Contention resolution without collision detection

This paper focuses on the contention resolution problem on a shared communication channel that does not support collision detection. A shared communication channel is a multiple access channel, which consists of a sequence of synchronized time slots. Players on the channel may attempt to broadcast a packet (message) in any time slot. A player's broadcast succeeds if no other player broadcasts during that slot. If two or more players broadcast in the same time slot, then the broadcasts collide and both broadcasts fail. The lack of collision detection means that a player monitoring the channel cannot differentiate between the case of two or more players broadcasting in the same slot (a collision) and zero players broadcasting. In the contention-resolution problem, players arrive on the channel over time, and each player has one packet to transmit. The goal is to coordinate the players so that each player is able to successfully transmit its packet within reasonable time. However, the players can only communicate via the shared channel by choosing to either broadcast or not. A contention-resolution protocol is measured in terms of its throughput (channel utilization). Previous work on contention resolution that achieved constant throughput assumed that either players could detect collisions, or the players' arrival pattern is generated by a memoryless (non-adversarial) process. The foundational question answered by this paper is whether collision detection is a luxury or necessity when the objective is to achieve constant throughput. We show that even without collision detection, one can solve contention resolution, achieving constant throughput, with high probability.

[1]  Maxwell Young,et al.  Is Our Model for Contention Resolution Wrong?: Confronting the Cost of Collisions , 2017, SPAA.

[2]  Christian Scheideler,et al.  Sade: competitive MAC under adversarial SINR , 2018, Distributed Computing.

[3]  Aleksandar Kuzmanovic,et al.  Removing exponential backoff from TCP , 2008, CCRV.

[4]  Christian Scheideler,et al.  A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.

[5]  Michael A. Bender,et al.  Contention Resolution with Heterogeneous Job Sizes , 2006, ESA.

[6]  Seth Pettie,et al.  Simple Contention Resolution via Multiplicative Weight Updates , 2019, SOSA@SODA.

[7]  Robert Metcalfe,et al.  Ethernet: distributed packet switching for local computer networks , 1988, CACM.

[8]  Frank Thomson Leighton,et al.  Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..

[9]  Ruosong Wang,et al.  Exponential separations in the energy complexity of leader election , 2016, STOC.

[10]  Dariusz R. Kowalski,et al.  Brief Announcement: Deterministic Contention Resolution on a Shared Channel , 2018, DISC.

[11]  Philippe Flajolet,et al.  Estimating the multiplicities of conflicts to speed their resolution in multiple access channels , 1987, JACM.

[12]  Michael A. Bender,et al.  Adversarial contention resolution for simple channels , 2005, SPAA '05.

[13]  Christian Scheideler,et al.  Competitive and fair throughput for co-existing networks under adversarial interference , 2012, PODC '12.

[14]  Yossi Matias,et al.  An optical simulation of shared memory , 1994, SPAA '94.

[15]  Dariusz R. Kowalski,et al.  Local Queuing Under Contention , 2018, DISC.

[16]  Peter March,et al.  Stability of binary exponential backoff , 1988, JACM.

[17]  David J. Aldous Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.

[18]  Van Jacobson,et al.  Congestion avoidance and control , 1988, SIGCOMM '88.

[19]  Dan E. Willard,et al.  Log-Logarithmic Selection Resolution Protocols in a Multiple Access Channel , 1986, SIAM J. Comput..

[20]  Christian Scheideler,et al.  A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.

[21]  Dariusz R. Kowalski,et al.  Adversarial queuing on the multiple-access channel , 2006, PODC '06.

[22]  Christian Scheideler,et al.  An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.

[23]  Frank Thomson Leighton,et al.  Analysis of backoff protocols for multiple access channels , 1987, STOC '87.

[24]  Byung-Jae Kwak,et al.  On the Stability of Exponential Backoff , 2003, Journal of research of the National Institute of Standards and Technology.

[25]  Michael A. Bender,et al.  Scaling Exponential Backoff , 2018, J. ACM.

[26]  Thanasis Tsantilas,et al.  Efficient optical communication in parallel computers , 1992, SPAA '92.

[27]  Aravind Srinivasan,et al.  Contention resolution with constant expected delay , 2000, JACM.

[28]  Christian Scheideler,et al.  Competitive and Fair Medium Access Despite Reactive Jamming , 2011, 2011 31st International Conference on Distributed Computing Systems.

[29]  Antonio Fernández,et al.  Unbounded Contention Resolution in Multiple-Access Channels , 2011, PODC '11.

[30]  Eli Upfal,et al.  Stochastic contention resolution with short delays , 1995, STOC '95.

[31]  Dariusz R. Kowalski,et al.  A better wake-up in radio networks , 2004, PODC '04.

[32]  James R. Goodman,et al.  Speculative lock elision: enabling highly concurrent multithreaded execution , 2001, MICRO.

[33]  Maurice Herlihy,et al.  Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.

[34]  Grzegorz Stachowiak,et al.  Asynchronous Shared Channel , 2017, PODC.

[35]  Christian Scheideler,et al.  Competitive throughput in multi-hop wireless networks despite adaptive jamming , 2012, Distributed Computing.

[36]  Michael A. Bender,et al.  Contention resolution with log-logstar channel accesses , 2016, STOC.

[37]  Marek Chrobak,et al.  The wake-up problem in multi-hop radio networks , 2004, SODA '04.

[38]  Colin McDiarmid,et al.  Surveys in Combinatorics, 1989: On the method of bounded differences , 1989 .

[39]  Michael A. Bender,et al.  How to Scale Exponential Backoff: Constant Throughput, Polylog Access Attempts, and Robustness , 2016, SODA.

[40]  Leslie Ann Goldberg,et al.  Analysis of practical backoff protocols for contention resolution with multiple servers , 1996, SODA '96.

[41]  Dariusz R. Kowalski,et al.  On the Wake-Up Problem in Radio Networks , 2005, ICALP.

[42]  Frank Thomson Leighton,et al.  Doubly Logarithmic Communication Algorithms for Optical-Communication Parallel Computers , 1997, SIAM J. Comput..

[43]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[44]  Bogdan S. Chlebus,et al.  Adversarial Multiple Access Channel with Individual Injection Rates , 2009, OPODIS.

[45]  Albert G. Greenberg,et al.  A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.