Skip to main content
Log in

Dynamic Multiple-Message Broadcast: Bounding Throughput in the Affectance Model

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

A Correction to this article was published on 28 August 2023

This article has been updated

Abstract

We study a dynamic version of the Multiple-Message Broadcast problem, where packets are continuously injected in network nodes for dissemination throughout the network. Our performance metric is the ratio of the throughput of such protocol against the optimal one, for any sufficiently long period of time since startup. We present and analyze a dynamic Multiple-Message Broadcast protocol that works under an affectance model, which parameterizes the interference that other nodes introduce in the communication between a given pair of nodes. As an algorithmic tool, we develop an efficient algorithm to schedule a broadcast along a BFS tree under the affectance model. To provide a rigorous and accurate analysis, we define two novel network characteristics based on the network topology and the affectance function. The combination of these characteristics influence the performance of broadcasting with affectance (modulo a logarithmic function). We also carry out simulations of our protocol under affectance. To the best of our knowledge, this is the first dynamic Multiple-Message Broadcast protocol that provides throughput guarantees for continuous injection of messages and works under the affectance model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Change history

Notes

  1. Throughout, we denote \(\log _2\) simply as \(\log \), unless otherwise stated.

  2. In preliminary work [35], we studied a different model of affectance. The details are included in A.

  3. The second characterization was presented differently in the conference version of this work. The details are included in A.

  4. In settings with collision detection and where the affectance on any given link is O(n), a big enough constant \(c>1\) yields a randomized protocol that succeeds with probability \(1-1/n\).

  5. We refer to the tree and the broadcast schedule indistinctively.

  6. Any broadcast schedule that works under the affectance model could be used.

  7. Notice that changes in the list are not triggered by injections. The list needs to be updated only when a big node receives the token. That is, it is not enough to have a large queue to move to the front of the list.

  8. Notice that this bound on throughput of the modified MMB protocol does not imply that \(K\in O(\log n)\) for the Radio Network model in general. That is, we do not claim that K is logarithmic for the Radio Network model. Only for comparison against the throughput we obtain, we explain how to modify our MMB protocol for the Radio Network model using the WEB protocol for slow nodes instead of the stochastic protocol used. This modified protocol happens to achieve throughput of \(1/O(\log ^2 n)\), but the bound is not obtained by simple instantiation of K in \(\log n\).

References

  1. Alon, N., Bar-Noy, A., Linial, N., Peleg, D.: A lower bound for radio broadcast. J. Comput. Syst. Sci. 43(2), 290–298 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  2. Anantharamu, L., Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Deterministic broadcast on multiple access channels. In: Proc. of the 29th IEEE International Conference on Computer Communications, INFOCOM 2010, pp. 1–5. IEEE, Washington, DC, San Diego, CA (2010)

  3. Anderson, C.R., Rappaport, T.S.: In-building wideband partition loss measurements at 2.5 and 60 ghz. IEEE Trans. Wirel. Commun. 3(3), 922–928 (2004)

    Article  Google Scholar 

  4. Bar-Yehuda, R., Israeli, A., Itai, A.: Multiple communication in multihop radio networks. SIAM J. Comput. 22(4), 875–887 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  5. Bender, M.A., Farach-Colton, M., He, S., Kuszmaul, B.C., Leiserson, C.E.: Adversarial contention resolution for simple channels. In: Proc. of the 17th Annual ACM Symposium on Parallel Algorithms, SPAA 2005, pp. 325–332. ACM, New York, NY, Las Vegas, NV (2005)

  6. Bianchi, G.: Performance analysis of the ieee 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications 18(3), 535–547 (2000). https://doi.org/10.1109/49.840210

    Article  Google Scholar 

  7. Bienkowski, M., Jurdzinski, T., Korzeniowski, M., Kowalski, D.R.: Distributed online and stochastic queuing on a multiple access channel. In: Proc. of the 26th International Symposium on Distributed Computing, DISC 2012, Lect. Notes. Comput. Sci. 7611, 121–135. Springer-Verlag, Berlin, Salvador, Brazil (2012)

