Skip to main content

Buffer Size for Routing Limited-Rate Adversarial Traffic

  • Conference paper
  • First Online:
Distributed Computing (DISC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9888))

Included in the following conference series:

Abstract

We consider the slight variation of the adversarial queuing theory model in which an adversary injects packets with routes into the network subject to the following constraint: For any link e, the total number of packets injected in any time window \([t,t')\) and whose route contains e is at most \(\rho (t'-t)+\sigma \), where \(\rho \) and \(\sigma \) are non-negative parameters. Informally, \(\rho \) bounds the long-term rate of injections and \(\sigma \) bounds the “burstiness” of injection: \(\sigma =0\) means that the injection is as smooth as it can be.

It is known that greedy scheduling of the packets (under which a link is not idle if there is any packet ready to be sent over it) may result in \(\varOmega (n)\) buffer size even on an n-node line network and very smooth injections (\(\sigma =0\)). In this paper, we propose a simple non-greedy scheduling policy and show that, in a tree where all packets are destined at the root, no buffer needs to be larger than \(\sigma +2\rho \) to ensure that no overflows occur, which is optimal in our model. The rule of our algorithm is to forward a packet only if its next buffer is completely empty. The policy is centralized: in a single step, a long “train” of packets may progress together. We show that, in some sense, central coordination is required for our algorithm, and even for the more sophisticated “downhill” algorithm in which each node forwards a packet only if its next buffer is less occupied than its current one. This is shown by presenting an injection pattern with \(\sigma =0\) for the n-node line that results in \(\varOmega (n)\) packets in a buffer if local control is used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This model is almost equivalent to Cruz’s \((\sigma ,\rho )\) model (see discussion in [8]). We chose to use the \((\sigma ,\rho )\) model as it allows for simpler expressions to bound the buffer size.

  2. 2.

    LISP programmers might prefer to use car and cdr instead of front and tail!

References

  1. Afek, Y., Awerbuch, B., Gafni, E., Mansour, Y., Rosén, A., Shavit, N.: Slide-the key to polynomial end-to-end communication. J. Algorithms 22(1), 158–186 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  2. Aiello, W.A., Mansour, Y., Rajagopolan, S., Rosén, A.: Competitive queue policies for differentiated services. In: INFOCOM 2000, vol. 2, pp. 431–440 (2000)

    Google Scholar 

  3. Andrews, M., Awerbuch, B., Fernández, A., Leighton, T., Liu, Z., Kleinberg, J.: Universal-stability results and performance bounds for greedy contention-resolution protocols. J. ACM 48(1), 39–69 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  4. Awerbuch, B., Berenbrink, P., Brinkmann, A., Scheideler, C.: Simple routing strategies for adversarial systems. In: 42nd Annual Symposium on Foundations of Computer Science FOCS, pp. 158–167. IEEE Computer Society (2001)

    Google Scholar 

  5. Awerbuch, B., Leighton, F.T.: A simple local-control approximation algorithm for multicommodity flow. In: 34th Annual Symposium on Foundations of Computer Science (FOCS), pp. 459–468 (1993)

    Google Scholar 

  6. Awerbuch, B., Leighton, T.: Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks. In: Proceedings of the 26th Annual ACM Symposium on Theory of Computing (STOC), pp. 487–496 (1994)

    Google Scholar 

  7. Awerbuch, B., Patt-Shamir, B., Varghese, G.: Self-stabilizing end-to-end communication. J. High Speed Netw. 5(4), 365–381 (1996)

    Google Scholar 

  8. Borodin, A., Kleinberg, J., Raghavan, P., Sudan, M., Williamson, D.P.: Adversarial queuing theory. J. ACM 48(1), 13–38 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  9. Le Boudec, J.-Y., Thiran, P. (eds.): Network Calculus. LNCS, vol. 2050. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  10. Cruz, R.L.: A calculus for network delay, part I: network elements in isolation. IEEE Trans. Inf. Theory 37(1), 114–131 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  11. Emek, Y., Halldórsson, M.M., Mansour, Y., Patt-Shamir, B., Radhakrishnan, J., Rawitz, D.: Online set packing. SIAM J. Comput. 41(4), 728–746 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  12. Gettys, J., Nichols, K.: Bufferbloat: dark buffers in the internet. ACM Queue 9(11) (2011)

    Google Scholar 

  13. Goldberg, A.V., Tarjan, R.E.: Finding minimum-cost circulations by successive approximation. Math. Oper. Res. 15(3), 430–466 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  14. Goldwasser, M.H.: A survey of buffer management policies for packet switches. SIGACT News 41(1), 100–128 (2010)

    Article  Google Scholar 

  15. Kesselman, A., Lotker, Z., Mansour, Y., Patt-Shamir, B., Schieber, B., Sviridenko, M.: Buffer overflow management in QoS switches. SIAM J. Comput. 33(3), 563–583 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  16. Kesselman, A., Mansour, Y.: Harmonic buffer management policy for shared memory switches. Theoret. Comput. Sci. 324(2–3), 161–182 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  17. Kesselman, A., Mansour, Y., Lotker, Z., Patt-Shamir, B.: Buffer overflows of merging streams. In: Proceedings of the 15th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp. 244–245 (2003)

    Google Scholar 

  18. Kesselman, A., Rosén, A.: Scheduling policies for CIOQ switches. J. Algorithms 60(1), 60–83 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  19. Kushilevitz, E., Ostrovsky, R., Rosén, A.: Log-space polynomial end-to-end communication. SIAM J. Comput. 27(6), 1531–1549 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  20. Mansour, Y., Patt-Shamir, B., Lapid, O.: Optimal smoothing schedules for real-time streams. Distrib. Comput. 17(1), 77–89 (2004)

    Article  MATH  Google Scholar 

  21. Merlin, P.M., Schweitzer, P.J.: Deadlock avoidance in store-and-forward networks–I: store and forward deadlock. IEEE Trans. Commun. 28(3), 345–354 (1980)

    Article  MathSciNet  Google Scholar 

  22. Open Network Foundation: software-defined networking: the new norm for networks. White paper, April 2012. https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-newnorm.pdf

  23. Rosén, A., Scalosub, G.: Rate vs.buffer size-greedy information gathering on the line. ACM Trans. Algorithms 7(3, article 32) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Avery Miller or Boaz Patt-Shamir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Miller, A., Patt-Shamir, B. (2016). Buffer Size for Routing Limited-Rate Adversarial Traffic. In: Gavoille, C., Ilcinkas, D. (eds) Distributed Computing. DISC 2016. Lecture Notes in Computer Science(), vol 9888. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53426-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-53426-7_24

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-53425-0

  • Online ISBN: 978-3-662-53426-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics