skip to main content
article
Free Access

On contention resolution protocols and associated probabilistic phenomena

Published:01 March 1998Publication History
Skip Abstract Section

Abstract

Consider an on-line scheduling problem in which a set of abstract processes are competing for the use of a number of resources. Further assume that it is either prohibitively expensive or impossible for any two of the processes to directly communicate with one another. If several processes simultaneously attempt to allocate a particular resource (as may be expected to occur, since the processes cannot easily coordinate their allocations), then none succeed. In such a framework, it is a challenge to design efficient contention resolution protocols.

Two recently-proposed approaches to the problem of PRAM emulation give rise to scheduling problems of the above kind. In one approach, the resources (in this case, the shared memory cells) are duplicated and distributed randomly. We analyze a simple and efficient deterministic algorithm for accessing some subset of the duplicated resources. In the other approach, we analyze how quickly we can access the given (nonduplicated) resource using a simple randomized strategy. We obtain precise bounds on the performance of both strategies. We anticipate that our results with find other applications.

References

  1. ABRAMSON, N. 1973. The ALOHA system. In Computer-Communication Networks. N. Abramson and F. Kuo, eds. Prentice-Hall, Englewood Cliffs, N.J.Google ScholarGoogle Scholar
  2. ALON, N. 1990. Transversal numbers of uniform hypergraphs. Graphs Combin. 6, 1-4.Google ScholarGoogle Scholar
  3. ALON, N., BAR-NOY, A., LINIAL, N., AND PELEG, D. 1991. A lower bound for radio broadcast. J. Comput. Syst. Sci. 43, 290-298. Google ScholarGoogle Scholar
  4. ALON, N., AND SPENCER, J.H. 1991. The Probabilistic Method. Wiley, New York.Google ScholarGoogle Scholar
  5. ANDERSON, R. J., AND MILLER, G.L. 1988. Optical communication for pointer based algorithms. Tech. Rep. CRI-88-14, Computer Science Dept., Univ. Southern California.Google ScholarGoogle Scholar
  6. CARTER, J. L., AND WEGMAN, M.N. 1979. Universal classes of hash functions. J. Comput. Syst. Sci. 18, 143-154.Google ScholarGoogle Scholar
  7. CHERNOFF, H. 1952. A measure of the asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493-509.Google ScholarGoogle Scholar
  8. CHVATAL, V. 1979. The tail of the hypergeometric distribution. Disc. Math. 25, 285-287.Google ScholarGoogle Scholar
  9. DIETZFELBINGER, M., AND MEYER AUF DER HEIDE, F. 1993. Simple, efficient shared memory simulations. In Proceedings of the 5th Annual ACM Symposium on Parallel Algorithms and Architectures (Velen, Germany, June 30-July 2). ACM, New York, pp. 110-119. Google ScholarGoogle Scholar
  10. GER#B-GRAUS, M., AND TSANTTLAS, T. 1992. Efficient optical communication in parallel computers. In Proceedings of the 4th Annual ACM Symposium on Parallel Algorithms and Architectures (San Diego, Calif., June 29-July 1). ACM, New York, pp. 41-48. Google ScholarGoogle Scholar
  11. GOLDBERG, L. A., AND JERRUM, M. 1992. A sub-logarithmic communication algorithm for the completely connected optical communication parallel computer. Tech. Rep. ECS-LFCS-92-234 (September), Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, Edinburgh, Scotland.Google ScholarGoogle Scholar
  12. GOLDBERG, L. A., JERRUM, M., LEIGHTON, T., AND RAG, S. 1993. A doubly logarithmic communication algorithm for the completely connected optical communication parallel computer. In Proceedings of the 5th Annual ACM Symposium on Parallel Algorithms and Architectures (Velen, Germany, June 30-July 2). ACM, New York, pp. 300-309. Google ScholarGoogle Scholar
  13. GOLDBERG, L. A., MATIAS, Y., AND RAG, S.B. 1994. An optical simulation of shared memory. In Proceedings of the 6th Annual ACM Symposium on Parallel Algorithms and Architectures (Cape May, N.J., June 27-29). ACM, New York, pp. 257-267. Google ScholarGoogle Scholar
  14. GREENBERG, A. G., FLAJOLET, P., AND LADNER, R. E. 1987. Estimating the multiplicities of conflicts to speed their resolution in multiple access channels. J. ACM 34, 289-325. Google ScholarGoogle Scholar
  15. GREENBERG, A. G., AND WINOGRAD, S. 1985. A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels. J. ACM 32, 589-596. Google ScholarGoogle Scholar
  16. GREENBERG, R. I., AND LEISERSON, C.E. 1985. Randomized routing on fat-trees. In Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science (Oct.), IEEE, New York, pp. 241-249.Google ScholarGoogle Scholar
  17. HOEFFDING, W. 1963. Probability inequalities for sums of bounded random variables. JASA 58, 13-30.Google ScholarGoogle Scholar
  18. KARP, R., LUBY, M., AND MEYER AUF DER HEIDE, F. 1992. Efficient PRAM simulation on a distributed memory machine. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing (Victoria, B.C., Canada, May 4-6). ACM, New York, pp. 318-326. Google ScholarGoogle Scholar
  19. KOMLdS, J., AND GREENBERG, A. G. 1985. An asymptotically optimal nonadaptive algorithm for conflict resolution in multiple-access channels. IEEE Trans. Inf. Theory IT-M, 302-306. Google ScholarGoogle Scholar
  20. MARTEL, C. U., AND VADYA, T.P. 1988. The complexity of selection resolution, conflict resolution, and maximum finding on multiple access channels. In Proceedings of the 3rd International Workshop on Parallel Computation and VLSI Theory (1988), pp. 401-410. Google ScholarGoogle Scholar
  21. METCALFE, R., AND BOGGS, D. 1976. Ethernet: Distributed packet switching for local computer networks. Commun. ACM 19, 7 (July), 395-404. Google ScholarGoogle Scholar
  22. MEYER AUF DER HEIDE, F., SCHEIDELER, C., AND STEMANN, V. 1995. Exploiting storage redundancy to speed up randomized shared memory simulations. In Proceedings of the 12th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, vol. 900 (March), Springer-Verlag, New York, pp. 267-278.Google ScholarGoogle Scholar
  23. SIEGEL, A. 1989. On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science (Nov.). IEEE, New York, pp. 20-25. (Revised version).Google ScholarGoogle Scholar
  24. UPFAL, E., AND WIGDERSON, A. 1987. How to share memory in a distributed system. J. ACM 34, 116-127. Google ScholarGoogle Scholar
  25. VALIANT, L. G. 1990. General purpose parallel architectures. In Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity, J. van Leeuwen, ed., Elsevier/MIT Press, Cambridge, Mass., pp. 943-971. Google ScholarGoogle Scholar
  26. YAO, A. C. 1983. Lower bounds by probabilistic arguments. In Proceedings of the 24th Annual IEEE Symposium on Foundations of Computer Science (Oct.). IEEE, New York, pp. 420-428.Google ScholarGoogle Scholar

Index Terms

  1. On contention resolution protocols and associated probabilistic phenomena

      Recommendations

      Reviews

      Ralph Walter Wilkerson

      The authors consider an online scheduling problem in which a collection of processes are competing for the use of a number of resources and it is very expensive or impossible for any two of these processes to communicate with each other directly. Recent work in PRAM emulation gives rise to such problems. The authors analyze two approaches to this problem. One involves duplicating and randomly distributing resources (specifically, shared memory cells), and the other involves accessing a nonduplicated resource using a randomized strategy. A significant portion of this paper centers on deriving precise performance bounds on the algorithms used for these problems.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader