A Statistical Network Calculus for Computer Networks Jorg Liebeherr Department of Computer Science University of Virginia.

Slides:



Advertisements
Similar presentations
Scalable Routing In Delay Tolerant Networks
Advertisements

1 Real-Time Queueing Theory Presented by: John Lehoczky Carnegie Mellon SAMSI Workshop Congestion Control and Heavy Traffic.
1 Network Telecommunication Group University of Pisa - Information Engineering department January Speaker: Raffaello Secchi Authors: Davide Adami.
Multipath Routing for Video Delivery over Bandwidth-Limited Networks S.-H. Gary Chan Jiancong Chen Department of Computer Science Hong Kong University.
Doc.: IEEE /1216r1 Submission November 2009 BroadcomSlide 1 Internet Traffic Modeling Date: Authors: NameAffiliationsAddressPhone .
Computational Complexity, Choosing Data Structures Svetlin Nakov Telerik Corporation
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
TCP Probe: A TCP with Built-in Path Capacity Estimation Anders Persson, Cesar Marcondes, Ling-Jyh Chen, Li Lao, M. Y. Sanadidi, Mario Gerla Computer Science.
CS 268: Packet Scheduling Ion Stoica March 18/20, 2003.
Junchen Jiang (CMU) Vyas Sekar (Stony Brook U)
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Multistage Spectrum Sensing for Cognitive Radios UCLA CORES.
Online Sampling for Markov Decision Processes Bob Givan Joint work w/ E. K. P. Chong, H. Chang, G. Wu Electrical and Computer Engineering Purdue University.
Introduction into Simulation Basic Simulation Modeling.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
Resource Allocation: Deterministic Analysis. Traffic Model Stochastic Different sample paths with different properties Expected case analysis Deterministic.
Engineering Internet QoS
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
Analytical Modeling and Evaluation of On- Chip Interconnects Using Network Calculus M. BAkhouya, S. Suboh, J. Gaber, T. El-Ghazawi NOCS 2009, May 10-13,
0 A Short Course on Network Calculus CH-1015 Ecublens Jean-Yves Le Boudec Patrick Thiran ICA, EPFL.
Recent Progress on a Statistical Network Calculus Jorg Liebeherr Department of Computer Science University of Virginia.
Aleksandar Kuzmanovic and Edward W. Knightly Rice Networks Group Measuring Service in Multi-Class Networks.
1 Call Admission Control Carey Williamson Department of Computer Science University of Calgary.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
Edward W. Knightly and Chengzhi Li Rice Networks Group Coordinated Scheduling: A Mechanism for Efficient Multi-Node Communication.
End-to-End Analysis of Distributed Video-on-Demand Systems Padmavathi Mundur, Robert Simon, and Arun K. Sood IEEE Transactions on Multimedia, February.
CS 268: Lecture 15/16 (Packet Scheduling) Ion Stoica April 8/10, 2002.
Generalized Processing Sharing (GPS) Is work conserving Is a fluid model Service Guarantee –GPS discipline can provide an end-to-end bounded- delay service.
1 Token Bucket Based CAC and Packet Scheduling for IEEE Broadband Wireless Access Networks Chi-Hung Chiang
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
1 Proportional differentiations provisioning Packet Scheduling & Buffer Management Yang Chen LANDER CSE Department SUNY at Buffalo.
Surprise Quiz EE384Z: McKeown, Prabhakar ”Your Worst Nightmares in Packet Switching Architectures”, 3 units [Total time = 15 mins, Marks: 15, Credit is.
Network Planning & Capacity Management Frank Yeong-Sung Lin ( 林永松 ) Department of Information Management National Taiwan University Taipei, Taiwan, R.O.C.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
References for M/G/1 Input Process
Packet Scheduling From Ion Stoica. 2 Packet Scheduling  Decide when and what packet to send on output link -Usually implemented at output interface 1.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
A stochastic power network calculus for integrating renewable energy sources into the power grid Presenter: qinghua shen Wang, Kai, et al. "A stochastic.
. Post-Internet QoS Research Jorg Liebeherr Department of Computer Science University of Virginia IWQoS 2004 Panel.
1. Performance Guarantees Introduction –by asking sources about flow behavior it is possible to construct networks that could guarantee performance for.
Fair Queueing. 2 First-Come-First Served (FIFO) Packets are transmitted in the order of their arrival Advantage: –Very simple to implement Disadvantage:
1 Chapters 8 Overview of Queuing Analysis. Chapter 8 Overview of Queuing Analysis 2 Projected vs. Actual Response Time.
Link Dimensioning for Fractional Brownian Input Chen Jiongze PhD student, Electronic Engineering Department, City University of Hong Kong Supported by.
March 29 Scheduling ?. What is Packet Scheduling? Decide when and what packet to send on output link 1 2 Scheduler flow 1 flow 2 flow n Buffer management.
Packet Scheduling and Buffer Management Switches S.Keshav: “ An Engineering Approach to Networking”
Nick McKeown Spring 2012 Lecture 2,3 Output Queueing EE384x Packet Switch Architectures.
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
Scheduling Determines which packet gets the resource. Enforces resource allocation to each flows. To be “Fair”, scheduling must: –Keep track of how many.
Scheduling CS 218 Fall 02 - Keshav Chpt 9 Nov 5, 2003 Problem: given N packet streams contending for the same channel, how to schedule pkt transmissions?
Delays in Packet Networks
1 An Analytical Model for the Dimensioning of a GPRS/EDGE Network with a Capacity Constraint on a Group of Cells r , r , r Nogueira,
1 Queuing Delay and Queuing Analysis. RECALL: Delays in Packet Switched (e.g. IP) Networks End-to-end delay (simplified) = End-to-end delay (simplified)
Chengzhi Li and Edward W. Knightly Schedulability Criterion and Performance Analysis of Coordinated Schedulers.
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems Energy-aware QoS packet scheduling.
Virtual-Channel Flow Control William J. Dally
04/02/08 1 Packet Scheduling IT610 Prof. A. Sahoo KReSIT.
Intro to Deterministic Analysis
Intro to Deterministic Analysis
Measuring Service in Multi-Class Networks
Delays in Packet Networks
Intro to Deterministic Analysis
Fair Queueing.
EE 122: Quality of Service and Resource Allocation
Computer Science Division
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Schedulability Conditions for Scheduling Algorithms
Quality-of-Service ECE1545.
کنترل جریان امیدرضا معروضی.
Presentation transcript:

