and θiΓ(θi1){θi1}\theta_{i}\in\Gamma(\theta_{i-1})\cup\{\theta_{i-1}\} for 1ik1\leq i\leq k, be a walk on GG constructed from visit-exchange as follows. We start from vertex θ0=s\theta_{0}=s in round zero, and in each round 1tk1\leq t\leq k, we either stay put, in which case θt=θt1\theta_{t}=\theta_{t-1}, or we choose one of the agents gZθi1(t1)g\in Z_{\theta_{i-1}}(t-1), which visited θi1\theta_{i-1} in the previous round, and move to the same vertex as gg in round tt, i.e., θt=xt(g)\theta_{t}=x_{t}(g). We call θ\theta a canonical walk of length kk. A labeled canonical walk is a canonical walk that specifies also the agent gtg_{t} that the walk follows in each step tt, if θtθt1\theta_{t}\neq\theta_{t-1}. Formally, a labeled canonical walk corresponding to θ\theta is η=(θ0,g1,θ1,g2,,gk,θk)\eta=(\theta_{0},g_{1},\theta_{1},g_{2},\ldots,g_{k},\theta_{k}), where gtZθt1(t1)Zθt(t)g_{t}\in Z_{\theta_{t-1}}(t-1)\cap Z_{\theta_{t}}(t) if θtθt1\theta_{t}\neq\theta_{t-1}, and gt=g_{t}=\bot if θt=θt1\theta_{t}=\theta_{t-1}. Note that different labeled canonical walks may correspond to the same (unlabeled) canonical walk. We define the congestion Q(θ)Q(\theta) of a canonical walk θ\theta as the total number of agents encountered along the walk,444The same agents is counted more than once if encountered in multiple rounds. not counting the last step, i.e.,

Q(θ)=0t<k|Zθt(t)|.Q(\theta)=\sum_{0\leq t<k}|Z_{\theta_{t}}(t)|.

The congestion of a labeled canonical walk is the same as the congestion of the corresponding unlabeled walk.

Lemma 14.

For any uVu\in V and ttut\geq t_{u}, there is a canonical walk θ\theta of length tt with Q(θ)=Cu(t)Q(\theta)=C_{u}(t).

Proof.

We consider the same path (v0,v1,,vk)(v_{0},v_{1},\ldots,v_{k}) as in the proof of Lemma 13, where v0=sv_{0}=s, vk=uv_{k}=u, and for each 0<jk0<j\leq k, vj1Svjv_{j-1}\in S_{v_{j}} and Cvj(tvj)=Cvj1(tvj)C_{v_{j}}(t_{v_{j}})=C_{v_{j-1}}(t_{v_{j}}). Consider the canonical walk θ\theta obtained from this path by adding between each pair of consecutive vertices vj1v_{j-1} and vjv_{j}, tvjtvj11t_{v_{j}}-t_{v_{j-1}}-1 copies of vj1v_{j-1}, and also appending after vkv_{k} a number of ttvkt-t_{v_{k}} copies of vkv_{k}. It is then easy to show by induction that Q(θ)=Cu(t)Q(\theta)=C_{u}(t). ∎

5.5 Concise Descriptors of Canonical Walks

In this section, we bound the number of distinct labeled canonical walks of a given length kk. For that, we present a concise description for such walks, and bound the total number of the walks by the total number of different possible descriptions.

We start with a rather wasteful way to describe labeled canonical walks, which we then refine in two steps. Let 𝒜k\mathcal{A}_{k} denote the set of all αn×k\alpha n\times k matrices Ak=[ai,j]A_{k}=[a_{i,j}], where ai,j{0,,i}a_{i,j}\in\{0,\ldots,i\}. Let us fix the first kk rounds of visit-exchange, and consider a labeled canonical walk η=(θ0=s,g1,θ1,,gk,θk)\eta=(\theta_{0}=s,g_{1},\theta_{1},\ldots,g_{k},\theta_{k}). For each 1tk1\leq t\leq k, let

δt=|Zθt1(t1)|\delta_{t}=|Z_{\theta_{t-1}}(t-1)|

be the number of agents that visit θt1\theta_{t-1} in round t1t-1, and thus also the number of agents that depart from θt1\theta_{t-1} in round tt. Let ρt=0\rho_{t}=0 if gt=g_{t}=\bot, otherwise, ρt\rho_{t} is equal to the rank of gtg_{t} in set Zθt1(t1)Z_{\theta_{t-1}}(t-1), i.e., ρt=|{gZθt1(t1):ggt}|\rho_{t}=|\{g\in Z_{\theta_{t-1}}(t-1)\colon g\leq g_{t}\}|. We describe walk η\eta by a matrix Ak𝒜kA_{k}\in\mathcal{A}_{k} with the following entries: For each 1tk1\leq t\leq k, if δt>0\delta_{t}>0, then aδt,j=ρta_{\delta_{t},j}=\rho_{t}, for j=|{tt:δt=δt}|j=|\{t^{\prime}\leq t\colon\delta_{t^{\prime}}=\delta_{t}\}|, i.e., value ρt\rho_{t} is stored in the first unused entry of row Ak[δt,]A_{k}[\delta_{t},\cdot]. At most kk of the entries of AkA_{k} are specified that way; the remaining entries can have arbitrary values. We call AkA_{k} a non-concise descriptor of η\eta.

For any given realization of visit-exchange, each Ak𝒜kA_{k}\in\mathcal{A}_{k} describes exactly one labeled canonical walk of length kk, and any labeled canonical walk of length kk has at least one non-concise descriptor Ak𝒜kA_{k}\in\mathcal{A}_{k} (in fact, several ones). The total number of different non-concise descriptors is |𝒜k|=1iαn(i+1)k|\mathcal{A}_{k}|=\prod_{1\leq i\leq\alpha n}(i+1)^{k}, which is too large for our purposes.

A simple improvement is to use only entries in rows Ak[i,]A_{k}[i,\cdot] for which ii is a power of 2 (we assume w.l.o.g. that αn\alpha n is also a power of 2). Roughly speaking, if δt\delta_{t} is between 212^{\ell-1} and 22^{\ell} then ρt\rho_{t} is stored in raw Ak[2,]A_{k}[2^{\ell},\cdot]. Formally, let bb be a (large enough) constant, to be specified later, which is a power of 2. The matrix Ak𝒜kA_{k}\in\mathcal{A}_{k} we use to describes η\eta has the following entries. For each 1tk1\leq t\leq k:

  1. 1.

    If 21<δt22^{\ell-1}<\delta_{t}\leq 2^{\ell}, where {1+logb,,log(αn)}\ell\in\{1+\log b,\ldots,\log(\alpha n)\}, and |{tt:21<δt2}|=j|\{t^{\prime}\leq t\colon 2^{\ell-1}<\delta_{t^{\prime}}\leq 2^{\ell}\}|=j, then

    1. (a)

      if ρt0\rho_{t}\neq 0, we have a2,j=ρta_{2^{\ell},j}=\rho_{t},

    2. (b)

      if ρt=0\rho_{t}=0, a2,ja_{2^{\ell},j} can take any value in {0}{δt+1,,2}\{0\}\cup\{\delta_{t}+1,\ldots,2^{\ell}\}.

  2. 2.

    If 0δtb0\leq\delta_{t}\leq b and |{tt:0<δtb}|=j|\{t^{\prime}\leq t\colon 0<\delta_{t^{\prime}}\leq b\}|=j, then

    1. (a)

      if ρt0\rho_{t}\neq 0, we have ab,j=ρta_{b,j}=\rho_{t},

    2. (b)

      if ρt=0\rho_{t}=0, ab,ja_{b,j} can take any value in {0}{δt+1,,b}\{0\}\cup\{\delta_{t}+1,\ldots,b\}.

The purpose of subcases (b) is to maintain the property that every AkA_{k} describes a labeled canonical walk, which would not be the case if we just set a2,j=0a_{2^{\ell},j}=0 or ab,j=0a_{b,j}=0, since values greater than δt\delta_{t} would not correspond to a walk. We call the matrix AkA_{k} above a semi-concise descriptor of η\eta.

A second modification we make is based on the observation that, even in the logarithmic number of AkA_{k}’ rows used in the above scheme, most entries are very unlikely to be actually used. For each row i=2i=2^{\ell}, we specify a threshold index kikk_{i}\leq k, such that the first kik_{i} entries in each row Ak[i,]A_{k}[i,\cdot] suffice w.h.p. to describe all labeled canonical walks of length kk, in a random realization of visit-exchange. Let k\mathcal{B}_{k} be a subset of 𝒜k\mathcal{A}_{k} defined as follows. Let

ki=bk/i,k_{i}=b\cdot k/i,

and recall that bb is a constant power of 2. The set k\mathcal{B}_{k} consists of all Ak=[ai,j]𝒜kA_{k}=[a_{i,j}]\in\mathcal{A}_{k} such that

ai,j{0,,i},\displaystyle a_{i,j}\in\{0,\ldots,i\}, if i{2:logblog(αn)}i\in\{2^{\ell}\colon\log b\leq\ell\leq\log(\alpha n)\} and jkij\leq k_{i}
ai,j=0,\displaystyle a_{i,j}=0, otherwise.\displaystyle\text{otherwise}.

A concise descriptor of a labeled canonical walk η\eta of length kk is any semi-concise descriptor AkA_{k} of η\eta that belongs to set k\mathcal{B}_{k}.

Next we compute an upper bound on the number of all possible concise descriptors of length kk.

Lemma 15.

|k|(4b)2k|\mathcal{B}_{k}|\leq(4b)^{2k}.

Proof.

From the definition of k\mathcal{B}_{k}, we have

|k|\displaystyle|\mathcal{B}_{k}| logblog(αn)(2+1)bk/2\displaystyle\leq\prod_{\log b\leq\ell\leq\log(\alpha n)}(2^{\ell}+1)^{bk/2^{\ell}}
=logblog(αn)2bk/2logblog(αn)(1+2)bk/2\displaystyle=\prod_{\log b\leq\ell\leq\log(\alpha n)}2^{\ell bk/2^{\ell}}\cdot\prod_{\log b\leq\ell\leq\log(\alpha n)}(1+2^{-\ell})^{bk/2^{\ell}}
12bk/2logb12bk/2logbebk/4\displaystyle\leq\frac{\prod_{\ell\geq 1}2^{\ell bk/2^{\ell}}}{\prod_{\ell\leq\log b-1}2^{\ell bk/2^{\ell}}}\cdot\prod_{\ell\geq\log b}e^{bk/4^{\ell}}
=22bk2(2(blogb1)ke(4/3)k/b\displaystyle=\frac{2^{2bk}}{2^{(2(b-\log b-1)k}}\cdot e^{(4/3)k/b}
22(logb+2)k,\displaystyle\leq 2^{2(\log b+2)k},

where in the second-last line we used 1/2=2\sum_{\ell\geq 1}\ell/2^{\ell}=2, y/2=2y(2y+1y2)\sum_{\ell\leq y}\ell/2^{\ell}=2^{-y}(2^{y+1}-y-2), and 01/4=4/3\sum_{\ell\geq 0}1/4^{\ell}=4/3; and in the last line we used that e(4/3)<4e^{(4/3)}<4. ∎

For any realization of visit-exchange, each AkkA_{k}\in\mathcal{B}_{k} is a concise descriptor of some labeled canonical walk of length kk. However it is not always the case that a labeled canonical walk has a concise descriptor. The next lemma shows that w.h.p. all labeled canonical walks of length kk have concise descriptors for an appropriate choice of constant parameter bb. Note that the lemma assumes the t-visit-exchange process. The proof is given in Section 5.6.

Lemma 16.

If bmax{2γe2,64}b\geq\max\{2\gamma e^{2},64\} then, with probability at least 12bk/4log(αn)1-2^{-bk/4}\log(\alpha n), all labeled canonical walks of length kk in a random realization of t-visit-exchange have concise descriptors.

5.6 Proof of Lemma 16

First, we bound the number of steps tt in which more than ii agents are encountered in a canonical walk of length kk.

Lemma 17.

Fix any Ak𝒜kA_{k}\in\mathcal{A}_{k}, and let η=(θ0,g1,θ1,,gk,θk)\eta=(\theta_{0},g_{1},\theta_{1},\ldots,g_{k},\theta_{k}) be the labeled canonical walk with semi-concise (or non-concise) descriptor AkA_{k} in t-visit-exchange. For any ie2γi\geq e^{2}\gamma and βe2γ\beta\geq e^{2}\gamma,

[|{t{1,,k}:δt>i}|βk/i]2βk.\mathbb{P}\left[|\{t\in\{1,\ldots,k\}\colon\delta_{t}>i\}|\geq\beta k/i\right]\leq 2^{-\beta k}.
Proof.

Recall that δt=|Zθt1(t1)|\delta_{t}=|Z_{\theta_{t-1}}(t-1)| is the number of agents that visit vertex θt1\theta_{t-1} in round t1t-1, and thus also the number of agents that depart from θt1\theta_{t-1} in round tt. We argue that for any t1t\geq 1, conditioned on δ1,,δt\delta_{1},\ldots,\delta_{t}, variable δt+1\delta_{t+1} is stochastically dominated by the binomial random variable Bin(γd,1/d)+1\operatorname{Bin}(\gamma d,1/d)+1: From (3), applied for vertex θt\theta_{t} and round t1t-1, we get

vΓ(θt)|Zv(t1)|γd,\sum_{v\in\Gamma(\theta_{t})}|Z_{v}(t-1)|\leq\gamma\cdot d,

thus, there are at most γd\gamma d agents in the neighborhood of θt\theta_{t} before round tt. If θt=θt1\theta_{t}=\theta_{t-1}, then each one of those at most γd\gamma d agents will visit θt\theta_{t} in round tt independently with probability 1/d1/d. If θtθt1\theta_{t}\neq\theta_{t-1} (thus gtZθt1(t1)Zθt(t)g_{t}\in Z_{\theta_{t-1}}(t-1)\cap Z_{\theta_{t}}(t)), then each of the at most γd\gamma d agents will visit θt\theta_{t} in round tt independently with probability 1/d1/d, except for agent gtg_{t} who visits θt\theta_{t} with probability 1. In both cases, the number δt+1\delta_{t+1} of agents that visit θt\theta_{t} is dominated by Bin(γd,1/d)+1\operatorname{Bin}(\gamma d,1/d)+1. It follows that for any t1t\geq 1 and i1i\geq 1,

[δt+1>iδ1,,δt]\displaystyle\mathbb{P}\left[\delta_{t+1}>i\mid\delta_{1},\ldots,\delta_{t}\right] [Bin(γd,1/d)+1>i]=[Bin(γd,1/d)i]\displaystyle\leq\mathbb{P}\left[\operatorname{Bin}(\gamma d,1/d)+1>i\right]=\mathbb{P}\left[\operatorname{Bin}(\gamma d,1/d)\geq i\right]
(γdi)1di(eγdi)i1di=(eγi)i.\displaystyle\leq\binom{\gamma d}{i}\cdot\frac{1}{d^{i}}\leq\left(\frac{e\gamma d}{i}\right)^{i}\cdot\frac{1}{d^{i}}=\left(\frac{e\gamma}{i}\right)^{i}.

Similarly, for δ1\delta_{1} we have

[δ1i]=[Bin(αn,1/n)i](eαi)i<(eγi)i.\mathbb{P}\left[\delta_{1}\geq i\right]=\mathbb{P}\left[\operatorname{Bin}(\alpha n,1/n)\geq i\right]\leq\left(\frac{e\alpha}{i}\right)^{i}<\left(\frac{e\gamma}{i}\right)^{i}.

Let pi=(eγi)i.p_{i}=\left(\frac{e\gamma}{i}\right)^{i}. It follows from the above that for any 1\ell\geq 1,

[|{t{1,,k}:δt>i}|]\displaystyle\mathbb{P}\left[|\{t\in\{1,\ldots,k\}\colon\delta_{t}>i\}|\geq\ell\right] [Bin(k,pi)](k)pi(ekpi).\displaystyle\leq\mathbb{P}\left[\operatorname{Bin}(k,p_{i})\geq\ell\right]\leq\binom{k}{\ell}\cdot p_{i}^{\ell}\leq\left(\frac{ekp_{i}}{\ell}\right)^{\ell}. (6)

For βk/i\ell\geq\beta k/i and ie2γi\geq e^{2}\gamma,

(ekpi)\displaystyle\left(\frac{ekp_{i}}{\ell}\right)^{\ell} (ek(eγ/i)iβk/i),by pi=(eγi)i and βk/i\displaystyle\leq\left(\frac{ek(e\gamma/i)^{i}}{\beta k/i}\right)^{\ell},\qquad\text{by }p_{i}=\left(\frac{e\gamma}{i}\right)^{i}\text{ and }\ell\geq\beta k/i
=(e2γβ(eγi)i1)(eγi)(i1),by βe2γ\displaystyle=\left(\frac{e^{2}\gamma}{\beta}\cdot\left(\frac{e\gamma}{i}\right)^{i-1}\right)^{\ell}\leq\left(\frac{e\gamma}{i}\right)^{(i-1)\ell},\qquad\text{by }\beta\geq e^{2}\gamma
(eγi)(11/i)βk,by βk/i\displaystyle\leq\left(\frac{e\gamma}{i}\right)^{(1-1/i)\beta k},\qquad\text{by }\ell\geq\beta k/i
(1e)(11/e2)βk,by ie2γe2\displaystyle\leq\left(\frac{1}{e}\right)^{(1-1/e^{2})\beta k},\qquad\text{by }i\geq e^{2}\gamma\geq e^{2}
2βk.\displaystyle\leq 2^{-\beta k}.

Substituting that to (6) completes the proof of Lemma 17. ∎

We proceed now to the proof of the main claim. For any Ak𝒜kA_{k}\in\mathcal{A}_{k}, and for η=(θ0,g1,θ1,,θk)\eta=(\theta_{0},g_{1},\theta_{1},\ldots,\theta_{k}) the labeled canonical walk with semi-concise descriptor AkA_{k}, let Ak\mathcal{E}_{A_{k}} denote the event:

|{t{1,,k}:21<δt2}|k2,for all{logb+1,,log(αn)}.|\{t\in\{1,\ldots,k\}\colon 2^{\ell-1}<\delta_{t}\leq 2^{\ell}\}|\leq k_{2^{\ell}},\ \text{for all}\,\ell\in\{\log b+1,\ldots,\log(\alpha n)\}.

Applying Lemma 17, for i=21i=2^{\ell-1} and β=b/2\beta=b/2, for each {logb+1,,log(αn)}\ell\in\{\log b+1,\ldots,\log(\alpha n)\}, and then using a union bound, we obtain

[Ak]12bk/2log(αn).\mathbb{P}\left[\mathcal{E}_{A_{k}}\right]\geq 1-2^{-bk/2}\log(\alpha n).

By another union bound and Lemma 15,

[AkkAk]\displaystyle\mathbb{P}\left[\bigcap_{A_{k}\in\mathcal{B}_{k}}\mathcal{E}_{A_{k}}\right] 1|k|2bk/2log(αn)1(4b)2k2bk/2log(αn)\displaystyle\geq 1-|\mathcal{B}_{k}|\cdot 2^{-bk/2}\log(\alpha n)\geq 1-(4b)^{2k}\cdot 2^{-bk/2}\log(\alpha n)
12bk/4log(αn),\displaystyle\geq 1-2^{-bk/4}\log(\alpha n), (7)

where the last inequality holds if b64b\geq 64. Next we show that event AkkAk\bigcap_{A_{k}\in\mathcal{B}_{k}}\mathcal{E}_{A_{k}} implies that every labeled canonical walk η\eta has a concise descriptor AkkA_{k}\in\mathcal{B}_{k}. From this and (5.6), the lemma follows.

