Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3350755.3400292acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
research-article

Efficient Local Medium Access

Published: 09 July 2020 Publication History

Abstract

Shah, Shin and Tetali [25] initiated the study of queuing systems on the medium access channel with arbitrary interference graph. The graph models dependencies between the channel members -- any two connected by an edge are dependent. This problem could be also re-stated as a query system with dependent elements or local scheduling of dependent packets/jobs. In short, if two dependent units, also called stations, want to transmit (or be in the same query, or do jobs in parallel), there is a conflict and none of them succeeds. The problem is particularly challenging, if the units need to make their decisions locally, without any coordination. Prior the paper by Shah, Shin and Tetali [FOCS 2011], the main focus was on the clique graph -- even in this simple topology, many problems related to stability remain open. While the solution by Shah, Shin and Tetali [FOCS 2011] is semi-local, as nodes make use of information about interfering neighbors in the graph, we provide the first purely local stable algorithms. In particular, in our algorithms stations make their decision whether to transmit or not based only on looking at their local queues. Based only on this feature, and without using a priori knowledge of topology, we design an algorithm that allows all stations for implicit transferring information to and from all other stations. We use it as a tool for developing universally stable algorithms for the problem of queuing messages -- i.e., guaranteeing bounded queues when, on average, less than one independent set is injected per round. The first one is stable in adversarial (worst-case) sense, the second one -- in stochastic sense (average-case). We also prove optimality of our algorithm in adversarial sense: no algorithm can be stable against injections with rate ρ=1 (when, on average, one independent set is injected per round). Moreover, for the class of non-adaptive protocols, we show that it is not possible to achieve stability for any injection rate Ω(1/log m), where m is the size of the largest clique in the interference graph. We extend the result by showing that such protocols are not stable on some interference graphs with no cliques of size at least 3 even for injection rates Ω(√[3](log n)/n). This result separates the model with general interference graphs from the classical model of a multiple access channel (in which the interference graph is a clique), in which there exist non-adaptive algorithms stable for adversarial injection rates O(1/log2 n).

