Buffer overflows of merging streams

被引:0
|
作者
Kesselman, A [1 ]
Lotker, Z
Mansour, Y
Patt-Shamir, B
机构
[1] Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel
[2] Tel Aviv Univ, Dept Elect Engn, IL-69978 Tel Aviv, Israel
[3] Hewlett Packard Corp, Cambridge Res Lab, Cambridge, MA 02142 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider a network merging streams of packets with different quality of service (QoS) levels, where packets are transported from input links to output links via multiple merge stages. Each merge node is equipped with a finite buffer, and since the bandwidth of a link outgoing from a merge node is in general smaller than the sum of incoming bandwidths, overflows may occur. QoS is modeled by assigning a positive value to each packet, And the goal of the system is to maximize the total value of packets transmitted on the output links. We assume that each buffer runs an independent local scheduling policy, and analyze FIFO policies that must deliver packets in the order they were received. We show that a simple local on-line algorithm called Greedy does essentially as well as the combination of locally optimal (off-line) schedules. We introduce a concept we call the weakness of a link, defined as the ratio between the longest time a packet spends in the system before transmitted over the link, and the longest time a packet spends in that link's buffer. We prove that for any tree, the competitive factor of Greedy is at most the maximal link weakness.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [21] Unpaced Merging Lines With Uneven Buffer Allocation
    Shaaban, Sabry
    McNamara, Tom
    Dmitriev, Viatcheslav
    IFAC PAPERSONLINE, 2017, 50 (01): : 1093 - 1100
  • [22] A fast cross-entropy method for estimating buffer overflows in queueing networks
    de Boer, PT
    Kroese, DP
    Rubinstein, RY
    MANAGEMENT SCIENCE, 2004, 50 (07) : 883 - 895
  • [23] The Age of Data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
    Slowinska, Asia
    Bos, Herbert
    TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 487 - 500
  • [24] Buffer-overflows: Joint limit laws of undershoots and overshoots of reflected processes
    Mijatovic, Aleksandar
    Pistorius, Martijn
    STOCHASTIC PROCESSES AND THEIR APPLICATIONS, 2015, 125 (08) : 2937 - 2954
  • [25] Binary rewriting and call interception for efficient runtime protection against buffer overflows
    Avijit, Kumar
    Gupta, Prateek
    Gupta, Deepak
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (09): : 971 - 998
  • [26] CSSV: Towards a realistic tool for statically detecting all buffer overflows in C
    Dor, N
    Rodeh, M
    Sagiv, M
    ACM SIGPLAN NOTICES, 2003, 38 (05) : 155 - 167
  • [27] HeapTherapy: An Efficient End-to-end Solution against Heap Buffer Overflows
    Zeng, Qiang
    Zhao, Mingyi
    Liu, Peng
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 485 - 496
  • [28] Simulation of merging pedestrian streams at T-junctions
    Craesmeyer, Matthias
    Schadschneider, Andreas
    CONFERENCE ON PEDESTRIAN AND EVACUATION DYNAMICS 2014 (PED 2014), 2014, 2 : 406 - 411
  • [29] Passive control of two merging streams for microfluidic devices
    Kim, SJ
    Lim, YT
    Yang, H
    Shin, YB
    Kim, K
    Lee, DS
    Park, SH
    Kim, YT
    BIOMEMS AND NANOTECHNOLOGY II, 2006, 6036
  • [30] Asymmetrical buffer allocation in unpaced merging assembly lines
    Shaaban, Sabry
    McNamara, Tom
    Dmitriev, Viatcheslav
    COMPUTERS & INDUSTRIAL ENGINEERING, 2017, 109 : 211 - 220