{"title":"通过乘法权重更新的简单争用解决","authors":"Yi-Jun Chang, Wenyu Jin, S. Pettie","doi":"10.4230/OASIcs.SOSA.2019.16","DOIUrl":null,"url":null,"abstract":"We consider the classic contention resolution problem, in which devices conspire to share some common resource, for which they each need temporary and exclusive access. To ground the discussion, suppose (identical) devices wake up at various times, and must send a single packet over a shared multiple-access channel. In each time step they may attempt to send their packet; they receive ternary feedback {0, 1, 2+} from the channel, 0 indicating silence (no one attempted transmission), 1 indicating success (one device successfully transmitted), and 2+ indicating noise. We prove that a simple strategy suffices to achieve a channel utilization rate of 1/e − O( ), for any > 0. In each step, device i attempts to send its packet with probability pi, then applies a rudimentary multiplicative weight-type update to pi. pi ← pi · e upon hearing silence (0) pi upon hearing success (1) pi · e− /(e−2) upon hearing noise (2+) This scheme works well even if the introduction of devices/packets is adversarial, and even if the adversary can jam time slots (make noise) at will. We prove that if the adversary jams J time slots, then this scheme will achieve channel utilization 1/e− , excluding O(J) wasted slots. Results similar to these (Bender, Fineman, Gilbert, Young, SODA 2016) were already achieved, but with a lower constant efficiency (less than 0.05) and a more complex algorithm. 2012 ACM Subject Classification Networks → Network protocols, Mathematics of computing → Probabilistic algorithms","PeriodicalId":93491,"journal":{"name":"Proceedings of the SIAM Symposium on Simplicity in Algorithms (SOSA)","volume":"4 1","pages":"16:1-16:16"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Simple Contention Resolution via Multiplicative Weight Updates\",\"authors\":\"Yi-Jun Chang, Wenyu Jin, S. Pettie\",\"doi\":\"10.4230/OASIcs.SOSA.2019.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the classic contention resolution problem, in which devices conspire to share some common resource, for which they each need temporary and exclusive access. To ground the discussion, suppose (identical) devices wake up at various times, and must send a single packet over a shared multiple-access channel. In each time step they may attempt to send their packet; they receive ternary feedback {0, 1, 2+} from the channel, 0 indicating silence (no one attempted transmission), 1 indicating success (one device successfully transmitted), and 2+ indicating noise. We prove that a simple strategy suffices to achieve a channel utilization rate of 1/e − O( ), for any > 0. In each step, device i attempts to send its packet with probability pi, then applies a rudimentary multiplicative weight-type update to pi. pi ← pi · e upon hearing silence (0) pi upon hearing success (1) pi · e− /(e−2) upon hearing noise (2+) This scheme works well even if the introduction of devices/packets is adversarial, and even if the adversary can jam time slots (make noise) at will. We prove that if the adversary jams J time slots, then this scheme will achieve channel utilization 1/e− , excluding O(J) wasted slots. Results similar to these (Bender, Fineman, Gilbert, Young, SODA 2016) were already achieved, but with a lower constant efficiency (less than 0.05) and a more complex algorithm. 2012 ACM Subject Classification Networks → Network protocols, Mathematics of computing → Probabilistic algorithms\",\"PeriodicalId\":93491,\"journal\":{\"name\":\"Proceedings of the SIAM Symposium on Simplicity in Algorithms (SOSA)\",\"volume\":\"4 1\",\"pages\":\"16:1-16:16\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the SIAM Symposium on Simplicity in Algorithms (SOSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/OASIcs.SOSA.2019.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the SIAM Symposium on Simplicity in Algorithms (SOSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/OASIcs.SOSA.2019.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
摘要
我们考虑经典的争用解决问题,其中设备合谋共享一些公共资源,它们每个都需要临时和独占访问。为了进行讨论,假设(相同的)设备在不同的时间被唤醒,并且必须通过共享的多址通道发送单个数据包。在每一个时间步,他们可能会尝试发送他们的数据包;他们从信道接收三元反馈{0,1,2 +},0表示沉默(没有人尝试传输),1表示成功(一个设备成功传输),2+表示噪声。我们证明了一个简单的策略足以实现1/e−O()的通道利用率,对于任何> 0。在每一步中,设备i尝试以概率pi发送它的数据包,然后对pi应用基本的乘法权重类型更新。pi←听到沉默时的pi·e(0)听到成功时的pi(1)听到噪音时的pi·e−/(e−2)(2+)即使设备/数据包的引入是对抗性的,即使对手可以随意堵塞时隙(制造噪音),该方案也能很好地工作。我们证明,如果对手阻塞J个时隙,那么该方案将实现1/e -信道利用率,不包括O(J)个浪费的时隙。类似的结果(Bender, Fineman, Gilbert, Young, SODA 2016)已经实现,但具有较低的恒定效率(小于0.05)和更复杂的算法。2012 ACM主题分类网络→网络协议,计算数学→概率算法
Simple Contention Resolution via Multiplicative Weight Updates
We consider the classic contention resolution problem, in which devices conspire to share some common resource, for which they each need temporary and exclusive access. To ground the discussion, suppose (identical) devices wake up at various times, and must send a single packet over a shared multiple-access channel. In each time step they may attempt to send their packet; they receive ternary feedback {0, 1, 2+} from the channel, 0 indicating silence (no one attempted transmission), 1 indicating success (one device successfully transmitted), and 2+ indicating noise. We prove that a simple strategy suffices to achieve a channel utilization rate of 1/e − O( ), for any > 0. In each step, device i attempts to send its packet with probability pi, then applies a rudimentary multiplicative weight-type update to pi. pi ← pi · e upon hearing silence (0) pi upon hearing success (1) pi · e− /(e−2) upon hearing noise (2+) This scheme works well even if the introduction of devices/packets is adversarial, and even if the adversary can jam time slots (make noise) at will. We prove that if the adversary jams J time slots, then this scheme will achieve channel utilization 1/e− , excluding O(J) wasted slots. Results similar to these (Bender, Fineman, Gilbert, Young, SODA 2016) were already achieved, but with a lower constant efficiency (less than 0.05) and a more complex algorithm. 2012 ACM Subject Classification Networks → Network protocols, Mathematics of computing → Probabilistic algorithms