Packet multiplexers with adversarial regulated traffic

Srini Rajagopal, Martin Reisslein, Keith Ross

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    We consider a finite-buffer packet multiplexer to which traffic arrives from several independent sources. The traffic from each of the sources is regulated, i.e., the amount of traffic that can enter the multiplexer is constrained by known regulator constraints. The regulator constraints depend on the source and are more general than those resulting from cascaded leaky buckets. We assume that the traffic is adversarial to the extent permitted by the regulators. For lossless multiplexing, we show that if the original multiplexer is lossless it is possible to allocate bandwidth and buffer to the sources so that the resulting segregated systems are lossless. For lossy multiplexing, we use our results for lossless multiplexing to estimate the loss probability of the multiplexer. Our estimate involves transforming the original system into two independent resource systems, and using adversarial sources for the two independent resources to obtain a bound on the loss probabilities for the transformed system. We show that the adversarial sources are not extremal on-off sources, even when the regulator consists of a peak rate controller in series with a leaky bucket. We explicitly characterize the form of the adversarial source for the transformed problem. We also provide numerical results for the case of the simple regulator.

    Original languageEnglish (US)
    Title of host publicationProceedings - IEEE INFOCOM
    PublisherIEEE
    Pages347-355
    Number of pages9
    Volume1
    StatePublished - 1998
    EventProceedings of the 1998 17th Annual IEEE Conference on Computer Communications, INFOCOM. Part 1 (of 3) - San Francisco, CA, USA
    Duration: Mar 29 1998Apr 2 1998

    Other

    OtherProceedings of the 1998 17th Annual IEEE Conference on Computer Communications, INFOCOM. Part 1 (of 3)
    CitySan Francisco, CA, USA
    Period3/29/984/2/98

    Fingerprint

    Multiplexing
    Bandwidth
    Controllers

    ASJC Scopus subject areas

    • Hardware and Architecture
    • Electrical and Electronic Engineering

    Cite this

    Rajagopal, S., Reisslein, M., & Ross, K. (1998). Packet multiplexers with adversarial regulated traffic. In Proceedings - IEEE INFOCOM (Vol. 1, pp. 347-355). IEEE.

    Packet multiplexers with adversarial regulated traffic. / Rajagopal, Srini; Reisslein, Martin; Ross, Keith.

    Proceedings - IEEE INFOCOM. Vol. 1 IEEE, 1998. p. 347-355.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Rajagopal, S, Reisslein, M & Ross, K 1998, Packet multiplexers with adversarial regulated traffic. in Proceedings - IEEE INFOCOM. vol. 1, IEEE, pp. 347-355, Proceedings of the 1998 17th Annual IEEE Conference on Computer Communications, INFOCOM. Part 1 (of 3), San Francisco, CA, USA, 3/29/98.
    Rajagopal S, Reisslein M, Ross K. Packet multiplexers with adversarial regulated traffic. In Proceedings - IEEE INFOCOM. Vol. 1. IEEE. 1998. p. 347-355
    Rajagopal, Srini ; Reisslein, Martin ; Ross, Keith. / Packet multiplexers with adversarial regulated traffic. Proceedings - IEEE INFOCOM. Vol. 1 IEEE, 1998. pp. 347-355
    @inproceedings{7d7c01a4c8364828a4cfa43940785d9c,
    title = "Packet multiplexers with adversarial regulated traffic",
    abstract = "We consider a finite-buffer packet multiplexer to which traffic arrives from several independent sources. The traffic from each of the sources is regulated, i.e., the amount of traffic that can enter the multiplexer is constrained by known regulator constraints. The regulator constraints depend on the source and are more general than those resulting from cascaded leaky buckets. We assume that the traffic is adversarial to the extent permitted by the regulators. For lossless multiplexing, we show that if the original multiplexer is lossless it is possible to allocate bandwidth and buffer to the sources so that the resulting segregated systems are lossless. For lossy multiplexing, we use our results for lossless multiplexing to estimate the loss probability of the multiplexer. Our estimate involves transforming the original system into two independent resource systems, and using adversarial sources for the two independent resources to obtain a bound on the loss probabilities for the transformed system. We show that the adversarial sources are not extremal on-off sources, even when the regulator consists of a peak rate controller in series with a leaky bucket. We explicitly characterize the form of the adversarial source for the transformed problem. We also provide numerical results for the case of the simple regulator.",
    author = "Srini Rajagopal and Martin Reisslein and Keith Ross",
    year = "1998",
    language = "English (US)",
    volume = "1",
    pages = "347--355",
    booktitle = "Proceedings - IEEE INFOCOM",
    publisher = "IEEE",

    }

    TY - GEN

    T1 - Packet multiplexers with adversarial regulated traffic

    AU - Rajagopal, Srini

    AU - Reisslein, Martin

    AU - Ross, Keith

    PY - 1998

    Y1 - 1998

    N2 - We consider a finite-buffer packet multiplexer to which traffic arrives from several independent sources. The traffic from each of the sources is regulated, i.e., the amount of traffic that can enter the multiplexer is constrained by known regulator constraints. The regulator constraints depend on the source and are more general than those resulting from cascaded leaky buckets. We assume that the traffic is adversarial to the extent permitted by the regulators. For lossless multiplexing, we show that if the original multiplexer is lossless it is possible to allocate bandwidth and buffer to the sources so that the resulting segregated systems are lossless. For lossy multiplexing, we use our results for lossless multiplexing to estimate the loss probability of the multiplexer. Our estimate involves transforming the original system into two independent resource systems, and using adversarial sources for the two independent resources to obtain a bound on the loss probabilities for the transformed system. We show that the adversarial sources are not extremal on-off sources, even when the regulator consists of a peak rate controller in series with a leaky bucket. We explicitly characterize the form of the adversarial source for the transformed problem. We also provide numerical results for the case of the simple regulator.

    AB - We consider a finite-buffer packet multiplexer to which traffic arrives from several independent sources. The traffic from each of the sources is regulated, i.e., the amount of traffic that can enter the multiplexer is constrained by known regulator constraints. The regulator constraints depend on the source and are more general than those resulting from cascaded leaky buckets. We assume that the traffic is adversarial to the extent permitted by the regulators. For lossless multiplexing, we show that if the original multiplexer is lossless it is possible to allocate bandwidth and buffer to the sources so that the resulting segregated systems are lossless. For lossy multiplexing, we use our results for lossless multiplexing to estimate the loss probability of the multiplexer. Our estimate involves transforming the original system into two independent resource systems, and using adversarial sources for the two independent resources to obtain a bound on the loss probabilities for the transformed system. We show that the adversarial sources are not extremal on-off sources, even when the regulator consists of a peak rate controller in series with a leaky bucket. We explicitly characterize the form of the adversarial source for the transformed problem. We also provide numerical results for the case of the simple regulator.

    UR - http://www.scopus.com/inward/record.url?scp=0031650894&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=0031650894&partnerID=8YFLogxK

    M3 - Conference contribution

    AN - SCOPUS:0031650894

    VL - 1

    SP - 347

    EP - 355

    BT - Proceedings - IEEE INFOCOM

    PB - IEEE

    ER -