Buffer overflows of merging streams

被引:0
|
作者
Kesselman, A [1 ]
Lotker, Z
Mansour, Y
Patt-Shamir, B
机构
[1] Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel
[2] Tel Aviv Univ, Dept Elect Engn, IL-69978 Tel Aviv, Israel
[3] Hewlett Packard Corp, Cambridge Res Lab, Cambridge, MA 02142 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We consider a network merging streams of packets with different quality of service (QoS) levels, where packets are transported from input links to output links via multiple merge stages. Each merge node is equipped with a finite buffer, and since the bandwidth of a link outgoing from a merge node is in general smaller than the sum of incoming bandwidths, overflows may occur. QoS is modeled by assigning a positive value to each packet, And the goal of the system is to maximize the total value of packets transmitted on the output links. We assume that each buffer runs an independent local scheduling policy, and analyze FIFO policies that must deliver packets in the order they were received. We show that a simple local on-line algorithm called Greedy does essentially as well as the combination of locally optimal (off-line) schedules. We introduce a concept we call the weakness of a link, defined as the ratio between the longest time a packet spends in the system before transmitted over the link, and the longest time a packet spends in that link's buffer. We prove that for any tree, the competitive factor of Greedy is at most the maximal link weakness.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [31] Impact of VC merging on buffer requirements in ATM networks
    Schmid, AL
    Iliadis, I
    Droz, P
    HIGH PERFORMANCE NETWORKING, 1998, 8 : 203 - 217
  • [32] Organic wastewater compounds in combined sewer overflows, stormwater, and receiving streams in Omaha, Nebraska
    Vogel, Jason R.
    Frankforter, Jill D.
    Rus, David L.
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2009, 238 : 546 - 546
  • [33] BUFFER SHARING AND SMOOTHING SCHEME OF VBR STREAMS
    Li, Kaihui
    Zhang, Yuanhai
    Xu, Changqiao
    Wu, Zhimei
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 1393 - 1396
  • [34] PwnShield: An Automated Approach to Detect and Exploit Buffer Overflows and Bypassing Modern Mitigation Techniques
    Eddine, Jamai Badr
    Abdellaoui, Abderrahim
    Anass, Bouchnafa
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 170 - 191
  • [35] Value Guard: Protection of Native Applications against Data-Only Buffer Overflows
    Van Acker, Steven
    Nikiforakis, Nick
    Philippaerts, Pieter
    Younan, Yves
    Piessens, Frank
    INFORMATION SYSTEMS SECURITY, 2010, 6503 : 156 - 170
  • [36] Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows
    Rigger, Manuel
    Pekarek, Daniel
    Mossenbock, Hanspeter
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 376 - 390
  • [37] Efficient protection against heap-based buffer overflows without resorting to magic
    Younan, Yves
    Joosen, Wouter
    Piessens, Frank
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 379 - +
  • [38] Merging video streams in a multimedia storage server: complexity and heuristics
    Siu-Wah Lau
    John C.S. Lui
    Leana Golubchik
    Multimedia Systems, 1998, 6 : 29 - 42
  • [39] Merging video streams in a multimedia storage server: complexity and heuristics
    Lau, SW
    Lui, JCS
    Golubchik, L
    MULTIMEDIA SYSTEMS, 1998, 6 (01) : 29 - 42
  • [40] Adaptive Partitioning and Order-Preserved Merging of Data Streams
    Pohl, Constantin
    Sattler, Kai-Uwe
    ADVANCES IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2019, 2019, 11695 : 267 - 282