Packet Forwarding with a Locally Bursty Adversary

08/19/2022
by   Will Rosenbaum, et al.
0

We consider packet forwarding in the adversarial queueing theory (AQT) model introduced by Borodin et al. We introduce a refinement of the AQT (ρ, σ)-bounded adversary, which we call a locally bursty adversary (LBA) that parameterizes injection patterns jointly by edge utilization and packet origin. For constant (O(1)) parameters, the LBA model is strictly more permissive than the (ρ, σ) model. For example, there are injection patterns in the LBA model with constant parameters that can only be realized as (ρ, σ)-bounded injection patterns with ρ + σ = Ω(n) (where n is the network size). We show that the LBA model (unlike the (ρ, σ) model) is closed under packet bundling and discretization operations. Thus, the LBA model allows one to reduce the study of general (uniform) capacity networks and inhomogenous packet sizes to unit capacity networks with homogeneous packets. On the algorithmic side, we focus on information gathering networks – i.e., networks in which all packets share a common destination, and the union of packet routes forms a tree. We show that the Odd-Even Downhill (OED) forwarding protocol described independently by Dobrev et al. and Patt-Shamir and Rosenbaum achieves buffer space usage of O(log n) against all LBAs with constant parameters. OED is a local protocol, but we show that the upper bound is tight even when compared to centralized protocols. Our lower bound for the LBA model is in contrast to the (ρ, σ)-model, where centralized protocols can achieve worst-case buffer space usage O(1) for ρ, σ = O(1), while the O(log n) upper bound for OED is optimal only for local protocols.

READ FULL TEXT

page 1

page 3

page 10

research
06/30/2018

An optimal algorithm for 2-bounded delay buffer management with lookahead

The bounded delay buffer management problem, which was proposed by Kesse...
research
09/26/2019

Packet-oblivious stable routing in multi-hop wireless networks

In this work, we study the fundamental problem of scheduling communicati...
research
10/24/2021

New Bounds for the Flock-of-Birds Problem

In this paper, we continue a line of work on obtaining succinct populati...
research
12/07/2020

Breaking the Barrier of 2 for the Competitiveness of Longest Queue Drop

We consider the problem of managing the buffer of a shared-memory switch...
research
08/07/2018

Power Constrained Parallel Queuing with Contention

We examine deterministic broadcasting on multiple-access channels for a ...
research
10/26/2018

Energy Efficient Adversarial Routing in Shared Channels

We investigate routing on multiple access channels when packets are inje...
research
12/29/2021

Broadcasting on Adversarial Multiple Access Channels

We study broadcasting on multiple-access channels under adversarial pack...

Please sign up or login with your details

Forgot password? Click here to reset