Fix a realization of t-visit-exchange conditioned on the event AkkAk\bigcap_{A_{k}\in\mathcal{B}_{k}}\mathcal{E}_{A_{k}}. Suppose, for contradiction, that there is some labeled canonical walk η=(θ0,g1,θ1,,gk,θk)\eta^{\prime}=(\theta_{0}^{\prime},g_{1}^{\prime},\theta_{1}^{\prime},\ldots,g_{k}^{\prime},\theta_{k}) that does not have a concise descriptor. Let η=(θ0,g1,θ1,,gk,θk)\eta=(\theta_{0},g_{1},\theta_{1},\ldots,g_{k},\theta_{k}) be a labeled canonical walk that does have a concise descriptor AkkA_{k}\in\mathcal{B}_{k}, and shares a maximal common prefix with η\eta^{\prime}. Consider the first element where η\eta^{\prime} and η\eta are different. We first argue that this element is not a vertex: Suppose, for contradiction, that (θ0,,gi)=(θ0,,gi)(\theta_{0}^{\prime},\ldots,g_{i}^{\prime})=(\theta_{0},\ldots,g_{i}) and θiθi\theta^{\prime}_{i}\neq\theta_{i}, for some 0ik0\leq i\leq k. Then i0i\neq 0, as θ0=s=θ0\theta_{0}^{\prime}=s=\theta_{0}. Moreover, if i>0i>0, then by definition, (θ0,,gi)=(θ0,,gi)(\theta_{0}^{\prime},\ldots,g_{i}^{\prime})=(\theta_{0},\ldots,g_{i}) implies θi=θi\theta^{\prime}_{i}=\theta_{i}, contradicting our assumption. Thus, the first element where η\eta^{\prime} and η\eta are different must be an agent. Suppose (θ0,g1,,θi1)=(θ0,g1,,θi1)(\theta_{0}^{\prime},g_{1}^{\prime},\ldots,\theta_{i-1}^{\prime})=(\theta_{0},g_{1},\ldots,\theta_{i-1}) and gigig^{\prime}_{i}\neq g_{i}, for some 1ik1\leq i\leq k. Then, by the maximal prefix assumption, the labeled canonical walk (θ0,,θi1,gi,θi,,θi,,,,θi)(\theta_{0},\ldots,\theta_{i-1},g^{\prime}_{i},\theta^{\prime}_{i},\bot,\theta^{\prime}_{i},\bot,\ldots,\bot,\theta^{\prime}_{i}), which stays put at vertex θi\theta^{\prime}_{i} in rounds i+1i+1 up to kk, has no concise descriptor. This can only be true if |{t{1,,i1}:21<δt2}|>k2,|\{t\in\{1,\ldots,i-1\}\colon 2^{\ell-1}<\delta_{t}\leq 2^{\ell}\}|>k_{2^{\ell}}, for some {logb+1,,logn}\ell\in\{\log b+1,\ldots,\log n\}. But this contradicts event Ak\mathcal{E}_{A_{k}}. Therefore, there exists no labeled canonical walk η\eta^{\prime} of length kk such that η\eta^{\prime} has no concise descriptor.

5.7 Upper Bound on Congestion

The next lemma gives un upper bound on the congestion of a single canonical walk of length kk.

Lemma 18.

Fix any AkkA_{k}\in\mathcal{B}_{k}, and let η\eta be the labeled canonical walk with concise descriptor AkA_{k} in t-visit-exchange. Then, for any β2eγ+1\beta\geq 2e\gamma+1, [Q(η)βk]12(β1)k.\mathbb{P}\left[Q(\eta)\leq\beta k\right]\geq 1-2^{-(\beta-1)k}.

Proof.

Let η=(θ0,g1,θ1,,gk,θk)\eta=(\theta_{0},g_{1},\theta_{1},\ldots,g_{k},\theta_{k}). Then Q(η)=1tkδt,Q(\eta)=\sum_{1\leq t\leq k}\delta_{t}, where δt=|Zθt1(t1)|\delta_{t}=|Z_{\theta_{t-1}}(t-1)|. By the same reasoning as in the proof of Lemma 17, Q(η)Q(\eta) is stochastically dominated by k+1tkBtk+\sum_{1\leq t\leq k}B_{t}, where B1,,BkB_{1},\ldots,B_{k} are independent binomial random variables, such that B1Bin(γn,1/n)B_{1}\sim\operatorname{Bin}(\gamma n,1/n) and, for t>1t>1, BtBin(γd,1/d)B_{t}\sim\operatorname{Bin}(\gamma d,1/d). It follows that 𝔼[Q(η)k]kγ,\mathbb{E}\left[\,Q(\eta)-k\,\right]\leq k\gamma, and

[Q(η)βk]=[Q(η)k(β1)k]2(β1)k,\mathbb{P}\left[Q(\eta)\geq\beta k\right]=\mathbb{P}\left[Q(\eta)-k\geq(\beta-1)k\right]\leq 2^{-(\beta-1)k},

by a Chernoff bound, since (β1)k2e𝔼[Q(η)k](\beta-1)k\geq 2e\cdot\mathbb{E}\left[\,Q(\eta)-k\,\right]. ∎

5.8 Putting the Pieces Together – Proof of Theorem 10

We consider first the case where kk is at most logarithmic. In Theorem 24, we show that Tvisitx=Ω(logn)T_{\rm visitx}=\Omega(\log n) w.h.p., by arguing that some vertices are not visited by any agent (informed or not) during the first logarithmic number of rounds. Thus, there is some constant ϵ>0\epsilon>0 such that if kϵlognk\leq\epsilon\log n, [Tvisitxk]nλ\mathbb{P}\left[T_{\rm visitx}\leq k\right]\leq n^{-\lambda}. From this, the theorem’s statement follows for kϵlognk\leq\epsilon\log n. In the rest of the proof, we assume that kϵlognk\geq\epsilon\log n.

We have Tpush=maxuVτu,T_{\rm push}=\max_{u\in V}\tau_{u}, and from Lemma 13,

TpushmaxuVCu(tu).T_{\rm push}\leq\max_{u\in V}C_{u}(t_{u}).

Since for any fixed realization of visit-exchange and any uVu\in V, Cu(t)C_{u}(t) is a non-decreasing function of tt, and since tuTvisitxt_{u}\leq T_{\rm visitx}, it follows

TpushmaxuVCu(Tvisitx).T_{\rm push}\leq\max_{u\in V}C_{u}(T_{\rm visitx}).

By Lemma 14, for any uVu\in V, there is a canonical walk θ\theta of length t=Tvisitxt=T_{\rm visitx} with congestion Q(θ)=Cu(Tvisitx)Q(\theta)=C_{u}(T_{\rm visitx}). Thus, there is also a labeled canonical walk η\eta of length TvisitxT_{\rm visitx} with Q(η)=Q(θ)=Cu(Tvisitx)Q(\eta)=Q(\theta)=C_{u}(T_{\rm visitx}). It follows

Tpushmaxη(Tvisitx)Q(η),T_{\rm push}\leq\max_{\eta\in\mathcal{H}(T_{\rm visitx})}Q(\eta), (8)

where (t)\mathcal{H}(t) denotes the set of all labeled canonical walks of length tt in visit-exchange.

Next we bound maxη(k)Q(η)\max_{\eta\in\mathcal{H}(k)}Q(\eta). Consider t-visit-exchange, and for any AkkA_{k}\in\mathcal{B}_{k}, let ηAk\eta_{A_{k}} be the labeled canonical walk with concise descriptor AkA_{k} in t-visit-exchange. From Lemma 18, for any AkkA_{k}\in\mathcal{B}_{k} and β2eγ+1\beta\geq 2e\gamma+1, [Q(ηAk)βk]12(β1)k.\mathbb{P}\left[Q(\eta_{A_{k}})\leq\beta k\right]\geq 1-2^{-(\beta-1)k}. Then

[maxAkkQ(ηAk)βk]\displaystyle\mathbb{P}\left[\max_{A_{k}\in\mathcal{B}_{k}}Q(\eta_{A_{k}})\leq\beta k\right] 12(β1)k|k|12(β1)k(4b)2k,\displaystyle\geq 1-2^{-(\beta-1)k}\cdot|\mathcal{B}_{k}|\geq 1-2^{-(\beta-1)k}\cdot(4b)^{2k},

by Lemma 15. Choosing constant β\beta large enough so that (β1)/22log(4b)(\beta-1)/2\geq 2\log(4b), yields

[maxAkkQ(ηAk)βk]12(β1)k/2.\mathbb{P}\left[\max_{A_{k}\in\mathcal{B}_{k}}Q(\eta_{A_{k}})\leq\beta k\right]\geq 1-2^{-(\beta-1)k/2}.

From Lemma 16, the probability that all labeled canonical walks of length kk have concise descriptors is at least 12bk/4log(αn)1-2^{-bk/4}\log(\alpha n), if bmax{2γe2,64}b\geq\max\{2\gamma e^{2},64\}. It follows

[maxAkkQ(ηAk)=maxη(k)Q(η)]12bk/4log(αn),\mathbb{P}\left[\max_{A_{k}\in\mathcal{B}_{k}}Q(\eta_{A_{k}})=\max_{\eta\in\mathcal{H}^{\ast}(k)}Q(\eta)\right]\geq 1-2^{-bk/4}\log(\alpha n),

where (t)\mathcal{H}^{\ast}(t) is the set of all labeled canonical walks of length tt in t-visit-exchange. By Lemma 12, however, we can couple visit-exchange and t-visit-exchange, by using the same collection of random walks for both, such that the two processes are identical until round kk with probability at least 1kn2ad1-kn\cdot 2^{-ad}. Thus

[(k)=(k)]1kn2γd.\mathbb{P}\left[\mathcal{H}(k)=\mathcal{H}^{\ast}(k)\right]\geq 1-kn\cdot 2^{-\gamma d}.

Combining the last three inequalities above, we obtain

[maxη(k)Q(η)βk]12(β1)k/22bk/4log(αn)kneγd.\mathbb{P}\left[\max_{\eta\in\mathcal{H}(k)}Q(\eta)\leq\beta k\right]\geq 1-2^{-(\beta-1)k/2}-2^{-bk/4}\log(\alpha n)-kn\cdot e^{-\gamma d}.