  8. Chlamtac, I., Kutten, S.: Tree-based broadcasting in multihop radio networks. IEEE Trans. Computers 36(10), 1209–1223 (1987)

    Article  Google Scholar 

  9. Chlamtac, I., Weinstein, O.: The wave expansion approach to broadcasting in multihop networks. IEEE Trans. Commun. 39(3), 426–433 (1991)

    Article  Google Scholar 

  10. Chlebus, B.S.: Randomized communication in radio networks. In: Pardalos, P., Rajasekaran, S., Reif, J., Rolim, J. (eds.) Handbook on Randomized Computing, I, 401–456. Kluwer Academic Publishers, Norwell, MA (2001)

    Google Scholar 

  11. Chlebus, B.S., Kowalski, D.R., Pelc, A., Rokicki, M.A.: Efficient distributed communication in ad-hoc radio networks. In: Proc. of the 38th International Colloquium on Automata, Languages and Programming, ICALP 2011, Lect. Notes Comput. Sci. vol. 6756, pp. 613–624. Springer-Verlag, Berlin, Zurich, Switzerland (2011)

  12. Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Maximum throughput of multiple access channels in adversarial environments. Distrib. Comput. 22(2), 93–116 (2009)

    Article  MATH  Google Scholar 

  13. Chlebus, B.S., Kowalski, D.R., Rokicki, M.A.: Adversarial queuing on the multiple access channel. ACM Transactions on Algorithms 8(1), 5 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  14. Cisco Systems, Inc.: Cisco wireless control system configuration guide, release 3.2 (2017). https://www.cisco.com/c/en/us/td/docs/wireless/wcs/3-2/configuration/guide/wcscfg32/wcscod.html Accessed Sep 2017

  15. Clementi, A.E.F., Monti, A., Silvestri, R.: Selective families, superimposed codes, and broadcasting on unknown radio networks. In: Proc. of the 12th Annual Symposium on Discrete Algorithms, SODA 2001, pp. 709–718. SIAM, Philadelphia, PA, Washington, DC (2001)

  16. Czumaj, A., Rytter, W.: Broadcasting algorithms in radio networks with unknown topology. In: Proc. of the 44th Symposium on Foundations of Computer Science, FOCS 2003, pp. 492–501. IEEE Computer Society, Washington, DC, Cambridge, MA (2003)

  17. Daum, S., Gilbert, S., Kuhn, F., Newport, C.C.: Broadcast in the ad hoc sinr model. In: Proc. of the - 27th International Symposium on Distributed Computing, DISC 2013, Lect. Notes Comput. Sci. 8205, 358–372. Springer-Verlag, Berlin, Jerusalem, Israel (2013)

  18. De Marco, G.: Distributed broadcast in unknown radio networks. In: Proc. of the 19th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2008, pp. 208–217. SIAM, Philadelphia, PA, San Francisco, CA (2008)

  19. Deb, S., Monogioudis, P., Miernik, J., Seymour, J.P.: Algorithms for enhanced inter-cell interference coordination (eicic) in lte hetnets. IEEE/ACM Trans Networking 22(1), 137–150 (2014)

    Article  Google Scholar 

  20. Ga̧sieniec, L., Peleg, D., Xin, Q.: Faster communication in known topology radio networks. Distrib. Comput. 19(4), 289–300 (2007)

    Article  MATH  Google Scholar 

  21. Ghaffari, M., Haeupler, B., Khabbazian, M.: A bound on the throughput of radio networks. CoRR abs/1302.0264 (2013)

  22. Ghaffari, M., Haeupler, B., Khabbazian, M.: Randomized broadcast in radio networks with collision detection. In: Proc. of the 32nd Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2013, pp. 325–334. ACM, New York, NY, Montreal, Canada (2013)

  23. Goussevskaia, O., Wattenhofer, R., Halldórsson, M.M., Welzl, E.: Capacity of arbitrary wireless networks. In: IEEE INFOCOM 2009, pp. 1872–1880. IEEE (2009)

  24. Halldórsson, M.M., Kortsarz, G., Mitra, P., Tonoyan, T.: Spanning Trees With Edge Conflicts and Wireless Connectivity. In: I. Chatzigiannakis, C. Kaklamanis, D. Marx, D. Sannella (eds.) 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), Leibniz International Proceedings in Informatics (LIPIcs), vol. 107, pp. 158:1–158:15. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2018). 10.4230/LIPIcs.ICALP.2018.158 http://drops.dagstuhl.de/opus/volltexte/2018/9162

  25. Halldórsson, M.M., Wattenhofer, R.: Wireless communication is in apx. In: Proc. of the 36th International Colloquium on Automata, Languages and Programming, ICALP 2009, pp. 525–536. Springer-Verlag, Berlin, Rhodes, Greece (2009)

  26. Jurdzinski, T., Kowalski, D.R.: Distributed backbone structure for algorithms in the sinr model of wireless networks. In: Proc. of the 26th International Symposium on Distributed Computing, DISC 2012, Lect Notes Comput Sci, vol. 7611, pp. 106–120. Springer-Verlag, Berlin, Salvador, Brazil (2012)

  27. Jurdzinski, T., Kowalski, D.R., Rozanski, M., Stachowiak, G.: Distributed randomized broadcasting in wireless networks under the SINR model. In: Proc. of the - 27th International Symposium on Distributed Computing, DISC 2013, Lect Notes Comput Sci, vol. 8205, pp. 373–387. Springer-Verlag, Berlin, Jerusalem, Israel (2013)

  28. Jurdzinski, T., Kowalski, D.R., Stachowiak, G.: Distributed deterministic broadcasting in uniform-power ad hoc wireless networks. In: Proc. of the 19th International Symposium on Fundamentals of Computation Theory, FCT 2013, Lect Notes Comput Sci, vol. 8070, pp. 195–209. Springer-Verlag, Berlin, Liverpool, UK (2013)

  29. Kesselheim, T.: Dynamic packet scheduling in wireless networks. In: Proc. of the 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2012, pp. 281–290. ACM, New York, NY, Madeira, Portugal (2012)

  30. Kesselheim, T., Vöcking, B.: Distributed contention resolution in wireless networks (2010). http://www.thomas-kesselheim.de/science/DistributedContentionResolution.pdf Accessed July 2022. See conference version in [32]

  31. Kesselheim, T., Vöcking, B.: Distributed contention resolution in wireless networks. In: Proc. of the 24th International Symposium on Distributed Computing, DISC 2010, Lect Notes Comput Sci, vol. 6343, pp. 163–178. Springer-Verlag, Berlin, Cambridge, MA (2010). See full version in [31]

  32. Khabbazian, M., Kowalski, D.R.: Time-efficient randomized multiple-message broadcast in radio networks. In: Proc. of the 30th Annual ACM Symposium on Principles of Distributed Computing, PODC 2011, pp. 373–379. ACM, New York, NY, San Jose, CA (2011)

  33. Kowalski, D.R.: On selection problem in radio networks. In: Proc. of the 24th ACM Symposium on Principles of Distributed Computing, PODC 2005, pp. 158–166. ACM, New York, NY, Las Vegas, NV (2005)

  34. Kowalski, D.R., Kudaravalli, H., Mosteiro, M.A.: Ad-hoc affectance-selective families for layer dissemination. CoRR abs/1703.01704 (2017). http://arxiv.org/abs/1703.01704

