Reliable Spanners for Metric Spaces††thanks: A preliminary version of this paper appeared in SoCG 2021 [HMO21].
Abstract
A spanner is reliable if it can withstand large, catastrophic failures in the network. More precisely, any failure of some nodes can only cause a small damage in the remaining graph in terms of the dilation. In other words, the spanner property is maintained for almost all nodes in the residual graph. Constructions of reliable spanners of near linear size are known in the low-dimensional Euclidean settings. Here, we present new constructions of reliable spanners for planar graphs, trees and (general) metric spaces.
1 Introduction
Let be a finite metric space. Let be a sparse graph on the points of whose edges are weighted with the distances of their endpoints. The graph is a -spanner if for any pair of vertices we have , where is the length of the shortest path between and in , and is the distance in the metric space between and . Spanners were first introduced by Peleg and Schäffer [PS89] as a tool in distributed computing, but have since found use in many other areas, such as algorithms, networking, data structures, and metric geometry, see [Pel00, NS07].
Fault tolerant spanners
A desired property of spanners is the ability to withstand failures of some of their vertices. One such notion is provided by fault tolerance [CLNS15, LNS98, LNS02, Luk99, Sol14]. A graph is a -fault tolerant -spanner, if for any subset of vertices , with , the graph is a -spanner. However, for -fault tolerant graphs there is no guarantee if more than vertices fail, and furthermore, the size of a fault tolerant graph grows (linearly) with the parameter . In particular, for fixed , the optimal size of -fault tolerant -spanners on vertices is [BDPW18]. Note that vertex degrees must be at least to avoid the possibility of isolating a vertex. Thus, it is not suitable for massive failures in the network.
Reliable spanners
An alternative notion was introduced by Bose et al. [BDMS13]. Here, for a parameter , a -reliable -spanner has the property that for any failure (or attack) set , the residual graph is a -spanner path for the points of , where is some set, such that . We consider two variants:
-
(A)
Adaptive adversary (i.e., standard or “deterministic” model): The adversary knows the spanner , and the set is chosen as a worst case for .
-
(B)
Oblivious adversary (i.e., “randomized” model): Here, the spanner is drawn from a probability distribution (over the same number of vertices). The adversary knows in advance, but not the sampled spanner. In this oblivious model, we require that .
See Section 2 for precise definitions.
Previous work
Bose et al. [BDMS13] provided some lower bounds and constructions in the general settings, but the bounds on the size of the damaged set (i.e., ) are much larger. In the Euclidean settings, for any point set , and for any constants , one can construct a -reliable -spanner with only edges [BHO19] (an alternative, but slightly inferior construction, was provided independently by Bose et al. [BCDM18]). The number of edges can be further reduced in the oblivious adversary case, where one can construct an oblivious -spanner that is -reliable in expectation and has edges [BHO20].
Covers.
A cover is a set of clusters (i.e., subsets of the point set) that covers the metric space with certain desirable properties. Awerbuch and Peleg [AP90] showed a cover, where (i) each cluster has diameter , (ii) every vertex participates in clusters, and (iii) for every vertex , the ball of radius centered at , is contained in a single cluster. Busch et al. [BLT14] show how to compute a cover of a planar graph, with diameter per cluster, such that each pair in distance from each other belongs to some cluster, and every vertex participates in at most clusters. For graphs that excludes a minor of fixed size, they get a similar result, except that each vertex might participate in vertices, where is the number of vertices in the input graph. Abraham et al. [AGMW10] presented a result with better sparsity when the graphs do not have as a minor.
Constructions of -reliable -spanners | ||||
---|---|---|---|---|
metric | guarantee | size | ref | |
Uniform | expectation | Lemma 3.1 | ||
det. lower bound | Lemma 3.2 | |||
deterministic | Theorem 3.6 | |||
deterministic | Theorem 3.6 | |||
Finite metrics | expectation | Lemma 5.3 | ||
expectation | Lemma 5.3 | |||
deterministic | Lemma 5.4 | |||
deterministic | Lemma 5.4 | |||
Ultrametrics | expectation | Lemma 5.5 | ||
deterministic | Lemma 5.6 | |||
Trees | expectation | Lemma 5.7 | ||
deterministic | Lemma 5.8 | |||
Planar graphs | expectation | Lemma 5.9 | ||
deterministic | Lemma 5.10 |
Our results.
We provide new constructions of reliable spanners for finite uniform metrics, ultrametrics, trees, planar graphs and finite metrics. Our new results are summarized in Table 1.1.
Technique
Our approach for constructing reliable spanners is in two steps: We first construct reliable spanners for uniform metrics and then reduce the problem of constructing reliable spanners for general metrics to uniform metrics using covers.
Spanners for uniform metrics
Uniform metrics have trivial classical 2-spanners – that is, star graphs. In the oblivious model one can simply use “constellation of stars” with a constant number of random centers, and the resulting spanner is linear in size. In the adaptive settings, we present a lower bound of edges for a reliable -spanner, and asymptotically “matching” construction of a deterministic -reliable spanner with edges. The construction is based on reliable expanders – these are expanders that remain expanding under the type of attacks described above. See Section 3 and Section 6 for details.
Covers
A -cover of a finite metric space is a family of subsets , such that for each pair of points there exists a subset in that contains both points and whose diameter is at most . Covers are used here to extend reliable spanners for uniform metrics into reliable spanners for general metrics. This is done by using spanners for uniform in each set of the cover and then taking a union of the edges of those graphs. See Section 5.
Naturally, the size of a -cover is an important parameter in the resulting size of the spanner, so in Section 4 we study the problem of constructing good covers. For general -point spaces with spread at most , we observe that the Ramsey partitions of [MN07] provide covers of size , which is close to optimal, because of an lower bound we provide. In more specific cases, like ultrametrics, trees and planar graphs, one can do better. For example, for trees and planar graphs one gets -covers of near linear size. For planar graphs, known partitions have much larger gap, which makes these results quite interesting.
New reliable spanners
Plugging the constructions of spanners for uniform metrics with the construction of covers yields reliable spanners for finite uniform, ultrametric, tree, planar, and general metrics. The results are summarized in Table 1.1.
