Abstract
Consider an on-line scheduling problem in which a set of abstract processes are competing for the use of a number of resources. Further assume that it is either prohibitively expensive or impossible for any two of the processes to directly communicate with one another. If several processes simultaneously attempt to allocate a particular resource (as may be expected to occur, since the processes cannot easily coordinate their allocations), then none succeed. In such a framework, it is a challenge to design efficient contention resolution protocols.
Two recently-proposed approaches to the problem of PRAM emulation give rise to scheduling problems of the above kind. In one approach, the resources (in this case, the shared memory cells) are duplicated and distributed randomly. We analyze a simple and efficient deterministic algorithm for accessing some subset of the duplicated resources. In the other approach, we analyze how quickly we can access the given (nonduplicated) resource using a simple randomized strategy. We obtain precise bounds on the performance of both strategies. We anticipate that our results with find other applications.
- ABRAMSON, N. 1973. The ALOHA system. In Computer-Communication Networks. N. Abramson and F. Kuo, eds. Prentice-Hall, Englewood Cliffs, N.J.Google Scholar
- ALON, N. 1990. Transversal numbers of uniform hypergraphs. Graphs Combin. 6, 1-4.Google Scholar
- ALON, N., BAR-NOY, A., LINIAL, N., AND PELEG, D. 1991. A lower bound for radio broadcast. J. Comput. Syst. Sci. 43, 290-298. Google Scholar
- ALON, N., AND SPENCER, J.H. 1991. The Probabilistic Method. Wiley, New York.Google Scholar
- ANDERSON, R. J., AND MILLER, G.L. 1988. Optical communication for pointer based algorithms. Tech. Rep. CRI-88-14, Computer Science Dept., Univ. Southern California.Google Scholar
- CARTER, J. L., AND WEGMAN, M.N. 1979. Universal classes of hash functions. J. Comput. Syst. Sci. 18, 143-154.Google Scholar
- CHERNOFF, H. 1952. A measure of the asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493-509.Google Scholar
- CHVATAL, V. 1979. The tail of the hypergeometric distribution. Disc. Math. 25, 285-287.Google Scholar
- DIETZFELBINGER, M., AND MEYER AUF DER HEIDE, F. 1993. Simple, efficient shared memory simulations. In Proceedings of the 5th Annual ACM Symposium on Parallel Algorithms and Architectures (Velen, Germany, June 30-July 2). ACM, New York, pp. 110-119. Google Scholar
- GER#B-GRAUS, M., AND TSANTTLAS, T. 1992. Efficient optical communication in parallel computers. In Proceedings of the 4th Annual ACM Symposium on Parallel Algorithms and Architectures (San Diego, Calif., June 29-July 1). ACM, New York, pp. 41-48. Google Scholar
- GOLDBERG, L. A., AND JERRUM, M. 1992. A sub-logarithmic communication algorithm for the completely connected optical communication parallel computer. Tech. Rep. ECS-LFCS-92-234 (September), Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, Edinburgh, Scotland.Google Scholar
- GOLDBERG, L. A., JERRUM, M., LEIGHTON, T., AND RAG, S. 1993. A doubly logarithmic communication algorithm for the completely connected optical communication parallel computer. In Proceedings of the 5th Annual ACM Symposium on Parallel Algorithms and Architectures (Velen, Germany, June 30-July 2). ACM, New York, pp. 300-309. Google Scholar
- GOLDBERG, L. A., MATIAS, Y., AND RAG, S.B. 1994. An optical simulation of shared memory. In Proceedings of the 6th Annual ACM Symposium on Parallel Algorithms and Architectures (Cape May, N.J., June 27-29). ACM, New York, pp. 257-267. Google Scholar
- GREENBERG, A. G., FLAJOLET, P., AND LADNER, R. E. 1987. Estimating the multiplicities of conflicts to speed their resolution in multiple access channels. J. ACM 34, 289-325. Google Scholar
- GREENBERG, A. G., AND WINOGRAD, S. 1985. A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels. J. ACM 32, 589-596. Google Scholar
- GREENBERG, R. I., AND LEISERSON, C.E. 1985. Randomized routing on fat-trees. In Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science (Oct.), IEEE, New York, pp. 241-249.Google Scholar
- HOEFFDING, W. 1963. Probability inequalities for sums of bounded random variables. JASA 58, 13-30.Google Scholar
- KARP, R., LUBY, M., AND MEYER AUF DER HEIDE, F. 1992. Efficient PRAM simulation on a distributed memory machine. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing (Victoria, B.C., Canada, May 4-6). ACM, New York, pp. 318-326. Google Scholar
- KOMLdS, J., AND GREENBERG, A. G. 1985. An asymptotically optimal nonadaptive algorithm for conflict resolution in multiple-access channels. IEEE Trans. Inf. Theory IT-M, 302-306. Google Scholar
- MARTEL, C. U., AND VADYA, T.P. 1988. The complexity of selection resolution, conflict resolution, and maximum finding on multiple access channels. In Proceedings of the 3rd International Workshop on Parallel Computation and VLSI Theory (1988), pp. 401-410. Google Scholar
- METCALFE, R., AND BOGGS, D. 1976. Ethernet: Distributed packet switching for local computer networks. Commun. ACM 19, 7 (July), 395-404. Google Scholar
- MEYER AUF DER HEIDE, F., SCHEIDELER, C., AND STEMANN, V. 1995. Exploiting storage redundancy to speed up randomized shared memory simulations. In Proceedings of the 12th Annual Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, vol. 900 (March), Springer-Verlag, New York, pp. 267-278.Google Scholar
- SIEGEL, A. 1989. On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications. In Proceedings of the 30th IEEE Symposium on Foundations of Computer Science (Nov.). IEEE, New York, pp. 20-25. (Revised version).Google Scholar
- UPFAL, E., AND WIGDERSON, A. 1987. How to share memory in a distributed system. J. ACM 34, 116-127. Google Scholar
- VALIANT, L. G. 1990. General purpose parallel architectures. In Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity, J. van Leeuwen, ed., Elsevier/MIT Press, Cambridge, Mass., pp. 943-971. Google Scholar
- YAO, A. C. 1983. Lower bounds by probabilistic arguments. In Proceedings of the 24th Annual IEEE Symposium on Foundations of Computer Science (Oct.). IEEE, New York, pp. 420-428.Google Scholar
Index Terms
- On contention resolution protocols and associated probabilistic phenomena
Recommendations
Contention Resolution in Hashing Based Shared Memory Simulations
In this paper we study the problem of simulating shared memory on the distributed memory machine (DMM). Our approach uses multiple copies of shared memory cells, distributed among the memory modules of the DMM via universal hashing. The main aim is to ...
Probabilistic Termination and Composability of Cryptographic Protocols
When analyzing the round complexity of multi-party protocols, one often overlooks the fact that underlying resources, such as a broadcast channel, can by themselves be expensive to implement. For example, it is well known that it is impossible to ...
Comments