RMT and SMT problem can be studied in various network models and adversarial settings. We may use the following parameters to describe different settings/models for studying RMT/SMT:
\begin{enumerate}
\item Type of Underlying Network --- Undirected Graph, Directed Graph, Hypergraph.
\item Type of Communication --- Synchronous, Asynchronous.
\item Adversary capacity --- Threshold Static, Threshold Mobile, Non-threshold Static, Non-threshold Mobile.
\item Type of Faults --- Fail-stop, Passive, Byzantine, Mixed.
\end{enumerate}
Irrespective of the settings in which RMT/SMT is studied, the following issues are common:
\begin{enumerate}
\item Possibility: What are the necessary and sufficient structural conditions to be satisfied by the underlying network for the existence of any RMT/SMT protocol, tolerating a given type of adversary?
\item Feasibility: Once the existence of a RMT/SMT protocol in a network is ascertained, the next natural question is, does there exist an efficient protocol on the given network?
\item Optimality: Given a message of specific length, what is the minimum communication complexity (lower bound) needed by any RMT/SMT protocol to transmit the message and how to design a polynomial time RMT/SMT protocol whose total communication complexity matches the lower bound on the communication complexity (optimal protocol)?
\end{enumerate}
In this dissertation, we look into the above issues in several network models and adversarial settings. This thesis reports several new/improved/efficient/optimal solutions, gives affirmative/negative answers to several significant open problems and last but not the least, provides first solutions to several newly formulated problems.
Category / Keywords: foundations / Date: received 11 May 2010 Contact author: partho_31 at yahoo co in Available format(s): PDF | BibTeX Citation Version: 20100512:225542 (All versions of this report) Short URL: ia.cr/2010/281 Discussion forum: Show discussion | Start new discussion