Delays in Packet Networks

Slides:



Advertisements
Similar presentations
A Statistical Network Calculus for Computer Networks Jorg Liebeherr Department of Computer Science University of Virginia.
Advertisements

Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Traffic and routing. Network Queueing Model Packets are buffered in egress queues waiting for serialization on line Link capacity is C bps Average packet.
1 IK1500 Communication Systems IK1330 Lecture 3: Networking Anders Västberg
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
Network Design and Optimization Queueing Theory Overview Dr. Greg Bernstein Grotto Networking
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Resource Allocation: Deterministic Analysis. Traffic Model Stochastic Different sample paths with different properties Expected case analysis Deterministic.
Abhay.K.Parekh and Robert G.Gallager Laboratory for Information and Decision Systems Massachusetts Institute of Technology IEEE INFOCOM 1992.
THE SYSTEM THEORY OF NETWORK CALCULUS J.-Y. Le Boudec EPFL WoNeCa, 2012 Mars 21 1.
Analytical Modeling and Evaluation of On- Chip Interconnects Using Network Calculus M. BAkhouya, S. Suboh, J. Gaber, T. El-Ghazawi NOCS 2009, May 10-13,
0 A Short Course on Network Calculus CH-1015 Ecublens Jean-Yves Le Boudec Patrick Thiran ICA, EPFL.
Recent Progress on a Statistical Network Calculus Jorg Liebeherr Department of Computer Science University of Virginia.
Aleksandar Kuzmanovic and Edward W. Knightly Rice Networks Group Measuring Service in Multi-Class Networks.
Comments on the Performance of Measurement Based Admission Control Algorithms Lee Breslau, S. Jamin, S. Shenker Infocom 2000.
1 Network Information Flow in Network of Queues Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingxiang Luo, and Carey Williamson Department of Computer.
Queuing Theory For Dummies
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
Edward W. Knightly and Chengzhi Li Rice Networks Group Coordinated Scheduling: A Mechanism for Efficient Multi-Node Communication.
Supporting Stored Video: Reducing Rate Variability and End-toEnd Resource Requirements through Optimal Smoothing By James D. salehi, Zhi-Li Zhang, James.
CS 268: Lecture 15/16 (Packet Scheduling) Ion Stoica April 8/10, 2002.
Performance analysis for high speed switches Lecture 6.
Generalized Processing Sharing (GPS) Is work conserving Is a fluid model Service Guarantee –GPS discipline can provide an end-to-end bounded- delay service.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
1 Token Bucket Based CAC and Packet Scheduling for IEEE Broadband Wireless Access Networks Chi-Hung Chiang
Network Calculus: Reference Material: J.-Y. LeBoudec and Patrick Thiran: “Network Calculus: A Theory of Deterministic Queuing Systems for the Internet”,
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
Queueing Theory.
7/3/2015© 2007 Raymond P. Jefferis III1 Queuing Systems.
Self-Similarity of Network Traffic Presented by Wei Lu Supervised by Niclas Meier 05/
1 Real-Time Queueing Network Theory Presented by Akramul Azim Department of Electrical and Computer Engineering University of Waterloo, Canada John P.
1 Chapters 9 Self-SimilarTraffic. Chapter 9 – Self-Similar Traffic 2 Introduction- Motivation Validity of the queuing models we have studied depends on.
References for M/G/1 Input Process
Packet Scheduling From Ion Stoica. 2 Packet Scheduling  Decide when and what packet to send on output link -Usually implemented at output interface 1.
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert.
1 Network Calculus Jean-Yves Le Boudec, lecturer Patrick Thiran Pisa 2003.
Probability Review Thinh Nguyen. Probability Theory Review Sample space Bayes’ Rule Independence Expectation Distributions.
. Post-Internet QoS Research Jorg Liebeherr Department of Computer Science University of Virginia IWQoS 2004 Panel.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
Pravin Rajamoney CSE-581 Network Technology
CS433 Modeling and Simulation Lecture 12 Queueing Theory Dr. Anis Koubâa 03 May 2008 Al-Imam Mohammad Ibn Saud University.
1 Chapters 8 Overview of Queuing Analysis. Chapter 8 Overview of Queuing Analysis 2 Projected vs. Actual Response Time.
A Forward end-to-end delays Analysis for packet switched networks Georges Kemayo, Frédéric Ridouard, Henri Bauer, Pascal Richard LIAS, Université de Poitiers,
QoS Routing in Networks with Inaccurate Information: Theory and Algorithms Roch A. Guerin and Ariel Orda Presented by: Tiewei Wang Jun Chen July 10, 2000.
1 Performance Analysis of the Distributed Coordination Function under Sporadic Traffic joint work with C.-F. Chiasserini (Politecnico di Torino)
Opportunistic Traffic Scheduling Over Multiple Network Path Coskun Cetinkaya and Edward Knightly.
Florida State UniversityZhenhai Duan1 BCSQ: Bin-based Core Stateless Queueing for Scalable Support of Guaranteed Services Zhenhai Duan Karthik Parsha Department.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
Real-Time Communication Integrated Services: Integration of variety of services with different requirements (real-time and non-real-time) Traffic (workload)
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
Dynamic Bandwidth Allocation with Fair Scheduling For WCDMA Systems Liang Xu, Xumin Shen, and Jon W. Mark University of Waterloo published in IEEE Wireless.
Scheduling Determines which packet gets the resource. Enforces resource allocation to each flows. To be “Fair”, scheduling must: –Keep track of how many.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
1 Queuing Delay and Queuing Analysis. RECALL: Delays in Packet Switched (e.g. IP) Networks End-to-end delay (simplified) = End-to-end delay (simplified)
Chengzhi Li and Edward W. Knightly Schedulability Criterion and Performance Analysis of Coordinated Schedulers.
Managing VBR Videos. The VBR Problem Constant quality Burstiness over multiple time scales Difference within and between scenes Frame structure of encoding.
Scheduling for QoS Management. Engineering Internet QoS2 Outline  What is Queue Management and Scheduling?  Goals of scheduling  Fairness (Conservation.
04/02/08 1 Packet Scheduling IT610 Prof. A. Sahoo KReSIT.
OPERATING SYSTEMS CS 3502 Fall 2017
Topics discussed in this section:
Delays in Packet Networks
Scheduling in Packet Networks
Intro to Deterministic Analysis
EE 122: Quality of Service and Resource Allocation
Schedulability Conditions for Scheduling Algorithms
Prestented by Zhi-Sheng, Lin
CSE 550 Computer Network Design
Quality-of-Service ECE1545.
کنترل جریان امیدرضا معروضی.
Presentation transcript:

Delays in Packet Networks Getting a Grip on Delays in Packet Networks Jorg Liebeherr Almut Burchard Dept. of ECE Dept. of Mathematics University of Toronto

Packet Switch Fixed-capacity links Variable delay due to waiting time in buffers Delay depends on Traffic Scheduling

Traffic Arrivals Peak rate Frame size Mean rate Frame number

First-In-First-Out

Static Priority (SP) Blind Multiplexing (BMux): All “other traffic” has higher priority

Earliest Deadline First (EDF) Benchmark scheduling algorithm for meeting delay requirements

Network

Computing delays in such networks is notoriously hard … Simplified Network Computing delays in such networks is notoriously hard …

… but tempting Over the last (almost) 20/15 years, we have worked on problems relating to network delays: Worst-case delays Scheduling vs. statistical multiplexing Statistical bounds on end-to-end delays Difficult traffic types Scaling laws

Collaborators Domenico Ferrari Dallas Wrege Hui Zhang Ed Knightly Robert Boorstyn Chaiwat Oottamakorn Stephen Patek Chengzhi Li Florin Ciucu Yashar Ghiassi-Farrokhfal

Papers (relevant to this talk) J.Liebeherr, D. E. Wrege, D. Ferrari, “Exact admission control for networks with a bounded delay service,” ACM/IEEE Trans. Netw. 4(6), 1996. E. W. Knightly, D. E. Wrege, H. Zhang, J. Liebeherr, “Fundamental Limits and Tradeoffs of Providing Deterministic Guarantees to VBR Video Traffic,” ACM Sigmetrics, 1995. R. Boorstyn, A. Burchard, J. Liebeherr, C. Oottamakorn. “Statistical Service Assurances for Packet Scheduling Algorithms”, IEEE JSAC, Dec. 2000. A. Burchard, J. Liebeherr, S. D. Patek, “A Min-Plus Calculus for End-to-end Statistical Service Guarantees,” IEEE Trans. on IT, 52(9), Sep. 2006. F. Ciucu, A. Burchard, J. Liebeherr, “A Network Service Curve Approach for the Stochastic Analysis of Networks”, ACM Sigmetrics 2005. C. Li, A. Burchard, J. Liebeherr, “A Network Calculus with Effective Bandwidth,” ACM/IEEE Trans. on Networking, Dec. 2007. J. Liebeherr, A. Burchard, F. Ciucu, “Non-asymptotic Delay Bounds for Networks with Heavy-Tailed Traffic,” INFOCOM 2010. J. Liebeherr, Y. Ghiassi-Farrokhfal, A. Burchard, “On the Impact of Link Scheduling on End-to-End Delays in Large Networks,” IEEE JSAC, May 2011. J. Liebeherr, Y. Ghiassi-Farrokhfal, A. Burchard, “The Impact of Link Scheduling on Long Paths: Statistical Analysis and Optimal Bounds”, INFOCOM ’2011., A. Burchard, J. Liebeherr, F. Ciucu, “On Superlinear Scaling of Network Delays, ACM/IEEE Trans. Netw., to appear.

Disclaimer This talk makes a few simplifications Please see papers for complete details

Traffic Description Traffic arrivals in time interval [s,t) is Arrival function A Traffic arrivals in time interval [s,t) is Burstiness can be reduced by “shaping” traffic

Shaped Arrivals Traffic is shaped by an envelope such that: Flow 1 . C Flow N Flows are shaped Regulated arrivals Buffered Link Traffic is shaped by an envelope such that: Popular envelope: “token bucket”

What is the maximum number of shaped flows with delay requirements that can be put on a single buffered link? Link capacity C Each flows j has arrival function Aj envelope Ej delay requirement dj

Delay Analysis of Schedulers Consider a link scheduler with rate C Consider arrival from flow i at t with t+di: Limit (Scheduler Dependent) Deadline of Tagged arrival Arrivals from flow j Tagged arrival Tagged arrival departs by if

Delay Analysis of Schedulers Arrivals from flow j with FIFO: Static Priority: EDF:

Schedulability Condition We have: Therefore: An arrival from class i never has a delay bound violation if Condition is tight, when Ej is concave

Numerical Result (Sigmetrics 1995) C = 45 Mbps MPEG 1 traces: Lecture: d = 30 msec Movie (Jurassic Park): d = 50 msec EDF Static Priority (SP) Peak Rate strong effective envelopes Type 1 flows

Expected case Deterministic worst-case Probable worst-case

Statistical Multiplexing Gain Worst-case arrivals Arrivals Flow 1 Flow 2 Flow 3 Time Backlog Worst-case backlog With statistical multiplexing Arrivals Flow 1 Flow 2 Flow 3 Time Backlog Backlog

Statistical Multiplexing Gain Statistical multiplexing gain is the raison d’être for packet networks.

