Towards Power-Sensitive Communication on a Multiple-Access Channel

We are given $n$ stations of which $k$ are active, while the remaining $n-k$ are asleep. The active stations communicate via a multiple-access channel. If a subset $Q$ of active stations transmits in the same round, all active stations can recognize from the signal strength how many stations have transmitted (i.e., they learn the size of set $Q$), even though they may not be able to decode the contents of transmitted messages. The goal is to let each active station to learn about the set of all active stations. It is well known that $\Theta(k\log_{k+1} n)$ rounds are enough, even for non-adaptive deterministic algorithms. A natural interesting generalization arises when we are required to identify a subset of $m\leq k$ active stations. We show that while for randomized or for adaptive deterministic algorithms $O(m \log_{m+1} n)$ rounds are sufficient, the non-adaptive deterministic counterpart still requires $\Theta(k\log_{k+1} n)$ rounds, therefore, finding any subset of active stations is not easier than finding all of them by a non-adaptive deterministic algorithm. We prove our results in the more general framework of combinatorial search theory, where the problem of identifying active stations on a multiple-access channel can be viewed as a variant of the well-known counterfeit coin problem.

[1]  Robert G. Gallager,et al.  A perspective on multiaccess channels , 1984, IEEE Trans. Inf. Theory.

[2]  Jeong Han Kim,et al.  Optimal query complexity bounds for finding graphs , 2010, Artif. Intell..

[3]  Nader H. Bshouty,et al.  Optimal Algorithms for the Coin Weighing Problem with a Spring Scale , 2009, COLT.

[4]  Albert G. Greenberg,et al.  A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.

[5]  Philippe Flajolet,et al.  Estimating the multiplicities of conflicts to speed their resolution in multiple access channels , 1987, JACM.

[6]  Michael Mitzenmacher,et al.  Probability And Computing , 2005 .

[7]  Torben Hagerup,et al.  A Guided Tour of Chernoff Bounds , 1990, Inf. Process. Lett..

[8]  Andrew Chi-Chih Yao,et al.  Probabilistic computations: Toward a unified measure of complexity , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).

[9]  Zoltán Füredi,et al.  Forbidding Just One Intersection , 1985, J. Comb. Theory, Ser. A.

[10]  Norman M. Abramson,et al.  Development of the ALOHANET , 1985, IEEE Trans. Inf. Theory.

[11]  Gordon Bell,et al.  Ethernet: Distributed Packet Switching for Local Computer Networks , 1976 .

[12]  B. Lindström On B2-sequences of vectors , 1972 .

[13]  Vladimir Grebinski,et al.  Optimal Reconstruction of Graphs under the Additive Model , 1997, Algorithmica.

[14]  Dan E. Willard,et al.  Log-Logarithmic Selection Resolution Protocols in a Multiple Access Channel , 1986, SIAM J. Comput..

[15]  Martin Aigner Combinatorial search , 1988 .

[16]  John Capetanakis,et al.  Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.

[17]  János Komlós,et al.  Correction to 'An Asymptotically Nonadaptive Algorithm for Conflict Resolution in Multiple-Access Channels' , 1985, IEEE Transactions on Information Theory.

[18]  J. Massey Collision-Resolution Algorithms and Random-Access Communications , 1981 .

[19]  J. Capetanakis,et al.  Generalized TDMA: The Multi-Accessing Tree Protocol , 1979, IEEE Trans. Commun..