Academia.eduAcademia.edu

Buffer Management

913 papers
2 followers
AI Powered
Buffer management is the process of overseeing and controlling buffer stocks in production and supply chain systems to optimize flow, reduce lead times, and minimize inventory costs. It involves strategic decision-making regarding the allocation, replenishment, and utilization of buffers to enhance operational efficiency and responsiveness to demand fluctuations.
Destination-based forwarding in traditional IP routers has not been able to take full advantage of multiple paths that frequently exist in Internet Service Provider Networks. As a result, the networks may not operate efficiently,... more
In most computer systems, software overhead dominates the cost of messaging, reducing delivered performance, especially for short messages. Efficient software messaging layers are needed to deliver the hardware performance to the... more
Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating information in large peer-to-peer systems deployed on Internet or ad hoc networks. It is possible to... more
Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may also be long due to the operational environment (e.g. deep... more
The future broadband ISDN needs a high degree of flexibility in order to cope with a great variety of services with widely differing bandwidth and quality of service requirements. The asynchronous transfer mode (ATM), which is now widely... more
This paper presents a novel buffer management scheme for portable media players equipped with flash memory. Though flash memory has various advantages over magnetic disks such as small and lightweight form factor, solid-state reliability,... more
R-tree based spatial join is useful because of both its superior performance and the wide spread implementation of R-trees. We present a new R-tree join method called BFRJ (Breadth-First R-tree Join). BFRJ syn- chronously traverses both... more
The design of the Georgia Tech Time Warp (GTW, version 2.0) executive for cache-coherent sharedmemory multiprocessors is described. The programmer's interface is presented. Several optimizations used to e ciently realize key functions... more
A wireless sensor network is constrained by computation capability, memory space, communication bandwidth, and above all, energy supply. When a critical event triggers a surge of data generated by the sensors, congestion may occur as data... more
The proportional differentiation model was proposed in [1] as a target for controllable and predictable relative differentiated services.
Catchment riparian areas are considered key zones to target mitigation measures aimed at interrupting the movement of diffuse substances from agricultural land to surface waters. Hence, unfertilized buffer strips have become a widely... more
In today's multicomputers, software overhead dominates the message-passing latency cost. We designed two multicomputer network interfaces that signif~cantiy reduce this overhead. Both support vMual-memory-mapped communication, allowing... more
In this paper, we propose a novel external-memory algorithm to support view-dependent simplification for datasets much larger than main memory. In the preprocessing phase, we use a new spanned sub-meshes simplification technique to build... more
We address the problem of des%ning optimal buffer management policies in shared memory switches when packets already accepted in the switch can be dropped (pushed-out). Our goal is to maximize the overall throughput, or equivalently to... more
The commercial deployment of LTE Release 8 is gaining significant momentum all over the globe, and LTE is evolving to LTE-Advanced, which offers various new features to meet or exceed IMT-Advanced requirements. Since LTE-Advanced targets... more
Flow control mechanisms in Network-on-Chip (NoC) architectures are critical for fast packet propagation across the network and for low idling of network resources. Buffer management and allocation are fundamental tasks of each flow... more
The Assured Forwarding (AF) service of the IETF DiffServ architecture provides a qualitative service differentiation between classes of traffic, in the sense that a low-priority class experiences higher loss rates and higher delays than a... more
With the growth in Internet access services over networks with asymmetric links such as asymmetric digital subscriber line (ADSL) and cable-based access networks, it becomes crucial to evaluate the performance of TCP/IP over systems in... more
Performance needs of many database applications dictate that the entire database be stored in main memory. The Dal system is a main memory storage manager designed to provide the persistence, availability and safety guarantees one... more
Performance gains in memory have traditionally been obtained by increasing memory bus widths and speeds. The diminishing returns of such techniques have led to the proposal of an alternate architecture, the Fully-Buffered DIMM. This new... more
In this paper, we present an approach to construct a built-in block-based hierarchical index structures, like Rtree, to organize data sets in one, two, or higher dimensional space and improve the query performance towards the common query... more
