Buffer overflow management in QoS switches

被引:111
|
作者
Kesselman, A [1 ]
Lotker, Z
Mansour, Y
Patt-Shamir, B
Schieber, G
Sviridenko, M
机构
[1] Tel Aviv Univ, Dept Comp Sci, IL-69978 Tel Aviv, Israel
[2] Tel Aviv Univ, Dept Elect Engn, IL-69978 Tel Aviv, Israel
[3] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
buffer overflows; competitive analysis; Quality of Service; FIFO scheduling; deadline scheduling;
D O I
10.1137/S0097539701399666
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider two types of buffering policies that are used in network switches supporting Quality of Service (QoS). In the FIFO type, packets must be transmitted in the order in which they arrive; the constraint in this case is the limited buffer space. In the bounded-delay type, each packet has a maximum delay time by which it must be transmitted, or otherwise it is lost. We study the case of overloads resulting in packet loss. In our model, each packet has an intrinsic value, and the goal is to maximize the total value of transmitted packets. Our main contribution is a thorough investigation of some natural greedy algorithms in various models. For the FIFO model we prove tight bounds on the competitive ratio of the greedy algorithm that discards packets with the lowest value when an overflow occurs. We also prove that the greedy algorithm that drops the earliest packets among all low-value packets is the best greedy algorithm. This algorithm can be as much as 1.5 times better than the tail-drop greedy policy, which drops the latest lowest-value packets. In the bounded-delay model we show that the competitive ratio of any on-line algorithm for a uniform bounded-delay buffer is bounded away from 1, independent of the delay size. We analyze the greedy algorithm in the general case and in three special cases: delay bound 2, link bandwidth 1, and only two possible packet values. Finally, we consider the off-line scenario. We give efficient optimal algorithms and study the relation between the bounded-delay and FIFO models in this case.
引用
收藏
页码:563 / 583
页数:21
相关论文
共 50 条
  • [32] Method of integer overflow detection to avoid buffer overflow
    School of Computer Science and Engineering, Southeast University, Nanjing 211189, China
    不详
    [J]. J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
  • [33] An integrated scheduling and buffer management scheme for input queued switches with finite buffer space
    Kumar, A
    Mahapatra, RN
    [J]. COMPUTER COMMUNICATIONS, 2005, 29 (01) : 42 - 51
  • [34] Partial sharing and partial partitioning buffer management scheme for shared buffer packet switches
    Chu, YS
    Yang, RB
    Wu, CS
    Liang, MC
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (01) : 79 - 88
  • [35] A Taxonomy of Buffer Overflow Characteristics
    Bishop, Matt
    Engle, Sophie
    Howard, Damien
    Whalen, Sean
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 305 - 317
  • [36] The Cost of Preventing a Buffer Overflow
    Gordonov, Anatoliy S.
    [J]. 2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
  • [37] Traffic-Aware Buffer Management in Shared Memory Switches
    Huang, Sijiang
    Wang, Mowei
    Cui, Yong
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (06) : 2559 - 2573
  • [38] A novel buffer management for input queued switches providing DiffServ
    Zhao, Youjian
    Yuan, Kejin
    Zhang, Xiaoping
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1250 - 1254
  • [39] CLR in multicast ATM switches with shared memory and buffer management
    Xiong, YJ
    Kanginakudru, J
    [J]. GLOBECOM'99: SEAMLESS INTERCONNECTION FOR UNIVERSAL SERVICES, VOL 1-5, 1999, : 1391 - 1395
  • [40] Vulnerability scanning for buffer overflow
    Iyer, A
    Liebrock, LM
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117