A Statistical Network Calculus for Computer Networks Jorg Liebeherr Department of Computer Science University of Virginia

Collaborators Almut Burchard Robert Boorstyn Chaiwat Oottamakorn Stephen Patek Chengzhi Li Florin Ciucu

R. Boorstyn, A. Burchard, J. Liebeherr, C. Oottamakorn. “Statistical Service Assurances for Packet Scheduling Algorithms”, IEEE Journal on Selected Areas in Communications. Special Issue on Internet QoS, Vol. 18, No. 12, pp , December A. Burchard, J. Liebeherr, and S. D. Patek. “A Calculus for End–to–end Statistical Service Guarantees.” (2nd revised version), Technical Report CS , May J. Liebeherr, A. Burchard, and S. D. Patek, “Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning”, Infocom C. Li, A. Burchard, J. Liebeherr, “Calculus with Effective Bandwidth”, Technical Report CS , November F. Ciucu, A. Burchard, J. Liebeherr, ",A Network Service Curve Approach for the Stochastic Analysis of Networks”, ACM Sigmetrics 2005, to appear. Papers

“Toy Models” in Computer Networking Learn from Physics: Wide use of toy models … that capture key characteristics of studied system … that permit back-of-the-envelope calculations … that are usable by non-theorists Simple models have played a major role in the evolution and development of data networks Queueing Networks Effective Bandwidth (Deterministic) Network Calculus

(Product Form) Queueing Networks Jackson (50’s), Kelly, BCMP (70’s) Flow of “jobs” in system of queues and servers Applications: Provided motivation for packet-switching (Kleinrock’s PhD thesis) Main result: Steady state probability of queue occupancey n = (n 1, n 2, …, n k ) : P(n ) = P(n 1 ) P(n 2 ) … P(n k ) Limitations:  Limited to Poisson traffic  Limited scheduling algorithms

Effective Bandwidth Hui, Mitra, Kelly (90s) Describes bandwidth needs of complex traffic by a number Application: admission control in ATM networks Can consider:  service guarantees  wide variety of traffic (incl. LRD)  statistical multiplexing Limitations:  not well suited for scheduling Peak rate Mean rate effective bandwidth

Network Calculus Cruz, Chang, LeBoudec (90’s) Worst case delay and backlog bounds for fluid flow traffic Application: design of new schedulers (WFQ) new services (IntServ). Sender Receiver S3S3 S1S1 S2S2 S net Limitations:  No random losses  No statistical multiplexing, therefore pessimistic Main result: If S 1, S 2 and S 3 describes the service at each node, then S net = S 1 * S 2 * S 3 describes the service given by the network as a whole.