References

[1]
Norman M. Abramson. 1985. Development of the ALOHANET. IEEE Transactions on Information Theory, Vol. 31, 2 (1985), 119--123.
[2]
L. Anantharamu, Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. 2010. Deterministic Broadcast on Multiple Access Channels. In Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM). 1--5.
[3]
L. Anantharamu, Bogdan S. Chlebus, and Mariusz A. Rokicki. 2009. Adversarial multiple access channel with individual injection rates. In Proceedings of the 13th International Conference on Principles of Distributed Systems (OPODIS) (LNCS 5923). Springer-Verlag, 174--188.
[4]
Matthew Andrews, Baruch Awerbuch, Antonio Fernández, Frank Thomson Leighton, Zhiyong Liu, and Jon M. Kleinberg. 2001. Universal-stability results and performance bounds for greedy contention-resolution protocols. J. ACM, Vol. 48, 1 (2001), 39--69.
[5]
Michael A. Bender, Martin Farach-Colton, Simai He, Bradley C. Kuszmaul, and Charles E. Leiserson. 2005. Adversarial contention resolution for simple channels. In Proceedings of the 17th Annual ACM Symposium on Parallel Algorithms (SPAA). 325--332.
[6]
Marcin Bienkowski, Marek Klonowski, Mirosław Korzeniowski, and Dariusz R. Kowalski. 2010. Dynamic Sharing of a Multiple Access Channel. In Proceedings of the $27$th International Symposium on Theoretical Aspects of Computer Science (STACS). 83--94.
[7]
Allan Borodin, Jon M. Kleinberg, Prabhakar Raghavan, Madhu Sudan, and David P. Williamson. 2001. Adversarial queuing theory. J. ACM, Vol. 48, 1 (2001), 13--38.
[8]
Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. 2009a. Maximum throughput of multiple access channels in adversarial environments. Distributed Computing, Vol. 22, 2 (2009), 93--116.
[9]
Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. 2012. Adversarial Queuing on the Multiple Access Channel. ACM Transactions on Algorithms, Vol. 8, 1, Article 5 (2012), 31 pages.
[10]
Jurek Czyzowicz, Leszek Gkasieniec, Dariusz R. Kowalski, and Andrzej Pelc. 2009. Consensus and Mutual Exclusion in a Multiple Access Channel. In Proceedings of the 23rd International Symposium on Distributed Computing (DISC) (LNCS 5805). Springer-Verlag, 512--526.
[11]
Robert G. Gallager. 1985. A perspective on multiaccess channels. IEEE Transactions on Information Theory, Vol. 31, 2 (1985), 124--142.
[12]
Pawel Garncarek, Tomasz Jurdzinski, and Dariusz R. Kowalski. 2018. Local Queuing Under Contention. In 32nd International Symposium on Distributed Computing, DISC 2018, New Orleans, LA, USA, October 15--19, 2018 (LIPIcs), Ulrich Schmid and Josef Widder (Eds.), Vol. 121. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 28:1--28:18. https://doi.org/10.4230/LIPIcs.DISC.2018.28
[13]
Leslie Ann Goldberg, Mark Jerrum, Sampath Kannan, and Mike Paterson. 2004. A bound on the capacity of backoff and acknowledgment-based protocols. SIAM J. Comput., Vol. 33, 2 (2004), 313--331.
[14]
Leslie Ann Goldberg and Philip D. MacKenzie. 1999. Analysis of Practical Backoff Protocols for Contention Resolution with Multiple Servers. J. Comput. Syst. Sci., Vol. 58, 1 (1999), 232--258. https://doi.org/10.1006/jcss.1998.1590
[15]
Leslie Ann Goldberg, Philip D. MacKenzie, Mike Paterson, and Aravind Srinivasan. 2000. Contention resolution with constant expected delay. J. ACM, Vol. 47, 6 (2000), 1048--1096.
[16]
Albert G. Greenberg and Shmuel Winograd. 1985. A Lower Bound on the Time Needed in the Worst Case to Resolve Conflicts Deterministically in Multiple Access Channels. J. ACM, Vol. 32, 3 (1985), 589--596.
[17]
J. Håstad, F. T. Leighton, and B. Rogoff. 1996. Analysis of Backoff Protocols for Multiple Access Channels. SIAM J. Comput., Vol. 25, 4 (1996), 740--774.
[18]
Libin Jiang and Jean C. Walrand. 2011. Approaching throughput-optimality in distributed CSMA scheduling algorithms with collisions. IEEE/ACM Trans. Netw., Vol. 19, 3 (2011), 816--829. https://doi.org/10.1109/TNET.2010.2089804
[19]
Tomasz Jurdzinski, Miroslaw Kutyłowski, and Jan Zatopia'nski. 2002. Efficient algorithms for leader election in radio networks. In Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC). 51--57.
[20]
János Komlós and Albert G. Greenberg. 1985. An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels. IEEE Transactions on Information Theory, Vol. 31, 2 (1985), 302--306.
[21]
Dariusz R. Kowalski. 2005. On selection problem in radio networks. In Proceedings of the 24th ACM Symposium on Principles of Distributed Computing (PODC). 158--166.
[22]
Eyal Kushilevitz and Yishay Mansour. 1998. An Ω(D log (N/D)) Lower Bound for Broadcast in Radio Networks. SIAM J. Comput., Vol. 27, 3 (1998), 702--712.
[23]
Robert M. Metcalfe and David R. Boggs. 1976. Ethernet: Distributed Packet Switching for Local Computer Networks. Commun. ACM, Vol. 19, 7 (1976), 395--404.
[24]
Prabhakar Raghavan and Eli Upfal. 1998. Stochastic Contention Resolution With Short Delays. SIAM J. Comput., Vol. 28, 2 (1998), 709--719.
[25]
Devavrat Shah, Jinwoo Shin, and Prasad Tetali. 2011. Medium Access Using Queues. In IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, October 22--25, 2011. 698--707. https://doi.org/10.1109/FOCS.2011.99
[26]
Dan E. Willard. 1986. Log-Logarithmic Selection Resolution Protocols in a Multiple Access Channel. SIAM J. Comput., Vol. 15, 2 (1986), 468--477.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPAA '20: Proceedings of the 32nd ACM Symposium on Parallelism in Algorithms and Architectures
July 2020
601 pages
ISBN:9781450369350
DOI:10.1145/3350755
© 2020 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 July 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adversarial packet arrivals
  2. deterministic algorithms
  3. distributed algorithms
  4. local queuing
  5. multiple-access channel
  6. shared channel
  7. stability

Qualifiers

  • Research-article

Funding Sources

Conference

SPAA '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 447 of 1,461 submissions, 31%

Upcoming Conference

SPAA '25
37th ACM Symposium on Parallelism in Algorithms and Architectures
July 28 - August 1, 2025
Portland , OR , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media