Efficient construction
All our constructions relies on randomized constructions of expanders (over vertices), that succeeds with probability . As such, the constructions described can be done efficiently, if one wants constructions of spanners for vertices that succeeds with probability . See Remark 6.3 for details.
2 Preliminaries
2.1 Metric spaces
For a set , a function , is a metric if it is symmetric, complies with the triangle inequality, and . A metric space is a pair , where is a metric. For a point , and a radius , the ball of radius is the set
For a finite set , the diameter of is
and the spread of is A metric space is finite, if is a finite set. In this case, we use to denote the spread of the (finite) metric.
A natural way to define a metric space is to consider an undirected connected graph with positive weights on the edges. The shortest path metric of , denoted by , assigns for any two points the length of the shortest path between and in the graph. Thus, any graph readily induces the finite metric space . If the graph is unweighted, then all the edges have weight .
A tree metric is a shortest path metric defined over a graph that is a tree.
2.2 Reliable spanners
Definition 2.1.
For a metric space , a graph is a -spanner, if for any , Here is the shortest path distance on whose edges are weighted according to .
Given a weighted graph , and a set , we denote by the subgraph induced on . We also use the notation . A randomized graph is a probability distribution over the edge set for a given set of vertices .
An attack on a graph is a set of vertices that fails and no longer can be used. An attack (on a randomized graph) is oblivious, if the set is picked stochastically independent of the edge set of the graph.
Definition 2.2 (Reliable spanner).
Let be a -spanner for some constructed by a (possibly) randomized algorithm. Given an attack , its damaged set is a set of smallest possible size, such that for any pair of vertices , we have
(2.1) |
that is, distances are preserved (up to a factor of ) for all pairs of points not contained in . The quantity is the loss of under the attack . The loss rate of is . For , the graph is -reliable (in the deterministic or non-oblivious setting), if holds for any attack . Furthermore, the graph is -reliable in expectation (or in the oblivious model), if holds for any oblivious attack .
Remark 2.3.
The damaged set is not necessarily unique, since there might be freedom in choosing the point to include in for a pair that does not have a -path in .
2.3 Miscellaneous
For a graph , and two set of vertices , let
denote the neighbors of in . The neighbors of in is denoted by .
Definition 2.4.
For a collection of sets , and an element , let denote the degree of in . The maximum degree of any element of is the depth of .
Notations
We use and . Similarly, for a graph , and a vertex , let denote the graph resulting from removing .
3 Reliable spanners for uniform metric
Let be a set of points and let be a metric space equipped with the uniform metric, that is, for all distinct pairs , we have that is the same quantity (e.g., ). Note that edges are enough to achieve a -spanner for the uniform metric by using the star graph.
3.1 A randomized construction for the oblivious case
Construction
Let be a fixed parameter. Set and sample points from uniformly at random (with replacement). Let be the resulting set of center points. For each point , build the star graph , where is the center of the star. The constellation of is the graph , which is the union of the star graphs induced by centers in .
Lemma 3.1.
The constellation , defined above, is a -reliable -spanner in expectation. The number of its edges is .
Proof:
Let be an oblivious attack, and let . If there is a point of that is not in , then there is a center point outside of the attack set, which provides -hop paths between all pairs of points in the residual graph, and therefore we choose . On the other hand, if , then the residual graph contains only isolated vertices, and therefore we choose . If then there is nothing to prove. Thus, since and , we have
As for the number of edges, has at most edges, since is the union of stars and each star has edges. Thus, by the choice of , the size of is .
3.2 Lower bound for a deterministic construction
In the non-oblivious settings, the attacker knows the constructed graph when choosing the attack set .
Lemma 3.2.
Let be a -reliable -spanner on for the uniform metric, where and . Then, in the non-oblivious settings, must have edges.
Proof:
We assume that the distance between any pair of points of is one. Let the attack set be the set of all nodes of degree at least , where . Assume, toward a contradiction, that . By the reliability condition, there exists a set of nodes of the residual graph of size at least , that has -hop paths in between all pairs of vertices of . Let be an arbitrary vertex. Let be a ball of radius centered at in the shortest path metric in the residual graph . On the one hand, from the above, . On the other hand, the maximum degree is at most , and therefore . As such, we have . A contradiction.
Hence, . The claim follows since , which implies
Remark 3.3.
Erdős’ girth conjecture states that there exists a graph with vertices and edges, and girth at least , where the girth of is the length of the shortest cycle in . The argument in the proof of Lemma 3.2 is closely related to the standard argument for proving a tight counterpart – any graph with edges has girth at most .
3.3 Reliable spanners of the uniform metric for adaptive adversary
Here, we present a construction of reliable spanner that is close to being tight. The spanner is simply a high-degree expander whose properties are described in the following definition.
Definition 3.4.
Denote by the second eigenvalue of the matrix , where is the adjacency matrix of a -regular graph . A proper expander specifies a constant , and functions , such that for every and even integers , , there exists an -vertex, -regular graph , such that:
-
(P1)
-
(P2)
-
(P3)
For each one of the properties above, it is known that there exists an expander satisfying it: Property (P1) is essentially proved in [BHO19], Property (P2) is folklore, and Property (P3) appears in [DJPP13]. Since they hold almost surely for “random regular graphs”, they also hold simultaneously. However, we were unable to find in the literature proofs of almost sure existence in the same model of random regular graphs, and contiguity of the different random models does not necessarily hold in the high-degree regime (which is what we need here). Therefore, for completeness, Appendix A reprove (P1) and (P2) in the same random model in which (P3) was proved. We thus get the following:
Theorem 3.5.
The random graph constructed in Section A.1 is a proper expander (see Definition 3.4), asymptotically almost surely. Specifically, the probability the graph has the desired properties is .
With the appropriate choice of parameters, these expanders are reliable spanners for uniform metrics.
Theorem 3.6.
For every , , and , such that , there exist:
-
(i)
-reliable -spanner with edges for -point uniform space, and
-
(ii)
-reliable -spanner with edges for -point uniform space.
