Buffer size for routing limited-rate adversarial traffic

Avery Miller*, Boaz Patt-Shamir

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


We consider he slight variation of the adversarial queuing theory model in which an adversary injects packets with routes into the network subject to the following constraint: For any link e, the total number of packets injected in any time window [t, t’) and whose route contains e is at most ρ(t’−t)+σ, where ρ and σ are non-negative parameters. Informally, ρ bounds the long-term rate of injections and σ bounds the “burstiness” of injection: σ = 0 means that the injection is as smooth as it can be. It is known that greedy scheduling of the packets (under which a link is not idle if there is any packet ready to be sent over it) may result in Ω(n) buffer size even on an n-node line network and very smooth injections (σ = 0). In this paper, we propose a simple non-greedy scheduling policy and show that, in a tree where all packets are destined at the root, no buffer needs to be larger than σ+2ρ to ensure that no overflows occur, which is optimal in our model. The rule of our algorithm is to forward a packet only if its next buffer is completely empty. The policy is centralized: in a single step, a long “train” of packets may progress together. We show that, in some sense, central coordination is required for our algorithm, and even for the more sophisticated “downhill” algorithm in which each node forwards a packet only if its next buffer is less occupied than its current one. This is shown by presenting an injection pattern with σ = 0 for the n-node line that results in Ω(n) packets in a buffer if local control is used.

Original languageEnglish
Title of host publicationDistributed Computing - 30th International Symposium, DISC 2016, Proceedings
EditorsCyril Gavoille, David Ilcinkas
PublisherSpringer Verlag
Number of pages14
ISBN (Print)9783662534250
StatePublished - 2016
Event30th International Symposium on Distributed Computing, DISC 2016 - Paris, France
Duration: 27 Sep 201629 Sep 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9888 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference30th International Symposium on Distributed Computing, DISC 2016


Dive into the research topics of 'Buffer size for routing limited-rate adversarial traffic'. Together they form a unique fingerprint.

Cite this