Skip to main content

Optimal Protocols for 2-Party Contention Resolution

  • Conference paper
  • First Online:
Stabilization, Safety, and Security of Distributed Systems (SSS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 13046))

  • 597 Accesses

Abstract

Contention Resolution is a fundamental symmetry-breaking problem in which n devices must acquire temporary and exclusive access to some shared resource, without the assistance of a mediating authority. For example, the n devices may be sensors that each need to transmit a single packet of data over a broadcast channel. In each time step, devices can (probabilistically) choose to acquire the resource or remain idle; if exactly one device attempts to acquire it, it succeeds, and if two or more devices make an attempt, none succeeds. The complexity of the problem depends heavily on what types of collision detection are available. In this paper we consider acknowledgement-based protocols, in which devices only learn whether their own attempt succeeded or failed; they receive no other feedback from the environment whatsoever, i.e., whether other devices attempted to acquire the resource, succeeded, or failed.

Nearly all work on the Contention Resolution problem evaluated the performance of algorithms asymptotically, as \(n\rightarrow \infty \). In this work we focus on the simplest case of \(n=2\) devices, but look for precisely optimal algorithms. We design provably optimal algorithms under three natural cost metrics: minimizing the expected average of the waiting times (avg), the expected waiting time until the first device acquires the resource (min), and the expected time until the last device acquires the resource (max). We first prove that the optimal algorithms for \(n=2\) are periodic in a certain sense, and therefore have finite descriptions, then we design optimal algorithms under all three objectives.

  • avg. The optimal contention resolution algorithm under the avg objective has expected cost \(\sqrt{3/2} + 3/2 \approx 2.72474\).

  • min. The optimal contention resolution algorithm under the min objective has expected cost 2. (This result can be proved in an ad hoc fashion, and may be considered folklore.)

  • max. The optimal contention resolution algorithm under the max objective has expected cost \(1/\gamma \approx 3.33641\), where \(\gamma \approx 0.299723\) is the smallest root of \(3x^3 - 12x^2 + 10x -2\) (We may also express \(\gamma \) in radical form: \(\gamma = -\frac{1}{6} \left( 1-i \sqrt{3}\right) \root 3 \of {13+i \sqrt{47}}+\frac{4}{3}-\frac{1+i \sqrt{3}}{\root 3 \of {13+i \sqrt{47}}}\).).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    For a humorous example, consider the Canadian Standoff problem https://www.cartoonstock.com/cartoonview.asp?catref=CC137954.

  2. 2.

    The full version is available at http://www.ancientwang.com/document/Optimal_Protocols_for_2_Party_Contention_Resolution%20(1).pdf.

  3. 3.

    A policy may have no finite representation, and therefore may not be an algorithm in the usual sense.

  4. 4.

    We use the convention that \(\prod _{i=0}^{-1}a_k=1\), where \((a_k)_{k=0}^\infty \) is any sequence.

References

  1. Abramson, N.: The ALOHA system: another alternative for computer communications. In: Proceedings of the November 17–19, 1970, Fall Joint Computer Conference, pp. 281–285. ACM (1970)

    Google Scholar 

  2. Aldous, D.J.: Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Trans. Inf. Theory 33(2), 219–223 (1987). https://doi.org/10.1109/TIT.1987.1057295

    Article  MATH  Google Scholar 

  3. Awerbuch, B., Richa, A.W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 45–54 (2008). https://doi.org/10.1145/1400751.1400759

  4. Bar-Yehuda, R., Goldreich, O., Itai, A.: On the time-complexity of broadcast in multi-hop radio networks: an exponential gap between determinism and randomization. J. Comput. Syst. Sci. 45(1), 104–126 (1992)

    Article  MathSciNet  Google Scholar 

  5. Bender, M., Kopelowitz, T., Pettie, S., Young, M.: Contention resolution with constant throughput and log-logstar channel accesses. SIAM J. Comput. 47(5), 1735–1754 (2018). https://doi.org/10.1137/17M1158604

    Article  MathSciNet  MATH  Google Scholar 

  6. Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial analyses of window backoff strategies. In: Proceedings 18th International Parallel and Distributed Processing Symposium (IPDPS) (2004). https://doi.org/10.1109/IPDPS.2004.1303230, https://doi.org/10.1109/IPDPS.2004.1303230

  7. Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 325–332 (2005). https://doi.org/10.1145/1073970.1074023

  8. Bender, M.A., Fineman, J.T., Gilbert, S., Young, M.: Scaling exponential backoff: constant throughput, polylogarithmic channel-access attempts, and robustness. J. ACM 66(1), 6:1–6:33 (2019)

    Google Scholar 

  9. Capetanakis, J.: Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory 25(5), 505–515 (1979). https://doi.org/10.1109/TIT.1979.1056093

    Article  MathSciNet  MATH  Google Scholar 

  10. Chang, Y., Jin, W., Pettie, S.: Simple contention resolution via multiplicative weight updates. In: Proceedings 2nd Symposium on Simplicity in Algorithms (SOSA), pp. 16:1–16:16 (2019). https://doi.org/10.4230/OASIcs.SOSA.2019.16

  11. Chang, Y., Kopelowitz, T., Pettie, S., Wang, R., Zhan, W.: Exponential separations in the energy complexity of leader election. In: Proceedings 49th Annual ACM Symposium on Theory of Computing (STOC), pp. 771–783 (2017). https://doi.org/10.1145/3055399.3055481, http://doi.acm.org/10.1145/3055399.3055481

  12. Gallager, R.G.: Conflict resolution in random access broadcast networks. In: Proceedings AFOSR Workshop on Communications Theory Applications, Provincetown, MA, 17–20 September, pp. 74–76 (1978)

    Google Scholar 

  13. Jacobson, V.: Congestion avoidance and control. ACM SIGCOMM Comput. Commun. Rev. 18, 314–329. ACM (1988)

    Google Scholar 

  14. Kwak, B.J., Song, N.O., Miller, L.E.: Performance analysis of exponential backoff. IEEE/ACM Trans. Netw. (TON) 13(2), 343–355 (2005)

    Article  Google Scholar 

  15. Metcalfe, R.M., Boggs, D.R.: Ethernet: distributed packet switching for local computer networks. Commun. ACM 19(7), 395–404 (1976)

    Article  Google Scholar 

  16. Mikhailov, V.A., Tsybakov, B.S.: Upper bound for the capacity of a random multiple access system. Problemy Peredachi Informatsii 17(1), 90–95 (1981)

    MathSciNet  Google Scholar 

  17. Mosely, J., Humblet, P.A.: A class of efficient contention resolution algorithms for multiple access channels. IEEE Trans. Commun. 33(2), 145–151 (1985). https://doi.org/10.1109/TCOM.1985.1096261

    Article  Google Scholar 

  18. Nakano, K., Olariu, S.: Uniform leader election protocols for radio networks. IEEE Trans. Parallel Distrib. Syst. 13(5), 516–526 (2002). https://doi.org/10.1109/TPDS.2002.1003864

    Article  Google Scholar 

  19. Newport, C.: Radio network lower bounds made easy. In: Proceedings of the 28th International Symposium on Distributed Computing (DISC), pp. 258–272 (2014)

    Google Scholar 

  20. Rajwar, R., Goodman, J.R.: Speculative lock elision: enabling highly concurrent multithreaded execution. In: Proceedings of the 34th Annual ACM/IEEE International Symposium on Microarchitecture, pp. 294–305. IEEE Computer Society (2001)

    Google Scholar 

  21. Tsybakov, B.S., Mikhailov, V.A.: Slotted multiaccess packet broadcasting feedback channel. Problemy Peredachi Informatsii 14(4), 32–59 (1978)

    MathSciNet  Google Scholar 

  22. Willard, D.E.: Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. Comput. 15(2), 468–477 (1986). https://doi.org/10.1137/0215032

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dingyu Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, D. (2021). Optimal Protocols for 2-Party Contention Resolution. In: Johnen, C., Schiller, E.M., Schmid, S. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2021. Lecture Notes in Computer Science(), vol 13046. Springer, Cham. https://doi.org/10.1007/978-3-030-91081-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91081-5_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91080-8

  • Online ISBN: 978-3-030-91081-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics