Consensus and Mutual Exclusion in a Multiple Access Channel

Size: px
Start display at page:

Download "Consensus and Mutual Exclusion in a Multiple Access Channel"

Transcription

1 Consensus and Mutual Exclusion in a Multiple Access Channel Jurek Czyzowicz 1,, Leszek Gasieniec 2,, Dariusz R. Kowalski 2,, and Andrzej Pelc 1, 1 Département d informatique, Université duquébec en Outaouais, Gatineau, Québec J8X 3X7, Canada 2 Department of Computer Science, University of Liverpool, Liverpool L69 3BX, UK Abstract. We consider deterministic feasibility and time complexity of two fundamental tasks in distributed computing: consensus and mutual exclusion. Processes have different labels and communicate through a multiple access channel. The adversary wakes up some processes in possibly different rounds. In any round every awake process either listens or transmits. The message of a process i is heard by all other awake processes, if i is the only process to transmit in a given round. If more than one process transmits simultaneously, there is a collision and no message is heard. We consider three characteristics that may or may not exist in the channel: collision detection (listening processes can distinguish collision from silence), the availablity of a global clock showing the round number, and the knowledge of the number n of all processes. If none of the above three characteristics is available in the channel, we prove that consensus and mutual exclusion are infeasible; if at least one of them is available, both tasks are feasible and we study their time complexity. Collision detection is shown to cause an exponential gap in complexity: if it is available, both tasks can be performed in time logarithmic in n, which is optimal, and without collision detection both tasks require linear time. We then investigate both consensus and mutual exclusion in the absence of collision detection, but under alternative presence of the two other features. With global clock, we give an algorithm whose time complexity linearly depends on n and on the wake-up time, and an algorithm whose complexity does not depend on the wake-up time and differs from the linear lower bound only by a factor O(log 2 n). If n is known, we also show an algorithm whose complexity differs from the linear lower bound only by a factor O(log 2 n). Keywords: consensus, mutual exclusion, multiple access channel, collision detection. Partially supported by NSERC discovery grant. Partially funded by the Royal Society International Joint Project, IJP /R1. This work was supported by the Engineering and Physical Sciences Research Council [grant number EP/G023018/1]. Partially supported by NSERC discovery grant and by the Research Chair in Distributed Computing at the Université du Québec en Outaouais. I. Keidar (Ed.): DISC 2009, LNCS 5805, pp , c Springer-Verlag Berlin Heidelberg 2009

2 1 Introduction Consensus and Mutual Exclusion in a Multiple Access Channel 513 The background and the problem. We consider deterministic feasibility and time complexity of two fundamental tasks in distributed computing: consensus and mutual exclusion. Processes have different integer labels from 1 to n, andeachof them knows its own label. In the sequel we identify processes with their labels. They communicate through a multiple access channel (MAC) which is a well known and thoroughly studied communication medium. In order to capture the notion of collisions, that are the main difficulty of communicating over a MAC, time is considered as slotted into rounds, similarly as in the literature on radio communication, cf., e.g., [1,3,7,12,14,16]. The adversary wakes up some processes in possibly different rounds. In each round every awake process either listens or transmits. Transmitting processes do not hear anything. The message of process i is heard by all other awake listening processes, if i is the only process to transmit in a given round. If more than one process transmits simultaneously, there is a collision and no message is heard. We consider three features that may or may not exist in the MAC: collision detection (CD), the availablity of a global clock showing the round number (GC), and the knowledge of the number n of all processes (KN). Collision detection is the capacity of listening processes to distiguish collision (when more than one process transmits in a given round) from silence (when no process transmits). Silence is in fact the background noise occurring in the MAC when no process transmits, and a collision slightly increases the level of this noise. Hence detecting this difference requires a more sensitive receiving device. Global clock permits awake processes to see the same round number. In the absence of it, individual clocks of awake processes tick at the same rate indicating rounds, but each clock starts at 0 when the process is woken up by the adversary. Finally, knowledge of the number n of all processes may or may not be available, but we never assume the knowledge of the number of processes ever woken up or the knowledge of their waking rounds. We focus on the problem of whether consensus and mutual exclusion are deterministically feasible, and if so, what is their deterministic time complexity, depending on which of the features CD, GC, KN are available in the MAC over which processes communicate. It should be stressed that the fact that the adversary wakes up an arbitrary unknown subset of processes and that these processes are woken up in arbitrary rounds, significantly increases the difficulty of the problem. The tasks and the power of the adversary. Since communication between processes is done over a MAC, we define a transmission schedule that is an infinite binary sequence π determining the communication actions of a process. For any non-negative integer i, π(i) = 1 means that the process transmits in round i after its wakeup, and π(i) = 0 means that the process listens in round i after its wakeup. Round 0 is the round in which the process is woken up. We now describe the two tasks under consideration, in the context of the communication over a MAC, and define the power of the adversary for each task. The adversary wakes up some of the processes in some, possibly different

3 514 J. Czyzowicz et al. rounds. Every process starts executing its protocol in its wake-up round. Actions of an awake process in a given round depend on its label, on its input value, on the previously heard messages (or noise, if collision detection is available), on the number of rounds since its wake-up, on the global round number, if there is a global clock, and on the number n of processes, if this number is known. Consensus Let {1,..., α}, forα 2, be the range of possible input values of processes. The adversary chooses a function v : {1,..., n} {1,..., α} which assigns an input value to every process. A consensus algorithm is distributedly run by all awake processes. Each action of a process can be either listening or transmitting some message and/or deciding a value from {1,..., α}. The following three conditions must be satisfied: Termination: each awake process eventually decides Validity: a decision is on one of the input values of awake processes Agreement: all awake processes decide the same value The time complexity of a consensus algorithm is the maximum number of rounds, over all awake processes, between the wake-up time and the decision time. Mutual Exclusion A mutual exclusion algorithm is distributedly run by all awake processes. Each process executes a protocol partitioned into the following sections: Entry (trying): the part of the protocol executed in preparation for entering the critical section Critical: the part of the protocol to be protected from concurrent execution Exit: the part of the protocol executed on leaving the critical section Remainder: the rest of the protocol Each process executes these sections cyclically in the order: remainder, entry, critical, and exit. In the traditional mutual exclusion problem, as defined in [2,31] in the context of the shared-memory model, the adversary controls the sections remainder and critical (in particular it controls their duration in each cycle, only subject to the obvious assumption that this duration in each cycle is finite), while an algorithm provides a protocol for the entry and exit sections of each process. In the model of communication over a MAC, each action of a process can be either listening or transmitting some message, as well as changing sections of the protocol: entering the critical section, if the process is currently in the entry section, and entering the remainder section, if the process is currently in the exit section. We assume that changing sections occurs momentarily between consecutive rounds, i.e., in each round a process is exactly in one section of the protocol. The following assumption is specific for mutual exclusion with communication over a MAC, replacing the traditional communication by shared variables: the MAC is not used by the adversary in the sections remainder and critical (otherwise the adversary would have an unlimited power of creating collisions in

