Buffer Size for Routing Limited-Rate Adversarial Traffic

نویسندگان

  • Avery Miller
  • Boaz Patt-Shamir
چکیده

We consider the slight variation of the adversarial queuing theory model, in which an adversary injects packets with routes into the network subject to the following constraint: For any link e, the total number of packets injected in any time window [t, t′) and whose route contains e, is at most ρ(t′− t) +σ, where ρ and σ are non-negative parameters. Informally, ρ bounds the long-term rate of injections and σ bounds the “burstiness” of injection: σ = 0 means that the injection is as smooth as it can be. It is known that greedy scheduling of the packets (under which a link is not idle if there is any packet ready to be sent over it) may result in Ω(n) buffer size even on an n-line network and very smooth injections (σ = 0). In this paper we propose a simple non-greedy scheduling policy and show that, in a tree where all packets are destined at the root, no buffer needs to be larger than σ + 2ρ to ensure that no overflows occur, which is optimal in our model. The rule of our algorithm is to forward a packet only if its next buffer is completely empty. The policy is centralized: in a single step, a long “train” of packets may progress together. We show that in some sense central coordination is required, by presenting an injection pattern with σ = 0 for the n-node line that results in Ω(n) packets in a buffer if local control is used, even for the more sophisticated “downhill” algorithm, which forwards a packet only if its next buffer is less occupied than its current one.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stability of Adversarial Routing with Feedback

We consider the impact of scheduling disciplines on the performance of routing in the framework of adversarial queuing. We propose an adversarial model which reflects stalling of packets due to transient failures and explicitly incorporates the feedback produced by the network when packets are stalled. This adversarial model provides a methodology to study stability of routing protocols when fl...

متن کامل

Frequency Hopping Based Performance Evaluation of TORA and OLSR Routing Protocols Using OPNET

In this paper analysis and performance of OLSR and TORA routing protocols is done. We used OPNET Simulation tool we created a network containing 50 mobile nodes with data rate 1 Mbps and 2 Mbps with transmission power 0.005 watts and buffer size 256000 bits each node moves randomly in the network and simulation time was 1500 sec. TORA and OLSR routing protocols were compared in terms of Traffic...

متن کامل

Analysis and comparison of hot-potato and single-buffer deflection routing in very high bit rate optical mesh networks

The steady state behavior of regular two-connected multihoP networks in uniform traffic under hot-Pobto and a simple single-buffer deflection routing technique is analyzed for very high bit rate optical applications. Manhattan Street Network and ShuffleNet are compared in terms of throughput, delay, deflection probability, and hop distribution both analytically and network traffic. In a deflect...

متن کامل

Impact of queue buffer size awareness on single and multi service real-time routing protocols for WSNs

Wireless Sensor Networks (WSNs) are increasingly used and will certainly be part of our everyday lives. Many routing protocols were designed with respect to WSNs capacities to allow the achievement of numerous applications. One of the not well investigated areas in WSNs is the queue management issue. The purpose of this paper is to present an analysis of the impact of queue buffer size awarenes...

متن کامل

CORC REPORT TR-2003-06 Effective Routing and Scheduling in Adversarial Queueing Networks∗

Motivation. Scheduling and packet-routing have emerged as important problems in modern computer and communication systems. In this paper, we consider such problems in the setting of an arbitrary synchronous, adversarial network. In an adversarial network, the nature of the incoming traffic is decided by an adversary, operating under a reasonable rate restriction. Such networks have attracted at...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016