Buffer overflows of merging streams

被引:0
|
作者
Kesselman, A [1 ]
Lotker, Z
Mansour, Y
Patt-Shamir, B
机构
[1] Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel
[2] Tel Aviv Univ, Dept Elect Engn, IL-69978 Tel Aviv, Israel
[3] Hewlett Packard Corp, Cambridge Res Lab, Cambridge, MA 02142 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider a network merging streams of packets with different quality of service (QoS) levels, where packets are transported from input links to output links via multiple merge stages. Each merge node is equipped with a finite buffer, and since the bandwidth of a link outgoing from a merge node is in general smaller than the sum of incoming bandwidths, overflows may occur. QoS is modeled by assigning a positive value to each packet, And the goal of the system is to maximize the total value of packets transmitted on the output links. We assume that each buffer runs an independent local scheduling policy, and analyze FIFO policies that must deliver packets in the order they were received. We show that a simple local on-line algorithm called Greedy does essentially as well as the combination of locally optimal (off-line) schedules. We introduce a concept we call the weakness of a link, defined as the ratio between the longest time a packet spends in the system before transmitted over the link, and the longest time a packet spends in that link's buffer. We prove that for any tree, the competitive factor of Greedy is at most the maximal link weakness.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [1] Buffer overflows: Exploitation and detection
    Varghese, Surekha Mariam
    Jacob, K. Paulose
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 918 - +
  • [2] Merging ordered streams
    Dosch, W
    Stümpel, A
    COMPUTERS AND THEIR APPLICATIONS, 2000, : 377 - 382
  • [3] RECURRENCE TIMES OF BUFFER OVERFLOWS IN JACKSON NETWORKS
    MEYN, SP
    FRATER, MR
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (01) : 92 - 97
  • [4] Constraint-Based Testing for Buffer Overflows
    Al Sardy, Loui
    Saglietti, Francesca
    Tang, Tong
    Sonnenberg, Heiko
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 99 - 111
  • [5] Software project aims at preventing buffer overflows
    不详
    COMPUTERS & SECURITY, 2003, 22 (04) : 277 - 277
  • [6] A Taxonomy of Software Flaws Leading to Buffer Overflows
    Khoury, Raphael
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 1 - 8
  • [7] Verification of C Buffer Overflows in C Programs
    Bican, Andreea
    Deaconescu, Razvan
    Chin, Wei Ngan
    Quang-Trung Ta
    2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
  • [8] Using static symbolic execution to detect buffer overflows
    I. A. Dudina
    A. A. Belevantsev
    Programming and Computer Software, 2017, 43 : 277 - 288
  • [9] Eliminating Cell Broadband Engine™ DMA Buffer Overflows
    Murase, Masana
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1062 - 1069
  • [10] Exploiting buffer overflows over Bluetooth: the BluePAss tool
    Me, GL
    2005 International Conference on Wireless and Optical Communications Networks, 2005, : 66 - 70