4 Consensus and Mutual Exclusion in a Multiple Access Channel 515 the MAC, thus preventing communication if collision detection is not available). Instead, the protocol can use the MAC while a process is in the critical section by sending the message occupied. Any mutual exclusion algorithm has to satisfy the following two properties: Exclusion: in every round of any execution, at most one process is in the critical section. No deadlock: in every round r of any execution, if there is a process in the entry section at round r then some process will enter the critical section eventually after round r. Note that we do not require the no lockout property, stronger than no deadlock: in every round r of any execution, if there is a process in the entry section at round r, thenthis process will enter the critical section eventually after round r. The time complexity of a mutual exclusion algorithm, called the makespan, is the maximum number of rounds in any interval when there is some process in the entry section and there is no process in the critical section. Our results. If none of the three characteristics (collision detection, global clock, knowledge of the number n of all processes) is available in the channel, we prove that consensus and mutual exclusion are infeasible. If at least one of them is available, both tasks are feasible and we study their time complexity. Collision detection is shown to cause an exponential gap in complexity. If it is available, both tasks can be performed in logarithmic time, which is optimal. More precisely, consensus with values in the range {1,..., α} can be performed in time O(min(log n, log α)) and mutual exclusion in time O(log n), and both these orders of magnitude are tight. If collision detection is not available, we show that both consensus and mutual exclusion require time Ω(n). We then investigate both consensus and mutual exclusion in the absence of collision detection, but under alternative presence of the two other characteristics. With global clock, we give an algorithm for consensus and mutual exclusion whose time complexity linearly depends on n and on the wake-up time, and an algorithm whose complexity does not depend on the wake-up time and differs from the linear lower bound only by a factor O(log 2 n). If n is known, we also show an algorithm whose complexity differs from the linear lower bound only by a factor O(log 2 n). The paper is organized as follows. In Section 2 we show infeasibility of the considered tasks in the weakest model. In Section 3 we present a consensus algorithm with collision detection, show that it is optimal and prove a linear lower bound on the complexity of our tasks without collision detection. In Sections 4 and 5 we present consensus algorithms assuming the availability only of a global clock, resp. only of the knowledge of the number of processes, in the absence of the two other characteristics. Section 6 is devoted to presenting a scheme that transforms a consensus algorithm to a mutual exclusion algorithm. Thus we obtain corollaries for the complexity of mutual exclusion from the previous results. Section 7 contains conclusions and open problems. Due to lack of space, proofs of the results are omitted. They will appear in the full version of the paper.

5 516 J. Czyzowicz et al. Related work. The multiple access channel (MAC) is a well-studied communication medium. Research concerning the MAC can be divided into two parts: one assuming that some communicating processes are woken up by the adversary in possibly different rounds (this is the model used in this paper), and the other assuming that all processes are awake from the beginning. In the first model two tasks were mainly studied in the literature: the wake-up problem in which one process has to transmit alone in some round, thus waking up all other processes [9,17,24,26] and the continuous broadcast, in which processes start to broadcast possibly multiple messages in different rounds, the broadcast being successful when the process transmits alone in some round. The latter problem is subject to dynamic packet arrival, either modeled by an adversarial queuing framework (see, e.g., [4,11]), or by queue-free framework (see, e.g., [28]), or by stochastic distributions (see, e.g., [21]). One of the fundamental problems investigated assuming that all processes communicating over a MAC are awake from the beginning is the leader election problem. For deterministic leader election without collision detection and with a known number n of processes, matching bounds on time Ω(n log n) and O(n log n) follow from [14], with the upper bound being non-constructive. A constructive upper bound O(n polylog (n)) follows from [24]. For the time of deterministic algorithms with collision detection, matching bounds are also known: Ω(log n) follows from [22], and O(log n) follows from [5,23,35]. For the expected time of randomized algorithms without collision detection, the same matching bounds are known: Ω(log n) follows from [30] and O(log n) from [3]. Randomized leader election with collision detection can be done faster: matching bounds Ω(log log n) (forfairprotocols)ando(log log n) were proved in [36]. Further references can be found in [25,32]. Communication with possible failures (e.g., crash or Byzantine) has been investigated in the above model, e.g., in [15,18,20]. It should be noted that the MAC is equivalent to a special case of the popular radio network model, namely when the underlying graph is complete. General radio networks were intensely studied in the context of the broadcasting problem, starting with the seminal paper [10]. Most researchers worked in the model without collision detection: deterministic broadcasting in this model was studied, e.g., in [8,14,16] and randomized broadcasting in [1,16,29,30]. Fewer papers were devoted to broadcasting with collision detection, cf. [8,19]. Communication with possible failures (such as crash, Byzantine, probabilistic) has also been studied in multi-hop radio network models, see, e.g., [15,27,34] Consensus and mutual exclusion are two classic problems in distributed computing, mostly studied assuming that processes communicate by shared variables or through message passing networks [2,31]. In [6], feasibility and complexity of consensus in a multiple access channel with synchronized starting points and crash failures were studied in the context of different collision detectors the tools introduced in that work by the analogy to classic failure detectors. To the best of our knowledge, consensus and mutual exclusion were never studied in the context of a multiple access channel with non-synchronized wake-up times.

6 Consensus and Mutual Exclusion in a Multiple Access Channel Infeasibility in the Weakest Model We start with a negative result that neither consensus nor mutual exclusion are feasible in the weakest of all models considered in this paper, the model in which none of the assumptions CD, GC, KN holds. Theorem 1. Consensus and mutual exclusion are infeasible without collision detection, without a global clock and with an unknown number n of processes. The above impossibility result should be contrasted with the positive solution of the wake-up problem in the same model. Indeed, it was shown in [17] that wake-up in a MAC can be achieved in polynomial time without a global clock, collision detection or the knowledge of the number of processes. Hence wake-up in the weakest of our models is strictly easier than consensus. This difference can be also viewed as follows. Consider the special case of the consensus problem in which the input value of each process is equal to its label. This is called label consensus and it is clearly equivalent to leader election. While wake-up in the weakest model is feasible and all other awake processes can elect as the leader the first process to speak alone, this process itself cannot become aware that it is the leader. 3 Impact of Collision Detection Collision detection permits a listening process to distinguish between silence and collision noise, which occurs when at least two messages are sent. Hence any listening process hears either the silence, or collision noise, or the content of the message transmitted. We say that a listening process hears signal μ, if one or more processes transmit in the given round. A round is called silent for a listening process i, ifi hears silence in this round, and it is noisy for i, ifi hears signal μ. 3.1 Availability of Collision Detection We first prove a lower bound on the time of consensus and on the makespan of mutual exclusion even in the strongest of our models. Theorem 2. Any consensus algorithm, even with collision detection, global clock and known number n of processes, requires time Ω(min(log n, log α)). Anymutual exclusion algorithm, even with collision detection, global clock and known number n of processes, has makespan Ω(log n). We now present a consensus algorithm matching the above lower bound Ω(min(log n, log α)), if collision detection is available, even without the global clock or the knowledge of n. We first design a consensus algorithm working in time O(log α). Let B v(i) = b 1 b 2...b l denote the string of bits in the binary representation of the input value v(i) of process i, written in reverse order, i.e. starting from the least significant

7 518 J. Czyzowicz et al. bit. Only meaningful bits of this representation are considered. Hence the last bit b l of B v(i) always equals 1 and B v(i) = log v(i). Consider the first round r when some process is woken up. In the case when there is only one process wokenupinroundr the consensus value is the input value of this process. Otherwise, the consensus value v(i ) is the input value of process i woken up in round r, such that for any process i woken up in round r, B v(i) B v(i ), where denotes the natural lexicographic order of bit-strings (we also write B v(i) B v(j),ifb v(i) B v(j) and B v(i) B v(j) ). The transmission schedule π i,v(i) begins with 0001 followed by the infinite sequence of repetitions of bit-string b 1 1b b l 1 1b l 001, that we will call the value transmission pattern. The only message ever transmitted by a process is the contact message consisting of bit 1. During the algorithm execution each process i may be either active, when it follows its transmission schedule π i,v(i), or passive, when it listens forever. At least one process remains active forever. This process will follow its value transmission pattern periodically and its input value becomes the consensus value. Passive processes decode this value from a sequence of silent and noisy rounds. Algorithm ConsensusCD1 (integer v) 1 active: Listen for three rounds; if silence is always heard then transmit in round 4 else goto passive; 2 Follow value transmission pattern for v; if μ is heard at some listening round then goto passive; 3 Decide on v; 4 forever follow value transmission pattern for v periodically. 5 passive: Wait until silence is heard for two consecutive rounds ρ, ρ +1; 6 Start counting rounds r 1,r 2,...,withr 1 = ρ +2; Listen until silence is heard in the first odd-numbered round r 2k+1 ; For each even-numbered round r 2j,for0< 2j <2k +1, store bit 0 if silence was heard and bit 1 otherwise; Interpret the reverse of the stored bit-string as a binary representation of value x; Decide on x. Each process i runs Algorithm ConsensusCD1 with its input value v(i) asthe parameter v. Lemma 1. Algorithm ConsensusCD1 reaches consensus with collision detection in time O(log α). We now present our main consensus algorithm with collision detection, working in time O(min(log n, log α)). It essentially consists in running in parallel ConsensusCD1(v(i)) and ConsensusCD1(i). This may be done by reserving oddnumbered rounds for one algorithm and even-numbered rounds for the other one.

8 Consensus and Mutual Exclusion in a Multiple Access Channel 519 Since global clock is not available, some synchronization is necessary in order for each process to recognize at some point the round parity. Similarly as before we consider the string B i =b 1b 2...b m - which is the inverse of the binary representation of label i. Wecallthelabel transmission pattern of process i the sequence of bits b 1 1b b m 1 1b m001. Unless specified otherwise, the message transmitted in each transmission round is the contact message. Algorithm ConsensusCD2 (integer i, integer v) 1 active: Listen for six rounds; if silenceisalwaysheardthen transmit in round 7 else goto passive; 2 Starting from the 7th round after wake-up consider the numbering of rounds r 1,r 2,... Follow b 1 1b b l 1 1b l the value transmission pattern of v in the odd-numbered rounds Follow b 11b 21...b m 11b m001 - the label transmission pattern for i in the even-numbered rounds if μ is heard at some listening round in the above patterns then goto passive; 3 if the end of the value transmission pattern is achieved then Decide on v forever follow the pattern b 1 1b b l 1 1b l periodically; 4 if the end of the label transmission pattern is achieved then Decide on v forever follow the pattern periodically, where v is transmitted in each transmission round. 5 passive: Listen until silence is heard for five consecutive rounds; Listen until silence is heard again for five consecutive rounds ρ +1,...,ρ+ 5 and signal μ is heard in round ρ +6; 6 if silence is heard in round ρ +7then Decide on x (inthiscaseamessagewasheardinroundρ +6); 7 else Start counting rounds r 1,r 2,...,withr 1 = ρ +7 Listen until silence is heard in the first odd-numbered round r 2k+1 For each even-numbered round r 2j, for 2j <2k +1, store bit 0 if silence was heard and bit 1 otherwise Interpret the reverse of the stored bit-string as a binary representation of integer x Decide on x. Each process i runs Algorithm ConsensusCD2 with its label i and its input value v(i) as the parameters of the algorithm. Theorem 3. Algorithm ConsensusCD2 reaches consensus with collision detection in time O(min(log n, log α)).

9 520 J. Czyzowicz et al. 3.2 Absence of Collision Detection The following lower bound on the complexity of consensus and mutual exclusion in the absence of collision detection shows an exponential gap caused by the lack of this characteristic of the MAC. Theorem 4. Any consensus (resp. mutual exclusion) algorithm in the model without collision detection, even with global clock and known number n of processes, requires time (resp. makespan) at least n/2. 4 Global Clock In this section we assume that a global clock is available to all awake processes, but we do not assume collision detection or the knowledge of the number n of processes. We present algorithms for consensus based on the following scheme. Algorithmic scheme GlobalClock The set of natural numbers (corresponding to the round numbers given by the global clock) is partitioned into an infinite family A 1,A 2,... of pairwise disjoint infinite sets. The set A i is the set of rounds reserved for process i, i.e., no other process transmits in these rounds. Process i that was woken up in (global) round t listens in rounds t, t +1,..., t,wheret + 1 is the first integer larger than t belonging to A i. If silence was heard in all these rounds, then process i decides on its value v(i) and in all rounds larger than t transmits value v(i). If some value w was heard in one of the rounds t, t +1,..., t, then process i decides on value w and remains silent forever. Lemma 2. The algorithmic scheme GlobalClock reaches consensus with global clock, for any family A 1,A 2,... of pairwise disjoint infinite sets of natural numbers. Depending on the particular family of sets A 1,A 2,..., the algorithmic scheme GlobalClock can produce various consensus algorithms. We show two such algorithms with incomparable complexities. The first one, Algorithm GlobalClock1, has complexity O(n + t), where t is the largest wake-up round of any process. It matches the lower bound Ω(n) from Theorem 4, for small values of t. Algorithm GlobalClock1 It is enough to define the family of sets A 1,A 2,... First partition the set N of natural numbers into consecutive segments C 0,C 1,... called blocks. BlockC i has length 2 i.forafixedi, letr 1,..., r 2 i be elements of C i. We define the function f i : C i N by f i (r j )=j. This gives the function f : N N defined as f i on block C i. The function f corresponds to the sequence (1, 1, 2, 1, 2, 3, 4, 1, 2, 3, 4, 5, 6, 7, 8,...). Now the set A i is defined as f 1 ({i}).

10 Consensus and Mutual Exclusion in a Multiple Access Channel 521 Lemma 3. Algorithm GlobalClock1 reaches consensus with global clock in time O(n + t), wheret is the largest wake-up round of any process. While the complexity of Algorithm GlobalClock1 matches the lower bound Ω(n) for small values of t, it may be arbitrarily large (as compared to the number of processes), if processes are woken up late in global history. Hence it is natural to seek a consensus algorithm whose complexity does not depend on the times of wake-up of processes by the adversary. Our next algorithm, also based on the algorithmic scheme GlobalClock, satisfies this requirement. Algorithm GlobalClock2 Again it suffices to define the family of sets A 1,A 2,... First partition the set N of natural numbers into consecutive blocks B 0,B 1,... BlockB i has length 8 2 i i 2 and it is formed of positions enumerated from 1 to 8 2 i i 2. We subdivide B i into i + 1 pairwise disjoint lists S i (1),..., S i (i) andr i. Consider a list S i (l), where 2 k 1 l 2 k 1forsome1 k log i. The consecutive elements of such S i (l)arepositions2 k x+2 k 1 in B i for all integers x satisfying x l (mod 2 k 1 ). Note that consecutive elements in such S i (l) are at distance 2 k 2 k 1 =2 2k 1 in B i. We now show that for any 1 l 1 <l 2 i the lists S i (l 1 )ands i (l 2 )donot intersect. First, if 2 k 1 l 1 <l 2 2 k 1forsome1 k log i, then values x 1 l 1 (mod 2 k 1 )andx 2 l 2 (mod 2 k 1 ) can only be equal when l 1 l 2 > 2 k 1, which is impossible. Assume now that 2 k1 1 l 1 2 k1 1and 2 k2 1 l 2 2 k2 1, for some 1 k 1 <k 2 log i. Note that in this case integers in S i (l 1 ) are certain multiples of 2 k1 1 but not multiples of 2 k1. Since integers in S i (l 2 ) are certain multiples of 2 k2 1 which are multiples of 2 k1 when k 2 >k 1, the intersection of S i (l 1 )ands i (l 2 ) is also empty. Finally, the list R i contains all remaining positions in B i, i.e., R i = B i \ (S i (1) S i (l)). For each i and for l = 1,..., i, we now define functions g l : S i (l) {2 l 1,..., 2 l 1} as follows. The function g l assigns elements from the set {2 l 1,..., 2 l 1} to consecutive elements from the list S i (l) in a round-robin fashion, i.e., forming the sequence of values (2 l 1,..., 2 l 1, 2 l 1,..., 2 l 1, 2 l 1,..., 2 l 1,...). We additionally define the function h i as the function constantly equal 1 on the domain R i. Since the lists S i (1),..., S i (i),r i form a disjoint partition of the block B i,the above functions define, for each i, a function φ i : B i {1,..., 2 i 1}. Thisin turn gives the function φ : N N defined as φ i on block B i.nowtheseta i is defined as φ 1 ({i}). Lemma 4. Algorithm GlobalClock2 reaches consensus with global clock in time O(n log 2 n). By interleaving algorithms GlobalClock1 and GlobalClock2 on even and odd rounds, respectively, listening in the first two rounds after wake-up and keeping silence on both threads as soon as a process hears some value in one of the threads, we get the following result.

11 522 J. Czyzowicz et al. Theorem 5. There exists an algorithm reaching consensus with global clock in time O(min(n+t, n log 2 n)), wheret is the largest wake-up round of any process. 5 Known Number of Processes In this section, we assume that the number n of all processes is known to every process, but we do not assume global clock or collision detection. Our consensus algorithm uses the notion of a fixed transmission schedule, introduced in [17]. A fixed transmission schedule of process i is a finite binary sequence π i depending only on the label i of the process and on the parameter n. The interpretation of π i is the following. If process i is woken up in round t, then i transmits in round t + u 1ifπ i (u) =1andi listens in round t + u 1 if π i (u) = 0. It was proved in [17] that, for every n, there exists a set of fixed transmission schedules {π i : i =1,..., n} of length s O(n log 2 n), such that regardless of the (non-empty) set of processes woken up by the adversary and regardless of the wake-up rounds of these processes, there exists a process and a round t + s,wheret is the earliest wake-up round of any process and s s, in which this process transmits alone. Thus the easier problem of wake-up can be solved in time O(n log 2 n). Our aim is to give a consensus algorithm with the same time complexity. Algorithm KnownNumber Starting in its wake-up round t, process i listens for s rounds. If it hears some input value in one of these rounds, it decides on this value and remains silent forever. If it hears silence in all these s rounds, it starts transmitting its input value according to the schedule π i. If it hears some input value in one of the following s rounds, it decides on this value and remains silent forever. If it does not hear any message in all the 2s rounds, it decides on its own input value and transmits it according to the schedule π i repeated periodically forever. Theorem 6. Algorithm KnownNumber reaches consensus in time O(n log 2 n), for any known number n of processes. 6 From Consensus to Mutual Exclusion In this section we propose a generic mutual exclusion algorithm, called MacMEx, which uses a consensus algorithm as a subroutine and solves the problem of mutual exclusion, preserving the complexity of the consensus solution. Using the consensus algorithms developped in the previous sections, we obtain mutual exclusion algorithms in the respective models. Consider our consensus algorithms in the case when the input value of every process is equal to the label of the process (label consensus). All our algorithms have the following two properties.

12 Consensus and Mutual Exclusion in a Multiple Access Channel 523 P1. Every process listens in the round in which it is woken up. P2. If the decision is on value i, no process other than i transmits in the round when i makes its decision. Hence all our consensus algorithms, considered in the case of label consensus, can be transformed by having the winning process i transmit a special message my label i won in the round r when process i decides on its value and in all subsequent rounds. Indeed, all processes awake in round r will hear this message in round r, decide on i and remain silent forever, and all processes woken up in some round r >rwill hear this message in round r, decide on i and remain silent forever. The complexities of the transformed algorithms remain the same. Hence we may assume that the label consensus subroutine used by Algorithm MacMEx has the following two properties. P 1. Every process listens in the round in which it is woken up. P 2. Starting from the round in which process i decides on its own value, process i transmits the message my label i won forever, and all other processes listen forever. Algorithm MacMEx Entry section. Process i executes a consensus subroutine satifying properties P 1 and P 2, with its label as the input value, until one of the following events occurs: process i decides on its own label; in this case process i enters the critical section process i hears either the message occupied or the message my label j won ; in this case process i stops the execution of the consensus subroutine and listens on the MAC in the next round process i hears the message released ; in this case process i starts a new execution of the consensus subroutine with its label as the input value. Critical section. Process i transmits the message occupied on the MAC in each round when it is in the critical section. The rest of the behavior of the process in this section is controlled by the adversary. Exit section. Process i transmits the message released on the MAC and leaves the section. The proof of correctness of Algorithm MacMEx is based on the following invariant. Lemma 5. Exactly one of the following properties holds in any round r: Q1 the message occupied is heard in round r and its sender is the only process in the critical section in this round; additionally, no process is in the exit section and no process executes the consensus subroutine in round r; or

13 524 J. Czyzowicz et al. Q2 the message released is heard in round r and its sender is the only process in the exit section in this round; additionally, no process is in the critical section and no process executes the consensus subroutine in round r; or Q3 there is at least one process executing the consensus subroutine in round r; additionally, all such processes are exactly those in the entry section and no process is in the critical or exit sections in round r; or Q4 all processes are in the remainder section in round r. Using Lemma 5 we can prove the following theorem. Theorem 7. Algorithm MacMEx with a consensus subroutine satisfying properties P 1 and P 2, is a mutual exclusion algorithm with no deadlock. Moreover, the makespan of the MacMEx algorithm is the same as the time complexity of the consensus subroutine. Combining Theorem 7 with Theorems 3, 5 and 6 for the label-consensus version of the problem, we derive the following conclusions for mutual exclusion. Theorem 8. Algorithm MacMEx is a mutual exclusion algorithm with no deadlock in a multiple access channel having at least one of the following characteristics: collision detection, global clock, or the knowledge of the number n of processes. The makespan of algorithm MacMEx is: (i) O(log n), if collision detection is assumed; (ii) O(min(n + t, n log 2 n)), ifglobalclockisassumedandt is the largest round of the wake-up of any process; (iii) O(n log 2 n), ifknowledgeofn is assumed. Moreover, the first bound is tight, while the two others differ from the lower bound Ω(n) without collision detection at most by a factor of O(log 2 n). 7 Conclusion and Open Problems We provided almost optimal algorithms for consensus and mutual exclusion with processes communicating over a MAC. It would be interesting to close the O(log 2 n) factor gaps in the models without collision detection but with global clock or with a known number of processes. (In the model with collision detection our algorithms have optimal complexity.) It also remains open how randomization influences the complexity of these problems with MAC communication. Another set of open problems concerns energy consumption. We may assume that processes can not only transmit or listen, but can switch off. Then a natural measure of efficiency is the maximum or average number of rounds in which a process is active (listens or transmits). Finally, in the case of mutual exclusion, we guaranteed no deadlock, but not the stronger no lockout property. It remains open if mutual exclusion with no lockout is feasible in all models except the weakest one, and if so, what is its complexity.

14 References Consensus and Mutual Exclusion in a Multiple Access Channel Alon, N., Bar-Noy, A., Linial, N., Peleg, D.: A lower bound for radio broadcast. J. of Computer and System Sciences 43, (1991) 2. Attiya, H., Welch, J.: Distributed Computing. John Wiley and Sons, Inc., Chichester (2004) 3. Bar-Yehuda, R., Goldreich, O., Itai, A.: On the time complexity of broadcast in radio networks: an exponential gap between determinism and randomization. Journal of Computer and System Sciences 45, (1992) 4. Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proceedings, 17th Annual ACM Symposium on Parallel Algorithms (SPAA), pp (2005) 5. Capetanakis, J.: Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory 25, (1979) 6. Chockler, G., Demirbas, M., Gilbert, S., Lynch, N.A., Newport, C.C., Nolte, T.: Consensus and collision detectors in radio networks. Distributed Computing 21, (2008) 7. Chlamtac, I., Kutten, S.: On broadcasting in radio networks - problem analysis and protocol design. IEEE Transactions on Communications 33, (1985) 8. Chlebus, B.S., Gasieniec, L., Gibbons, A., Pelc, A., Rytter, W.: Deterministic broadcasting in unknown radio networks. Distributed Computing 15, (2002) 9. Chlebus, B.S., Gasieniec, L., Kowalski, D.R., Radzik, T.: On the wake-up problem in radio networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP LNCS, vol. 3580, pp Springer, Heidelberg (2005) 10. Chlebus, B.S., Kowalski, D.R.: A better wake-up in radio networks. In: Proceedings, 23rd ACM Symposium on Principles of Distributed Computing (PODC), pp (2004) 11. Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Adversarial queuing on the multipleaccess channel. In: Proceedings, 25th ACM Symposium on Principles of Distributed Computing (PODC), pp (2006) 12. Chrobak, M., Gasieniec, L., Kowalski, D.R.: The wake-up problem in multi-hop radio networks. SIAM J. Comput. 36, (2007) 13. Chrobak, M., Gasieniec, L., Rytter, W.: Fast broadcasting and gossiping in radio networks. J. Algorithms 43, (2002) 14. Clementi, A.E.F., Monti, A., Silvestri, R.: Selective families, superimposed codes, and broadcasting on unknown radio networks. In: Proceedings, 12th Ann. ACM- SIAM Symp. on Discrete Algorithms (SODA), pp (2001) 15. Clementi, A.E.F., Monti, A., Silvestri, R.: Round robin is optimal for fault-tolerant broadcasting on wireless networks. In: Meyer auf der Heide, F. (ed.) ESA LNCS, vol. 2161, pp Springer, Heidelberg (2001) 16. Czumaj, A., Rytter, W.: Broadcasting algorithms in radio networks with unknown topology. In: Proceedings, 44th IEEE Symposium on Foundations of Computer Science (FOCS), pp (2003) 17. Gasieniec, L., Pelc, A., Peleg, D.: The wakeup problem in synchronous broadcast systems. SIAM Journal on Discrete Mathematics 14, (2001) 18. Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.C.: Gossiping in a multi-channel radio network. In: Pelc, A. (ed.) DISC LNCS, vol. 4731, pp Springer, Heidelberg (2007)

