Simple routing strategies for adversarial systems

被引:33
作者
Awerbuch, B [1 ]
Berenbrink, P [1 ]
Brinkmann, A [1 ]
Scheideler, C [1 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
来源
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 2001年
关键词
D O I
10.1109/SFCS.2001.959890
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we consider the problem of delivering dynamically changing input streams in dynamically changing networks where both the topology and the input streams can change in an unpredictable way. In particular, we present two simple distributed balancing algorithms (one for packet injections and one for flow injections) and show that for the case of a single receiver these algorithms will always ensure that the number of packets or flow in the system is bounded at any time step, even for an injection process that completely saturates the capacities of the available edges and even if the network topology changes in a completely unpredictable way. We also show that the maximum number of packets or flow that can be in the system at any time is essentially best possible by providing a lower bound that holds for any online algorithm, whether distributed or not. Interestingly, our balancing algorithms do not only behave well in a completely adversarial setting. We show that also in the other extreme of a static network and a static injection pattern the algorithms will converge to a point in which they achieve an average routing time that is close to the best possible average routing time that can be achieved by any strategy. This demonstrates that there are simple algorithms that can be efficient for very different scenarios.
引用
收藏
页码:158 / 167
页数:10
相关论文
共 18 条
  • [1] Afek Y., 1988, Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing, P131
  • [2] AFEK Y, 1992, UNPUB POLYNOMIAL END
  • [3] Aiello W., 1993, Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, P632, DOI 10.1145/167088.167250
  • [4] Aiello W., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P359, DOI 10.1145/276698.276788
  • [5] Universal stability results for greedy contention-resolution protocols
    Andrews, M
    Awerbuch, B
    Fernandez, A
    Kleinberg, J
    Leighton, T
    Liu, ZY
    [J]. 37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1996, : 380 - 389
  • [6] [Anonymous], 1985, MITLCSTM291
  • [7] Awerbuch B., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P487, DOI 10.1145/195058.195238
  • [8] Awerbuch B., 1993, Proceedings. 34th Annual Symposium on Foundations of Computer Science (Cat. No.93CH3368-8), P459, DOI 10.1109/SFCS.1993.366841
  • [9] AWERBUCH B, 1989, P 30 IEEE S FDN COMP, P358
  • [10] Borodin A., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P376, DOI 10.1145/237814.237984