State-of-the-art No analysis methodology is widely used today. Today, a lot of networking research relies on simulation and measurements to validate new designs Simulation and measurement are generally not suitable for evaluation of radically new designs RequirementsQueueing networks Effective bandwidth Network calculus Traffic classes (incl. self-similar, heavy-tailed) LimitedBroad Broad (but loose) Scheduling LimitedNoYes QoS (bounds on loss, throughput, delay) Very limited Loss, throughput Deterministic Statistical Multiplexing SomeYesNo

Motivation: Develop network calculus into new “Toy Model” Today, fundamental progress in networking is hampered by the lack of methods to evaluate how radically new designs will perform. Opportunity: Simple (`toy') models that permit fast (`back-of-the-envelope') evaluations can become an enabling factor for breakthrough changes in networking research Approach: Probabilistic version of network calculus (stochastic network calculus) is a candidate for a new class of toy models for networking

Rate Variance Envelope Knightly `97 Effective Bandwidth: J. Hui ’88 Guerin et.al. ’91 Kelly `91 Gibbens, Hunt `91 Deterministic network calculus Cruz `91 Effective bandwidth in network calculus Chang `94 (min,+) algebra for det. networks: Agrawal et.al. `99 Chang `98 LeBoudec `98 Service Curves Cruz `95 Cruz calculus with probabilistic traffic Kurose `92 Exponentially/stochasti- cally. bounded burstiness Yaron/Sidi `93 Starobinski/Sidi `99 Stochastically bounded service curve Qiu et.al.` Our goals: (1)Maintain elegance of deterministic calculus (2)Exploit statistical multiplexing (3)Try to express other models 2005 Related Work (small subset)

Multiplexing gain is the raison d’être for packet networks. Sources of multiplexing gain: Traffic characterization and conditioning Scheduling Statistical Multiplexing Multiplexing Gain

Traffic Conditioning Traffic conditioning is typically done at the network edge Reshaping traffic increases delays and/or losses Traffic Conditioning

Scheduling algorithm determines the order in which traffic is transmitted Examples: Different loss priorities  priority scheduling Traffic with rate guarantees  rate-based scheduling (WFQ, WRR) Delay constraints  deadline-based scheduling (EDF) Scheduling

Multiplexing Gain Flow 1 Worst case arrivals Flow 2 Flow 3 Time Without statistical multiplexing Backlog Worst-case backlog Flow 1 Flow 2 Flow 3 Time Backlog Arrivals With statistical multiplexing Backlog

Deterministic worst-case Expected case Probable worst- case

Example of Statistical Multiplexing: Retirement Savings Life expectancy: Normal(  =75,  =10) years Retiring Age:65 years Interest: 0% Withdrawal: $50,000 per year How much money does a person need to save (with confidence of 95% or 99%)? Life expectancy in a group of N people is Normal( ,  N). N=1 person (Individual Savings): 95% confidence:  = 30 years  $1.5 Mio. 99% confidence:  = 40 years  $2 Mio. N=100 people (Pooled Savings): 95% confidence:  = 12 years  $600,000 99% confidence:  = 13 years  $650,000

The importance of Statistical Multiplexing At high data rates, statistical multiplexing gain dominates the effects of scheduling and traffic characterization

Arrivals from a flow j are a random process Stationarity: The are stationary random processes Independence: The and are stochastically independent Traffic Characterization

Leaky Buckets: Regulated arrivals Each flow is regulated Buffer with Scheduler Flow 1 Flow N C Traffic is constrained by a subadditive deterministic envelope such that Regulated Arrivals

Definition: Definition: Effective envelope for is a function such that Note: Effective envelope is not a sample path bound. Often, we need a stronger version of the effective envelope! Effective envelope Define a function that bounds traffic with high probability  “Effective Envelope”

Sample Paths and Envelopes Sample paths Note: All envelopes are non-random functions Effective envelope At any time, at most one sample path is violated Stronger effective envelope At most one sample path is violated Deterministic envelope Never violated

Probabilistic Sample Path Bound A strong effective envelope for an interval of length is a function which satisfies Relationship between the envelopes is established as follows: with

Arrivals from multiple flows: Deterministic Network Calculus: Deterministic Network Calculus: Worst-case of multiple flows is sum of the worst-case of each flow Regulated arrivals Traffic Conditioning Buffer with Scheduler Flow 1 Flow N C Aggregating Arrivals

Effective Envelopes for aggregated flows Stochastic Calculus: Stochastic Calculus: Exploit independence and extract statistical multiplexing gain by calculating For example, using the Chernoff Bound, we can obtain

Type 1 flows: P =1.5 Mbps  =.15 Mbps  =95400 bits Type 2 flows: P = 6 Mbps  =.15 Mbps  = bits Type 1 flows strong effective envelopes Effective vs. Deterministic Envelope Envelopes

Traffic rate at t = 50 ms Type 1 flows Effective vs. Deterministic Envelope Envelopes

