Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1073970.1074023acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
Article

Adversarial contention resolution for simple channels

Published: 18 July 2005 Publication History

Abstract

This paper analyzes the worst-case performance of randomized backoff on simple multiple-access channels. Most previous analysis of backoff has assumed a statistical arrival model.For batched arrivals, in which all n packets arrive at time 0, we show the following tight high-probability bounds. Randomized binary exponential backoff has makespan Θ(nlgn), and more generally, for any constant r, r-exponential backoff has makespan Θ(nloglgr n). Quadratic backoff has makespan Θ((n/lg n)3/2), and more generally, for r>1, r-polynomial backoff has makespan Θ((n/lg n)1+1/r). Thus, for batched inputs, both exponential and polynomial backoff are highly sensitive to backoff constants. We exhibit a monotone superpolynomial subexponential backoff algorithm, called loglog-iterated backoff, that achieves makespan Θ(nlglg n/lglglg n). We provide a matching lower bound showing that this strategy is optimal among all monotone backoff algorithms. Of independent interest is that this lower bound was proved with a delay sequence argument.In the adversarial-queuing model, we present the following stability and instability results for exponential backoff and loglog-iterated backoff. Given a (λ,T)-stream, in which at most nT packets arrive in any interval of size T, exponential backoff is stable for arrival rates of λ=O(1/lgn) and unstable for arrival rates of λ=Ω(lglgn/lgn); loglog-iterated backoff is stable for arrival rates of λ=O(1/(lglgn\lgn)) and unstable for arrival rates of λ=Ω(1/lgn). Our instability results show that bursty input is close to being worst-case for exponential backoff and variants and that even small bursts can create instabilities in the channel.