15 526 J. Czyzowicz et al. 19. Fusco, E.G., Pelc, A.: Acknowledged broadcasting in ad hoc radio networks. Information Processing Letters 109, (2008) 20. Gilbert, S., Guerraoui, R., Newport, C.C.: Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. Theor. Comput. Sci. 410, (2009) 21. Goldberg, L.A., Jerrum, M., Kannan, S., Paterson, M.: A bound on the capacity of backoff and acknowledgment-based protocols. SIAM J. Comput. 33, (2004) 22. Greenberg, A.G., Winograd, S.: A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels. J. ACM 32, (1985) 23. Hayes, J.F.: An adaptive technique for local distribution. IEEE Transactions on Communications 26, (1978) 24. Indyk, P.: Explicit constructions of selectors and related combinatorial structures, with applications. In: Proceedings, 13th ACM-SIAM Symposium on Discrete Algorithms (SODA), pp (2002) 25. Jurdzinski, T., Kutylowski, M., Zatopianski, J.: Efficient algorithms for leader election in radio networks. In: Proceedings, 21st Annual ACM Symposium on Principles of Distributed Computing (PODC), pp (2002) 26. Jurdziński, T., Stachowiak, G.: Probabilistic algorithms for the wakeup problem in single-hop radio networks. In: Bose, P., Morin, P. (eds.) ISAAC LNCS, vol. 2518, pp Springer, Heidelberg (2002) 27. Koo, C.-Y., Bhandari, V., Katz, J., Vaidya, N.H.: Reliable broadcast in radio networks: the bounded collision case. In: Proceedings, 25th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp (2006) 28. Kowalski, D.R.: On selection problem in radio networks. In: Proceedings, 24th ACM Symposium on Principles of Distributed Computing (PODC), pp (2005) 29. Kowalski, D.R., Pelc, A.: Deterministic broadcasting time in radio networks of unknown topology. In: Proceedings, 22nd ACM Symposium on Principles of Distributed Computing (PODC), pp (2003) 30. Kushilevitz, Y., Mansour, Y.: An Ω(D log(n/d)) lower bound for broadcast in radio networks. SIAM J. on Computing 27, (1998) 31. Lynch, N.A.: Distributed Algorithms. Morgan Kaufmann Publ., Inc., San Francisco (1996) 32. Nakano, K., Olariu, S.: Uniform leader election protocols for radio networks. IEEE Transactions on Parallel Distributed Systems 13, (2002) 33. Pelc, A.: Activating anonymous ad hoc radio networks. Distributed Computing 19, (2007) 34. Pelc, A., Peleg, D.: Feasibility and complexity of broadcasting with random transmission failures. In: Proceedings, 24th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp (2005) 35. Tsybakov, B.S., Mikhailov, V.A.: Free synchronous packet access in a broadcast channel with feedback. Prob. Inf. Transmission 14, (1978); Translated from Russian original. Prob. Peredach. Inf. (1977) 36. Willard, D.E.: Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. on Computing 15, (1986)

arxiv: v1 [cs.dc] 9 Oct 2017

arxiv: v1 [cs.dc] 9 Oct 2017 Constant-Length Labeling Schemes for Deterministic Radio Broadcast Faith Ellen Barun Gorain Avery Miller Andrzej Pelc July 11, 2017 arxiv:1710.03178v1 [cs.dc] 9 Oct 2017 Abstract Broadcast is one of the

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

c 2004 Society for Industrial and Applied Mathematics

c 2004 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 18, No. 2, pp. 332 346 c 2004 Society for Industrial and Applied Mathematics FASTER DETERMINISTIC BROADCASTING IN AD HOC RADIO NETWORKS DARIUSZ R. KOWALSKI AND ANDRZEJ PELC

More information

TIME OF DETERMINISTIC BROADCASTING IN RADIO NETWORKS WITH LOCAL KNOWLEDGE

TIME OF DETERMINISTIC BROADCASTING IN RADIO NETWORKS WITH LOCAL KNOWLEDGE SIAM J. COMPUT. Vol. 33, No. 4, pp. 87 891 c 24 Society for Industrial and Applied Mathematics TIME OF DETERMINISTIC BROADCASTING IN RADIO NETWORKS WITH LOCAL KNOWLEDGE DARIUSZ R. KOWALSKI AND ANDRZEJ

More information

Time-Optimal Information Exchange on Multiple Channels

Time-Optimal Information Exchange on Multiple Channels Time-Optimal Information Exchange on Multiple Channels Stephan Holzer 1, Yvonne-Anne Pignolet 2, Jasmin Smula 1, Roger Wattenhofer 1 1 Computer Eng. and Networks Laboratory (TIK), ETH Zurich, Switzerland

More information

Efficient Symmetry Breaking in Multi-Channel Radio Networks

Efficient Symmetry Breaking in Multi-Channel Radio Networks Efficient Symmetry Breaking in Multi-Channel Radio Networks Sebastian Daum 1,, Fabian Kuhn 2, and Calvin Newport 3 1 Faculty of Informatics, University of Lugano, Switzerland sebastian.daum@usi.ch 2 Department

More information

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Acknowledged Broadcasting and Gossiping in ad hoc radio networks Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, 466-8555, Japan, 1 jiro@phaser.elcom.nitech.ac.jp,

More information

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able

More information

Interference-Resilient Information Exchange

Interference-Resilient Information Exchange Interference-Resilient Information Exchange The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Gilbert,

More information

Network-Wide Broadcast

Network-Wide Broadcast Massachusetts Institute of Technology Lecture 10 6.895: Advanced Distributed Algorithms March 15, 2006 Professor Nancy Lynch Network-Wide Broadcast These notes cover the first of two lectures given on

More information

Modeling Radio Networks

Modeling Radio Networks Modeling Radio Networks Calvin Newport and Nancy Lynch MIT CSAIL, Cambridge, MA {cnewport,lynch}@csail.mit.edu Abstract. We describe a modeling framework and collection of foundational composition results

More information

INFORMATION EXCHANGE WITH COLLISION DETECTION ON MULTIPLE CHANNELS

INFORMATION EXCHANGE WITH COLLISION DETECTION ON MULTIPLE CHANNELS *Manuscript Click here to download Manuscript: jco.pdf Click here to view linked References 1 1 1 1 1 1 0 1 0 1 0 1 INORMATION EXCHANGE WITH COLLISION DETECTION ON MULTIPLE CHANNELS Yuepeng Wang 1, Yuexuan

More information

A Randomized Algorithm for Gossiping in Radio Networks

A Randomized Algorithm for Gossiping in Radio Networks A Randomized Algorithm for Gossiping in Radio Networks Marek Chrobak Department of Computer Science, University of California, Riverside, California 92521 Leszek Ga sieniec Department of Computer Science,

More information

Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks

Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks Weijie Shi 1, Qiang-Sheng Hua 1, Dongxiao Yu 2, Yuexuan Wang 1, and Francis C.M. Lau 2 1 Institute for Theoretical Computer Science,

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

How many oblivious robots can explore a line

How many oblivious robots can explore a line Author manuscript, published in "Information Processing Letters 111, 0 (011) 107-1031" DOI : 10.1016/j.tcs.011.09.00 How many oblivious robots can explore a line Paola Flocchini David Ilcinas Andrzej Pelc

More information

Token Traversal in Ad Hoc Wireless Networks via Implicit Carrier Sensing

Token Traversal in Ad Hoc Wireless Networks via Implicit Carrier Sensing Token Traversal in Ad Hoc Wireless Networks via Implicit Carrier Sensing Tomasz Jurdziński 1, Michał Różański 1, and Grzegorz Stachowiak 1 1 Institute of Computer Science, University of Wrocław, Poland.

