skip to main content
10.1145/1248377.1248430acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
Article

Rate vs. buffer size: greedy information gathering on the line

Published:09 June 2007Publication History

ABSTRACT

We consider packet networks with limited buffer space at the nodes, and are interested in the question of maximizing the number of packets that arrive to destination rather than being dropped due to full buffers.

We initiate a more refined analysis of the throughput competitive ratio of admission and scheduling policies in the Competitive Network Throughput model [2], taking into account not only the network size but also the buffer size and the injection rate of the traffic.

We specifically consider the problem of information gathering on the line, with limited buffer space, under adversarial traffic. We examine how the buffer size and the injection rate of the traffic affect the performance of the greedy protocol for this problem. We establish upper bounds on the competitive ratio of the greedy protocol in terms of the network size, the buffer size, and the adversary's rate, and present lower bounds which are tight up to constant factors. These results show, for example, that provisioning the network with sufficiently large buffers may substantially improve the performance of the greedy protocol in some cases, whereas for some high-rate adversaries, using larger buffers does not have any effect on the competitive ratio of the protocol.

References

  1. W. Aiello, Y. Mansour, S. Rajagopolan, and A. Rosén. Competitive Queue Policies for Differentiated Services. Journal of Algorithms, 55(2):113--141, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Aiello, R. Ostrovsky, E. Kushilevitz, and A. Rosén. Dynamic Routing on Networks with Fixed-Sized Buffers. In Proceedings of the 14th annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 771--780, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Albers and M. Schmidt. On the Performance of Greedy Algorithms in Packet Buffering. SIAM Journal on Computing, 35(2):278--304, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Andelman and Y. Mansour. Competitive Management of Non-preemptive Queues with Multiple Values. In Proceedings of the 17th International Symposium on Distributed Computing (DISC), pages 166--180, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  5. S. Angelov, S. Khanna, and K. Kunal. The Network as a Storage Device: Dynamic Routing with Bounded Buffers. In Proceedings of the 8th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), pages 1--13, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Azar and A. Litichevskey. Maximizing Throughput in Multi-Queue Switches. Algorithmica, 45(1):69--90, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Azar and Y. Richter. An Improved Algorithm for CIOQ Switches. In Proceedings of the 12th Annual European Symposium on Algorithms (ESA), pages 65--76, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  8. Y. Azar and Y. Richter. Management of Multi-Queue Switches in QoS Networks. Algorithmica, 43(1-2):81--96, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Azar and R. Zachut. Packet Routing and Information Gathering in Lines, Rings and Trees. In Proceedings of the 13th Annual European Symposium on Algorithms (ESA), pages 484--495, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Epstein and R. V. Stee. Buffer Management Problems. ACM SIGACT News, 35(3):58--66, September 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Florens, M. Franceschetti, and R. J. McEliece. Lower Bounds on Data Collection Time in Sensory Networks. IEEE Journal on Selected Areas in Communications, 22(6):1110--1120, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Gordon and A. Rosén. Competitive Weighted Throughput Analysis of Greedy Protocols on DAGs. In Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing (PODC), pages 227--236, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Kesselman, Z. Lotker, Y. Mansour, and B. Patt-Shamir. Buffer Overflows of Merging Streams. In Proceedings of the 11th Annual European Symposium on Algorithms (ESA), pages 349--360, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Kesselman, Z. Lotker, Y. Mansour, B. Patt-Shamir, B. Schieber, and M. Sviridenko. Buffer Overflow Management in QoS Switches. SIAM Journal on Computing, 33(3):563--583, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Kesselman, Y. Mansour, and R. van Stee. Improved Competitive Guarantees for QoS Buffering. Algorithmica, 43(1-2):63--80, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Kesselman and A. Rosén. Scheduling policies for CIOQ switches. Journal of Algorithms, 60(1):60--83, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Kothapalli, M. Onus, A. Richa, and C. Scheideler. Efficient Broadcasting and Gathering in Wireless Ad-Hoc Networks. In Proceedings of the 8th International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), pages 346--351, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Kothapalli and C. Scheideler. Information Gathering in Adversarial Systems: Lines and Cycles. In Proceedings of the 15th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA), pages 333--342, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Rate vs. buffer size: greedy information gathering on the line

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  SPAA '07: Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures
                  June 2007
                  376 pages
                  ISBN:9781595936677
                  DOI:10.1145/1248377

                  Copyright © 2007 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 9 June 2007

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate447of1,461submissions,31%

                  Upcoming Conference

                  SPAA '24

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader