Resource Allocation: Deterministic Analysis. Traffic Model Stochastic Different sample paths with different properties Expected case analysis Deterministic.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Min-Plus Linear Systems Theory and Bandwidth Estimation Min-Plus Linear Systems Theory and Bandwidth Estimation TexPoint fonts used in EMF. Read the TexPoint.
ECE358: Computer Networks Fall 2014
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Token Bucket. © Jörg Liebeherr, 2013 Tokens are added at rate r up to a maximum size of TB max.
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
Berlin Network Calculus & Related Models with Applications by George I. Stassinopoulos Prof. NTUA
Lecture 12. Emulating the Output Queue So far we have shown that it is possible to obtain the same throughput with input queueing as with output queueing.
Courtesy: Nick McKeown, Stanford 1 Intro to Quality of Service Tahir Azim.
THE SYSTEM THEORY OF NETWORK CALCULUS J.-Y. Le Boudec EPFL WoNeCa, 2012 Mars 21 1.
Communication Networks Network Calculus: Deterministic Traffic Analysis Last updated: Thursday, May 07, 2015 Prof. Amir Herzberg Dept of Computer.
Analytical Modeling and Evaluation of On- Chip Interconnects Using Network Calculus M. BAkhouya, S. Suboh, J. Gaber, T. El-Ghazawi NOCS 2009, May 10-13,
0 A Short Course on Network Calculus CH-1015 Ecublens Jean-Yves Le Boudec Patrick Thiran ICA, EPFL.
Recent Progress on a Statistical Network Calculus Jorg Liebeherr Department of Computer Science University of Virginia.
Network Calculus: Reference Material: J.-Y. LeBoudec and Patrick Thiran: “Network Calculus: A Theory of Deterministic Queuing Systems for the Internet”,
1 ELEN 602 Lecture 8 Review of Last lecture –HDLC, PPP –TDM, FDM Today’s lecture –Wavelength Division Multiplexing –Statistical Multiplexing –Preliminary.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
Algorithm Orals Algorithm Qualifying Examination Orals Achieving 100% Throughput in IQ/CIOQ Switches using Maximum Size and Maximal Matching Algorithms.
CS 268: Lecture 15/16 (Packet Scheduling) Ion Stoica April 8/10, 2002.
Network Calculus: Reference Material: J.-Y. LeBoudec and Patrick Thiran: “Network Calculus: A Theory of Deterministic Queuing Systems for the Internet”,
Deterministic Network Calculus p.2. DNC arrival results Accumulated arrival functions R(t): traffic recieved in [0,t] Arrival function may be constrained:
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
Surprise Quiz EE384Z: McKeown, Prabhakar ”Your Worst Nightmares in Packet Switching Architectures”, 3 units [Total time = 15 mins, Marks: 15, Credit is.
Internet Queuing Delay Introduction How many packets in the queue? How long a packet takes to go through?
CS144, Stanford University Error in Q3-7. CS144, Stanford University Using longest prefix matching, the IP address will match which entry? a /8.
Digital Signals and Systems
References for M/G/1 Input Process
Packet Scheduling From Ion Stoica. 2 Packet Scheduling  Decide when and what packet to send on output link -Usually implemented at output interface 1.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
1 Network Calculus Jean-Yves Le Boudec, lecturer Patrick Thiran Pisa 2003.
Distributed Multimedia March 19, Distributed Multimedia What is Distributed Multimedia?  Large quantities of distributed data  Typically streamed.
Network Analysis A brief introduction on queues, delays, and tokens Lin Gu, Computer Networking: A Top Down Approach 6 th edition. Jim Kurose.
Bandwidth Estimation TexPoint fonts used in EMF.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1. Performance Guarantees Introduction –by asking sources about flow behavior it is possible to construct networks that could guarantee performance for.
TexPoint fonts used in EMF.
Nick McKeown Spring 2012 Lecture 2,3 Output Queueing EE384x Packet Switch Architectures.
Computer Networking Queueing (A Summary from Appendix A) Dr Sandra I. Woolley.
Constructions of Optical Priority Queues Jay Cheng Department of Electrical Engineering & Institute of Communications Engineering National Tsing Hua University.
What is the Speed of the Internet? Internet Computing KUT Youn-Hee Han.
Maciej Stasiak, Mariusz Głąbowski Arkadiusz Wiśniewski, Piotr Zwierzykowski Model of the Nodes in the Packet Network Chapter 10.
048866: Packet Switch Architectures
Chengzhi Li and Edward W. Knightly Schedulability Criterion and Performance Analysis of Coordinated Schedulers.
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems Energy-aware QoS packet scheduling.
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California
Providing QoS in IP Networks
Scheduling for QoS Management. Engineering Internet QoS2 Outline  What is Queue Management and Scheduling?  Goals of scheduling  Fairness (Conservation.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for data flow In Computer Networks Resource: Fayez Gebali, Analysis.
04/02/08 1 Packet Scheduling IT610 Prof. A. Sahoo KReSIT.
QoS & Queuing Theory CS352.
Topics discussed in this section:
Intro to Deterministic Analysis
Intro to Deterministic Analysis
CONGESTION CONTROL.
QoS Guarantees introduction call admission traffic specification
Intro to Deterministic Analysis
Intro to Deterministic Analysis
EE384x: Packet Switch Architectures
Token Bucket.
A Short Course on Network Calculus
Network calculus ( system theory )
© J. Liebeherr, All rights reserved, 2018
Buffered Link.
Schedulability Conditions for Scheduling Algorithms
Fundamentals of Computer Networking
Introduction to Traffic Shaping
Intro to Deterministic Analysis
Fair Queueing.
کنترل جریان امیدرضا معروضی.
Presentation transcript:

Resource Allocation: Deterministic Analysis

Traffic Model Stochastic Different sample paths with different properties Expected case analysis Deterministic Properties applying to every sample path worst case analysis

System Description Single server service rate C Single buffer Finite Infinite Arrival stream Departure Stream Output Queued System

Reichs Equation A(t) Total traffic arriving in interval (0, t) D(t) Total traffic departing in interval (0, t) X(t) Queue length at time t X(t) = sup 0  s  t (A(t) – A(s) – C(t-s)) D(t) = A(t) – X(t) = A(t) - sup 0  s  t (A(t) – A(s) – C(t-s)) = inf 0  s  t (A(s) + C(t-s))

Convolution D(t) = inf 0  s  t (A(s) + C(t-s)) = inf 0  s  t (A(s) + B(t-s)) A*B(t) = inf 0  s  t (A(s) + B(t-s))  (t) = 0 for t  0 =  otherwise A*  (t) = A A*  d (t) = A(t-d)  d (t)=  (t-d) For causal B, B  , thus A* B  A*  = A

Service curve for network elements A(t) D(t) S(t)  S(t) S(t) and  S(t) are nonnegative, non-decreasing causal functions such that D  A* S and D  A*  S The first is minimum service curve and the second the maximum service curve If D = A*F for some non-negative, non-decreasing causal F, then F is the service curve

Examples coder packetizer Coder emits bursts of bytes at rate r Packetizer packetizes L bits in a packet, if less than L bits are available, then packetizes whatever available Maximum delay is L/r D  A(t – L/r) Minimum service curve is S =  L/r

Constant rate server S(t) = C max(t, 0) Coder + Packetizer Constant rate server S DpDp D A D = D p * S  (A *  L/r ) * S = A * (  L/r * S) Minimum service curve is  L/r * S

Delay in a network element Let u be the minimum time such that all the data arriving in [0, t] depart by time u Then u = inf{s: D(s)  A(t)} FIFO service Maximum delay  max = sup t  0 {u – t: inf{s: D(s)  A(t)}} This is the maximum horizontal distance between A and D D  (A *   max ) If A curve is shifted to the right by  max it is below D

Envelope A function E(t) is an envelope for the arrival function A(t) if A(t) – A(u)  E(t-u) for all u and t, 0  u  t That is A  A*E For causal E, E  , thus A* E  A*  = A  A*E Thus A = A*E An envelope is sub-additive if for all u  t, E(t)  E(u) + E(t-u) Thus E  E*E for a sub-additive envelope

Regulator A network element is a regulator with envelope E, if for any input arrival process A, the departure process D satisfies D  D*E Output of a source is typically statistically characterizable Source output can be upper-bounded by envelopes by passing it through a regulator

Buffered Leaky Bucket Regulator There exists a fictitious token bucket which obtains token at the rate . The bucket can hold up to  tokens A packet generated from a source can be released only if the token bucket has a token, and the token is removed after releasing the packet

D(t) – D(u)   +  (t-u) In [u, t] the maximum amount of data that can be transported is the total number of tokens generated in [u, t] + the total number of tokens accumulated at u. The first quantity is  (t-u) The second is  Thus D  D*E where E(t) =  +  t It follows that a leaky bucket regulator has envelope  +  t Is this envelope causal? Is it sub-additive?

For any arrival process A, the departure process of the regulator satisfies D = A*E Thus E is the service curve of the regulator Proof: Note down from the board

A process A with envelope E 1 is passed through a leaky bucket regulator with envelope E 2 Show that the resulting output has envelope E 1 * E 2 Lets work this out! Consider the output of a voice coder Emits bits at the rate R A has envelope E = Rt Regulate this process by a leaky bucket regulator with envelope E(t) =  +  t The resulting process will have an envelope min(Rt,  +  t)

What do we do if we know the envelopes? We can upper bound the delay of an arrival process if its envelope and the minimum service curve of the network element is known. Let an arrival process A be transmitted through a network element with minimum service curve S(t) D is the departure process d max = inf {d: E*  d  S}

Here, d max is the least amount the envelope E(t) be shifted so that it falls below he service curve S. The delay produced by the network element is upper bounded in terms of d max D  A *  dmax Proof: D  A * S  A * (E*  dmax ) = (A * E) *  dmax  A *  dmax

Example computations of d max E(t) = min(Rt,  +  t) S(t) = ct d max =  (R-c)/c(R -  ) Lets work it out!

Consider an arbitrary envelope E(t) and S(t) = ct It follows that E(t- d max )  ct Not quite rigorous! E(t)  c(t+ d max ) d max  (E(t)-ct)/c More rigorously, d max = sup t  0 (E(t)-ct)/c If delay upper bound must be less than some T, then the minimim required service rate c min is such that sup t  0 (E(t)- c min t)/ c min = T It follows that c min = sup t  0 (E(t)/ T + t)