Abstract
In many communications settings, such as wired and wireless local-area networks, when multiple users attempt to access a communication channel at the same time, a conflict results and none of the communications are successful. Contention resolution is the study of distributed transmission and retransmission protocols designed to maximize notions of utility such as channel utilization in the face of blocking communications.
An additional issue to be considered in the design of such protocols is that selfish users may have incentive to deviate from the prescribed behavior, if another transmission strategy increases their utility. The work of Fiat et al. (in SODA ’07, pp. 179–188, SIAM, Philadelphia 2007) addresses this issue by constructing an asymptotically optimal incentive-compatible protocol. However, their protocol assumes the cost of any single transmission is zero, and the protocol completely collapses under non-zero transmission costs.
In this paper we treat the case of non-zero transmission cost c. We present asymptotically optimal contention resolution protocols that are robust to selfish users, in two different channel feedback models. Our main result is in the Collision Multiplicity Feedback model, where after each time slot, the number of attempted transmissions is returned as feedback to the users. In this setting, we give a protocol that has expected cost Θ(n+clogn) and is in o(1)-equilibrium, where n is the number of users.
Similar content being viewed by others
Notes
Recall from the earlier description that the threat of Fiat et al. requires that all remaining players will be transmitting in every step with probability 1 for a large number of steps. This is an equilibrium only when the cost of a transmission is zero.
Alternatively, we can assume that player transmits with p it =0 on all subsequent rounds.
Notice that since the feedback is symmetric, h it =h jt implies H it =H jt .
Since we are interested in symmetric protocols, then the average expected cost is equal to the expected cost of any player, and hence the social utility coincides with the individual utility.
In fact, if the identities of the players were common knowledge, then simply transmitting in lexicographic order would be incentive-compatible and achievable.
A player i who is currently assigned a leave slot keeps transmitting until she succeeds. This technical detail ensures that the protocol will not collapse if some other player j tries to transmit at that slot. Such an event would occur only if j deviated from the protocol by transmitting in the leave slot assigned to i.
It may reduce by two if the player that succeeded during the split belonged to a group of size 2. The other player in that group would be assigned a leave slot in the same round.
More details can be found in the full-version of [8], at www.cs.tau.ac.il/~urinadav/papers/JournalSelfishMac.pdf
As opposed to a player that the protocol instructs to stay quiet during s with probability 1.
At round 0 all players belong to the same group, i.e., M 0=1.
Validation slots only happen if there is at least one player from G j,k that is supposed to transmit in them. Thus, a player cannot have a successful transmission by attacking a validation slot.
If none of the members of G j,k transmitted during the split slot, then i has a successful transmission. If all members but one transmitted, then the cheating does not get caught (and i only had a failed transmission). In this case, it looks as if all members of G j,k transmitted, and the validation slot is skipped. In all other cases, i gets caught.
References
Abramson, N.: The ALOHA system: another alternative for computer communications. In: AFIPS ’70, November 17–19, 1970, pp. 281–285. ACM, New York (1970)
Altman, E., El Azouzi, R., Jiménez, T.: Slotted aloha as a game with partial information. Comput. Netw. 45(6), 701–713 (2004)
Altman, E., Barman, D., Benslimane, A., El Azouzi, R.: Slotted aloha with priorities and random power. In: Boutaba, R., Almeroth, K.C., Puigjaner, R., Shen, S.X., Black, J.P. (eds.) NETWORKING. Lecture Notes in Computer Science, vol. 3462 pp. 610–622. Springer, Berlin (2005)
Auletta, V., Moscardelli, L., Penna, P., Persiano, G.: Interference games in wireless networks. In: Papadimitriou, C.H., Zhang, S. (eds.) WINE. Lecture Notes in Computer Science, vol. 5385, pp. 278–285. Springer, Berlin (2008)
Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Gibbons, P.B., Spirakis, P.G. (eds.) SPAA ’05, pp. 325–332. ACM, New York (2005)
Capetanakis, J.: Tree algorithms for packet broadcast channels. IEEE Trans. Inf. Theory 25(5), 505–515 (1979)
Capetanakis, J.: Generalized TDMA: the multi-accessing tree protocol. IEEE Trans. Commun. 27(10), 1476–1484 (1979)
Fiat, A., Mansour, Y., Nadav, U.: Efficient contention resolution protocols for selfish agents. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’07, pp. 179–188. SIAM, Philadelphia (2007)
Georgiadis, L., Papantoni-Kazakos, P.: A collision resolution protocol for random access channels with energy detectors. IEEE Trans. Commun. 30, 2413 (1982)
Geréb-Graus, M., Tsantilas, T.: Efficient optical communication in parallel computers. In: SPAA ’92, pp. 41–48. ACM, New York (1992)
Goldberg, L.A., Mackenzie, P.D.: Analysis of practical backoff protocols for contention resolution with multiple servers. J. Comput. Syst. Sci. 58(1), 232–258 (1999)
Goldberg, L.A., Mackenzie, P.D., Paterson, M., Srinivasan, A.: Contention resolution with constant expected delay. J. ACM 47(6), 1048–1096 (2000)
Greenberg, A.G., Winograd, S.: A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels. J. ACM 32(3), 589–596 (1985)
Hayes, J.: An adaptive technique for local distribution. IEEE Trans. Commun. 26(8), 1178–1186 (1978)
Koutsoupias, E., Papadimitriou, C.H.: Worst-case equilibria. Comput. Sci. Rev. 3(2), 65–69 (2009)
Ma, R.T.B., Misra, V., Rubenstein, D.: Modeling and analysis of generalized slotted-aloha mac protocols in cooperative, competitive and adversarial environments. In: The 26th International Conference on Distributed Computing Systems (ICDCS 06), p. 62. IEEE, Washington (2006)
MacKenzie, A.B., Wicker, S.B.: Stability of multipacket slotted aloha with selfish users and perfect information (2003)
MacKenzie, P.D., Plaxton, C.G., Rajaraman, R.: On contention resolution protocols and associated probabilistic phenomena. J. ACM 45(2), 324–378 (1998)
Menache, I., Shimkin, N.: Efficient rate-constrained Nash equilibrium in collision channels with state information. In: INFOCOM 2008, pp. 403–411 (2008)
Pippenger, N.: Bounds on the performance of protocols for a multiple-access broadcast channel. IEEE Trans. Inf. Theory 27(2), 145–151 (1981)
Prabhakar, R., Upfal, E.: Stochastic contention resolution with short delays. In: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, STOC ’95, pp. 229–237. ACM, New York (1995)
Roberts, L.G.: Aloha packet system with and without slots and capture. SIGCOMM Comput. Commun. Rev. 5(2), 28–42 (1975)
Miklos, R., Vanroose, P.: How an Erdöos-Rényi-type search approach gives an explicit code construction of rate 1 for random access with multiplicity feedback. IEEE Trans. Inf. Theory 43(1), 368–372 (1997)
Srivastava, V., Neel, J.O., MacKenzie, A.B., Menon, R., DaSilva, L.A., Hicks, J.E., Reed, J.H., Gilles, R.P.: Using game theory to analyze wireless ad hoc networks. IEEE Commun. Surv. Tutor. 7(5), 46–56 (2005)
Tsybakov, B.: Resolution of a conflict of known multiplicity. Problemy Peredachi Informatsii (1980)
Tsybakov, B.S., Mikhailov, V.A.: Free synchronous packet access in a broadcast channel with feedback. Probl. Inf. Transm. 14(4), 259–280 (1978)
Wang, D., Comaniciu, C., Tureli, U.: Cooperation and fairness for slotted aloha. Wirel. Pers. Commun. 43(1), 13–27 (2007)
Zheng, D., Ge, W., Zhang, J.: Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. In: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’07, pp. 1–10. ACM, New York (2007)
Acknowledgements
The first author was partially supported by DFG grant Kr 2332/1-3 within Emmy Noether Program and by EPSRC grant EP/F069502/1. The second author was supported in part by an NSF Graduate Research Fellowship, NSF grant 0937060 to the Computing Research Association for the CIFellows Project, and NSF grant 1004416.
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this work appeared in ICALP 2010.
Rights and permissions
About this article
Cite this article
Christodoulou, G., Ligett, K. & Pyrga, E. Contention Resolution under Selfishness. Algorithmica 70, 675–693 (2014). https://doi.org/10.1007/s00453-013-9773-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00453-013-9773-4