How to Scale Exponential Backoff

Randomized exponential backoff is a widely deployed technique for coordinating access to a shared resource. A good backoff protocol should, arguably, satisfy three natural properties: (i) it should provide constant throughput, wasting as little time as possible; (ii) it should require few failed access attempts, minimizing the amount of wasted effort; and (iii) it should be robust, continuing to work efficiently even if some of the access attempts fail for spurious reasons. Unfortunately, exponential backoff has some well-known limitations in two of these areas: it provides poor (sub-constant) throughput (in the worst case), and is not robust (to resource acquisition failures). The goal of this paper is to "fix" exponential backoff by making it scalable, particularly focusing on the case where processes arrive in an on-line, worst-case fashion. We present a relatively simple backoff protocol~Re-Backoff~that has, at its heart, a version of exponential backoff. It guarantees expected constant throughput with dynamic process arrivals and requires only an expected polylogarithmic number of access attempts per process. Re-Backoff is also robust to periods where the shared resource is unavailable for a period of time. If it is unavailable for $D$ time slots, Re-Backoff provides the following guarantees. When the number of packets is a finite $n$, the average expected number of access attempts for successfully sending a packet is $O(\log^2( n + D))$. In the infinite case, the average expected number of access attempts for successfully sending a packet is $O( \log^2(\eta) + \log^2(D) )$ where $\eta$ is the maximum number of processes that are ever in the system concurrently.

[1]  Rachid Guerraoui,et al.  Secure communication over radio channels , 2008, PODC '08.

[2]  Chenyang Lu,et al.  Energy-efficient Low Power Listening for wireless sensor networks in noisy environments , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[3]  Ramesh K. Sitaraman,et al.  The power of two random choices: a survey of tech-niques and results , 2001 .

[4]  Christian Scheideler,et al.  Competitive and fair throughput for co-existing networks under adversarial interference , 2012, PODC '12.

[5]  Dariusz R. Kowalski,et al.  A better wake-up in radio networks , 2004, PODC '04.

[6]  Peter March,et al.  Stability of binary exponential backoff , 1988, JACM.

[7]  Eli Upfal,et al.  Balanced Allocations , 1999, SIAM J. Comput..

[8]  Christian Scheideler,et al.  A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.

[9]  Robert Simon,et al.  A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.

[10]  Aravind Srinivasan,et al.  Contention resolution with constant expected delay , 2000, JACM.

[11]  Nitin H. Vaidya,et al.  Reliable broadcast in radio networks: the bounded collision case , 2006, PODC '06.

[12]  Victor O. K. Li,et al.  Receiver-initiated busy-tone multiple access in packet radio networks , 1987, Computer Communication Review.

[13]  Yih-Chun Hu,et al.  Demo: bankrupting the jammer , 2011, MobiSys '11.

[14]  Christian Scheideler,et al.  Competitive and Fair Medium Access Despite Reactive Jamming , 2011, 2011 31st International Conference on Distributed Computing Systems.

[15]  Rachid Guerraoui,et al.  Interference-Resilient Information Exchange , 2009, IEEE INFOCOM 2009.

[16]  Xin Liu,et al.  SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  D. K. Arvind,et al.  Towards an Integrated Design Approach to Specknets , 2007, 2007 IEEE International Conference on Communications.

[18]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1976, CACM.

[19]  Michael A. Bender,et al.  Adversarial contention resolution for simple channels , 2005, SPAA '05.

[20]  Alan M. Frieze,et al.  On Balls and Bins with Deletions , 1998, RANDOM.

[21]  Ravi Rajwar,et al.  Speculative lock elision: enabling highly concurrent multithreaded execution , 2001, Proceedings. 34th ACM/IEEE International Symposium on Microarchitecture. MICRO-34.

[22]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.

[23]  Maxwell Young,et al.  Making evildoers pay: resource-competitive broadcast in sensor networks , 2012, PODC '12.

[24]  Thomas Sauerwald,et al.  Balls-into-bins with nearly optimal load distribution , 2013, SPAA.

[25]  Rachid Guerraoui,et al.  Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks , 2006, OPODIS.

[26]  Yang Xiao,et al.  Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs , 2005, IEEE Transactions on Wireless Communications.

[27]  J. Capetanakis,et al.  Generalized TDMA: The Multi-Accessing Tree Protocol , 1979, IEEE Trans. Commun..

[28]  Yossi Matias,et al.  An Optical Simulation of Shared Memory , 1999, SIAM J. Comput..

[29]  Leslie Ann Goldberg,et al.  Analysis of practical backoff protocols for contention resolution with multiple servers , 1996, SODA '96.

[30]  Frank Thomson Leighton,et al.  Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..

[31]  Jing Deng,et al.  Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks , 2002, IEEE Trans. Commun..

[32]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[33]  Frank Thomson Leighton,et al.  A doubly logarithmic communication algorithm for the completely connected optical communication parallel computer , 1993, SPAA '93.

[34]  Marek Chrobak,et al.  The wake-up problem in multi-hop radio networks , 2004, SODA '04.

[35]  Frank Thomson Leighton,et al.  Doubly Logarithmic Communication Algorithms for Optical-Communication Parallel Computers , 1997, SIAM J. Comput..

[36]  Stefan Schmid,et al.  Speed Dating Despite Jammers , 2009, DCOSS.

[37]  Christian Scheideler,et al.  A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.

[38]  Michael A. Bender,et al.  Contention Resolution with Heterogeneous Job Sizes , 2006, ESA.

[39]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[40]  Albert G. Greenberg,et al.  A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.

[41]  Byung-Jae Kwak,et al.  Performance analysis of exponential backoff , 2005, IEEE/ACM Transactions on Networking.

[42]  Maxwell Young,et al.  Resource-competitive analysis: a new perspective on attack-resistant distributed computing , 2012, FOMC '12.

[43]  Andrzej Pelc,et al.  Feasibility and complexity of broadcasting with random transmission failures , 2005, PODC '05.

[44]  Maurice Herlihy,et al.  Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.

[45]  V. Jacobson,et al.  Congestion avoidance and control , 1988, CCRV.

[46]  Frank Thomson Leighton,et al.  Analysis of backoff protocols for multiple access channels , 1987, STOC '87.

[47]  Michael Mitzenmacher,et al.  The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..

[48]  Dariusz R. Kowalski,et al.  On the Wake-Up Problem in Radio Networks , 2005, ICALP.

[49]  Artur Czumaj,et al.  Multiple-Choice Balanced Allocation in (Almost) Parallel , 2012, APPROX-RANDOM.

[50]  Bogdan S. Chlebus,et al.  Adversarial Multiple Access Channel with Individual Injection Rates , 2009, OPODIS.

[51]  Max Buot Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2006 .

[52]  Dariusz R. Kowalski,et al.  Adversarial Queuing on the Multiple Access Channel , 2012, TALG.

[53]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.