Since kϵlognk\geq\epsilon\log n and dεlognd\geq\varepsilon\log n, for any given constant λ>0\lambda>0 we can choose constants β,b,γ\beta,b,\gamma large enough such that

[maxη(k)Q(η)βk]1nλ.\mathbb{P}\left[\max_{\eta\in\mathcal{H}(k)}Q(\eta)\leq\beta k\right]\geq 1-n^{-\lambda}. (9)

From (8) and (9), we obtain

[Tpushβk]\displaystyle\mathbb{P}\left[T_{\rm push}\leq\beta k\right] [maxη(Tvisitx)Q(η)βk], by  (8)\displaystyle\geq\mathbb{P}\left[\max_{\eta\in\mathcal{H}(T_{\rm visitx})}Q(\eta)\leq\beta k\right],\text{\qquad by ~\eqref{eq:TpushD}}
[{Tvisitxk}{maxη(k)Q(η)βk}]\displaystyle\geq\mathbb{P}\left[\{T_{\rm visitx}\leq k\}\cap\left\{\max_{\eta\in\mathcal{H}(k)}Q(\eta)\leq\beta k\right\}\right]
[Tvisitxk][maxη(k)Q(η)>βk]\displaystyle\geq\mathbb{P}\left[T_{\rm visitx}\leq k\right]-\mathbb{P}\left[\max_{\eta\in\mathcal{H}(k)}Q(\eta)>\beta k\right]
[Tvisitxk]nλ, by  (9).\displaystyle\geq\mathbb{P}\left[T_{\rm visitx}\leq k\right]-n^{-\lambda},\text{\qquad by ~\eqref{eq:allk}}.

This completes the proof of Theorem 10.

6 Bounding TvisitxT_{\rm visitx} by TpushT_{\rm push} on Regular Graphs

The following theorem upper bounds the broadcast time of visit-exchange in a regular graph by the broadcast time of push.

Theorem 19.

For any constants α,β,λ>0\alpha,\beta,\lambda>0 with αβ\alpha\cdot\beta sufficiently large, there is a constant c>0c>0, such that for any dd-regular graph G=(V,E)G=(V,E) with |V|=n|V|=n and dβlognd\geq\beta\log n, and for any source sVs\in V, the broadcast times of push and visit-exchange, with |A|αn|A|\geq\alpha n agents, satisfy

[Tvisitxck][Tpushk]nλ,\mathbb{P}\left[T_{\rm visitx}\leq ck\right]\geq\mathbb{P}\left[T_{\rm push}\leq k\right]-n^{-\lambda},

for any k0k\geq 0.

From Theorem 19, it is immediate that if TpushTT_{\rm push}\leq T w.h.p., then Tvisitx=O(T)T_{\rm visitx}=O(T) w.h.p. Moreover, using Theorem 19 and the well-known O(n2logn)O(n^{2}\log n) upper bound w.h.p. on the cover time for a single random walk on a regular graph, which also applies to TvisitxT_{\rm visitx}, one can easily obtain that 𝔼[Tvisitx]=O(𝔼[Tpush])\mathbb{E}\left[\,T_{\rm visitx}\,\right]=O(\mathbb{E}\left[\,T_{\rm push}\,\right]).

Proof Overview Of Theorem 19.

We use a coupling which is similar to that in the proof of the converse result, stated in Theorem 10, but with a twist (which we describe momentarily). Unlike in the proof of Theorem 10, where we essentially consider all possible paths through which information travels, here we focus on the first path by which information reaches each vertex. Let P=(u0=s,u1,,uk=u)P=(u_{0}=s,u_{1},\ldots,u_{k}=u) be such a path for vertex uu in push, where each vertex uiu_{i} in the path gets informed by ui1u_{i-1}. Let δi\delta_{i} be the number of rounds it takes for ui1u_{i-1} to sample (and inform) uiu_{i} in push. We consider the same path in visit-exchange, and compare δi\delta_{i} with the number DiD_{i} of rounds until some informed agent moves from ui1u_{i-1} to uiu_{i}, counting from the round when ui1u_{i-1} becomes informed. Note that iδi\sum_{i}\delta_{i} is precisely the round when uu is informed in push, while iDi\sum_{i}D_{i} is an upper bound on the round when uu is informed in visit-exchange.

The coupling from Section 5 seems suitable for this setup. Recall, in that coupling we let the list of neighbors that a vertex uu samples in push, be identical to the list of neighbors that informed agents visit in their next step after visiting uu, in visit-exchange. The same intuition applies, namely, that on average each vertex is visited by |A|/n=Ω(1)|A|/n=\Omega(1) agents per round, which suggests that DiD_{i} should be close to δi\delta_{i}. We can even apply a similar trick as in Section 5 to avoid some dependencies: In each round, the number of agents in the neighborhood of a vertex is bounded below by d|A|/n=Ω(d)d\cdot|A|/n=\Omega(d), w.h.p. This should imply that the number of agents that visit a vertex in a round is bounded below by a geometric distribution with constant expectation. Let \mathcal{E} denote the event that the above Ω(d)\Omega(d) bound holds for all uu, for polynomially many rounds.

There is, however, a problem with this proof plan. By fixing path PP in advance, to be the first path to inform uu in push, we introduce dependencies from the future. So, when we analyse DiD_{i} and δi\delta_{i}, we must condition on the event that the ii-prefix of the path we have considered so far will indeed be a prefix of the first path to reach uu. These kind of dependencies seem hard to deal with.

We use the following neat idea to overcome this problem. We only consider the odd rounds of visit-exchange in the coupling, i.e., we match the list of neighbors that a vertex vv samples in push (in all rounds), to the list of neighbors that informed agents visit in round 2k+12k+1 after visiting uu in round 2k2k, for all k0k\geq 0. In even rounds, agents take steps independently of the coupled push process.

Under this coupling, we proceed as follows. We condition on the high probability event \mathcal{E} defined earlier (formally, we modify visit-exchange to ensure \mathcal{E} holds). We then fix all random choices in push, and thus the information path PP to uu. For each even round of visit-exchange, we have that vertex uiu_{i} in PP is visited by at least one agent with constant probability, independently of the past and of the fixed choices in future odd rounds. If indeed some vertex visits uiu_{i} in an even round, then in the next round it will visit a vertex dictated by the coupling. This allows us to show that under this coupling, iDic(iδi+logn)\sum_{i}D_{i}\leq c\left(\sum_{i}\delta_{i}+\log n\right), w.h.p. We get rid of the logn\log n term in the final bound, by using that Tpush=Ω(logn)T_{\rm push}=\Omega(\log n) w.h.p.

6.1 Coupling Description

We use mostly the same notation as in Section 5.1. For each vertex uu, we denote by τu\tau_{u} the round when vertex uu gets informed in push. For i1i\geq 1, let πu(i)\pi_{u}(i) be the iith the vertex that uu samples (in round τu+i\tau_{u}+i). We denote by tut_{u} the round when vertex uu gets informed in visit-exchange. For an agent gAg\in A and round t0t\geq 0, let xg(t)x_{g}(t) be the vertex that gg visits in round tt. Let Zu(t)Z_{u}(t) be the set of agents that visit uu in round tt, i.e., Zu(t)={gA:xg(t)=u}.Z_{u}(t)=\{g\in A\colon x_{g}(t)=u\}.

The next definition differs from the corresponding one in Section 5.1, as it distinguishes between even and odd rounds. Fix a vertex uVu\in V, and consider all visits to uu in even rounds ttut\geq t_{u}, in chronological order, ordering visits in the same round with respect to a predefined total order over all agents. We call these visits even visits to vertex uu. For each i1i\geq 1, consider the agent gg that performs the iith even visit and let puodd(i)p_{u}^{odd}(i) be the vertex that gg visits in the next (odd) round. Formally, let

Wueven={(t,g):ttu,teven,xg(t)=u},W_{u}^{even}=\{(t,g)\colon t\geq t_{u},t\in\mathds{N}_{even},x_{g}(t)=u\},

where even\mathds{N}_{even} is the set of non-negative even integers. Order the elements of WuevenW_{u}^{even} such that (t,g)<(t,g)(t,g)<(t^{\prime},g^{\prime}) if t<tt<t^{\prime}, or t=tt=t^{\prime} and g<gg<g^{\prime}. If (t,g)(t,g) is the iith smallest element in WuevenW_{u}^{even}, then puodd(i)=xg(t+1)p_{u}^{odd}(i)=x_{g}(t+1).

Coupling.

We couple processes push and visit-exchange by setting πu(i)=puodd(i)\pi_{u}(i)=p_{u}^{odd}(i). Formally, let {wu(i)}uV,i1\{w_{u}(i)\}_{u\in V,i\geq 1}, be a collection of independent random variables each taking a uniformly random value from the set Γ(u)\Gamma(u) of uu’s neighbors in GG. For all uVu\in V and i1i\geq 1, we set

πu(i)=puodd(i)=wu(i).\pi_{u}(i)=p_{u}^{odd}(i)=w_{u}(i).

6.2 Lower Bound on Agents and Re-Tweaked Visit-Exchange

We will use the following simple lower bound on the number of agents visiting a given set of vertices SS in a round of visit-exchange. The proof is almost the same as its counterpart Lemma 11.

Lemma 20.

For any SVS\subseteq V and t0t\geq 0,

[vS|Zv(t)||A||S|/(2n)]1e|A||S|/(8n).\mathbb{P}\left[\sum_{v\in S}|Z_{v}(t)|\geq|A|\cdot|S|/(2n)\right]\geq 1-e^{-|A|\cdot|S|/(8n)}.
Proof.

Since each agent’s walk starts from the stationary distribution and GG is a regular graph, we have that for any given agent gAg\in A and round t0t\geq 0, [xg(t)S]=|S|/n\mathbb{P}\left[x_{g}(t)\in S\right]=|S|/n. Therefore the expected number of agents visiting SS in round tt is

𝔼[|{gA:xg(t)S}|]=|A||S|/n.\mathbb{E}\left[\,|\{g\in A\colon x_{g}(t)\in S\}|\,\right]=|A|\cdot|S|/n.

By the independence of the walks, we can use a standard Chernoff bound to show that |{gA:xg(t)S}||A||S|/(2n)|\{g\in A\colon x_{g}(t)\in S\}|\geq|A|\cdot|S|/(2n), with probability at least 1e|A||S|/(8n)1-e^{-|A|\cdot|S|/(8n)}. ∎

Re-Tweaked Visit-Exchange Process.