References

[1]
N. Abramson. The ALOHA system -- another alternative for computer communications. In Proc. of AFIPS FJCC, vol. 37, pp. 281--285, 1970.]]
[2]
A. Agarwal, M. Cherian. Adaptive backoff synchronization techniques. In ISCA'89, pp. 396--406, 1989.]]
[3]
D. J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Trans. on Inform. Theory, IT-33(2):219--223, 1987.]]
[4]
D. J. Bernstein. qmail -- an email message transfer agent. http://cr.yp.to/qmail.html, 1998.]]
[5]
A. Borodin, J. Kleinberg, P. Raghavan, M. Sudan, D. P. Williamson. Adversarial queuing theory. J. ACM, 48(1):13--38, 2001.]]
[6]
B. Costales, E. Allman. Sendmail. O'Reilly, third ed., 2002.]]
[7]
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee. Hypertext transfer protocol - http/1.1. Internet RFC 2616, 1999.]]
[8]
K. Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, second ed., 2003. E-book at books24x7.com.]]
[9]
M. Geréb-Graus, T. Tsantilas. Efficient optical communication in parallel computers. In SPAA'92, pp. 41--48, 1992.]]
[10]
L. A. Goldberg. Notes on contention resolution. http://www.dcs.warwick.ac.uk/~leslie/contention.html, viewed Oct. 2003.]]
[11]
L. A. Goldberg, M. Jerrum, T. Leighton, S. Rao. Doubly logarithmic communication algorithms for optical-communication parallel computers. SIAM J. Comput., 26(4):1100--1119, 1997.]]
[12]
L. A. Goldberg, P. D. MacKenzie. Analysis of practical backoff protocols for contention resolution with multiple servers. In SODA'96, pp. 554--563, 1996.]]
[13]
L. A. Goldberg, P. D. MacKenzie, M. Paterson, A. Srinivasan. Contention resolution with constant expected delay. J. ACM, 47(6):1048--1096, 2000.]]
[14]
L. A. Goldberg, Y. Matias, S. Rao. An optical simulation of shared memory. SIAM J. Comput., 28(5):1829--1847, 1999.]]
[15]
J. Goodman, A. G. Greenberg, N. Madras, P. March. Stability of binary exponential backoff. J. ACM, 35(3):579--602, 1988.]]
[16]
A. G. Greenberg, P. Flajolet, R. E. Ladner. Estimating the multiplicities of conflicts to speed their resolution in multiple access channels. J. ACM, 34(2):289--325, 1987.]]
[17]
A. G. Greenberg, S. Winograd. A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels. J. ACM, 32(3):589--596, 1985.]]
[18]
R. I. Greenberg, C. E. Leiserson. Randomized routing on fattrees. Advances in Computing Research, 5:345--374, 1989.]]
[19]
R. Gusella. A measurement study of diskless workstation traffic on an ethernet. IEEE Trans. on Commun., 38(9):1557--1568, 1990.]]
[20]
J. Hastad, T. Leighton, B. Rogoff. Analysis of backoff protocols for multiple access channels. In STOC'87, pp. 241--253, 1987.]]
[21]
M. Herlihy. A methodology for implementing highly concurrent data objects. ACM Trans. Prog. Lang. Syst., 15(5):745--770, 1993.]]
[22]
M. Herlihy, J. E. B. Moss. Transactional memory: Architectural support for lock-free data structures. In ISCA'93, pp. 289--300, 1993.]]
[23]
M. P. Herlihy, V. Luchangco, M. Moir. Obstruction-free synchronization: Double-ended queues as an example. In ICDCS 2003, pp. 522--529, 2003.]]
[24]
M. P. Herlihy, V. Luchangco, M. Moir, W. M. Scherer III. Software transactional memory for dynamic-sized data structures. In PODC 2003, pp. 92--101, 2003.]]
[25]
IEEE 802.11 Working Group. ANSI/IEEE Std. 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society, 1999.]]
[26]
A. Juels, R. L. Rivest, M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In Conference on Computer and Communications Security, pp. 103--111, 2003.]]
[27]
R. M. Karp, M. Luby, F. Meyer auf der Heide. Efficient PRAM simulation on a distributed memory machine. In STOC'92, pp. 318--326, 1992.]]
[28]
P. Kumar, L. Merakos. Distributed control of broadcast channels with acknowledgement feedback: Stability and performance. In CDC'84, 1984.]]
[29]
W. E. Leland, M. S. Taqqu, W. Willinger, D. V. Wilson. On the self-similar nature of ethernet traffic. Comput. Commun. Rev., 23(4), 1993.]]
[30]
P. D. MacKenzie, C. G. Plaxton, R. Rajaraman. On contention resolution protocols and associated probabilistic phenomena. J. ACM, 45(2):324--378, 1998.]]
[31]
R. M. Metcalfe, D. R. Boggs. Ethernet: Distributed packet switching for local computer networks. CACM, 19(7):395--404, 1976.]]
[32]
R. Motwani, P. Raghavan. Randomized Algorithms. Cambridge University Press, Cambridge, England, 1995.]]
[33]
F. M. Pittelli, H. Garcia-Molina. Reliable scheduling in a TMR database system. ACM Trans. Comput. Syst., 7(1):25--60, 1989.]]
[34]
J. Postel. Transmission control protocol. Internet RFC 793, 1981.]]
[35]
P. Raghavan, E. Upfal. Stochastic contention resolution with short delays. SIAM J. Comput., 28(2):709--719, 1999.]]
[36]
R. Rajwar, J. R. Goodman. Transactional lock-free execution of lock-based programs. In ASPLOS-X, pp. 5--17, 2002.]]
[37]
A. G. Ranade. How to emulate shared memory. J. Comput. and Syst. Sciences, 42(3):307--326, 1991.]]
[38]
A. G. Ranade. The delay sequence argument. In Handbook of Randomized Algorithms, chapter 1. Kluwer Academic Publishers, 2001.]]
[39]
S. Sarma. Towards the five-cent tag. Tech Report MIT-AUTOID-WH-006, MIT Auto-ID Center, 2001. http://www.autoidlabs.org/whitepapers/MIT-AUTOID-WH-006.pdf.]]
[40]
Sleepycat Software. The Berkeley Database version 2. http://sleepycat.com, 1997.]]
[41]
Sun Microsystems. RPC: Remote procedure call protocol specification version 2. Internet RFC 1057, 1988.]]
[42]
Y. T'Joens, C. Hublet, P. De Schrijver. DHCP reconfiguration extension. Internet RFC 3203, 2001.]]
[43]
D. E. Willard. Log-logarithmic protocols for resolving ethernet and semaphore conflicts. In STOC'84, pp. 512--521, 1984.]]
[44]
Wiseband. Intelligent amplifiers. http://www.wiseband.com/Intelligent_amplifiers.pdf (viewed October 2003), 2002.]]

