Better Bounds for Online k-Frame Throughput Maximization in Network Switches
نویسندگان
چکیده
We consider a variant of the online buffer management problem in network switches, called the k-frame throughput maximization problem (k-FTM). This problem models the situation where a large frame is fragmented into k packets and transmitted through the Internet, and the receiver can reconstruct the frame only if he/she accepts all the k packets. Kesselman et al. introduced this problem and showed that its competitive ratio is unbounded even when k = 2. They also introduced an “order-respecting” variant of k-FTM, called k-OFTM, where inputs are restricted in some natural way. They proposed an online algorithm and showed that its competitive ratio is at most 2kB ⌊B/k⌋ + k for any B ≥ k, where B is the size of the buffer. They also gave a lower bound of B ⌊2B/k⌋ for deterministic online algorithms when 2B ≥ k and k is a power of 2. In this paper, we improve upper and lower bounds on the competitive ratio of k-OFTM. Our main result is to improve an upper bound of O(k) by Kesselman et al. to 5B+⌊B/k⌋−4 ⌊B/2k⌋ = O(k) for B ≥ 2k. Note that this upper bound is tight up to a multiplicative constant factor since the lower bound given by Kesselman et al. is Ω(k). We also give two lower bounds. First we give a lower bound of 2B ⌊B/(k−1)⌋ + 1 on the competitive ratio of deterministic online algorithms for any k ≥ 2 and any B ≥ k − 1, which improves the previous lower bound of B ⌊2B/k⌋ by a factor of almost four. Next, we present the first nontrivial lower bound on the competitive ratio of randomized algorithms. Specifically, we give a lower bound of k − 1 against an oblivious adversary for any k ≥ 3 and any B. Since a deterministic algorithm, as mentioned above, achieves an upper bound of about 10k, this indicates that randomization does not help too much.
منابع مشابه
Maximizing Throughput in Energy-Harvesting Sensor Nodes
We consider an online throughput maximization problem in sensor nodes that can harvest energy. The sensor nodes generate and forward packets, which cost energy; they can also harvest energy from the environment, but the amount of energy that can be harvested is not known in advance. We give a number of algorithms and lower bounds for the case of a single node. We consider both the general case ...
متن کاملOnline Routing in Energy-constrained Ad-hoc Networks
We present a new distributed algorithm for online routing of messages in ad-hoc networks where the nodes are energy-constrained. The objective is to maximize the network throughput assuming no information regarding future message arrivals. We show that our algorithm (which uses only one shortest path computation) achieves a competitive ratio that is logarithmic in the size of the network. We al...
متن کاملThe energy harvesting multi-way relay channel with intermittent data: the impact of buffer sizes
In this paper, a multi-way relay channel is considered with energy harvesting nodes. The harvested energy at each node can be stored in a battery of finite capacity. Additionally, each node employs a data buffer of limited size to store data prior to transmission. Data packets to be exchanged between the nodes arrive at the source nodes in an intermittent fashion. In this setup, the offline sum...
متن کاملScheduling algorithms for throughput maximization in data networks
This thesis considers the performance implications of throughput optimal scheduling in physically and computationally constrained data networks. We study optical networks, packet switches, and wireless networks, each of which has an assortment of features and constraints that challenge the design decisions of network architects. In this work, each of these network settings are subsumed under a ...
متن کاملOnline time-constrained scheduling in linear and ring networks
We consider the problem of scheduling a sequence of packets over a linear network, where every packet has a source and a target, as well as a release time and a deadline by which it must arrive at its target. The model we consider is bufferless, where packets are not allowed to be buffered in nodes along their paths other than at their source. This model applies to optical networks where opto-e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Theor. Comput. Sci.
دوره 657 شماره
صفحات -
تاریخ انتشار 2013