The proof is somewhat cumbersome and is deferred to Section 6.
Applying the above theorem directly on non-uniform metric we obtain the following corollaries.
Corollary 3.7.
Let be a metric space, and let be a finite subset of size . Given parameters , and , there exists a weighted graph on , such that:
-
(A)
The graph has edges.
-
(B)
The graph is -reliable. Namely, given any attack set , there exists a subset , such that . Furthermore, for any two points , we have
and the path realizing it has at most hops.
In particular, has hop diameter at most , and diameter at most .
Corollary 3.8.
Let be a metric space, and let be a finite subset of size . Given parameters , and , there exists a weighted graph on , such that:
-
(A)
The graph has edges.
-
(B)
The graph is -reliable. Namely, given any attack set , there exists a subset , such that . Furthermore, for any two points , we have
and the path realizing it has at most hops.
In particular, has hop diameter at most , and diameter at most .
Remark 3.9.
Corollary 3.7 and Corollary 3.8 are quite weak as far as the guarantee on the length of the resulting path (i.e., they are not good spanners). A construction that provides a spanner guarantee is provided below in Lemma 5.4 below.
As aside, proper expanders are reliable spanners because their expansion property is robust, as testified by the following.
Theorem 3.10 (reliable vertex expander).
For every there exists a constant , such that for any expansion constant , there exists a family of vertex expander graphs on vertices of degree at most , with the following resiliency property: For any , there exists , such that the graph is a vertex expander in the sense that
-
(i)
, and
-
(ii)
For any of size , we have .
The proof is deferred to Section 6.3.4.
4 Covers for trees, bounded spread metrics, and planar graphs
Definition 4.1.
For a finite metric space , a -cover, is a family of subsets , such that for any , there exists an index , such that , and
The size of a cover is . Recalling Definition 2.4, the degree in of a point is the number of sets of that contain it. The depth of is the maximum degree of any element of , and is denoted by .
4.1 Lower bounds
Unfortunately, in the worst case, the depth and the size of any cover must depend on the spread of the metric.
Proposition 4.2.
For any parameter , any integer , , and any , there exists a metric of points, such that
-
(I)
, and
-
(II)
any -cover of has size , average degree , and depth .
Proof:
For simplicity of exposition, assume that divides . Let be a set of points, such that the distance between any pair of points of is , for some fixed small , for . Furthermore, assume that the distance between any point of and any point of , for , is .
Let , and observe that the distance function defined above is a metric (it is the union of uniform metrics of different resolutions). Now, consider any -cover of . The rank of a cluster , is the highest , such that . We can assume that all the clusters of have at least two points, as otherwise they can be removed. For any index , any point and any point , by definition, there exists a cluster , such that , and , since . It follows that can not contain any point of . Namely, the rank of is .
If there are two clusters of rank in , then we can merge them, since merging does not increase their diameter, and such an operation does not increase the size of the cover, and the degrees of its elements. As such, in the end of this process, the cover has clusters, and for any , there is a cluster that is of rank , and contains (exactly) all the elements of . Namely, , where . It is easy to verify that this cover has the desired properties.
Proposition 4.3.
For any , and any sufficiently large there exists an -point metric space for which any -cover must be of size at least .
Proof:
Let . By a standard probabilistic argument, for any sufficiently large there exists a simple graph on vertices and edges whose girth is at least . (This is not the best known bound, but it is sufficient for our purposes.) Consider as a metric space with the shortest (unweighted) path metric. Let be a -cover for , and let . For let .
We claim that for every , is a forest, and hence . Indeed, Suppose contains a cycle such that . Denote . Since , we have . Let be the smallest such that . Hence, . Let be a shortest path in between and . ’s length is at most . Thus, the sequence is closed path of length at most , and hence contains a cycle of length at most . By the girth condition, , and hence . But since , this means that which contradicts the definition of .
For every edge , , and by the -covering condition there exists such that . Therefore . Hence , and therefore
4.2 Cover for ultrametrics
Definition 4.4.
A hierarchically well-separated tree (HST) is a metric space defined on the leaves of a rooted tree . To each vertex there is an associated label . This label is zero for all the leaves of , and it is a positive number for all the interior nodes. The labels satisfy for every non-root vertex , , where is the parent of in . The distance between two leaves is defined as , where is the least common ancestor of and in . An HST is a -HST if for every non-root vertex , .
HSTs are one of the simplest non-trivial metrics, and surprisingly, general metrics can be embedded randomly into HSTs with expected distortion of [Bar98, FRT04].
Definition 4.5.
A metric is an ultrametric, if for any , we have that . Notice, that this is a stronger version of the triangle inequality, which states that .
The following is folklore, and it also easy to verify (see, e.g., [BLMN05, Lemma 3.5].
Lemma 4.6.
For , every finite ultrametric can be -approximated by a -HST.
Lemma 4.7.
For , every -HST with spread has -cover of depth at most .
Proof:
Let be the tree of the HST. With every vertex we associate a cluster the leaves of the subtree rooted at . The covers is defined as . The properties of the cover are immediate.
Corollary 4.8.
Let be an ultrametric over points with spread . For any , one can compute a -cover of of depth .
4.3 Cover for general finite metrics
We need the following result.
Lemma 4.9 ([MN07]).
Let be an -point metric space and . Then there exists a distribution over decreasing sequences of subsets ( itself is a random variable), such that for all , we have and such that for each there exists an ultrametric on satisfying for every , that , and if and then .
By computing a cover (using Corollary 4.8) for each ultrametric generated by the above lemma, we get the following.
Lemma 4.10.
For an -point metric space with spread , and a parameter , one can compute, in polynomial time, an -cover of of size and depth .
Proof:
Using Lemma 4.9, for the parameter , compute the sequence , and the associated ultrametrics . We build a -HST for , when restricted to the set , for . For every HST in this collection, we compute a -cover using Corollary 4.8. Let be the union of all these covers.