Similar to the analysis in Section 5, it is convenient to work with a slightly modified version of visit-exchange. We call the new process r-visit-exchange and is identical to visit-exchange except for the following modification. If in some odd round t0t\geq 0, there is a vertex uVu\in V for which the next condition is not true,

vΓ(u)|Zv(t)||A|2nd\sum_{v\in\Gamma(u)}|Z_{v}(t)|\geq\frac{|A|}{2n}\cdot d (10)

then before round t+1t+1, we add a minimal set of new agents to the graph such that the above condition holds for all vertices uu. An agent gg added to vertex uu adopts the state (informed or non-informed) of uu at the end of round tt.

Recall that |A|αn|A|\geq\alpha n. The next lemma allows us to consider the r-visit-exchange process in the rest of the proof, and argue that the results also hold for visit-exchange.

Lemma 21.

The probability that Eq.(10) holds simultaneously for all uVu\in V and 0t<k0\leq t<k is at least 1kn2αd/81-kn\cdot 2^{-\alpha d/8}.

Proof.

For each uVu\in V, if we set S=Γ(u)S=\Gamma(u), then Lemma 20 implies that the condition (10) holds with probability at least 1e|A||S|/(8n)1eαd/81-e^{|A|\cdot|S|/(8n)}\geq 1-e^{\alpha d/8}. The claim in the lemma follows after applying union bound for each 0t<k0\leq t<k and each uVu\in V. ∎

6.3 Proof of Theorem 19

We first compare the times until a given vertex uu gets informed in push and in r-visit-exchange.

Lemma 22.

The coupling described in Section 6.1, when applied to push and r-visit-exchange, yields the following property. For any constant γ>0\gamma>0, there is a constant c>0c>0 such that for any uVu\in V,

[tuc(τu+logn)]nγ,\mathbb{P}\left[t_{u}^{\prime}\geq c(\tau_{u}+\log n)\right]\leq n^{-\gamma},

where τu\tau_{u} and tut^{\prime}_{u} are the rounds when uu is informed in the coupled processes push and in r-visit-exchange, respectively.

Proof.

In this proof, we will use the same notation for r-visit-exchange as those defined for visit-exchange. (We used tut^{\prime}_{u} instead of tut_{u} in the lemma’s statement to avoid confusion when we apply the lemma, but in the proof there is no such fear, because only r-visit-exchange is used.)

As described in the proof overview, we consider a path from the source ss to vertex uu that push uses to inform uu, and count the number of rounds visit-exchange takes to traverse the same path. First, we consider a single edge (v,w)(v,w) such that ww is informed by vv in a realization of push that we fix. We also fix the first tvt_{v} rounds of r-visit-exchange, i.e., until vv becomes informed. Let δv,w=τwτv\delta_{v,w}=\tau_{w}-\tau_{v} be the number of rounds of push that it takes to inform ww counting from when vv gets informed. Similarly, we define Dv,w=twtvD_{v,w}=t_{w}-t_{v} for r-visit-exchange. We will bound Dv,wD_{v,w} in terms of δv,w\delta_{v,w}.

Recall that we have defined a natural total order over the set WvevenW_{v}^{even} of even visits to vertex vv. For j1j\geq 1, let (t,g)(t,g) be the jjth element of WvevenW_{v}^{even} in that order. By the coupling, at the odd round t+1t+1, agent gg will move to the neighbor of vv that is sampled by push in round πv(j)=τv+j\pi_{v}(j)=\tau_{v}+j. In particular, since πv(j)=w\pi_{v}(j)=w for j=δv,wj=\delta_{v,w}, vertex ww gets informed after δv,w\delta_{v,w} even visits to vv in r-visit-exchange (possibly earlier).

Formally, let Bv(j)B_{v}^{(j)} be the number of r-visit-exchange rounds between even visits j1j-1 and jj (when j=1j=1, Bv(j)B_{v}^{(j)} is the number of rounds until the first even visit since tvt_{v}). Bv(j)B_{v}^{(j)} can be 0, if two agents visit vv at the same even round. With this definition,

Dv,wj=1δv,wBv(j).D_{v,w}\leq\sum_{j=1}^{\delta_{v,w}}B_{v}^{(j)}.

By condition (10) and assumption |A|αn|A|\geq\alpha\cdot n, there are at least αd/2\alpha\cdot d/2 agents in the neighborhood of vv at any round of r-visit-exchange. Let p=1eα/2p=1-e^{-\alpha/2} and recall that, for an even t>0t>0, the agents move independently from push, and therefore, some agent visits vv in round tt with probability at least 1(11/d)αd/2p1-(1-1/d)^{\alpha d/2}\geq p. For t=0t=0, when agents are placed according to the stationary distribution, some agent is placed at vv with probability 1(11/n)αn1eαp1-(1-1/n)^{\alpha n}\geq 1-e^{-\alpha}\geq p. It follows that the number of rounds between two even visits to vv, namely Bv(j)B_{v}^{(j)} for 1jδv,w1\leq j\leq\delta_{v,w}, is stochastically dominated by 2Fv(j)2\cdot F_{v}^{(j)}, where {Fv(j)}j1\{F_{v}^{(j)}\}_{j\geq 1} is a collection of independent geometric random variables with success probability pp. The coefficient 22 appears because we have to take into account both odd and even rounds. In other words, for any b0b\geq 0 and 1jδv,w1\leq j\leq\delta_{v,w},

[Bv(j)bBv(1),,Bv(j1)][2Fv(j)b].\mathbb{P}\left[B_{v}^{(j)}\leq b\mid B_{v}^{(1)},\dots,B_{v}^{(j-1)}\right]\geq\mathbb{P}\left[2\cdot F_{v}^{(j)}\leq b\right].

Using Lemma 28, we get that, given vv is informed, Dv,wD_{v,w} is stochastically dominated by 2j=1δv,wFv(j)2\cdot\sum_{j=1}^{\delta_{v,w}}F_{v}^{(j)}:

[Dv,wbtv][j=1δv,wBv(j)btv][2j=1δv,wFv(j)b].\mathbb{P}\left[D_{v,w}\leq b\mid t_{v}\right]\geq\mathbb{P}\left[\sum_{j=1}^{\delta_{v,w}}B_{v}^{(j)}\leq b\mid t_{v}\right]\geq\mathbb{P}\left[2\cdot\sum_{j=1}^{\delta_{v,w}}F_{v}^{(j)}\leq b\right].

We apply the above result to all edges on the path from ss to uu through which push informed uu. Let Pu=(s=u0,u1,,uk=u)P_{u}=(s=u_{0},u_{1},\dots,u_{k}=u) be a path in GG such that, in push, uiu_{i} is informed from ui1u_{i-1}, for all 1ik1\leq i\leq k. By definition of τu\tau_{u}, ui1u_{i-1} samples its neighbor uiu_{i} at round τui\tau_{u_{i}}. Define δi=τuiτui1\delta_{i}=\tau_{u_{i}}-\tau_{u_{i-1}} and Di=tuitui1D_{i}=t_{u_{i}}-t_{u_{i-1}} for 1ik1\leq i\leq k. From our result above for a single edge it follows that

[DibD1,,Di1][2j=1δiFui(j)b].\mathbb{P}\left[D_{i}\leq b\mid D_{1},\dots,D_{i-1}\right]\geq\mathbb{P}\left[2\cdot\sum_{j=1}^{\delta_{i}}F_{u_{i}}^{(j)}\leq b\right].

By Lemma 28 and the fact that tu=tuk=i=1kDit_{u}=t_{u_{k}}=\sum_{i=1}^{k}D_{i}, we have that tut_{u} is stochastically dominated by 2F=2i=1kj=1δiFui1(j)2F=2\cdot\sum_{i=1}^{k}\sum_{j=1}^{\delta_{i}}F_{u_{i-1}}^{(j)}, i.e., for any b0b\geq 0,

[tub][2Fb].\mathbb{P}\left[t_{u}\leq b\right]\geq\mathbb{P}\left[2F\leq b\right].

The random variable FF is a sum of exactly τk\tau_{k} independent and identical geometrically distributed random variables, hence, 𝔼[F]=τk/p\mathbb{E}\left[F\right]=\tau_{k}/p. Thus, for any constant c4/pc\geq 4/p, by Lemma 27,

[tuc(τu+logn)]\displaystyle\mathbb{P}\left[t_{u}\geq c(\tau_{u}+\log n)\right] [Fc2(τu+logn)]\displaystyle\leq\mathbb{P}\left[F\geq\frac{c}{2}(\tau_{u}+\log n)\right]
exp(c(τu+logn)p16)\displaystyle\leq\exp\left(-\frac{c(\tau_{u}+\log n)\cdot p}{16}\right)
ncp/16,\displaystyle\leq n^{-cp/16},

Choosing cc large enough so that cp/16γcp/16\geq\gamma, completes the proof. ∎

We can now complete the proof of our main result. Recall that τu,tu\tau_{u},t_{u} and tut_{u}^{\prime} are the rounds when vertex uu gets informed in push, visit-exchange, and r-visit-exchange, respectively. From Lemma 22, and a union bound over all vertices, we obtain that for any constant γ>0\gamma>0, there is a constant c>0c>0 such that

[uV:tuc(τu+logn)]1nnγ.\mathbb{P}\left[\forall\,u\in V\colon t_{u}^{\prime}\leq c(\tau_{u}+\log n)\right]\geq 1-n\cdot n^{-\gamma}.

Thus,

[maxuVtuc(maxuVτu+logn)]1nnγ.\mathbb{P}\left[\max_{u\in V}t_{u}^{\prime}\leq c\left(\max_{u\in V}\tau_{u}+\log n\right)\right]\geq 1-n\cdot n^{-\gamma}.

It follows that for any k0k\geq 0,

[maxuVtuc(k+logn)]\displaystyle\mathbb{P}\left[\max_{u\in V}t_{u}^{\prime}\leq c\left(k+\log n\right)\right] [maxuVtuc(maxuVτu+logn)maxuVτuk]\displaystyle\geq\mathbb{P}\left[\max_{u\in V}t_{u}^{\prime}\leq c\left(\max_{u\in V}\tau_{u}+\log n\right)\cap\max_{u\in V}\tau_{u}\leq k\right]
[maxuVτuk]nnγ.\displaystyle\geq\mathbb{P}\left[\max_{u\in V}\tau_{u}\leq k\right]-n\cdot n^{-\gamma}.

