Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds

K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena
{"title":"Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds","authors":"K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena","doi":"10.4230/LIPIcs.ITCS.2023.46","DOIUrl":null,"url":null,"abstract":"Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"59 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electron. Colloquium Comput. Complex.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.ITCS.2023.46","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.
基于无噪声蜂鸣声的噪声无线网络下界
今天的大部分通信都是通过具有不同输入输出行为的大型无线系统进行的。在这项工作中,我们通过布尔对称f -信道的一般概念来比较无线通信的中心抽象的能力:在f -信道的每一轮中,它的n方中的每一方决定是否广播,并且信道输出f (m),其中m是广播方的数量。我们的第一个结果是,经过充分研究的蜂鸣声通道(其中f是阈值-1函数)并不比任何其他f通道强。为此,我们在f通道上设计了一个协议,并证明任何在蜂鸣声通道上模拟它的协议都会将轮复杂度提高Ω(log n)。我们的下界技术可能是独立的兴趣,因为它本质上是通过利用组合矩形的“局部”松弛来推广流行的愚弄集技术。奇怪的是,虽然这个结果显示了无噪声信道,即蜂鸣声信道的局限性,但我们可以用它来显示许多其他信道的有噪声版本的局限性。这包括被广泛研究的具有碰撞即沉默(CAS)的单跳无线网络模型,它相当于f (m) = 1的f (m) = 1的f -信道。特别是,我们从第一个得到的第二个和主要结果表明,将CAS协议转换为具有噪声弹性的协议可能会产生很大的性能开销,即不存在恒速率交互代码。为此,我们设计了一个CAS协议,并证明了任何协议在具有相关随机噪声的CAS模型上模拟它,都会将轮复杂度提高Ω(log n)。我们提到Ω(log n)的开销在我们的两个结果中都很紧凑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信