On Packet Scheduling with Adversarial Jamming and Speedup

In Packet Scheduling with Adversarial Jamming packets of arbitrary sizes arrive over time to be transmitted over a channel in which instantaneous jamming errors occur at times chosen by the adversary and not known to the algorithm. The transmission taking place at the time of jamming is corrupt, and the algorithm learns this fact immediately. An online algorithm maximizes the total size of packets it successfully transmits and the goal is to develop an algorithm with the lowest possible asymptotic competitive ratio, where the additive constant may depend on packet sizes. Our main contribution is a universal algorithm that works for any speedup and packet sizes and, unlike previous algorithms for the problem, it does not need to know these properties in advance. We show that this algorithm guarantees 1-competitiveness with speedup 4, making it the first known algorithm to maintain 1-competitiveness with a moderate speedup in the general setting of arbitrary packet sizes. We also prove a lower bound of $\phi+1\approx 2.618$ on the speedup of any 1-competitive deterministic algorithm, showing that our algorithm is close to the optimum. Additionally, we formulate a general framework for analyzing our algorithm locally and use it to show upper bounds on its competitive ratio for speedups in $[1,4)$ and for several special cases, recovering some previously known results, each of which had a dedicated proof. In particular, our algorithm is 3-competitive without speedup, matching both the (worst-case) performance of the algorithm by Jurdzinski et al. and the lower bound by Anta et al.

[1]  Ronald L. Graham,et al.  Bounds for certain multiprocessing anomalies , 1966 .

[2]  Tak Wah Lam,et al.  Trade-offs between speed and processor in hard-deadline scheduling , 1999, SODA '99.

[3]  Tak Wah Lam,et al.  On-line scheduling with tight deadlines , 2003, Theor. Comput. Sci..

[4]  Chryssis Georgiou,et al.  Competitive Analysis of Task Scheduling Algorithms on a Fault-Prone Machine and the Impact of Resource Augmentation , 2015, ARMS-CC@PODC.

[5]  Allan Borodin,et al.  On the power of randomization in on-line algorithms , 2005, Algorithmica.

[6]  Tak Wah Lam,et al.  Performance guarantee for EDF under overload , 2004, J. Algorithms.

[7]  Prudence W. H. Wong,et al.  Fault tolerant scheduling of tasks of two sizes under resource augmentation , 2017, Journal of Scheduling.

[8]  Dariusz R. Kowalski,et al.  Online Packet Scheduling Under Adversarial Jamming , 2013, WAOA.

[9]  Kevin Schewior,et al.  Handling critical tasks online: deadline scheduling and convex-body chasing , 2016, OR.

[10]  Robert E. Tarjan,et al.  Amortized efficiency of list update and paging rules , 1985, CACM.

[11]  Bala Kalyanasundaram,et al.  Speed is as powerful as clairvoyance , 2000, JACM.

[12]  Krzysztof Lorys,et al.  Fault-Tolerant Online Packet Scheduling on Parallel Channels , 2017, 2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[13]  Chryssis Georgiou,et al.  Competitive analysis of fundamental scheduling algorithms on a fault-prone machine and the impact of resource augmentation , 2018, Future Gener. Comput. Syst..

[14]  Nodari Vakhania,et al.  Preemptive Scheduling in Overloaded Systems , 2002, ICALP.

[15]  Jörg Widmer,et al.  Measuring the impact of adversarial errors on packet scheduling strategies , 2013, Journal of Scheduling.

[16]  Kirk Pruhs Competitive online scheduling for server systems , 2007, PERV.

[17]  Cynthia A. Phillips,et al.  Optimal Time-Critical Scheduling via Resource Augmentation , 1997, STOC '97.

[18]  Pavel Veselý,et al.  On packet scheduling with adversarial jamming and speedup , 2019 .

[19]  Chryssis Georgiou,et al.  Online parallel scheduling of non-uniform tasks: Trading failures for energy , 2013, Theor. Comput. Sci..

[20]  Allan Borodin,et al.  Online computation and competitive analysis , 1998 .

[21]  Anna R. Karlin,et al.  Competitive snoopy caching , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[22]  Chryssis Georgiou,et al.  On the competitiveness of scheduling dynamically injected tasks on processes prone to crashes and restarts , 2015, J. Parallel Distributed Comput..