skip to main content
article

A general approach to dynamic packet routing with bounded buffers

Published:01 March 2001Publication History
Skip Abstract Section

Abstract

We prove a sufficient condition for the stability of dynamic packet routing algorithms. Our approach reduces the problem of steady state analysis to the easier and better understood question of static routing. We show that certain high probability and worst case bounds on the quasi-static (finite past) performance of a routing algorithm imply bounds on the performance of the dynamic version of that algorithm. Our technique is particularly useful in analyzing routing on networks with bounded buffers where complicated dependices make standard queuing techniques inapplicable.

We present several applications of our approach. In all cases we start from a known static algorithm, and modify it to fit our framework. In particular we give the first dynamic algorithms for routing on a butterfly or two-dimensional mesh with bounded buffers. Both the injection rate for which the algorithm is stable, and the expected time a packet spends in the system are optimal up to constant factors. Our approach is also applicable to the recently introduced adversarial input model.

References

  1. BORODIN, A., KLEINBERG, J., RAGHAVAN, P., SUDAN, M., AND WILLIAMSON, D. P. 2001. Adversarial queuing theory. J. ACM 48, 1 (Jan.), 13-38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BRODER,A.Z.,AND UPFAL, E. 1996. Dynamic deflection routing in arrays. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (Philadelphia, Pa., May 22-24). ACM, New York, pp. 348-355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. HARCOL-BALTER, M., AND BLACK, P. 1994. Queuing analysis of oblivious packet-routing networks. In Proceedings of the 5th Annual ACM-SIAM Symposium on Discrete Algorithms (Arlington, Va., Jan. 23-25). ACM, New York, pp. 583-592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. HARCOL-BALTER, M., AND WOLF, D. 1995. Bounding delays in packet-routing networks. In Proceedings of the 27th Annual ACM Symposium on Theory of Computing (Las Vegas, Nev., May 29-June 1). ACM, New York, pp. 248-257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. KAHALE, N., AND LEIGHTON, T. 1995. Greedy dynamic routing on arrays. In Proceedings of the 6th Annual ACM-SIAM Symposium on Discrete Algorithms (San Francisco, Calif., Jan. 22-24). ACM, New York, pp. 558-566. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. KLEINROCK, L. 1975. Queuing Systems. Volume I: Theory. Wiley, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. LEIGHTON, F. T. 1990. Average case analysis of greedy routing algorithms on arrays. In Proceedings of the 2nd Annual ACM Symposium on Parallel Algorithms and Architectures (Island of Crete, Greece, July 2-6). ACM, New York, pp. 2-10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. LEIGHTON, F. T. 1992. Introduction to Parallel Algorithms and Architectures. Morgan-Kaufmann, San Mateo, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. MAGGS,B.M.,AND SITARAMAN, R. K. 1992. Simple algorithms for routing on butterfly networks with bounded queues. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing (Victoria, B.C., Canada, May 4-6). ACM, New York, pp. 150-161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. MITZENMACHER, M. 1994. Bounds on the greedy routing algorithms for array networks. In Proceedings of the 6th Annual ACM Symposium on Parallel Algorithms and Architectures (Cape May, N.J., June 27-29). ACM, New York, pp. 346-353. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. RANADE, A. G. 1987. How to emulate shared memory. In Proceedings of the 28th Annual Symposium on Foundations of Computer Science (Oct.). IEEE Computer Society Press, Los Alamitos, Calif., pp. 185-194.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. SCHEIDELER, C., AND VOECKING, B. 1996. Universal continuous routing strategies. In Proceedings of the 8th Annual ACM Symposium on Parallel Algorithms and Architectures (Padua, Italy, June 24-26). ACM, New York, pp. 142-151. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. STAMOULIS,G.D.,AND TSITSIKLIS, J. N. 1991. The efficiency of greedy routing in hypercubes and butterflies. In Proceedings of the 3rd Annual ACM Symposium on Parallel Algorithms and Architectures (Hilton Head, S.C., July 21-24). ACM, New York, pp. 248-259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. UPFAL, E. 1984. Efficient schemes for parallel communication. J. ACM 31, 3 (July), 507-517. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A general approach to dynamic packet routing with bounded buffers

        Recommendations

        Reviews

        Xiangyu Sally Song

        This paper deals with dynamic packet routing in networks with bounded buffers at the switching nodes. It accurately models the real network. The analysis of routing algorithm has previously been largely focused on static routing while there are some recent studies on dynamic routing but with unbounded buffer. These approaches simplify the analysis at the cost of a less realistic model. This paper proposes a unique approach to reduce the problem of dynamic routing to the easier and better understood problem of static routing. The major contribution of this paper is the proof of a theorem on stability. This theorem defines a set of relatively simple and sufficient conditions such that if the routing algorithm satisfies them, then the network is stable up to a certain interarrival rate. Furthermore, the expected time a packet spending in the queue and in the network is bounded and formulated as the function of the interarrival distribution. The authors then obtain dynamic routing algorithm by conveniently modifying the prior results on static routing to satisfy the stability criterion. The dynamic versions of the static routing algorithms for 6 comprehensive scenarios are derived. It is shown that the expected time a packet spending in the system deviates from the optimum up to constant factors. At the end, this paper successfully extends this approach to the recently introduced adversarial input model. This paper is concisely written and well organized. Researchers and network designers will benefit from this unique approach. A comprehensive list of reference is included.

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Journal of the ACM
          Journal of the ACM  Volume 48, Issue 2
          March 2001
          201 pages
          ISSN:0004-5411
          EISSN:1557-735X
          DOI:10.1145/375827
          Issue’s Table of Contents

          Copyright © 2001 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 March 2001
          Published in jacm Volume 48, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader