2012
DOI: 10.1007/s00453-012-9677-8
|View full text |Cite
|
Sign up to set email alerts
|

An Optimal Lower Bound for Buffer Management in Multi-Queue Switches

Abstract: In the online packet buffering problem (also known as the unweighted FIFO variant of buffer management), we focus on a single network packet switching device with several input ports and one output port. This device forwards unit-size, unit-value packets from input ports to the output port. Buffers attached to input ports may accumulate incoming packets for later transmission; if they cannot accommodate all incoming packets, their excess is lost. A packet buffering algorithm has to choose from which buffers to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…Moreover, they showed that for B = 2, the same algorithm achieves the competitive ratio of 13/7(≈ 1.858) and gave a matching lower bound for large enough m. Schmidt [37] also proposed a deterministic algorithm whose competitive ratio is at most 17/9 for any even B ≥ 4 and at most 17/9 + 2/9(B + 1) for any odd B ≥ 3. Furthermore, he showed a lower bound e e−1 (≈ 1.581) of deterministic online algorithms for any B and large enough m, and a lower bound 1.465 of randomized online algorithms for any B and large enough m. Azar and Litichevskey [8] showed a e e−1 (≈ 1.58)-competitive deterministic algorithm for large enough B > log m. Schmidt [36] claimed he showed a 3/2-competitive randomized algorithm, whose flaw was pointed out in [13]. Also, in the case of m = 2, Schmidt [36] showed a lower bound of 16/13 ≈ 1.230 for any online algorithm for large enough B. Bienkowski and Madry [12] and Kobayashi et al [32] proved 16/13-competitive algorithms for the randomized and deterministic cases respectively.…”
Section: Related Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Moreover, they showed that for B = 2, the same algorithm achieves the competitive ratio of 13/7(≈ 1.858) and gave a matching lower bound for large enough m. Schmidt [37] also proposed a deterministic algorithm whose competitive ratio is at most 17/9 for any even B ≥ 4 and at most 17/9 + 2/9(B + 1) for any odd B ≥ 3. Furthermore, he showed a lower bound e e−1 (≈ 1.581) of deterministic online algorithms for any B and large enough m, and a lower bound 1.465 of randomized online algorithms for any B and large enough m. Azar and Litichevskey [8] showed a e e−1 (≈ 1.58)-competitive deterministic algorithm for large enough B > log m. Schmidt [36] claimed he showed a 3/2-competitive randomized algorithm, whose flaw was pointed out in [13]. Also, in the case of m = 2, Schmidt [36] showed a lower bound of 16/13 ≈ 1.230 for any online algorithm for large enough B. Bienkowski and Madry [12] and Kobayashi et al [32] proved 16/13-competitive algorithms for the randomized and deterministic cases respectively.…”
Section: Related Resultsmentioning
confidence: 99%
“…Also, in the case of m = 2, Schmidt [36] showed a lower bound of 16/13 ≈ 1.230 for any online algorithm for large enough B. Bienkowski and Madry [12] and Kobayashi et al [32] proved 16/13-competitive algorithms for the randomized and deterministic cases respectively. Bienkowski [13] showed a lower bound of e e−1 for any online algorithm for any B and large enough m. As for the single-queue models, the current upper and lower bounds on competitive ratios are summarized in Table 2. There are several other models, such as shared-memory switches [19,24,31], CIOQ switches [26,11,27,30,3] and crossbar switches [28,29,3], are also extensively studied.…”
Section: Related Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…If s = j, then r j (e ℓ |g, o) = r j (e ℓ−1 |g, o), r j (e ℓ |g, o) = r j (e ℓ−1 |g, o), and α j (e ℓ ) = α j (e ℓ−1 ) hold. Thus from Equation (8), it follows that Equation (7) holds for h = ℓ. So we assume that s = j and let us consider the following cases: (c-1) both greedy and opt accept the v j -packet; (c-2) both greedy and opt reject the v j -packet; (c-3) greedy rejects and opt accepts the v j -packet; (c-4) greedy accepts and opt rejects the v j -packet.…”
Section: Proof Of Claim 31mentioning
confidence: 99%