Cited By

View all
  • (2024)Stable Blockchain Sharding under Adversarial Transaction GenerationProceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3626183.3659970(451-461)Online publication date: 17-Jun-2024
  • (2024)Softening the Impact of Collisions in Contention ResolutionStabilization, Safety, and Security of Distributed Systems10.1007/978-3-031-74498-3_29(398-416)Online publication date: 20-Oct-2024
  • (2023)Adversarial contention resolution gamesProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/289(2598-2606)Online publication date: 19-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SPAA '05: Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
July 2005
346 pages
ISBN:1581139861
DOI:10.1145/1073970
  • General Chair:
  • Phil Gibbons,
  • Program Chair:
  • Paul Spirakis
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. batch
  2. exponential backoff
  3. on-line
  4. polynomial backoff
  5. worst-case backoff performance

Qualifiers

  • Article

Conference

SPAA05

Acceptance Rates

Overall Acceptance Rate 447 of 1,461 submissions, 31%

Upcoming Conference

SPAA '25
37th ACM Symposium on Parallelism in Algorithms and Architectures
July 28 - August 1, 2025
Portland , OR , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)3
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Stable Blockchain Sharding under Adversarial Transaction GenerationProceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3626183.3659970(451-461)Online publication date: 17-Jun-2024
  • (2024)Softening the Impact of Collisions in Contention ResolutionStabilization, Safety, and Security of Distributed Systems10.1007/978-3-031-74498-3_29(398-416)Online publication date: 20-Oct-2024
  • (2023)Adversarial contention resolution gamesProceedings of the Thirty-Second International Joint Conference on Artificial Intelligence10.24963/ijcai.2023/289(2598-2606)Online publication date: 19-Aug-2023
  • (2023)Near-Optimal Time–Energy Tradeoffs for Deterministic Leader ElectionACM Transactions on Algorithms10.1145/361442919:4(1-23)Online publication date: 26-Sep-2023
  • (2023)SplitZNS: Towards an Efficient LSM-Tree on Zoned Namespace SSDsACM Transactions on Architecture and Code Optimization10.1145/360847620:3(1-26)Online publication date: 7-Aug-2023
  • (2023)Deterministic non-adaptive contention resolution on a shared channelJournal of Computer and System Sciences10.1016/j.jcss.2022.11.001133(1-22)Online publication date: May-2023
  • (2023)The canonical amoebot model: algorithms and concurrency controlDistributed Computing10.1007/s00446-023-00443-336:2(159-192)Online publication date: 17-Feb-2023
  • (2023)Dynamic Multiple-Message Broadcast: Bounding Throughput in the Affectance ModelTheory of Computing Systems10.1007/s00224-023-10131-167:4(825-854)Online publication date: 10-Jul-2023
  • (2023)Stable Scheduling in Transactional MemoryAlgorithms and Complexity10.1007/978-3-031-30448-4_13(172-186)Online publication date: 25-Apr-2023
  • (2022)Robust and Optimal Contention Resolution without Collision DetectionProceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3490148.3538592(107-118)Online publication date: 11-Jul-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media