  35. Kowalski, D.R., Mosteiro, M.A., Rouse, T.: Dynamic multiple-message broadcast: bounding throughput in the affectance model. In: Proc. of the 10th ACM International Workshop on Foundations of Mobile Computing, FOMC 2014, pp. 39–46. ACM, New York, NY, Philadelphia, PA (2014)

  36. Kowalski, D.R., Pelc, A.: Time of deterministic broadcasting in radio networks with local knowledge. SIAM J. Comput. 33(4), 870–891 (2004). https://doi.org/10.1137/S0097539702419339

    Article  MathSciNet  MATH  Google Scholar 

  37. Kowalski, D.R., Pelc, A.: Broadcasting in undirected ad hoc radio networks. Distrib. Comput. 18(1), 43–57 (2005)

    Article  MATH  Google Scholar 

  38. Kowalski, D.R., Pelc, A.: Broadcasting in undirected ad hoc radio networks. Distrib. Comput. 18(1), 43–57 (2005)

    Article  MATH  Google Scholar 

  39. Kowalski, D.R., Pelc, A.: Optimal deterministic broadcasting in known topology radio networks. Distrib. Comput. 19(3), 185–195 (2007)

    Article  MATH  Google Scholar 

  40. Kushilevitz, E., Mansour, Y.: An \(\Omega (D \log (N/D))\) lower bound for broadcast in radio networks. SIAM J. Comput. 27(3), 702–712 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  41. Radunovic, B., Gunawardena, D., Key, P., Proutiere, A., Singh, N., Balan, V., Dejean, G.: Rethinking indoor wireless mesh design: Low power, low frequency, full-duplex. In: Proc. of the 5th IEEE Workshop on Wireless Mesh Networks, WIMESH 2010, pp. 1–6. IEEE, Boston, MA (2010)

  42. Scheideler, C., Richa, A.W., Santi, P.: An o(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. In: Proc. of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, pp. 91–100. ACM, New York, NY, Hong Kong (2008)

  43. Sciancalepore, V., Mancuso, V., Banchs, A., Zaks, S., Capone, A.: Enhanced content update dissemination through d2d in 5g cellular networks. IEEE Trans. Wirel. Commun. 15(11), 7517–7530 (2016)

    Article  Google Scholar 

  44. Shokri-Ghadikolaei, H., Fischione, C., Fodor, G., Popovski, P., Zorzi, M.: Millimeter wave cellular networks: A mac layer perspective. IEEE Trans. Commun. 63(10), 3437–3458 (2015)

    Article  Google Scholar 

  45. Vutukuru, M., Jamieson, K., Balakrishnan, H.: Harnessing exposed terminals in wireless networks. In: Proc. of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008, pp. 59–72. USENIX, Berkeley, CA, San Francisco, CA (2008)

Download references

Acknowledgements

We thank Vicenzo Mancuso for providing useful pointers to scientific literature on current radio communication technologies, and anonymous reviewers for their comments that helped to improve the quality of this paper. This work was partially supported by the Polish National Science Center (NCN) grant UMO-2017/25/B/ST6/02553; the UK Royal Society International Exchanges 2017 Round 3 Grant #170293; and Pace University SRC and Kenan Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miguel A. Mosteiro.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

A preliminary version of this work has appeared in [35]. The differences with respect to that version are detailed in A.

The original online version of this article was revised to update the presentation of Table 1.

Appendix

Appendix

1.1 A Notes

In this section, we highlight the differences between this paper and our preliminary work appeared in [35].

In [35], we studied a model of affectance that subsumes only some SINR models, by combining the effect of Radio Network collisions with affectance from nodes at more than one hop. Here, we generalize our model to subsume any arbitrary interference model. For instance, in the present model it is possible to receive a transmission even when more than one neighboring node transmits, as in some SINR models.

Also, in [35] our maximum path affectance metric was based on fast links only, which yields possibly tighter bounds. However, the definition was based on a specific BFS tree (a GBST [20]) which related the network characterization to our specific algorithmic solution. In the present work the characterization is related only to topology, since it is based on arbitrary BFS trees.