Since for every HST the resulting cover has size , then by Lemma 4.9 (applied with ), we have
As for the quality of the cover, let be any two points in , and assume (without loss of generality) that and for some . We have that , and since we computed a -cover for this tree, there is a cluster in the computed cover that contains both points and its diameter is at most twice the distance between those points.
The maximum depth, follows by using Lemma 4.9 with . This implies that a point of participates in HSTs, and each cover generated by such an HST might a point an element at most times.
The bounds on the size and depth hold in expectation, and one can repeat the construction if they exceed the desired size by (say) a factor of eight. In expectation, after a constant number of iterations, the algorithm would compute with high probability a cover with the desired bounds.
4.4 Covers for trees
Using a tree separator, and applying it recursively, implies the following construction of covers for trees.
Lemma 4.11.
For a weighted tree metric , with spread , and a parameter , one can compute in polynomial time a -cover of of depth , and size , where .
Proof:
The proof is by induction on . When the trivial cover is sufficient. Assume next that and the minimum distance in is one. Find a separator node in such that there is no connected component in larger than after removing . For , define the sets By the inductive hypothesis, for each connected component of there is a -cover of of depth and size . The cover for is
Since every element of participates in at most sets in each level of the recursion, the bound on the depth and size is immediate.
As for the quality of the cover, by the inductive hypothesis, we need only to check pairs of points , that are separated by . Assume , and let be the minimum index, such that . We have that , and
As such, we have
4.5 Covers for planar graphs
The next lemma can be traced back to the work of Lipton and Tarjan [LT79].
Lemma 4.12.
Let be a planar triangulated graph with non-negative edge weights. There is a partition of to three sets , such that
-
(i)
and ,
-
(ii)
there is no edge between and , and
-
(iii)
is composed of two interior disjoint shortest paths that share one of their endpoints, and an edge connecting their other two endpoints.
Definition 4.13.
For a metric space and a parameter , an -net is a maximal set of points in satisfying:
-
(i)
For any two net points , , we have .
-
(ii)
For any , .
A net can be computed by repeatedly picking the point furthest away from the current net , and adding it to the net if this distance is larger than , and stopping otherwise. We denote a net computed by this algorithm by .
The following lemma testifies that if we restrict the net to lay along a shortest path in the graph, locally the cover it induces has depth as if the graph was one dimensional.
Lemma 4.14.
Let be a weighted graph, and let be the shortest path metric it induces. Let be a shortest path in and let be a net computed for some distance . For some , consider the set of balls . For any point , we have that the degree of in is at most .
Proof:
Let be the points of sorted by their order along – these are the only points that their balls in would contain . By the definition of the net, for all . Since is a shortest path, we also have that
Construction
Let be an input parameter, and let be a weighted planar graph. We assume that is triangulated, as otherwise it can be triangulated (we also assume that we have its planar embedding). Any new edge is assigned as weight the distance between its endpoints in the original graph. This can be done in linear time. As usual, we assume that the minimum distance in is one, and its spread is .
Let be the cycle separator given by Lemma 4.12 made out of two shortest paths and . Let be the endpoints of these two paths.
For , let , where . The associated set of balls is
The resulting set of balls is . We add the sets of to the cover, and continue recursively on the connected components of . Let denote the resulting cover.
Analysis
Lemma 4.15.
For any two vertices , there exists a cluster , such that , and That is, is a -cover of .
Proof:
Assume, for the simplicity of exposition, that and get separated in the top level of the recursion (otherwise, apply the argument to the inductive step in which they get separated). The shortest path between and must intersect the separator , say at a vertex . Assume that and that . There is a point within distance from . As such,
which implies that . A similar argument shows that is also in . Furthermore, we have that Note that . We have that
Lemma 4.16.
The depth of is .
Proof:
Fix a vertex . By Lemma 4.14, for each , at most
balls of contains . The number of such sets is . The vertex get sent down to at most one recursive subproblem, and the recursion depth is . It follows that the depth of any point (and the degree of specifically) is at most .
Theorem 4.17.
Let be a weighted planar graph over vertices with spread . Then, given a parameter , one can construct a -cover of with depth in polynomial time.
Remark 4.18.
It is possible to generalize Theorem 4.17 to the shortest path metric on families of graphs excluding a fixed minor. Specifically, by [KLMN05, Lemma 3.3], there exists -cover of depth for every metric space supported on a graph excluding minor and spread . It may be possible to improve the approximation parameter to using [AGG+19]. This approach does not have a factor in the depth parameter, but it can not provide a -approximation as in Theorem 4.17. As communicated to us by an anonymous referee, the approach used here to prove Theorem 4.17 can also be extended to any family of graphs excluding fixed minor and obtain -cover using the shortest paths separators of [AG06]. We have not pursued those avenues.
5 From covers to reliable spanners
5.1 The oblivious construction
Lemma 5.1.
Let be a finite metric space, and suppose there exists a -cover of of size and depth . Then, there exists an oblivious -reliable -hop -spanner for , of size
Proof:
For each cluster , let C be a random constellation graph on as defined in Section 3.1, with reliability parameter . The resulting spanner is the union . The number of edges in the resulting graph is at most
Fix an attack set . A cluster is failed if . Denote the set failed clusters by . For , let be the (random) set of damaged points in as defined in the proof of Lemma 3.1, i.e., if contains all the constellation’s centers, and otherwise. by Lemma 3.1, The damaged set is defined as
We next bound expected size of the loss :
Finally, for any two points , there exists a non-failed cluster that contains both points, such that . As such, the two hops in the resulting graph are going to be of length at most .
5.2 The deterministic construction
Lemma 5.2.
Let be a finite metric space over points, and let be a -cover of it of depth and size . Then, for any integer , there exists:
-
(A)
A -reliable -hop -spanner for , of size .
-
(B)
A -reliable -hop -spanner for , of size .
Proof:
(A) For a cluster , let be a -reliable spanner constructed using Corollary 3.7 on , with the reliability parameter . Let be a graph whose edge set is the union of the edge sets of for .
Let be the size of the th cluster, for . The number of edges in is bounded by , where
since , and . We conclude that the total number of edges in is .
Let be an attack set. The damage set is constructed as in the proof of Lemma 5.1. Thus, as argued there, . For every two points , there exists a cluster , such that , and
Furthermore, by Corollary 3.7, we have
and shortest path in realizing has at most hops.
(B) Similar to the above, except for using Corollary 3.8 instead of Corollary 3.7.
5.3 Applications
5.3.1 General metrics
Lemma 5.3.
Let be an -point metric space of spread at most , and let and be parameters. Then, one can build an oblivious -reliable -spanner for with
edges. In particular, for , we obtain a -reliable -spanner for with
edges.
Proof:
By Lemma 4.10, has a -cover of size and depth . Plugging this into Lemma 5.1 yields an oblivious -reliable -spanner with edges.
Lemma 5.4.
Let be a finite metric over points of spread , and let and be parameters. Then, one can build a -reliable -spanner for with edges. In particular, when , we obtain a -reliable -spanner for with
edges, and when we obtain -reliable -spanner for with edges.
Proof:
By Lemma 4.10, has a -cover of size and depth . Plugging this into Lemma 5.2 (B), yields a -reliable -spanner with the number of edges bounded by
5.3.2 Ultrametrics
Lemma 5.5.
Let be an ultrametric over points with spread , and let be parameters. Then, one can build an oblivious -reliable -spanner for with
edges.
Proof:
By Corollary 4.8, one can build a -cover of of depth and size . Plugging this into Lemma 5.1 yields an oblivious -reliable -hop -spanner for , of size
Lemma 5.6.
Let be an ultrametric over points with spread , and let , and be parameters. Then, one can build a -reliable -spanner for of size
Proof:
By Corollary 4.8, one can build a -cover of of depth and size . Plugging this into Lemma 5.2 (A) yields a deterministic -reliable -spanner for , of size
5.3.3 Tree metrics
Lemma 5.7.
Let be a tree metric over points with spread , and let be parameters. Then, one can build an oblivious -reliable -spanner for with
edges, where .
Proof:
By Lemma 4.11, one can build a -cover of of depth and size . Plugging this into Lemma 5.1 yields an oblivious -reliable -hop -spanner for , of size
To get the improved bound on the dilation, let be two points and let be the cluster such that and . Assume that (otherwise and there is nothing to prove). By construction, for the separator node , we have for all . Observe, that the (shortest) path between and in passes through . Thus, using the triangle inequality, the length of a -hop path between and via can be bounded by
Lemma 5.8.
Let be a tree metric over points with spread , and let , and be parameters. Then, one can build a -reliable -spanner for of size
Proof:
By Lemma 4.11, one can build a -cover of of depth and size . Plugging this into Lemma 5.2 (A) yields a deterministic -reliable -spanner for , of size
To get the improved bound on the dilation, consider a -hop path , such that , for all , for some cluster . We have
for the length of the path. Thus, by using for the cover quality, we get
5.3.4 Planar graphs
Lemma 5.9.
Let be a weighted planar graph with vertices and spread . Furthermore, let be parameters. Then, one can build an oblivious -reliable -spanner for with edges, where .
Proof:
By Theorem 4.17, one can build a -cover of of depth and size . Plugging this into Lemma 5.1 yields an oblivious -reliable -hop -spanner for , of size
We next show the improved bound on the dilation. Using the notation from Lemma 4.15, for a pair of points , there is a cluster , such that and . Let be the point where the cycle separator and the shortest path between and intersect. Notice, that for the center point we have , for all . Furthermore, using the notation from the proof of Lemma 4.15, for some , we have
Thus, the length of a -hop path between and via can be bounded by
Lemma 5.10.
Let be a weighted planar graph with vertices and spread . Furthermore, let and be parameters. Then, one can build a deterministic -reliable -spanner for of size
Proof:
Let . By Theorem 4.17, one can build a -cover of with depth and size . Plugging this into Lemma 5.2 (A) yields a deterministic -reliable -spanner for , of size
6 Proper expanders as reliable spanners for uniform metric
The purpose of this section is to prove that with the appropriate parameters, proper expanders (as defined in Definition 3.4) and edge-union of proper expanders constitute good reliable spanners for uniform metrics. That is, they satisfy the requirements of Theorem 3.6.
6.1 Preliminaries
In the following, -graph denotes a -regular, -vertex graph. Recall that denotes the normalized eigenvalue of – that is, the second largest in absolute value (see Definition 3.4).
For a given graph and , denote by the neighbors of in . For , denote .
The following is well known result on expanders, attributed to Alon and Chung [AC88] in [HLW06, Sec. 2.4].
Lemma 6.1 (Expander mixing lemma).
Let be an graph. Then for every ,
(6.1) |
We also need the following lemma which is a minor variant of known constructions.
Lemma 6.2 ([BHO19]).
Let be two disjoint sets, with a total of elements, and let be a parameter. There exists a bipartite graph with edges, such that
-
(I)
for any subset , with , we have that , and
-
(II)
for any subset , with , we have that .
Remark 6.3.
The randomized construction of Lemma 6.2 succeeds with probability . Since we use the construction below on sets that are polynomially large (i.e., ), one can use Lemma 6.2 constructively in this case (potentially losing an additional factor). This also applies to the other expander constructions used in this paper. But while the randomized construction works with high probability, verifying it seems computationally intractable.
6.2 Construction of reliable spanners from proper expanders
Theorem 3.6 states the existence two different spanners and accordingly, we present two different graphs, and .
We begin with . Recall the definition of proper expander (Definition 3.4) with parameter . Fix , , and such that
(6.2) |
The graph is defined to be an -graph that is a proper expander with , and
(6.3) |
To define we follow an idea we used slightly inferior construction in a preliminary version of this paper, see [HMO21, Section 3.3.1]: Let . Partition the space to subsets, , each of size , and let . For every construct a copy of the graph with being the vertices. The degree in those graphs is .
In addition, for every connect with with a bipartite expander according to Lemma 6.2, with . This increases the degree by . Thus, the total degree of is .
6.3 Analysis of
For the rest of Section 6.3, let , and .