Multimedia applications demand specific support from database management systems due to the characteristics of multimedia data and their interactive usage. This includes integrated support for high-volume and time-dependent (continuous)... more
Modern high performance applications require efficient and scalable collective communication operations. Currently, most collective operations are implemented based on point-to-point operations. In this paper, we propose to use hardware... more
We propose a novel approach, called parallel rollout, to solving (partially observable) Markov decision processes. Our approach generalizes the rollout algorithm of Bertsekas and Castanon (1999) by rolling out a set of multiple heuristic... more
Several satellite systems currently in operation or under development claim to support broadband Internet applications. In these scenarios, transmission control protocol (TCP) plays a critical role. Unfortunately, when used with satellite... more
This paper concerns the mathematical formulation and optimal solutions for the Flexible Manufacturing Systems Scheduling Problem (FMSSP) with one vehicle. This linear formulation differs from the previously published ones as it takes into... more
Epidemic, or probabilistic, multicast protocols have emerged as a viable mechanism to circumvent the scalability problems of reliable multicast protocols. However, most existing epidemic approaches use connectionless transport protocols... more
In this paper, we present a survey on management mechanisms used for ensuring the Quality-of-Services for Voice-over-IP applications. We first address the motivations of QoS management for VoIP. We then partition the system into two... more
Flash memory has been widely used as a storage device for consumer devices. Recently, applications using flash memory are becoming complex and diverse. One of obstacles to its wide use is the slow write performance of flash memory caused... more
We study an online unit-job scheduling problem arising in buffer management. Each job is specified by its release time, deadline, and a nonnegative weight. Due to overloading conditions, some jobs have to be dropped. The goal is to... more
by Ram Ramesh and 
1 more
On-demand streaming from a remote server through best-effort Internet poses several challenges because of network losses and variable delays. The primary technique used to improve the quality of distributed content service is replication.... more
While it has been shown that TCP Vegas provides better performance compared to TCP Reno, studies have identified various issues associated with the protocol. We propose modifications to the congestion avoidance mechanism of the TCP Vegas... more
The Cambridge Research Laboratory was founded in 1987 to advance the state of the art in both core computing and human-computer interaction, and to use the knowledge so gained to support the Company's corporate objectives. We believe this... more
by Fei Li
As the Internet becomes more mature, there is a realization that improving the performance of routers has the potential to substantially improve Internet performance in general. Currently, most routers forward packets in a... more
We consider a FIFO buffer with finite storage space. An arbitrary input stream of packets arrives at the buffer, but the output stream rate is bounded, so overflows may occur. Motivated by DiffServ, we assume that each packet has value... more
AbstractÐThis paper presents a software-based approach to fault-tolerant routing in networks using wormhole or virtual cut-through switching. When a message encounters a faulty output link, it is removed from the network by the local... more
infrastructure. However, in multi-hop networks, effective bandwidth decreases with increasing number of hops, mainly due to increased spatial contention. Longer hop length flows suffer from extremely low throughputs which is highly... more
In Delay Tolerant Networks (DTN) disruptions may happen frequently as end to end path is not available all the time. Thus, delays can also be extended due to its environment nature like deep space, underwater, ocean sensor networks. In... more
by R. Leus and 
1 more
The lack of proper project planning is often cited as one of the main reasons why projects fail to be completed in time and within budget. In this paper we identify and illuminate several possible misconceptions that go round in project... more
We propose a dynamic sharing of radio resources in a wireless multiuser system by combining a flexible video coding scheme, namely the currently developed scalable video coding (SVC) extension of H.264/AVC with appropriate radio link... more
As the Internet infrastructure grows to support a variety of services, its legacy protocols are being overloaded with new functions such as traffic engineering. Today, operators engineer such capabilities through clever, but manual... more
This paper deals with improving the lead-time performance of a small packaging manufacturer in the Netherlands that had already implemented several facets of Theory of Constraints (TOC) in 1997. Since then, delivery reliability and... more