We also notice here that the proof of the maximum rank in [35] has an error, introduced while bounding the maximum number of ranks needed for updating the rank according to affectance. Lemma 1 here provides the correct bound.

1.2 B Instantiation of Affectance in SINR

Claim

The affectance matrix For \(u,v,w\in V\), where \(u\ne w\), the affectance matrix

$$\begin{aligned} A(u,(v,w))&= \frac{P/d_{uw}^\alpha }{P/(\beta ' d_{vw}^\alpha )-N}, \end{aligned}$$

with transmission power level P, background noise N, SINR lower bound for reception \(\beta '\), path-loss exponent \(\alpha \), and Euclidean distance between nodes u and v denoted as \(d_{uv}\), corresponds to the SINR model.

Proof

To prove this claim, we show that there is a successful transmission in the SINR model if and only if there is a successful transmission in the affectance model with matrix A. Consider a successful transmission in the SINR model. We have

$$\begin{aligned} \frac{P/d_{uv}^\alpha }{N+\sum _{w\ne u} P/d_{wv}^\alpha }&> \beta '\\ P/(\beta ' d_{uv}^\alpha )&> N+\sum _{w\ne u} P/d_{wv}^\alpha \\ P/(\beta ' d_{uv}^\alpha ) - N&> \sum _{w\ne u} P/d_{wv}^\alpha . \end{aligned}$$

If \(\sum _{w\ne u} P/d_{wv}^\alpha =0\) then \(\sum _{w\ne u}A(w,(u,v))=0\Rightarrow \) success in affectance model. Otherwise, it is \(\sum _{w\ne u} P/d_{wv}^\alpha >0\) and we have

$$\begin{aligned} \frac{P/(\beta ' d_{uv}^\alpha ) - N}{\sum _{w\ne u} P/d_{wv}^\alpha }&> 1. \end{aligned}$$

Thus, it is \(P/(\beta ' d_{uv}^\alpha ) - N>0\) and, hence, we have

$$\begin{aligned} \frac{\sum _{w\ne u} P/d_{wv}^\alpha }{P/(\beta ' d_{uv}^\alpha )-N}&< 1. \end{aligned}$$

Therefore, it is \(\sum _{w\ne u} A(w,(u,v)) < 1 \Rightarrow \) success in affectance model.

Consider now a non-successful transmission in the SINR model. We have

$$\begin{aligned} \frac{P/d_{uv}^\alpha }{N+\sum _{w\ne u} P/d_{wv}^\alpha }&\le \beta '\\ P/(\beta ' d_{uv}^\alpha )&\le N+\sum _{w\ne u} P/d_{wv}^\alpha \\ P/(\beta ' d_{uv}^\alpha ) - N&\le \sum _{w\ne u} P/d_{wv}^\alpha . \end{aligned}$$

If \(P/(\beta ' d_{uv}^\alpha ) \le N\), it would mean that P is not large enough to overcome the noise, even if no other node transmits. Then, rather than being produced by interference, the failure would be due to consider a link that is not even feasible. That is, \((u,v)\notin E\). Thus, it must be \(P/(\beta ' d_{uv}^\alpha ) > N\) and we have

$$\begin{aligned} \frac{\sum _{w\ne u} P/d_{wv}^\alpha }{P/(\beta ' d_{uv}^\alpha )-N}&\ge 1\\ \end{aligned}$$

Therefore, it is \(\sum _{w\ne u}A(w,(u,v)) \ge 1 \Rightarrow \) failure in affectance model.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kowalski, D.R., Mosteiro, M.A. & Zaki, K. Dynamic Multiple-Message Broadcast: Bounding Throughput in the Affectance Model. Theory Comput Syst 67, 825–854 (2023). https://doi.org/10.1007/s00224-023-10131-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-023-10131-1

Keywords

Navigation