6.3.1 The shadow of a bad set
Let an arbitrary subset, such that (otherwise, we can choose and there is nothing to prove). Choose
(6.4) |
so (recalling that , and )
(6.5) |
Define the “shadows of ” as follows. Let , and for let
(6.6) |
These are all the “bad” vertices that have a lot of neighbors inside the (growing) bad set . Lastly, set the limit of , and .
6.3.2 Bounding the size of the shadow
By the construction above of the damaged set , for every ,
(6.7) |
Claim 6.4.
.
Proof:
The argument we use is similar to the one used in the proof of [BLMN05, Lemma 5.3]. Let . We have that
This implies that Squaring, and dividing by , we have
which implies, for , that
We claim that for every . Indeed, otherwise let the smallest index such that . So . By definition, see Eq. (6.4), we have that and as such
We thus have that
which is a contradiction.
6.3.3 The expansion happens outside the bad set
Claim 6.5.
Let . If then .
Let
the ball of radius around in the shortest path metric of the graph . Define , and . Observe that .
Claim 6.6.
.
Proof:
We summarize the relevant properties of .
Lemma 6.7.
The graph has the following properties. For any , there exists a set , , , such that for any , we have
(6.8) | ||||
(6.9) | ||||
(6.10) |
Proof:
Recall that when , we can take and there is nothing to prove. So assume from now on that .
When , is the complete graph, and we take . Eq. (6.8) is equiavlent to ; Eq. (6.9) follows since in complete graph; and Eq. (6.10) follows simply because .
Proposition 6.8.
The graph is a -reliable -spanner for -point uniform space with edges.
Proof:
Fix . By Eq. (6.9),
So,
We conclude that , which means that there is a path of length at most in between and .
6.3.4 Proof of Theorem 3.10
Restatement of Theorem 3.10. For every there exists a constant , such that for any expansion constant , there exists a family of vertex expander graphs on vertices of degree at most , with the following resiliency property: For any , there exists , such that the graph is a vertex expander in the sense that
-
(i)
, and
-
(ii)
For any of size , we have .
Proof:
The graphs are simply for . The claims follow immediately from Claim 6.5 and Proposition 6.8.
6.4 Analysis of
Proposition 6.9.
The graph is -reliable -spanner for -point uniform space with edges.
Proof:
Recall the definition of from Section 6.2. Let , and . Given an attack set , construct from according to Lemma 6.7, and define . Fix . If then by Proposition 6.8, there is a path between them.
If , , . Then by Eq. (6.10), , and . By Lemma 6.2, there is an edge in between and . and hence a path of length in .
7 Concluding remarks and open problems
Subsequent work
Recently Filtser and Le [FL21] improved some of the results here. They obtained bounds that do not depend on the spread of the metrics in some cases, for the oblivious adversary case. They also obtained reliable spanners (in the oblivious adversary model) for trees with tight stretch of and for planar graphs with tight stretch of .
Tradeoffs in deterministic constructions for general spaces
Classical spanners are known to have an approximation–size trade-off for general -point metrics: To achieve approximation it is sufficient and necessary to have edges in the worst case. In contrast, for reliable spanners we were only able to show an upper bound on the trade-off, with no asymptotically matching lower bound: To achieve approximation it is sufficient to have edges. Classically, the uniform metric is -approximated by a star graph with only edges. In contrast, we have shown here reliable spanners for uniform metric have approximation–size trade similar to the classical spanner for general metrics. The connection between the two problems is quite intriguing, and is worthy of further research.
The dependence of the size on the spread
The size of spanners constructed in this paper depends on the spread of the metric space. This is because of the reduction to uniform spaces via covers, in which the dependence on the spread is unavoidable in general. However, in some setting this dependence is avoidable. For example [BHO19, BHO20] achieves this for fixed dimensional Euclidean spaces, and [FL21] achieves it for doubling spaces, and general finite spaces in the oblivious adversary model. Getting spread-free bounds for the non-oblivious adversary is an interesting problem for further research.
Explicit constructions
Acknowledgments
The authors thank Kevin Buchin for useful discussions and references, and the anonymous referees for their suggestions.
References
- [AC88] N. Alon and F. R. K. Chung. Explicit construction of linear sized tolerant networks. In Proceedings of the First Japan Conference on Graph Theory and Applications (Hakone, 1986), volume 72, pages 15–19, 1988.
- [AG06] Ittai Abraham and Cyril Gavoille. Object location using path separators. In Eric Ruppert and Dahlia Malkhi, editors, Proc. 25th ACM Sympos. Prin. Dist. Comput., pages 188–197, New York, NY, USA, 2006. ACM.
- [AGG+19] Ittai Abraham, Cyril Gavoille, Anupam Gupta, Ofer Neiman, and Kunal Talwar. Cops, robbers, and threatening skeletons: padded decomposition for minor-free graphs. SIAM J. Comput., 48(3):1120–1145, 2019.
- [AGMW10] Ittai Abraham, Cyril Gavoille, Dahlia Malkhi, and Udi Wieder. Strong-diameter decompositions of minor free graphs. Theory Comput. Syst., 47(4):837–855, 2010.
- [AP90] Baruch Awerbuch and David Peleg. Sparse partitions. In Proc. 31st Annu. IEEE Sympos. Found. Comput. Sci. (FOCS), pages 503–513, USA, 1990. IEEE Computer Society.
- [Bar98] Y. Bartal. On approximating arbitrary metrics by tree metrics. In Proc. 30th Annu. ACM Sympos. Theory Comput. (STOC), pages 161–168, New York, NY, USA, 1998. ACM.
- [BCDM18] P. Bose, P. Carmi, V. Dujmovic, and P. Morin. Near-optimal O(k)-robust geometric spanners. CoRR, abs/1812.09913, 2018.
- [BDMS13] P. Bose, V. Dujmović, P. Morin, and M. Smid. Robust geometric spanners. SIAM Journal on Computing, 42(4):1720–1736, 2013.
- [BDPW18] Greg Bodwin, Michael Dinitz, Merav Parter, and Virginia Vassilevska Williams. Optimal Vertex Fault Tolerant Spanners (for fixed stretch), pages 1884–1900. SIAM, 3600 University City Science Center, Philadelphia, PA, USA, 2018.