From Lemma 21, it follows

[maxuVtuc(k+logn)][maxuVtuc(k+logn)]c(k+logn)neαd/8.\displaystyle\mathbb{P}\left[\max_{u\in V}t_{u}^{\prime}\leq c\left(k+\log n\right)\right]-\mathbb{P}\left[\max_{u\in V}t_{u}\leq c\left(k+\log n\right)\right]\leq c(k+\log n)\cdot n\cdot e^{-\alpha d/8}.

Combining the last two inequalities above we obtain

[maxuVtuc(k+logn)][maxuVτuk]nnγc(k+logn)neαd/8.\displaystyle\mathbb{P}\left[\max_{u\in V}t_{u}\leq c\left(k+\log n\right)\right]\geq\mathbb{P}\left[\max_{u\in V}\tau_{u}\leq k\right]-n\cdot n^{-\gamma}-c(k+\log n)\cdot n\cdot e^{-\alpha d/8}.

Substituting Tvisitx=maxuVtuT_{\rm visitx}=\max_{u\in V}t_{u} and Tpush=maxuVτuT_{\rm push}=\max_{u\in V}\tau_{u}, and using dβlognd\geq\beta\log n, yields

[Tvisitxc(k+logn)][Tpushk]nγ+1c(k+logn)n1αβ/8.\displaystyle\mathbb{P}\left[T_{\rm visitx}\leq c\left(k+\log n\right)\right]\geq\mathbb{P}\left[T_{\rm push}\leq k\right]-n^{-\gamma+1}-c(k+\log n)\cdot n^{1-\alpha\beta/8}.

This implies the theorem for lognkpoly(n)\log n\leq k\leq\mathrm{poly}(n). For larger kk, the theorem follows from the known polynomial upper bound on the cover time on regular graphs. For smaller kk, it follows from the fact that Tpush=Ω(logn)T_{\rm push}=\Omega(\log n), w.h.p.

7 Bounding TvisitxT_{\rm visitx} by TmeetxT_{\rm meetx} on Regular Graphs

The next theorem bounds the broadcast time of visit-exchange on a regular graph by the broadcast time of meet-exchange.

Theorem 23.

For any constants α,β,λ>0\alpha,\beta,\lambda>0 with αβ\alpha\cdot\beta sufficiently large, there is a constant c>0c>0, such that for any dd-regular graph G=(V,E)G=(V,E) with |V|=n|V|=n and dβlnnd\geq\beta\ln n, and any source sVs\in V, the broadcast times of visit-exchange and meet-exchange, both with |A|αn|A|\geq\alpha n agents, satisfy

[Tvisitxk+clnn][Tmeetxk]nλ,\mathbb{P}\left[T_{\rm visitx}\leq k+c\ln n\right]\geq\mathbb{P}\left[T_{\rm meetx}\leq k\right]-n^{-\lambda},

for any k0k\geq 0.

Proof.

Let RvisitxR_{\rm visitx} be the number of rounds until all agents are informed in visit-exchange. Under the natural coupling of visit-exchange and meet-exchange, that uses the same random walks for both processes, it is immediate that

[Rvisitxk][Tmeetxk].\displaystyle\mathbb{P}\left[R_{\rm visitx}\leq k\right]\geq\mathbb{P}\left[T_{\rm meetx}\leq k\right]. (11)

Let =clnn\ell=c\ln n for constant cc to be determined later. Next we show that in \ell rounds of visit-exchange, every vertex is visited by at least one agent, with probability at least 1nλ1-n^{-\lambda}. For that we consider the process r-visit-exchange from Section 6.2, which ensures that for every vertex uVu\in V and round t0t\geq 0,

vΓ(u)|Zv(t)||A|d/(2n)αd/2,\sum_{v\in\Gamma(u)}|Z_{v}(t)|\geq|A|\cdot d/(2n)\geq\alpha d/2,

where Zv(t)Z_{v}(t) is the set of agents visiting vv in round tt.

Fix a vertex uu. In any round tRk={k+1,,k+}t\in R_{k}=\{k+1,\dots,k+\ell\} of r-visit-exchange, the probability that no agent visits uu in that round is at most (11/d)αd/2eα/2(1-1/d)^{\alpha d/2}\leq e^{-\alpha/2}, since the neighborhood of uu contains at least αd/2\alpha d/2 agents before round tt. This holds for every round tt independently, hence uu is visited by some agent in rounds RkR_{k} with probability at least 1eα/21-e^{-\alpha\ell/2}. By a union bound, with probability at least 1neα/21-n\cdot e^{-\alpha\ell/2}, every vertex uu is visited by some agent in rounds RkR_{k}. By Lemma 21, r-visit-exchange and visit-exchange are identical in the first (k+)(k+\ell) rounds of their execution with probability at least 1(k+)n2αd/81-(k+\ell)n\cdot 2^{-\alpha d/8}. The last two statements together imply that

[Tvisitxk+]\displaystyle\mathbb{P}\left[T_{\rm visitx}\leq k+\ell\right] [Tvisitxk+Rvisitxk][Rvisitxk]\displaystyle\geq\mathbb{P}\left[T_{\rm visitx}\leq k+\ell\mid R_{\rm visitx}\leq k\right]\cdot\mathbb{P}\left[R_{\rm visitx}\leq k\right]
(1(k+)n2αd/8neα/2)[Rvisitxk]\displaystyle\geq\left(1-(k+\ell)n\cdot 2^{-\alpha d/8}-n\cdot e^{-\alpha\ell/2}\right)\cdot\mathbb{P}\left[R_{\rm visitx}\leq k\right]
[Rvisitxk](k+l)n1αβ/16n1αc/2.\displaystyle\geq\mathbb{P}\left[R_{\rm visitx}\leq k\right]-(k+l)n^{1-\alpha\beta/16}-n^{1-\alpha c/2}.

Together with (11), this implies the theorem for poly(logn)kpoly(n)\mathrm{poly}(\log n)\leq k\leq\mathrm{poly}(n), since we can take αβ\alpha\cdot\beta and cc sufficiently large, depending on λ\lambda. For smaller kk, the theorem follows from the fact that Tmeetx=Ω(logn)T_{\rm meetx}=\Omega(\log n) w.h.p. (Theorem 25). For larger kk, it follows from the fact that Tvisitx,Tmeetxpoly(n)T_{\rm visitx},T_{\rm meetx}\leq\mathrm{poly}(n) w.h.p., by a known polynomial upper bound on the cover time of a random walk in a graph. ∎

8 Logarithmic Lower Bounds for TvisitxT_{\rm visitx} & TmeetxT_{\rm meetx} on Regular Graphs

Theorem 24.

For any dd-regular graph G=(V,E)G=(V,E) with |V|=n|V|=n and d=Ω(logn)d=\Omega(\log n), and any source vertex sVs\in V, the broadcast time of visit-exchange with |A|=O(n)|A|=O(n) agents is Ω(logn)\Omega(\log n) w.h.p.

Proof.

We argue that w.h.p. some vertices are not visited by any agent (informed or not) during the first logarithmic number of rounds of visit-exchange. We only count the visits starting from round 11, since the initial placement of agents cannot inform any vertex. The formal argument follows next.

For a sufficiently large constant γ>0\gamma>0, that will be fixed later, we consider the process t-visit-exchange defined in Section 5.2. Recall that in t-visit-exchange, for every vertex uVu\in V,

vΓ(u)|Zv(t)|γd,\sum_{v\in\Gamma(u)}|Z_{v}(t)|\leq\gamma\cdot d,

where Zv(t)Z_{v}(t) is the set of agents that visit vv in round tt. In the rest of the proof we use t-visit-exchange and use the fact that it is equivalent to visit-exchange w.h.p. for the first logarithmic rounds of the process.

Let t\mathcal{H}_{t} represent all random choices of t-visit-exchange up to (and including) round tt, and let UtU_{t} be the set of vertices that have not been visited by any agent (either informed, or not) in any round up to tt. Denote the event that |Ut||Ut1|4γ/2|U_{t}|\geq|U_{t-1}|\cdot 4^{-\gamma}/2 by 𝒜t\mathcal{A}_{t}. We will show that for any t1t\geq 1,

[𝒜t|t1;|Ut1|log2n]=1nω(1)1nλ1,\displaystyle\mathbb{P}\left[\mathcal{A}_{t}\;\middle|\;\mathcal{H}_{t-1};|U_{t-1}|\geq\log^{2}n\right]=1-n^{-\omega(1)}\geq 1-n^{-\lambda-1}, (12)

for any constant λ>0\lambda>0. By the definition of t-visit-exchange, for each uUt1u\in U_{t-1}, the total number of agents in Γ(u)\Gamma(u) before round tt is at most γd\gamma d. Each of these agents visits uu in round tt with probability 1/d1/d, independently from one another. Let XuX_{u} be the indicator random variable that uUtu\in U_{t}. Then, for uUt1u\in U_{t-1},

[Xu=1t1](11/d)γd4γ,\mathbb{P}\left[X_{u}=1\mid\mathcal{H}_{t-1}\right]\geq(1-1/d)^{\gamma d}\geq 4^{-\gamma},

which implies that

𝔼[|Ut|t1]=𝔼[uUt1Xu|t1]|Ut1|4γ.\mathbb{E}\left[|U_{t}|\mid\mathcal{H}_{t-1}\right]=\mathbb{E}\left[\sum_{u\in U_{t-1}}X_{u}\;\middle|\;\mathcal{H}_{t-1}\right]\geq|U_{t-1}|\cdot 4^{-\gamma}.

We observe that, conditioned on the history t1\mathcal{H}_{t-1}, the random variables XuX_{u} are negatively associated [20, Example 3.1]. Thus, we can apply standard Chernoff bounds on their sum to obtain

[|Ut||Ut1|4γ/2|t1]1exp(|Ut1|4γ/8),\mathbb{P}\left[|U_{t}|\geq|U_{t-1}|\cdot 4^{-\gamma}/2\;\middle|\;\mathcal{H}_{t-1}\right]\geq 1-\exp\left(|U_{t-1}|\cdot 4^{-\gamma}/8\right),

which implies (12).

