Conflict Resolution Algorithms and their Performance Analysis Mart

Multiple Access protocols are distributed algorithms that enable a set of geographically dispersed stations to communicate using a single, common, broadcast channel. We concentrate on the class of Conflict Resolution Algorithms. This class exhibits very good performance characteristics for ‘‘bursty’’ computer communications traffic, including high capacity, low delay under light traffic conditions, and inherent stability. One algorithm in this class achieves the highest capacity among all known multiple-access protocols for the infinite population Poisson model. Indeed, this capacity is not far from a theoretical upper bound. After surveying the most important and influential Conflict Resolution Algorithms, the emphasis in our presentation is shifted to methods for their analysis and results of their performance evaluation. We also discuss some extensions of the basic protocols and performance results for non-standard environments, such as Local Area Networks, satellite channels, channels with errors, etc., providing a comprehensive bibliography. 1. Conflict Resolution Based Random Access Protocols The ALOHA protocols were a breakthrough in the area of multiple access communications.1 They delivered, more or less, what they advertized, i.e., low delay for bursty, computer generated traffic. They suffer, however, from stability problems and low capacity.2 The next major breakthrough in the area of multiple access communications was the development of random access protocols that resolve conflicts algorithmically. The invention of Conflict Resolution Algorithms (CRAs) is usually attributed to Capetanakis [Capet78, Capet79, Capet79b], and, independently, to Tsybakov and Mikhailov [Tsyba78]. The same idea, but in a slightly different context, was also presented, earlier, by Hayes [Hayes78]. Later, it was recognized [Berge84, Wolf85] that the underlying idea had been known for a long time in the context of Group Testing [Dorfm43, Sobel59, Ungar60]. Group Testing was developed during World War II to speed up processing of syphilis blood tests. Since the administered test had high sensitivity, it was suggested [Dorfm43] that many blood samples could be pooled together. The result of the test would then be positive if, and only if, there was at least one diseased sample in the pool, in which case individual tests were administered to isolate the diseased samples. Later, it was suggested that, after the first diseased sample was isolated, the remaining samples could again be pooled for further testing. The beginning of a general theory of Group Testing can be found in [Sobel59], where, as pointed out in [Wolf85], a tree search algorithm is suggested, similar to the ones we present in section 1.2. The first application of Group Testing to communications arose when Hayes proposed a new, and more efficient, polling algorithm that he named probing [Hayes78]. Standard polling schemes are unacceptable for large sets of bursty stations because the overhead is proportional to the number of stations in the system, and independent from the amount of traffic. Hayes’ main idea was to shorten the polling cycle by having the central controller query subsets of the total population to discover if these subsets contain stations with waiting packets. If the response is negative, the total subset is ‘‘eliminated’’ in a single query. If the response is positive, the group is split into two subgroups and the process is continued, recursively, until a single active station is polled. This station is then allowed to transmit some data, which does not have to be in the form of constant size packets. Clearly, this is a reservation protocol. In subsequent papers Hayes has also considered direct transmission systems. Notice that the controller receives feedback in the form something — nothing (at least one station, or no station with waiting packets). 1.1. Basic Assumptions The protocols that will be presented in this section have been developed, and analyzed, on the basis of a set of common assumptions3 that describe a standard environment that is usually called an ALOHA-type channel. 1. Synchronous (slotted) operation: The common-receiver model of a broadcast channel is usually implicitly assumed. Furthermore, messages are split into packets of fixed size. All transmitters are (and remain) synchronized, and may initiate transmissions only at predetermined times, one packet transmission time apart. The time between two successive allowable packet transmission times is called a slot and is usually taken as the time unit. Thus, if more than one packet is transmitted during the same slot, they are ‘‘seen’’ by the receiver simultaneously, and therefore, overlap completely. 2. Errorless channel: If a given slot contains a single packet transmission, then the packet will be received correctly (by the common receiver). 1 For an introduction to the area of multiple access communications see the books by Bertsekas and Gallager [Berts92, chapter 4] and [Rom90]. Actually, chapter 4 of [Berts92] and chapter 5 of [Rom90] also present good expositions of Conflict Resolution Algorithms. 2 If no special control is exercised to stabilize the protocols, the term capacity must be taken in the ‘‘broader’’ sense of maximum throughput maintained during considerable periods of time, since the true capacity is zero [Fergu75, Fayol77, Aldou87]. However, having to stabilize the protocols detracts from their initial appeal that was mainly due to their simplicity. 3 Some of the protocols can operate with some of the assumptions weakened. When this is the case we point it out during their presentation. In section 6 we discuss protocols and analyses techniques that weaken or modify some of these assumptions.

