Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds

K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena
{"title":"Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds","authors":"K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena","doi":"10.4230/LIPIcs.ITCS.2023.46","DOIUrl":null,"url":null,"abstract":"Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"59 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Electron. Colloquium Comput. Complex.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.ITCS.2023.46","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于无噪声蜂鸣声的噪声无线网络下界
今天的大部分通信都是通过具有不同输入输出行为的大型无线系统进行的。在这项工作中,我们通过布尔对称f -信道的一般概念来比较无线通信的中心抽象的能力:在f -信道的每一轮中,它的n方中的每一方决定是否广播,并且信道输出f (m),其中m是广播方的数量。我们的第一个结果是,经过充分研究的蜂鸣声通道(其中f是阈值-1函数)并不比任何其他f通道强。为此,我们在f通道上设计了一个协议,并证明任何在蜂鸣声通道上模拟它的协议都会将轮复杂度提高Ω(log n)。我们的下界技术可能是独立的兴趣,因为它本质上是通过利用组合矩形的“局部”松弛来推广流行的愚弄集技术。奇怪的是,虽然这个结果显示了无噪声信道,即蜂鸣声信道的局限性,但我们可以用它来显示许多其他信道的有噪声版本的局限性。这包括被广泛研究的具有碰撞即沉默(CAS)的单跳无线网络模型,它相当于f (m) = 1的f (m) = 1的f -信道。特别是,我们从第一个得到的第二个和主要结果表明,将CAS协议转换为具有噪声弹性的协议可能会产生很大的性能开销,即不存在恒速率交互代码。为此,我们设计了一个CAS协议,并证明了任何协议在具有相关随机噪声的CAS模型上模拟它,都会将轮复杂度提高Ω(log n)。我们提到Ω(log n)的开销在我们的两个结果中都很紧凑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dependency schemes in CDCL-based QBF solving: a proof-theoretic study On blocky ranks of matrices Fractional Linear Matroid Matching is in quasi-NC Aaronson-Ambainis Conjecture Is True For Random Restrictions Optimal Pseudorandom Generators for Low-Degree Polynomials Over Moderately Large Fields
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1