Let κ=log24γ(n/log2n)\kappa=\lfloor\log_{2\cdot 4^{\gamma}}(n/\log^{2}n)\rfloor, and for t{1,,κ}t\in\{1,\dots,\kappa\}, define 𝒳t=1tt𝒜t\mathcal{X}_{t}=\bigcap_{1\leq t^{\prime}\leq t}\mathcal{A}_{t^{\prime}}. We prove that [𝒳t]1tnλ1\mathbb{P}\left[\mathcal{X}_{t}\right]\geq 1-t\cdot n^{-\lambda-1} by induction. The t=1t=1 case is exactly the statement of inequality (12) since |U0|=|V|=n|U_{0}|=|V|=n. For t>1t>1,

[𝒳t]\displaystyle\mathbb{P}\left[\mathcal{X}_{t}\right] [𝒜t𝒳t1][𝒳t1]\displaystyle\geq\mathbb{P}\left[\mathcal{A}_{t}\mid\mathcal{X}_{t-1}\right]\cdot\mathbb{P}\left[\mathcal{X}_{t-1}\right]
(1nλ1)[𝒳t1],by (12) since 𝒳t1 implies |Ut1|log2n,\displaystyle\geq\left(1-n^{-\lambda-1}\right)\cdot\mathbb{P}\left[\mathcal{X}_{t-1}\right],\quad\text{by \eqref{eq:u-shrink-lbd} since $\mathcal{X}_{t-1}$ implies $|U_{t-1}|\geq\log^{2}n$,}
(1nλ1)(1(t1)nλ1),by the inductive hypothesis,\displaystyle\geq\left(1-n^{-\lambda-1}\right)\cdot\left(1-(t-1)\cdot n^{-\lambda-1}\right),\quad\text{by the inductive hypothesis,}
1tnλ1.\displaystyle\geq 1-t\cdot n^{-\lambda-1}.

Observe that 𝒳κ\mathcal{X}_{\kappa} implies that there are at least log2n\log^{2}n vertices that have not been visited by any agent, and thus at least log2n1\log^{2}n-1 vertices that are uninformed (the other one may be the source). Therefore, with probability at least 1κnλ11-\kappa\cdot n^{-\lambda-1}, there is an uninformed vertex in t-visit-exchange after round κ\kappa. By Lemma 12, t-visit-exchange and visit-exchange are identical in the first κ\kappa rounds of their execution, with probability at least 1κn2γd1-\kappa n2^{-\gamma d}. Combining the two statements, we get that there is an uninformed vertex in visit-exchange after round κ\kappa, with probability at least 1κnλ1κn2γd1-\kappa\cdot n^{-\lambda-1}-\kappa\cdot n2^{-\gamma d}. By choosing a sufficiently large γ\gamma and using the fact that d=Ω(logn)d=\Omega(\log n), we can make this probability to be at least 1nλ1-n^{-\lambda}, while κ=Ω(logn)\kappa=\Omega(\log n), completing the proof. ∎

Theorem 25.

For any dd-regular graph G=(V,E)G=(V,E) with |V|=n|V|=n and d=Ω(logn)d=\Omega(\log n), and any source vertex sVs\in V, the broadcast time of meet-exchange with |A|=O(n)|A|=O(n) agents is Ω(logn)\Omega(\log n) w.h.p.

Proof.

The proof follows the same line of logic as the proof of Theorem  24. We show that, w.h.p., there is an agent that has not started its walk at the source, and that has not met any other agent (informed or not) in the first logarithmic number of rounds of meet-exchange.

First observe that we can consider a tweaked process t-meet-exchange, which has the same modification as t-visit-exchange in Theorem 24 that ensures that the neighborhood of every vertex contains at most O(d)O(d) agents at any round. Recall that t\mathcal{H}_{t} is the history of t-meet-exchange until round tt. Let StS_{t} be the set of agents that have not met another agent in the first tt rounds, and let 𝒜t\mathcal{A}_{t} be the event that |St||S_{t}| is a constant fraction of |St1||S_{t-1}|. The next inequality, which is analogous to (12), is the key step of the proof and is proved next:

[𝒜t|t1;|St1|log2n]1nλ1.\displaystyle\mathbb{P}\left[\mathcal{A}_{t}\;\middle|\;\mathcal{H}_{t-1};|S_{t-1}|\geq\log^{2}n\right]\geq 1-n^{-\lambda-1}. (13)

For every agent gSt1g\in S_{t-1}, consider the vertex u=xg(t)u=x_{g}(t) that gg visits in round tt. With constant probability no agent other than gg visits uu in round tt, therefore, there is a constant β\beta such that 𝔼[|St|t1]β|St1|\mathbb{E}\left[|S_{t}|\mid\mathcal{H}_{t-1}\right]\geq\beta|S_{t-1}|. Unlike in Theorem 24, we do not have negative association of the events that agents in St1S_{t-1} are also in StS_{t}, and therefore cannot use Chernoff bound directly.

Instead, we split round tt into two sub-rounds: In the first sub-round, only the agents in St1S_{t-1} make a step, and in the second one all other agents. Consider the set StS^{\prime}_{t}, which contains agents gSt1g\in S_{t-1} that do not meet another agent from St1S_{t-1} in the first sub-round. We have that 𝔼[|St|t1]𝔼[|St|t1]β|St1|\mathbb{E}\left[|S_{t}^{\prime}|\mid\mathcal{H}_{t-1}\right]\geq\mathbb{E}\left[|S_{t}|\mid\mathcal{H}_{t-1}\right]\geq\beta|S_{t-1}|. Additionally, |St||S_{t}^{\prime}| is a function of the independent steps taken by the agents in St1S_{t-1}, and changing the step of one of them changes |St||S_{t}^{\prime}| by at most 22. It implies that, by the Method of Bounded Difference [20, Corollary 5.2],

[|St|β|St1|/2t1]1eΩ(|St1|).\mathbb{P}\left[|S_{t}^{\prime}|\geq\beta|S_{t-1}|/2\mid\mathcal{H}_{t-1}\right]\geq 1-e^{-\Omega(|S_{t-1}|)}.

Consider the set of vertices LtL_{t} where agents in StS_{t}^{\prime} are located after the first sub-round. We can now use the negative association argument from Theorem 24 to show that, with probability at least 1eΩ(|Lt|)=1eΩ(|St1|)1-e^{-\Omega(|L_{t}|)}=1-e^{-\Omega(|S_{t-1}|)}, a constant fraction of vertices in LtL_{t} do not receive any agent in the second sub-round. Hence, with the same probability, a constant fraction of agents in StS_{t}^{\prime} do not meet a new agent. Combining the above arguments, we prove (13).

Applying (13) for κ=Ω(logn)\kappa=\Omega(\log n) rounds, we get that, w.h.p., at least log2n\log^{2}n agents have not met any other agent after the first κ\kappa rounds. Of these agents, at most O(logn)O(\log n) get informed in rounds 0, w.h.p. This follows from a standard bound on the largest bin in the balls-and-bins problem. Additionally, at most one such agent could be the first one to visit ss, while ss still contains the information. Therefore, the broadcast time of t-meet-exchange and thus also meet-exchange is at least κ=Ω(logn)\kappa=\Omega(\log n). ∎

9 Open Problems

This work is the first systematic and thorough comparison of the running times of the standard push and push-pull rumor spreading protocols with some very natural agent-based alternatives. Several open problems remain. The most obvious question to ask is whether our results for regular graphs hold also when the graph degree is sub-logarithmic. Another question is whether there are graphs where meet-exchange is slower than visit-exchange by more than logarithmic factors. In this paper we assumed a linear number of agents. It would be interesting to study the performance of the protocols when a sub-linear number of agents is available.

The main attractive properties of standard rumor spreading protocols are simplicity, scalability, and robustness to failures [24]. Arguably, visit-exchange and meet-exchange share the first two properties, but probably not the robustness property. In particular, it seems that faulty nodes or links can result in agents getting lost. It would be interesting to explore fault tolerant variants of these protocols. For example, it seems likely that the protocols could tolerate some number of lost agents, if a dynamic set of agents were used, where agents age with time and die, while new agents are born at a proportional rate.

10 Acknowledgments

We would like to thank Thomas Sauerwald and Nicolás Rivera for helpful discussions. This research was undertaken, in part, thanks to funding from the ANR Project PAMELA (ANR-16-CE23-0016-01), the NSF Award Numbers CCF-1461559, CCF-0939370 and CCF-18107, the Gates Cambridge Scholarship programme, and the ERC grant DYNAMIC MARCH.