- [BHO19] Kevin Buchin, Sariel Har-Peled, and Dániel Oláh. A spanner for the day after. In Gill Barequet and Yusu Wang, editors, Proc. 35th Int. Annu. Sympos. Comput. Geom. (SoCG), volume 129 of LIPIcs, pages 19:1–19:15, internet, 2019. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik.
- [BHO20] Kevin Buchin, Sariel Har-Peled, and Dániel Oláh. Sometimes reliable spanners of almost linear size. In Fabrizio Grandoni, Grzegorz Herman, and Peter Sanders, editors, Proc. 29th Annu. Euro. Sympos. Alg. (ESA), volume 173 of LIPIcs, pages 27:1–27:15, internet, 2020. Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
- [BLMN05] Yair Bartal, Nathan Linial, Manor Mendel, and Assaf Naor. On metric Ramsey-type phenomena. Ann. of Math. (2), 162(2):643–709, 2005.
- [BLT14] Costas Busch, Ryan LaFortune, and Srikanta Tirthapura. Sparse covers for planar graphs and graphs that exclude a fixed minor. Algorithmica, 69(3):658–684, 2014.
- [CLNS15] T.-H. H. Chan, M. Li, L. Ning, and S. Solomon. New doubling spanners: Better and simpler. SIAM Journal on Computing, 44(1):37–53, 2015.
- [DJPP13] Ioana Dumitriu, Tobias Johnson, Soumik Pal, and Elliot Paquette. Functional limit theorems for random regular graphs. Probab. Theory Related Fields, 156(3-4):921–975, 2013.
- [FKS89] Joel Friedman, Jeff Kahn, and Endre Szemerédi. On the second eigenvalue in random regular graphs. In David S. Johnson, editor, Proceedings of the 21st Annual ACM Symposium on Theory of Computing, May 14-17, 1989, Seattle, Washigton, USA, pages 587–598, New York, NY, USA, 1989. ACM.
- [FL21] Arnold Filtser and Hung Le. Reliable spanners: Locality-sensitive orderings strike back. Arxiv CoRR, abs/2101.07428, 2021.
- [Fri03] Joel Friedman. A proof of alon’s second eigenvalue conjecture. In Lawrence L. Larmore and Michel X. Goemans, editors, Proc. 35th Annu. ACM Sympos. Theory Comput. (STOC), pages 720–724, New York, NY, USA, 2003. ACM.
- [FRT04] J. Fakcharoenphol, S. Rao, and K. Talwar. A tight bound on approximating arbitrary metrics by tree metrics. J. Comput. Sys. Sci., 69(3):485–497, 2004.
- [HLW06] Shlomo Hoory, Nathan Linial, and Avi Wigderson. Expander graphs and their applications. Bull. Amer. Math. Soc. (N.S.), 43(4):439–561, 2006.
- [HMO21] Sariel Har-Peled, Manor Mendel, and Dániel Oláh. Reliable spanners for metric spaces. In Kevin Buchin and Éric Colin de Verdière, editors, Proc. 37th Int. Annu. Sympos. Comput. Geom. (SoCG), volume 189 of LIPIcs, pages 43:1–43:13, internet, 2021. Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
- [KLMN05] R. Krauthgamer, J. R. Lee, M. Mendel, and A. Naor. Measured descent: A new embedding method for finite metric spaces. Geom. funct. anal. (GAFA), 15(4):839–858, 2005.
- [LNS98] Christos Levcopoulos, Giri Narasimhan, and Michiel H. M. Smid. Efficient algorithms for constructing fault-tolerant geometric spanners. In Jeffrey Scott Vitter, editor, Proc. 30th Annu. ACM Sympos. Theory Comput. (STOC), pages 186–195, New York, NY, USA, 1998. ACM.
- [LNS02] C. Levcopoulos, G. Narasimhan, and M. Smid. Improved algorithms for constructing fault-tolerant spanners. Algorithmica, 32(1):144–156, 2002.
- [LT79] R. J. Lipton and R. E. Tarjan. A separator theorem for planar graphs. SIAM Journal on Applied Mathematics, 36(2):177–189, 1979.
- [Luk99] T. Lukovszki. New results of fault tolerant geometric spanners. In Proc. 6th Int. Workshop Alg. and Data Struct., pages 193–204, Berlin, Heidelberg, 1999. Springer-Verlag.
- [MN07] M. Mendel and A. Naor. Ramsey partitions and proximity data structures. J. Euro. Math. Soc., 009(2):253–275, 2007.
- [NS07] G. Narasimhan and M. Smid. Geometric spanner networks. Cambridge University Press, New York, NY, USA, 2007.
- [Pel00] D. Peleg. Distributed Computing: A Locality-Sensitive Approach. SIAM, 3600 University City Science Center, Philadelphia, PA, USA, 2000.
- [PS89] D. Peleg and A. Schäffer. Graph spanners. J. Graph Theory, 13:99–116, 1989.
- [Pud15] Doron Puder. Expansion of random graphs: new proofs, new results. Invent. Math., 201(3):845–908, 2015.
- [Sol14] S. Solomon. From hierarchical partitions to hierarchical covers: Optimal fault-tolerant spanners for doubling metrics. In Proceedings of the 46th ACM Symposium on Theory of Computing, STOC ’14, page 363–372, New York, NY, USA, 2014. ACM.
- [Wor99] N. C. Wormald. Models of random regular graphs. In Surveys in combinatorics, 1999 (Canterbury), volume 267 of London Math. Soc. Lecture Note Ser., pages 239–298. Cambridge Univ. Press, Cambridge, UK, 1999.
Appendix A Random regular graphs
In Theorem 3.5 above we prove that random construction using a union of random permutations yields a proper expander, see Definition 3.4. The properties are well known and are held by random regular graphs asymptotically almost surely. However, the literature on random regular graphs is more concerned with the setting of constant and tends to infinity, especially regarding Property (P3)). Here we need a slightly different range, where is sufficiently large, and . For completeness, we gather here proofs and references that prove Theorem 3.5.