More information

Tight Bounds for Scattered Black Hole Search in a Ring

Tight Bounds for Scattered Black Hole Search in a Ring Tight Bounds for Scattered Black Hole Search in a Ring Jérémie Chalopin 1, Shantanu Das 1, Arnaud Labourel 1, and Euripides Markou 2 1 LIF, CNRS & Aix-Marseille University, Marseille, France. {jeremie.chalopin,shantanu.das,arnaud.labourel}@lif.univ-mrs.fr

More information

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over

More information

MAC Theory. Chapter 7

MAC Theory. Chapter 7 MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy

More information

Rumors Across Radio, Wireless, and Telephone

Rumors Across Radio, Wireless, and Telephone Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Broadcast in Radio Networks in the presence of Byzantine Adversaries Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)

More information

Monitoring Churn in Wireless Networks

Monitoring Churn in Wireless Networks Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer

More information

Leveraging Channel Diversity to Gain Efficiency and Robustness for Wireless Broadcast

Leveraging Channel Diversity to Gain Efficiency and Robustness for Wireless Broadcast Leveraging hannel Diversity to Gain Efficiency and Robustness for Wireless Broadcast Shlomi Dolev 1, Seth Gilbert 2, Majid Khabbazian 3, and alvin Newport 4 1 Ben-Gurion University, Beersheba, Israel 2

More information

Ring exploration by a team of asynchronous oblivious robots

Ring exploration by a team of asynchronous oblivious robots Ring exploration by a team of asynchronous oblivious robots Paola Flocchini David Ilcinkas Andrzej Pelc Nicola Santoro Abstract We consider the problem of exploring an anonymous unoriented ring by a team

More information

Randomized broadcast in radio networks with collision detection

Randomized broadcast in radio networks with collision detection Randomized broadcast in radio networks with collision detection The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published

More information

Deterministic Symmetric Rendezvous with Tokens in a Synchronous Torus

Deterministic Symmetric Rendezvous with Tokens in a Synchronous Torus Deterministic Symmetric Rendezvous with Tokens in a Synchronous Torus Evangelos Kranakis 1,, Danny Krizanc 2, and Euripides Markou 3, 1 School of Computer Science, Carleton University, Ottawa, Ontario,

More information

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization Reuven Bar-Yehuda Oded Goldreich Alon Itai Department of Computer Science Technion

More information

On uniquely k-determined permutations

On uniquely k-determined permutations On uniquely k-determined permutations Sergey Avgustinovich and Sergey Kitaev 16th March 2007 Abstract Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

On the Complexity of Broadcast Setup

On the Complexity of Broadcast Setup On the Complexity of Broadcast Setup Martin Hirt, Pavel Raykov ETH Zurich, Switzerland {hirt,raykovp}@inf.ethz.ch July 5, 2013 Abstract Byzantine broadcast is a distributed primitive that allows a specific

More information

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.

More information

An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes

An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes Siu-Cheung Chau Dept. of Physics and Computing, Wilfrid Laurier University, Waterloo, Ontario, Canada, N2L 3C5

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1 TOPOLOGY, LIMITS OF COMPLEX NUMBERS Contents 1. Topology and limits of complex numbers 1 1. Topology and limits of complex numbers Since we will be doing calculus on complex numbers, not only do we need

More information

Enumeration of Two Particular Sets of Minimal Permutations

Enumeration of Two Particular Sets of Minimal Permutations 3 47 6 3 Journal of Integer Sequences, Vol. 8 (05), Article 5.0. Enumeration of Two Particular Sets of Minimal Permutations Stefano Bilotta, Elisabetta Grazzini, and Elisa Pergola Dipartimento di Matematica

More information

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Bit Reversal Broadcast Scheduling for Ad Hoc Systems Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems

More information

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Exploring an unknown dangerous graph with a constant number of tokens

Exploring an unknown dangerous graph with a constant number of tokens Exploring an unknown dangerous graph with a constant number of tokens B. Balamohan e, S. Dobrev f, P. Flocchini e, N. Santoro h a School of Electrical Engineering and Computer Science, University of Ottawa,

More information

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random Generating Pseudo-Random Permutations and Maimum Flow Algorithms Noga Alon IBM Almaden Research Center, 650 Harry Road, San Jose, CA 9510,USA and Sackler Faculty of Eact Sciences, Tel Aviv University,

More information

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian

More information

Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-Hop Wireless Sensor Network

Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-Hop Wireless Sensor Network Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-Hop Wireless Sensor Network Marin Bertier, Anne-Marie Kermarrec, Guang Tan To cite this version: Marin Bertier, Anne-Marie Kermarrec, Guang

More information

Sensor Network Gossiping or How to Break the Broadcast Lower Bound

Sensor Network Gossiping or How to Break the Broadcast Lower Bound Sensor Network Gossiping or How to Break the Broadcast Lower Bound Martín Farach-Colton 1 Miguel A. Mosteiro 1,2 1 Department of Computer Science Rutgers University 2 LADyR (Distributed Algorithms and

More information

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

#A13 INTEGERS 15 (2015) THE LOCATION OF THE FIRST ASCENT IN A 123-AVOIDING PERMUTATION

#A13 INTEGERS 15 (2015) THE LOCATION OF THE FIRST ASCENT IN A 123-AVOIDING PERMUTATION #A13 INTEGERS 15 (2015) THE LOCATION OF THE FIRST ASCENT IN A 123-AVOIDING PERMUTATION Samuel Connolly Department of Mathematics, Brown University, Providence, Rhode Island Zachary Gabor Department of

More information

Wireless Networks Do Not Disturb My Circles

Wireless Networks Do Not Disturb My Circles Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys

More information

Fast Sorting and Pattern-Avoiding Permutations

Fast Sorting and Pattern-Avoiding Permutations Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Winning the Lottery: Learning Perfect Coordination with Minimal Feedback

Winning the Lottery: Learning Perfect Coordination with Minimal Feedback 1 Winning the Lottery: Learning Perfect Coordination with Minimal Feedback William Zame, Jie Xu, and Mihaela van der Schaar Abstract Coordination is a central problem whenever stations (or nodes or users)

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

arxiv: v1 [cs.dc] 25 Oct 2017

arxiv: v1 [cs.dc] 25 Oct 2017 Uniform Circle Formation by Transparent Fat Robots Moumita Mondal and Sruti Gan Chaudhuri Jadavpur University, Kolkata, India. arxiv:1710.09423v1 [cs.dc] 25 Oct 2017 Abstract. This paper addresses the