References

  • [1] R. Aleliunas, R. M. Karp, R. J. Lipton, L. Lovász, and C. Rackoff. Random walks, universal traversal sequences, and the complexity of maze problems. In Proc. 20th IEEE Symposium on Foundations of Computer Science, FOCS, pages 218–223, 1979.
  • [2] N. Alon, C. Avin, M. Koucký, G. Kozma, Z. Lotker, and M. R. Tuttle. Many random walks are faster than one. Combinatorics, Probability & Computing, 20(4):481–502, 2011.
  • [3] O. S. M. Alves, F. P. Machado, and S. Y. Popov. The shape theorem for the frog model. The Annals of Applied Probability, 12(2):533–546, May 2002.
  • [4] O. Angel, A. Mehrabian, and Y. Peres. The string of diamonds is tight for rumor spreading. In Proc. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM, pages 26:1–26:9, 2017.
  • [5] P. Berenbrink, R. Elsässer, and T. Friedetzky. Efficient randomised broadcasting in random regular networks with applications in peer-to-peer systems. Distributed Computing, 29(5):317–339, 2016.
  • [6] P. Berenbrink, G. Giakkoupis, A. Kermarrec, and F. Mallmann-Trenn. Bounds on the voter model in dynamic networks. In Proc. 43rd International Colloquium on Automata, Languages, and Programming, ICALP, pages 146:1–146:15, 2016.
  • [7] P. Berenbrink, G. Giakkoupis, and P. Kling. Tight bounds for coalescing-branching random walks on regular graphs. In Proc. 29th ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 1715–1733, 2018.
  • [8] S. P. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. Randomized gossip algorithms. IEEE Trans. Information Theory, 52(6):2508–2530, 2006.
  • [9] A. Z. Broder, A. R. Karlin, P. Raghavan, and E. Upfal. Trading space for time in undirected s-t connectivity. SIAM J. Comput., 23(2):324–334, 1994.
  • [10] K. Censor-Hillel, B. Haeupler, J. A. Kelner, and P. Maymounkov. Rumor spreading with no dependence on conductance. SIAM J. Comput., 46(1):58–79, 2017.
  • [11] F. Chierichetti, G. Giakkoupis, S. Lattanzi, and A. Panconesi. Rumor spreading and conductance. J. ACM, 65(4):17:1–17:21, 2018.
  • [12] F. Chierichetti, S. Lattanzi, and A. Panconesi. Rumor spreading in social networks. Theor. Comput. Sci., 412(24):2602–2610, 2011.
  • [13] C. Cooper. Random walks, interacting particles, dynamic networks: Randomness can be helpful. In Proc. Structural Information and Communication Complexity - 18th International Colloquium, SIROCCO, pages 1–14, 2011.
  • [14] C. Cooper, A. M. Frieze, and T. Radzik. Multiple random walks in random regular graphs. SIAM J. Discrete Math., 23(4):1738–1761, 2009.
  • [15] A. J. Demers, D. H. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. E. Sturgis, D. C. Swinehart, and D. B. Terry. Epidemic algorithms for replicated database maintenance. Operating Systems Review, 22(1):8–32, 1988.
  • [16] T. Dimitriou, S. E. Nikoletseas, and P. G. Spirakis. The infection time of graphs. Discrete Applied Mathematics, 154(18):2577–2589, 2006.
  • [17] B. Doerr, M. Fouz, and T. Friedrich. Social networks spread rumors in sublogarithmic time. In Proc. 43rd ACM Symposium on Theory of Computing, STOC, pages 21–30, 2011.
  • [18] B. Doerr, M. Fouz, and T. Friedrich. Social networks spread rumors in sublogarithmic time. In Proc. 43rd ACM Symposium on Theory of Computing, STOC, pages 21–30. ACM, 2011.
  • [19] B. Doerr, T. Friedrich, and T. Sauerwald. Quasirandom rumor spreading. ACM Trans. Algorithms, 11(2):9:1–9:35, 2014.
  • [20] D. P. Dubhashi and A. Panconesi. Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press, 2009.
  • [21] K. Efremenko and O. Reingold. How well do random walks parallelize? In Proc. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 12th International Workshop, APPROX, and 13th International Workshop, RANDOM, pages 476–489, 2009.
  • [22] R. Elsässer and T. Sauerwald. On the runtime and robustness of randomized broadcasting. Theoretical Computer Science, 410(36):3414–3427, 2009.
  • [23] R. Elsässer and T. Sauerwald. Tight bounds for the cover time of multiple random walks. Theor. Comput. Sci., 412(24):2623–2641, 2011.
  • [24] U. Feige, D. Peleg, P. Raghavan, and E. Upfal. Randomized broadcast in networks. Random Struct. Algorithms, 1(4):447–460, 1990.
  • [25] W. Feller. An Introduction to Probability Theory and its Applications. Vol. 1. Wiley, 2009.
  • [26] G. Giakkoupis. Tight bounds for rumor spreading with vertex expansion. In Proc. 25th ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 801–815, 2014.
  • [27] G. Giakkoupis, Y. Nazari, and P. Woelfel. How asynchrony affects rumor spreading time. In Proc. 35th ACM Symposium on Principles of Distributed Computing, PODC, pages 185–194, 2016.
  • [28] M. Harchol-Balter, F. T. Leighton, and D. Lewin. Resource discovery in distributed networks. In Proc. 18th ACM Symposium on Principles of Distributed Computing, PODC, pages 229–237, 1999.
  • [29] J. Hermon. Frogs on trees? Electron. J. Probab., 23, 2018.
  • [30] V. Kanade, F. Mallmann-Trenn, and T. Sauerwald. On coalescence time in graphs: When is coalescing as fast as meeting? In Proc. 30th ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 956–965, 2019.
  • [31] R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vöcking. Randomized rumor spreading. In Proc. 41st IEEE Symposium on Foundations of Computer Science, FOCS, pages 565–574, 2000.
  • [32] D. Kempe, A. Dobra, and J. Gehrke. Gossip-based computation of aggregate information. In Proc. 44th IEEE Symposium on Foundations of Computer Science FOCS, pages 482–491, 2003.
  • [33] H. Kesten and V. Sidoravicius. The spread of a rumor or infection in a moving population. The Annals of Probability, 33(6):2402–2462, Nov 2005. Zbl: 1111.60074.
  • [34] H. Kesten and V. Sidoravicius. A shape theorem for the spread of an infection. Annals of Mathematics, 167(3):701–766, May 2008.
  • [35] H. Lam, Z. Liu, M. Mitzenmacher, X. Sun, and Y. Wang. Information dissemination via random walks in d-dimensional space. In Proc. 23rd ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 1612–1622, 2012.
  • [36] M. Mitzenmacher, R. Rajaraman, and S. T. Roche. Better bounds for coalescing-branching random walks. TOPC, 5(1):2:1–2:23, 2018.
  • [37] M. Mitzenmacher and E. Upfal. Probability and Computing. Cambridge University Press, second edition, 2017.
  • [38] D. Mosk-Aoyama and D. Shah. Fast distributed algorithms for computing separable functions. IEEE Trans. Information Theory, 54(7):2997–3007, 2008.
  • [39] A. Pettarin, A. Pietracaprina, G. Pucci, and E. Upfal. Infectious random walks. CoRR, abs/1007.1604, 2010.
  • [40] S. Y. Popov. Frogs and some other interacting random walks models. In Proc. Discrete Random Walks, DRW, pages 277–288, 2003.
  • [41] T. Sauerwald. On mixing and edge expansion properties in randomized broadcasting. Algorithmica, 56(1):51–88, 2010.
  • [42] R. van Renesse, Y. Minsky, and M. Hayden. A gossip-style failure detection service. In Proc. IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing, Middleware ’98, pages 55–70, 1998.

APPENDIX

Appendix A Concentration Bounds

Below we state some standard bounds we use in our analysis.

Theorem 26 (Chernoff bounds, [37, Theorems 4.2, 4.3]).

Let X1,X2,,XnX_{1},X_{2},\dots,X_{n} be independent 0/1 random variables. Let X=i=1nXiX=\sum_{i=1}^{n}X_{i} and μ=𝔼[X]\mu=\mathbb{E}\left[X\right]. Then,

  1. (a)

    [X(1+δ)μ]exp(μδ23)\mathbb{P}\left[X\geq(1+\delta)\cdot\mu\right]\leq\exp\left(-\frac{\mu\cdot\delta^{2}}{3}\right), for 0<δ10<\delta\leq 1.

  2. (b)

    [Xβμ]2βμ\mathbb{P}\left[X\geq\beta\mu\right]\leq 2^{-\beta\mu}, for β2e\beta\geq 2e.

  3. (c)

    [X(1δ)μ]exp(μδ22)\mathbb{P}\left[X\leq(1-\delta)\cdot\mu\right]\leq\exp\left(-\frac{\mu\cdot\delta^{2}}{2}\right), for 0<δ<10<\delta<1.

Lemma 27.

Let F1,,FnF_{1},\dots,F_{n} be independent and identical geometrically distributed random variables with parameter pp, i.e., for any integer k1k\geq 1, [Fi=k]=(1p)k1p.\mathbb{P}\left[F_{i}=k\right]=(1-p)^{k-1}p. Let F=i=1nFiF=\sum_{i=1}^{n}F_{i} and μ=𝔼[F]\mu=\mathbb{E}\left[F\right]. Then for any k2μk\geq 2\mu,

[Fk]exp(kp8).\mathbb{P}\left[F\geq k\right]\leq\exp\left(-\frac{kp}{8}\right).
Proof.

We define a coupling between random variables (Fi)i=1n(F_{i})_{i=1}^{n} and a sequence of Bernoulli trials (Xj)j=1(X_{j})_{j=1}^{\infty} with parameter pp. Let j0=0j_{0}=0 and for i1i\geq 1, let ji=min{j>ji1:Xj=1}j_{i}=\min\{j>j_{i-1}:X_{j}=1\}, i.e., jij_{i} is the index of iith 1 in (Xj)(X_{j}). We set Fi=jiji1F_{i}=j_{i}-j_{i-1}. With this coupling, FkF\geq k implies Yk=j=1kXjnY_{k}=\sum_{j=1}^{k}X_{j}\leq n. Therefore,

[Fk][Ykn],\mathbb{P}\left[F\geq k\right]\leq\mathbb{P}\left[Y_{k}\leq n\right],

which we can bound using standard Chernoff bounds from Theorem 26. We have that 𝔼[Yk]=kp\mathbb{E}\left[Y_{k}\right]=kp, and μ=n𝔼[F1]=n/p\mu=n\mathbb{E}\left[F_{1}\right]=n/p. Then,

[Fk]\displaystyle\mathbb{P}\left[F\geq k\right] [Ykn]\displaystyle\leq\mathbb{P}\left[Y_{k}\leq n\right]
=[Yk𝔼[Yk](1(1μk))]\displaystyle=\mathbb{P}\left[Y_{k}\leq\mathbb{E}\left[Y_{k}\right]\left(1-\left(1-\frac{\mu}{k}\right)\right)\right]
exp(kp2(1μk)2),by Chernoff bound,\displaystyle\leq\exp\left(-\frac{kp}{2}\left(1-\frac{\mu}{k}\right)^{2}\right),\quad\text{by Chernoff bound,}
exp(kp8),since k2μ.\displaystyle\leq\exp\left(-\frac{kp}{8}\right),\quad\text{since }k\geq 2\mu.\qed
Lemma 28.

Let Z1,,ZkZ_{1},\dots,Z_{k} be (dependent) integer random variables, and ZiZ_{i}^{\prime} be mutually independent random variables, such that for any 1ik1\leq i\leq k and b0b\geq 0,

[ZibZ1,,Zi1][Zib].\mathbb{P}\left[Z_{i}\leq b\mid Z_{1},\dots,Z_{i-1}\right]\geq\mathbb{P}\left[Z_{i}^{\prime}\leq b\right].

Then, for any b0b\geq 0,

[i=1kZib][i=1kZib].\mathbb{P}\left[\sum_{i=1}^{k}Z_{i}\leq b\right]\geq\mathbb{P}\left[\sum_{i=1}^{k}Z_{i}^{\prime}\leq b\right].
Proof.

Follows from a simple coupling argument. ∎