[1]  D. Kazakos,et al.  A simple stack algorithm for a code division multiple access communication system , 1986, 1986 25th IEEE Conference on Decision and Control.

[2]  Simon S. Lam Multiple Access Protocols , 1979 .

[3]  M. Ferguson,et al.  On the Control, Stability, and Waiting Time in a Slotted ALOHA Random-Access System , 1975, IEEE Trans. Commun..

[4]  P. Papantoni-Kazakos,et al.  A Collision Resolution Protocol for Random Access Channels with Energy Detectors , 1982, IEEE Trans. Commun..

[5]  Panayota Papantoni-Kazakos,et al.  A limited sensing random-access algorithm with binary success-failure feedback , 1989, IEEE Trans. Commun..

[6]  Donald F. Towsley,et al.  Random Multiple-Access Communication and Group Testing , 1984, IEEE Trans. Commun..

[7]  J. Massey Collision-Resolution Algorithms and Random-Access Communications , 1981 .

[8]  George C. Polyzos,et al.  Delay analysis of a window tree conflict resolution algorithm in a local area network environment , 1987, SIGMETRICS '87.

[9]  Albert G. Greenberg,et al.  A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.

[10]  Jennie Malboeuf Algorithm , 1994, Neurology.

[11]  Panayota Papantoni-Kazakos,et al.  A random access algorithm for data networks carrying high priority traffic , 1990, Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration.

[12]  Israel Cidon,et al.  The Effect of Capture on Collision-Resolution Algorithms , 1985, IEEE Trans. Commun..

[13]  George C. Polyzos,et al.  A queueing theoretic approach to the delay analysis for the FCFS 0.487 conflict resolution algorithm , 1993, IEEE Trans. Inf. Theory.

[14]  Jack K. Wolf,et al.  Random access systems with a time varying channel , 1989, IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies.

[15]  Nicholas Pippenger,et al.  Bounds on the performance of protocols for a multiple-access broadcast channel , 1981, IEEE Trans. Inf. Theory.

[16]  Philippe Flajolet,et al.  Q -ary collision resolution algorithms in random-access systems with free or blocked channel access , 1985, IEEE Trans. Inf. Theory.

[17]  GUY FAYOLLE,et al.  Analysis of a stack algorithm for random multiple-access communication , 1985, IEEE Trans. Inf. Theory.

[18]  Philippe Flajolet,et al.  Estimating the multiplicities of conflicts to speed their resolution in multiple access channels , 1987, JACM.

[19]  J. F. C. Kingman The effect of queue discipline on waiting time variance , 1962 .

[20]  Conflict multiplicity estimation and batch resolution algorithms , 1988, IEEE Trans. Inf. Theory.

[21]  Toby Berger,et al.  Delay analysis of interval-searching contention resolution algorithms , 1985, IEEE Trans. Inf. Theory.

[22]  P. Ungar The cutoff point for group testing , 1960 .

[23]  Pierre A. Humblet,et al.  A Class of Efficient Contention Resolution Algorithms for Multiple Access Channels , 1985, IEEE Trans. Commun..

[24]  A. G. Pakes,et al.  Some Conditions for Ergodicity and Recurrence of Markov Chains , 1969, Oper. Res..

[25]  Tatsuya Suda,et al.  The Robustness and Performance of Tree Collision Resolution Algorithms in an Unshared Feedback Error Environment , 1989, Comput. Networks ISDN Syst..

[26]  P. Papantoni-Kazakos,et al.  A simple window random access algorithm with advantageous properties , 1988, IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?.

[27]  Nader Mehravari On Poisson contention resolution problem with feedback based on conflict intensity , 1988, IEEE Trans. Commun..

[28]  Yu Gong,et al.  A random multiple-access algorithm for the dependent feedback error channel , 1991, IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings.

[29]  Donald F. Towsley,et al.  Collision resolution algorithms for a time-constrained multiaccess channel , 1993, IEEE Trans. Commun..

[30]  Ioannis Stavrakakis,et al.  A multiuser random-access communication system for users with different priorities , 1991, IEEE Trans. Commun..

[31]  Nader Mahravari,et al.  Random-access communication with multiple reception , 1990, IEEE Trans. Inf. Theory.

[32]  Moshe Sidi,et al.  Multiple access algorithms via group testing for heterogeneous population of users , 1988, IEEE Trans. Commun..

[33]  Lazaros F. Merakos,et al.  A Method for the Delay Analysis of Random Multiple-Access Algorithms Whose Delay Process is Regenerative , 1987, IEEE J. Sel. Areas Commun..

[34]  David J. Aldous Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.

[35]  BORIS S. TSYBAKOV Survey of USSR contributions to random multiple-access communications , 1985, IEEE Trans. Inf. Theory.

[36]  Robert G. Gallager,et al.  Variations on a theme by Huffman , 1978, IEEE Trans. Inf. Theory.

[37]  M. Sobel,et al.  Group testing to eliminate efficiently all defectives in a binomial sample , 1959 .

[38]  Israel Cidon,et al.  Splitting protocols in presence of capture , 1985, IEEE Trans. Inf. Theory.

[39]  Israel Cidon,et al.  Erasure, capture, and random power level selection in multiple-access systems , 1988, IEEE Trans. Commun..

[40]  Ulrich Schmid On a tree collision resolution algorithm in presence of capture , 1992, RAIRO Theor. Informatics Appl..

[41]  J. Hayes,et al.  An Adaptive Technique for Local Distribution , 1978, IEEE Trans. Commun..

[42]  János Komlós,et al.  An asymptotically fast nonadaptive algorithm for conflict resolution in multiple-access channels , 1985, IEEE Trans. Inf. Theory.

[43]  James L. Massey,et al.  The collision channel without feedback , 1985, IEEE Trans. Inf. Theory.

[44]  Leslie D. Servi,et al.  D/G/1 Queues with Vacations , 1986, Oper. Res..

[45]  Michael K. Molloy Collision Resolution on the CSMA/CD Bus , 1985, Comput. Networks.

[46]  George C. Polyzos,et al.  Performance Analysis of Finite Nonhomogeneous Population Tree Conflict Resolution Algorithms Using Constant Size Window Access , 1987, IEEE Trans. Commun..

[47]  Lazaros F. Merakos,et al.  Performance analysis of a stack random access algorithm for CSMA and CSMA/CD channels , 1992, IEEE Trans. Commun..

[48]  A. Sterrett On the Detection of Defective Members of Large Populations , 1957 .

[49]  Panayota Papantoni-Kazakos,et al.  A 0.487 throughput limited sensing algorithm , 1987, IEEE Trans. Inf. Theory.

[50]  Seshadri Mohan,et al.  Group Testing Protocol with Capture for Random Access Communication , 1987, IEEE Trans. Commun..

[51]  Mart Molle Analysis of a Class of Distributed Queues with Applications , 1989, Perform. Evaluation.

[52]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[53]  Toby Berger,et al.  Conflict Resolution Protocols for Secure Multiple-Access Communication Systems , 1983 .

[54]  Vincent Hodgson,et al.  The Single Server Queue. , 1972 .