A.1 Construction
We use the permutation model for constructing random regular graph (see [Wor99] for other models). Assuming is even, sample independent and identically distributed random permutations , where is the set of all permutations of . The resulting graph , has and
A.2 Analysis
A.2.1 Property (P3)
All the proofs that random -regular graphs have second eigenvalue at most (that we are aware of) are non-trivial. It was first proved in [FKS89], and by now there are many proofs of this. Notably, Friedman [Fri03] showed that random regular graphs are “almost Ramanujan”, i.e., with probability , see also [Pud15] for a recent and simpler proof. Unfortunately, most of those papers are interested in the settings where the degree is constant and only the number of vertices , which is not suitable for our needs. However, the argument of Kahn and Szemerédi [FKS89] does work when is allowed to tend to infinity (together with ). Specifically, Dumitiriu et al. [DJPP13] used it to prove the following.
Theorem A.1 ([DJPP13, Theorem 24]).
Fix . There exists such that for any even and , we have where is the probability in the permutation model .
This implies (P3) holds a.a.s. in the permutation model. Properties (P1) and (P2) are much easier to prove and are considered folklore. They are usually proved in different, more convenient, models of random regular graphs. However, contrary to the case when the degree is fixed, in the high-degree regime the different random models are not necessarily contiguous, i.e., asymptotically almost surely properties are not necessarily equivalent among the different models (for more on this, see [Wor99]). Therefore, for completeness, we next provide proofs that Properties (P1) and (P2) hold asymptotically almost surely in the permutation model.
A.2.2 Property (P1)
Lemma A.2.
For integers , such that , we have
Similarly, if and , we have
Proof:
Observe that for , we have
as . As such, using the (easy to verify) identity we have
Lemma A.3.
Fix sets , with and , such that . Then
Proof:
Fix of cardinality . Then By the union bound, and Lemma A.2, we have
Let be the permutations used in the construction. We have that
Lemma A.4.
Fix . If is an integer. Then, asymptotically almost surely over the random -graph , for any with , we have . That is, property (P1) of Definition 3.4 holds.
Proof:
Using the union bound on the bound established in Lemma A.3 we conclude that the probability that there exists a subset of size , such that , is at most
since , as easy calculation shows111Indeed, for , we have . Setting , implies . Namely, the maximum of is achieved at , where ..
A.2.3 Property (P2)
The argument above used only the forward edges associated with the random permutations. Since there are only such edges associated with every vertex, that argument can not prove vertex-expansion close to as is stated in (P2). For this we have to also use the backward edges associated with the permutation as well. Since the backward edges and the forward edges associated with the same random permutation are not stochastically independent, more care is needed to prove this property, as we shall now see.
Claim A.5.
Fix such that . Then
Proof:
Fix , of cardinality . Observe that
Fix . For any , let be the event that . The events induced by , that is are not independent, but they are non-positively correlated. Indeed, for a set consider the event . For we have,
Indeed, observe that all the sub-events in involving , are irrelevant (that is, stochastically independent of the events ). As such, let . Imagine now picking the permutation by first picking the locations of the elements of , and then choosing the location of . Clearly, if the event happened, then there are only empty slots in , and slots available overall. As such, we have that
Now, order the elements of in arbitrary order, and let be the subset with the first elements in that order. We have
Therefore,
since the summations behaves like a geometric series, using Therefore
The last inequality is derived by partitioning the sum on up-to – this part is bounded by The second part of the summation from to be bounded by .
Lemma A.6.
For every , there exists , such that for any sufficiently large integer , and any , asymptotically (in ) almost surely, a random graph have the following vertex expansion property: For any with , we have .
That is, Property (P2) of Definition 3.4 holds.
Proof:
Fix . Define to be the event, that for all subsets of cardinality at most , we have that
By Claim A.5, . So, fix of cardinality . The following stochastic process samples a random bijection on uniformly.
-
(i)
Order the vertices of arbitrarily .
-
(ii)
For , pick uniformly at random from .
-
(iii)
Let . Reorder the elements of as , such that .
-
(iv)
For , pick uniformly at random from .
-
(v)
Denote by the partial injection constructed so far.
-
(vi)
Note that, for , the element is already fixed, and it is in , as such we do nothing.
-
(vii)
Complete to a full permutation by sampling a random bijection
One can sample random regular graph from by applying the above independently times, and constructing random permutations .
We next do for a fixed of cardinality the following thought experiment. In the construction of each of the permutation, we replace step (vi) above with the following step generating a new partial injection into , as follows:
-
(vi′)
For , pick randomly and uniformly from
Denote by that random partial injection. Denote
the set of auxiliary edges associated with the above process for . Denote – it is the result of redirecting all the edges of to be outside the biclique. The graph is randomly generated, but the content of is not measurable in – meaning that the underline probability spaces is more refined than . We denote by a probability space from which one can sample all of . I.e., it contains random permutations that constitute and all the relevant partial injections .
Note that , and therefore depends only on . Furthermore, If , then for every , with cardinality at most , we have that . Hence, conditioned on , for any such ,
(A.1) |
We next bound for a fixed of cardinality , the probability that there exists a subset of cardinality for which . Begin by fixing of cardinality . We claim that
(A.2) |
Indeed, fix of cardinality . Then
Fix of cardinality . Recall that we denoted by the partial injection sampled at the end of step (v) in the sampling process described above. Observe that conditioned on the partial injection is also uniformly random, and therefore
Hence,
which complete the proof of Eq. (A.2).
The probability on that there exists of cardinality at most for which , where is at most the probability that there exists of cardinality for which . By the union bound and Eq. (A.2) this is at most
We bound the summand above by
To bound the above we let , and we do a case analysis according to the value of .
For , we have
For , we have
Summing the above over , we have
So, conditioned on , by Eq. (A.1), we have
Since , we conclude
A.3 Summary
Restatement of Theorem 3.5. The random graph constructed in Section A.1 is a proper expander (see Definition 3.4), asymptotically almost surely. Specifically, the probability the graph has the desired properties is .