Abstract
Contention Resolution is a fundamental symmetry-breaking problem in which n devices must acquire temporary and exclusive access to some shared resource, without the assistance of a mediating authority. For example, the n devices may be sensors that each need to transmit a single packet of data over a broadcast channel. In each time step, devices can (probabilistically) choose to acquire the resource or remain idle; if exactly one device attempts to acquire it, it succeeds, and if two or more devices make an attempt, none succeeds. The complexity of the problem depends heavily on what types of collision detection are available. In this paper we consider acknowledgement-based protocols, in which devices only learn whether their own attempt succeeded or failed; they receive no other feedback from the environment whatsoever, i.e., whether other devices attempted to acquire the resource, succeeded, or failed.
Nearly all work on the Contention Resolution problem evaluated the performance of algorithms asymptotically, as \(n\rightarrow \infty \). In this work we focus on the simplest case of \(n=2\) devices, but look for precisely optimal algorithms. We design provably optimal algorithms under three natural cost metrics: minimizing the expected average of the waiting times (avg), the expected waiting time until the first device acquires the resource (min), and the expected time until the last device acquires the resource (max). We first prove that the optimal algorithms for \(n=2\) are periodic in a certain sense, and therefore have finite descriptions, then we design optimal algorithms under all three objectives.
-
avg. The optimal contention resolution algorithm under the avg objective has expected cost \(\sqrt{3/2} + 3/2 \approx 2.72474\).
-
min. The optimal contention resolution algorithm under the min objective has expected cost 2. (This result can be proved in an ad hoc fashion, and may be considered folklore.)
-
max. The optimal contention resolution algorithm under the max objective has expected cost \(1/\gamma \approx 3.33641\), where \(\gamma \approx 0.299723\) is the smallest root of \(3x^3 - 12x^2 + 10x -2\) (We may also express \(\gamma \) in radical form: \(\gamma = -\frac{1}{6} \left( 1-i \sqrt{3}\right) \root 3 \of {13+i \sqrt{47}}+\frac{4}{3}-\frac{1+i \sqrt{3}}{\root 3 \of {13+i \sqrt{47}}}\).).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
For a humorous example, consider the Canadian Standoff problem https://www.cartoonstock.com/cartoonview.asp?catref=CC137954.
- 2.
The full version is available at http://www.ancientwang.com/document/Optimal_Protocols_for_2_Party_Contention_Resolution%20(1).pdf.
- 3.
A policy may have no finite representation, and therefore may not be an algorithm in the usual sense.
- 4.
We use the convention that \(\prod _{i=0}^{-1}a_k=1\), where \((a_k)_{k=0}^\infty \) is any sequence.
References
Abramson, N.: The ALOHA system: another alternative for computer communications. In: Proceedings of the November 17–19, 1970, Fall Joint Computer Conference, pp. 281–285. ACM (1970)
Aldous, D.J.: Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Trans. Inf. Theory 33(2), 219–223 (1987). https://doi.org/10.1109/TIT.1987.1057295
Awerbuch, B., Richa, A.W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 45–54 (2008). https://doi.org/10.1145/1400751.1400759
Bar-Yehuda, R., Goldreich, O., Itai, A.: On the time-complexity of broadcast in multi-hop radio networks: an exponential gap between determinism and randomization. J. Comput. Syst. Sci. 45(1), 104–126 (1992)
Bender, M., Kopelowitz, T., Pettie, S., Young, M.: Contention resolution with constant throughput and log-logstar channel accesses. SIAM J. Comput. 47(5), 1735–1754 (2018). https://doi.org/10.1137/17M1158604
Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial analyses of window backoff strategies. In: Proceedings 18th International Parallel and Distributed Processing Symposium (IPDPS) (2004). https://doi.org/10.1109/IPDPS.2004.1303230, https://doi.org/10.1109/IPDPS.2004.1303230
Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pp. 325–332 (2005). https://doi.org/10.1145/1073970.1074023
Bender, M.A., Fineman, J.T., Gilbert, S., Young, M.: Scaling exponential backoff: constant throughput, polylogarithmic channel-access attempts, and robustness. J. ACM 66(1), 6:1–6:33 (2019)
Capetanakis, J.: Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory 25(5), 505–515 (1979). https://doi.org/10.1109/TIT.1979.1056093
Chang, Y., Jin, W., Pettie, S.: Simple contention resolution via multiplicative weight updates. In: Proceedings 2nd Symposium on Simplicity in Algorithms (SOSA), pp. 16:1–16:16 (2019). https://doi.org/10.4230/OASIcs.SOSA.2019.16
Chang, Y., Kopelowitz, T., Pettie, S., Wang, R., Zhan, W.: Exponential separations in the energy complexity of leader election. In: Proceedings 49th Annual ACM Symposium on Theory of Computing (STOC), pp. 771–783 (2017). https://doi.org/10.1145/3055399.3055481, http://doi.acm.org/10.1145/3055399.3055481
Gallager, R.G.: Conflict resolution in random access broadcast networks. In: Proceedings AFOSR Workshop on Communications Theory Applications, Provincetown, MA, 17–20 September, pp. 74–76 (1978)
Jacobson, V.: Congestion avoidance and control. ACM SIGCOMM Comput. Commun. Rev. 18, 314–329. ACM (1988)
Kwak, B.J., Song, N.O., Miller, L.E.: Performance analysis of exponential backoff. IEEE/ACM Trans. Netw. (TON) 13(2), 343–355 (2005)
Metcalfe, R.M., Boggs, D.R.: Ethernet: distributed packet switching for local computer networks. Commun. ACM 19(7), 395–404 (1976)
Mikhailov, V.A., Tsybakov, B.S.: Upper bound for the capacity of a random multiple access system. Problemy Peredachi Informatsii 17(1), 90–95 (1981)
Mosely, J., Humblet, P.A.: A class of efficient contention resolution algorithms for multiple access channels. IEEE Trans. Commun. 33(2), 145–151 (1985). https://doi.org/10.1109/TCOM.1985.1096261
Nakano, K., Olariu, S.: Uniform leader election protocols for radio networks. IEEE Trans. Parallel Distrib. Syst. 13(5), 516–526 (2002). https://doi.org/10.1109/TPDS.2002.1003864
Newport, C.: Radio network lower bounds made easy. In: Proceedings of the 28th International Symposium on Distributed Computing (DISC), pp. 258–272 (2014)
Rajwar, R., Goodman, J.R.: Speculative lock elision: enabling highly concurrent multithreaded execution. In: Proceedings of the 34th Annual ACM/IEEE International Symposium on Microarchitecture, pp. 294–305. IEEE Computer Society (2001)
Tsybakov, B.S., Mikhailov, V.A.: Slotted multiaccess packet broadcasting feedback channel. Problemy Peredachi Informatsii 14(4), 32–59 (1978)
Willard, D.E.: Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. Comput. 15(2), 468–477 (1986). https://doi.org/10.1137/0215032
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, D. (2021). Optimal Protocols for 2-Party Contention Resolution. In: Johnen, C., Schiller, E.M., Schmid, S. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2021. Lecture Notes in Computer Science(), vol 13046. Springer, Cham. https://doi.org/10.1007/978-3-030-91081-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-91081-5_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91080-8
Online ISBN: 978-3-030-91081-5
eBook Packages: Computer ScienceComputer Science (R0)