Scheduling Algorithms Work-conserving scheduler with unit rate that serves Q classes Class-q traffic has delay bound d q Scheduling algorithm: Scheduler Static Priority (SP) : Earliest Deadline First (EDF) : Deterministic Service Never a delay bound violation if: Statistical Service Delay bound violation with if:

Statistical Multiplexing vs. Scheduling Statistical multiplexing makes a big difference Scheduling has small impact Example: MPEG videos with delay constraints at C= 622 Mbps Deterministic service vs. statistical service (  = 10 -6) Thick lines: EDF Scheduling Dashed lines: SP scheduling d terminator =100 ms d lamb =10 ms

Scheduling has small impact C= 45 Mbps,  = Delay bounds: Type 1: d 1 =100 ms, Type 2: d 2 =10 ms, Thick lines: EDF Scheduling Thin lines: SP scheduling Scheduling vs. Statistical Multiplexing Statistical multiplexing makes a big difference

More interesting traffic types So far: Traffic of each flow was regulated Next: Consider different traffic types: On-Off traffic Fraction Brownian Motion (FBM) traffic Approach: Exploit literature on Effective Bandwidth Describes traffic in terms of a function Expressions have been derived for many traffic types

Effective Envelopes and Effective Bandwidth Effective Bandwidth (Kelly 1996) Given, an effective envelope is given by

Comparisons of statistical service guarantees for different schedulers and traffic types Schedulers: SP- Static Priority EDF – Earliest Deadline First GPS – Generalized Processor Sharing Traffic: Regulated – leaky bucket On-Off – On-off source FBM – Fractional Brownian Motion C= 100 Mbps,  = Effective Envelopes and Effective Bandwidth

S(t) A(t) D(t) Statistical Network Calculus with Min-Plus Algebra

Convolution operation: Deconvolution operation Convolution and Deconvolution operators

1.Output Envelope: is an envelope for the departures 2.Backlog bound: is an upper bound for the backlog 3.Delay bound: An upper bound for the delay is Cruz `95: A service curve for a flow is a function S such that: (min,+) results (Cruz, Chang, LeBoudec ) Deterministic (min,+) Network Calculus

1.Output Envelope: is an envelope for the departures with probability  2.Backlog bound: is an upper bound for the backlog with probability  3.Delay bound: An upper bound for the delay with probability  is An effective service curve for a flow is a function such that: (min,+) results Stochast Network Calculus

Given: Service guarantee to aggregate ( C ) is known Total Traffic is known What is a lower bound on the service seen by a single flow? Allocated capacity C Sender Receiver Statistical Per-Flow Service Bounds

Can show: is an effective service curve for a flow where is a strong effective envelope and is a probabilistic bound on the busy period Allocated capacity C Sender Receiver Statistical Per-Flow Service Bounds

Type 1 flows: Goal: probabilistic delay bound d=10ms Number of flows that can be admitted

Sender Receiver S3S3 S1S1 S2S2 (Cruz, Chang, LeBoudec) Deterministic Network Service Curve (Cruz, Chang, LeBoudec) : If are service curves for a flow at nodes, then S net = S 1 * S 2 * S 3 is a service curve for the entire network. S net Network Service Curves

Network Service Curve: If S 1, , S 2,  … S H,  are effective service curves for a flow, then for all. Unfortunately, this network service is not very useful! Finding a suitable network service curve has been a longstanding open problem. A solution is presented in an upcoming ACM Sigmetrics 05 paper. Network Service Curve in a Stochastic Calculus

Effective Network Service Curve Revise the definition of the effective service curve to Define Theorem: A network service curve is given by with where are free parameters

Application of Network Service Curve Analyze end-to-end delay of through flows for Markov Modulated On-Off Traffic Compare delay with network service curve to a summation of per-node bounds

Example Peak rate: P = 1.5 Mbps Average rate:  = 0.15 Mbps T= 1/  + 1/ = 10 msec C = 100 Mbos Cross traffic = through traffic  = Addition of per- node bounds grows O(H 3 ) Network service curve bounds grow O(H log H)

Conclusions Presented aspects of stochastic network calculus Preserves much (but not all) of the deterministic calculus Can express many existing results on: Deterministic calculus Effective bandwidth Other models (EBB, not shown) Many open issues

Conclusions Requirements Queueing networks Effective bandwidth Network calculus Traffic classes (incl. self-similar, heavy-tailed) LimitedBroad Broad (but loose) Scheduling LimitedNoYes QoS (bounds on loss, throughput delay) Very limited Loss, throughput Deterministic Statistical Multiplexing SomeYesNo Stochastic network calculus Broad Yes