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Broadcast in the Ad Hoc SINR Model

Broadcast in the Ad Hoc SINR Model Broadcast in the Ad Hoc SINR Model Sebastian Daum 1,, Seth Gilbert 3, Fabian Kuhn 1, and Calvin Newport 2 1 Department of Computer Science, University of Freiburg, Germany {sdaum,kuhn}@cs.uni-freiburg.de

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Multiple Communication in Multi-Hop Radio Networks

Multiple Communication in Multi-Hop Radio Networks Multiple Communication in Multi-Hop Radio Networks Reuven Bar-Yehuda 1 Amos Israeli 2 Alon Itai 3 Department of Computer Department of Electrical Department of Computer Science Engineering Science Technion

More information

18.204: CHIP FIRING GAMES

18.204: CHIP FIRING GAMES 18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on

More information

Non-overlapping permutation patterns

Non-overlapping permutation patterns PU. M. A. Vol. 22 (2011), No.2, pp. 99 105 Non-overlapping permutation patterns Miklós Bóna Department of Mathematics University of Florida 358 Little Hall, PO Box 118105 Gainesville, FL 326118105 (USA)

More information

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Peng-Jun Wan 1,ZhuWang 1,ZhiyuanWan 2,ScottC.-H.Huang 2,andHaiLiu 3 1 Illinois Institute of Technology,

More information

arxiv: v1 [cs.ma] 8 Jun 2013

arxiv: v1 [cs.ma] 8 Jun 2013 Rendezvous of Two Robots with Constant Memory P. Flocchini N. Santoro G. Viglietta M. Yamashita arxiv:306.956v [cs.ma] 8 Jun 203 Abstract We study the impact that persistent memory has on the classical

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game The tenure game The tenure game is played by two players Alice and Bob. Initially, finitely many tokens are placed at positions that are nonzero natural numbers. Then Alice and Bob alternate in their moves

More information

Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings

Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings Tight Bounds for Black Hole Search with Scattered Agents in Synchronous Rings Jérémie Chalopin, Shantanu Das, Arnaud Labourel, Euripides Markou To cite this version: Jérémie Chalopin, Shantanu Das, Arnaud

More information

Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks

Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks Shouwen Lai Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial

More information

Broadcast Scheduling in Interference Environment

Broadcast Scheduling in Interference Environment Broadcast Scheduling in Interference Environment Scott C.-H. Huang, eng-jun Wan, Jing Deng Member, IEEE, and Yunghsiang S. Han Senior Member, IEEE Abstract Broadcast is a fundamental operation in wireless

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Scattered Black Hole Search in an Oriented Ring using Tokens

Scattered Black Hole Search in an Oriented Ring using Tokens Scattered Black Hole Search in an Oriented Ring using Tokens Stefan Dobrev, Nicola Santoro, WeiSHI University of Ottawa Carleton University School of Information Technology and Engineering School of Computer

More information

Advanced Automata Theory 4 Games

Advanced Automata Theory 4 Games Advanced Automata Theory 4 Games Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory 4 Games p. 1 Repetition

More information

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Lixin Wang, Peng-Jun Wan, and Kyle Young Department of Mathematics, Sciences and Technology, Paine College, Augusta, GA 30901,

More information

Scheduling broadcasts with deadlines

Scheduling broadcasts with deadlines Theoretical Computer Science 325 (2004) 479 488 www.elsevier.com/locate/tcs Scheduling broadcasts with deadlines Jae-Hoon Kim a,, Kyung-Yong Chwa b a Department of Computer Engineering, Pusan University

More information

From Wireless Network Coding to Matroids. Rico Zenklusen

From Wireless Network Coding to Matroids. Rico Zenklusen From Wireless Network Coding to Matroids Rico Zenklusen A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

Permutation Tableaux and the Dashed Permutation Pattern 32 1

Permutation Tableaux and the Dashed Permutation Pattern 32 1 Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn

More information

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

Combinatorics in the group of parity alternating permutations

Combinatorics in the group of parity alternating permutations Combinatorics in the group of parity alternating permutations Shinji Tanimoto (tanimoto@cc.kochi-wu.ac.jp) arxiv:081.1839v1 [math.co] 10 Dec 008 Department of Mathematics, Kochi Joshi University, Kochi

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

GEOGRAPHY PLAYED ON AN N-CYCLE TIMES A 4-CYCLE

GEOGRAPHY PLAYED ON AN N-CYCLE TIMES A 4-CYCLE GEOGRAPHY PLAYED ON AN N-CYCLE TIMES A 4-CYCLE M. S. Hogan 1 Department of Mathematics and Computer Science, University of Prince Edward Island, Charlottetown, PE C1A 4P3, Canada D. G. Horrocks 2 Department

More information

photons photodetector t laser input current output current

photons photodetector t laser input current output current 6.962 Week 5 Summary: he Channel Presenter: Won S. Yoon March 8, 2 Introduction he channel was originally developed around 2 years ago as a model for an optical communication link. Since then, a rather

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Randomized Broadcast in Radio Networks with Collision Detection

Randomized Broadcast in Radio Networks with Collision Detection Randomized Broadcast in Radio Networks with Collision Detection Mohsen Ghaffari ghaffari@mit.edu MIT Bernhard Haeupler haeupler@mit.edu MIT Majid Khabbazian mkhabbazian@ualberta.ca University of Alberta

More information

Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network

Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network Energy-Optimal and Energy-Balanced Sorting in a Single-Hop Wireless Sensor Network Mitali Singh and Viktor K Prasanna Department of Computer Science University of Southern California Los Angeles, CA 90089,

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks Baruch Awerbuch Dept. of Computer Science Johns Hopkins University Baltimore, MD 21218, USA baruch@cs.jhu.edu Andrea Richa Dept. of Computer

More information

The Worst-Case Capacity of Wireless Sensor Networks

The Worst-Case Capacity of Wireless Sensor Networks The Worst-Case Capacity of Wireless Sensor Networks Thomas Moscibroda Microsoft Research Redmond WA 98052 moscitho@microsoft.com ABSTRACT The key application scenario of wireless sensor networks is data

More information

An Energy-Division Multiple Access Scheme

An Energy-Division Multiple Access Scheme An Energy-Division Multiple Access Scheme P Salvo Rossi DIS, Università di Napoli Federico II Napoli, Italy salvoros@uninait D Mattera DIET, Università di Napoli Federico II Napoli, Italy mattera@uninait

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden

More information

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white

More information

Generic Attacks on Feistel Schemes

Generic Attacks on Feistel Schemes Generic Attacks on Feistel Schemes Jacques Patarin 1, 1 CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France PRiSM, University of Versailles, 45 av. des

More information