[55]  Donald F. Towsley,et al.  On the throughput of degenerate intersection and first-come first-served collision resolution algorithms , 1985, IEEE Trans. Inf. Theory.

[56]  David Mark Ryter A conflict resolution algorithm for noisy multiaccess channels , 1980 .

[57]  J. Capetanakis,et al.  Generalized TDMA: The Multi-Accessing Tree Protocol , 1979, IEEE Trans. Commun..

[58]  Anastasios N. Venetsanopoulos,et al.  Space-Time Models of Asynchronous CSMA Protocols for Local Area Networks , 1987, IEEE J. Sel. Areas Commun..

[59]  Israel Cidon,et al.  Erasures and noise in splitting multiple access algorithms , 1987, IEEE Trans. Inf. Theory.

[60]  Gabriel Ruget,et al.  Some Tools for the Study of Channel-Sharing Algorithms , 1981 .

[61]  Yih-Chiao Liu,et al.  Performance of a CSMA/CD Protocol for Local Area Networks , 1987, IEEE J. Sel. Areas Commun..

[62]  Mart L. Molle Asynchronous multiple access tree algorithms , 1983 .

[63]  M. Molle,et al.  Computation of the Packet Delay in Massey ’ s Standard and Modified Tree Conflict Resolution Algorithms with Gated Access , 1992 .

[64]  Donald F. Towsley,et al.  Window Random Access Protocols for Local Computer Networks , 1982, IEEE Transactions on Computers.

[65]  Erol Gelenbe,et al.  Stability and Optimal Control of the Packet Switching Broadcast Channel , 1977, JACM.

[66]  John Ippocratis Capetanakis The multiple access broadcast channel : protocol and capacity considerations. , 1977 .

[67]  Pierre A. Humblet On the Throughput of Channel Access Algorithms with Limited Sensing , 1986, IEEE Trans. Commun..

[68]  Jin-Fu Chang,et al.  Collision Resolution Algorithms for CDMA Systems , 1990, IEEE J. Sel. Areas Commun..

[69]  P Papantoni-Kazakos,et al.  High performance asynchronous limited sensing algorithms for CSMA and CSMA-CD channels , 1986 .

[70]  Jack K. Wolf,et al.  Born again group testing: Multiaccess communications , 1985, IEEE Trans. Inf. Theory.

[71]  Peter Mathys Analysis of Random-access algorithms , 1984 .

[72]  Panayota Papantoni-Kazakos,et al.  On the Relation Between the Finite and the Infinite Population Models for a Class of RAA's , 1987, IEEE Trans. Commun..

[73]  Panayota Papantoni-Kazakos,et al.  A window random access algorithm for environments with capture , 1989, IEEE Trans. Commun..

[74]  Charles U. Martel,et al.  Optimal Prioritized Conflict Resolution on a Multiple Access Channel , 1991, IEEE Trans. Computers.

[75]  Bruce E. Hajek,et al.  A new upper bound to the throughput of a multi-access broadcast channel , 1982, IEEE Trans. Inf. Theory.

[76]  Mart Molle,et al.  On the capacity of infinite population multiple access protocols , 1982, IEEE Trans. Inf. Theory.

[77]  Donald F. Towsley,et al.  Stack algorithms for random multiple-access networks in the presence of asymmetric feedback , 1990, IEEE Trans. Commun..

[78]  Yechiam Yemini,et al.  Controlling window protocols for time-constrained communication in multiple access networks , 1988, IEEE Trans. Commun..

[79]  Moshe Sidi,et al.  Splitting algorithms in noisy channels with memory , 1989, IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies.

[80]  Lazaros F. Merakos,et al.  Delay analysis of the n -ary stack random-access algorithm , 1988, IEEE Trans. Inf. Theory.

[81]  Toby Berger,et al.  Delay Analysis of 0.487 Contention Resolution Algorithms , 1986, IEEE Trans. Commun..