What is the maximum number of flows with delay requirements that can be put on a buffered link and considering statistical multiplexing? Arrivals are random processes Stationarity: The are stationary random processes Independence: The and are stochastically independent

Envelopes for random arrivals Statistical envelope bounds arrival from flow j with high certainty Statistical envelope : Statistical sample path envelope : Statistical envelopes are non-random functions

Aggregating arrivals Arrivals from group of flows: with deterministic envelopes: with statistical envelopes:

Statistical envelope for group of indepenent (shaped) flows Exploit independence and extract statistical multiplexing gain when calculating For example, using the Chernoff Bound, we can obtain

Statistical vs. Deterministic Envelope Envelopes (JSAC 2000) Type 1 flows: P =1.5 Mbps r = .15 Mbps s =95400 bits Type 2 flows: P = 6 Mbps s = 10345 bits statistical envelopes Type 1 flows

Statistical vs. Deterministic Envelope Envelopes (JSAC 2000) Traffic rate at t = 50 ms Type 1 flows

Scheduling Algorithms Work-conserving scheduler that serves Q classes Class-q has delay bound dq D-scheduling algorithm . Scheduler Deterministic Service Never a delay bound violation if: Statistical Service Delay bound violation with if:

Statistical Multiplexing vs. Scheduling (JSAC 2000) Example: MPEG videos with delay constraints at C= 622 Mbps Deterministic service vs. statistical service (e = 10-6) dterminator=100 ms dlamb=10 ms Thick lines: EDF Scheduling Dashed lines: SP scheduling Statistical multiplexing makes a big difference Scheduling has small impact

More interesting traffic types So far: Traffic of each flow was shaped Next: On-Off traffic Fraction Brownian Motion (FBM) traffic Approach: Exploit literature on Effective Bandwidth Derived for many traffic types Peak rate Mean rate effective bandwidth

Statistical Envelopes and Effective Bandwidth Effective Bandwidth (Kelly 1996) Given , an effective envelope is given by

Different Traffic Types (ToN 2007) Comparisons of statistical service guarantees for different schedulers and traffic types Schedulers: SP- Static Priority EDF – Earliest Deadline First GPS – Generalized Processor Sharing Traffic: Regulated – leaky bucket On-Off – On-off source FBM – Fractional Brownian Motion C= 100 Mbps, e = 10-6

Delays on a path with multiple nodes: Impact of Statistical Multiplexing Role of Scheduling How do delays scale with path length? Does scheduling still matter in a large network?

Deterministic Network Calculus (1/3) Systems theory for networks in (min,+) algebra developed by Rene Cruz, C. S. Chang, JY LeBoudec (1990’s) Service curve S characterizes node Used to obtain worst-case bounds on delay and backlog

Deterministic Network Calculus (2/3) Worst-case view of arrivals: service : Implies worst-case bounds backlog: delay : (min,+) algebra operators Convolution: Deconvolution:

Deterministic Network Calculus (3/3) Main result: If describes the service at each node, then describes the service given by the network as a whole. Sender Receiver Sender Receiver S3 S1 S3 S2 A (t) network S1 D (t) network S2 A (t) network D (t) network S = S * S * S network 1 2 3 S = S * S * S network 1 2 3 Receiver Sender Receiver Sender S network S network D (t) network A (t) network D (t) network A (t) network

Stochastic Network Calculus Probabilistic view on arrivals and service Statistical Sample Path Envelope Statistical Service Curve Results on performance bounds carry over, e.g.: Backlog Bound

Stochastic Network Calculus Hard problem: Find so that Technical difficulty: is a random variable!

Statistical Network Service Curve (Sigmetrics 2005) Notation: Theorem: If are statistical service curves, then for any : is a statistical network service curve with some finite violation probability.

EBB model Traffic with Exponentially Bounded Burstiness (EBB) Sample path statistical envelope obtained via union bound

Example: Scaling of Delay Bounds Traffic is Markov Modulated On-Off Traffic (EBB model) All links have capacity C Same cross-traffic (not independent!) at each node Through flow has lower priority:

Example: Scaling of Delay Bounds Two methods to compute delay bounds: Add per-node bounds: Compute delay bounds at each node and sum up Network service curve: Compute single-node delay bound with statistical network service curve

Example: Scaling of Delay Bounds (Sigmetrics 2005) Peak rate: P = 1.5 Mbps Average rate: r = 0.15 Mbps T= 1/m + 1/l = 10 msec C = 100 Mbps Cross traffic = through traffic e = 10-9 Addition of per-node bounds grows O(H3) Network service curve bounds grow O(H log H)

Result: Lower Bound on E2E Delay (Infocom 2007) M/M/1 queues with identical exponential service at each node Theorem: E2E delay satisfies for all Corollary: -quantile of satisfies

Numerical examples Tandem network without cross traffic Node capacity: Arrivals are compound Poisson process Packets arrival rate: Packet size: Utilization:

Upper and Lower Bounds on E2E Delays (Infocom 2007)

Superlinear Scaling of Network Delays For traffic satisfying “Exponential Bounded Burstiness”, E2E delays follow a scaling law of This is different than predicted by … worst-case analysis … networks satisfying “Kleinrock’s independence assumption”

How do end-to-end delay bounds look like for different schedulers? Back to scheduling … So far: Through traffic has lowest priority and gets leftover capacity  Leftover Service or Blind Multiplexing BMux C How do end-to-end delay bounds look like for different schedulers? Does link scheduling matter on long paths?

Service curves vs. schedulers (JSAC 2011) How well can a service curve describe a scheduler? For schedulers considered earlier, the following is ideal: with indicator function and parameter

Example: End-to-End Bounds Traffic is Markov Modulated On-Off Traffic (EBB model) Fixed capacity link

Example: Deterministic E2E Delays (Infocom ‘11) Peak rate: P = 1.5 Mbps Average rate: r = 0.15 Mbps C = 100 Mbps BMUX EDF (delay-tolerant) FIFO EDF (delay intolerant

Example: Statistical E2E Delays (Infocom`11) Peak rate: P = 1.5 Mbps Average rate: r = 0.15 Mbps C = 100 Mbps e = 10-9

Example: Statistical Output Burstiness (Infocom ‘11) Peak rate: P = 1.5 Mbps Average rate: r = 0.15 Mbps C = 100 Mbps e = 10-9

Can we compute scaling of delays for nasty traffic ?

Heavy-Tailed Self-Similar Traffic A heavy-tailed process satisfies with A self-similar process satisfies Hurst Parameter

End-to-End Delays Cross traffic Cross traffic Cross traffic Node 1 Node 2 … Node H Through traffic Exponentially bounded traffic  (N log N) (Sigmetrics 2005, Infocom 2007) End-to-end delay bound Worst-case delays  (N) (e.g., LeBoudec and Thiran 2000) Number of nodes (N)

htts Traffic Envelope Heavy-tailed self-similar (htss) envelope: Main difficulty: Backlog and delay bounds require sample path envelopes of the form Key contribution (not shown): Derive sample path bound for htss traffic

Example: Node with Pareto Traffic (Infocom 2010) Traffic parameters: Node: Capacity C=100 Mbps with packetizer No cross traffic Compared with: Lower bound from Infocom 2007 Simulations

Example: Nodes with Pareto Traffic (End-to-end) Parameters: Compared with: Lower bound from Infocom 2007 Simulation traces of 108 packets

Illustration of scaling bounds (Infocom 2010) Upper Bound: Lower Bound: Bounds: a = 1.5 Upper Bound Lower Bound  (N log N)  (N)

Summary of insights (1) (2) (3) (4), (5) 1995 2000 2005 2010 (1) (2) (3) (4), (5) Satisfying delay bounds does not require peak rate allocation for complex traffic Statistical multiplexing gain dominates gain due to link scheduling scaling law of end-to-end delays New laws for heavy-tailed traffic Link scheduling plays a role on long path

Example: Pareto Traffic Size of i–th arrival: Arrivals are evenly spaced with gap : With Generalized Central Limit Theorem … … and tail bound ... we get htss envelope a-stable distribution

Example: Envelopes for Pareto Traffic (Infocom 2010) Parameters: Comparison of envelopes: htss GCLT envelope Average rate Trace-based deterministic envelope htts trace envelope

Single Node Delay Bound htss envelope: ht service curve: Delay bound:

Conclusions Stochastic network calculus Broad Yes Requirements Queueing networks Effective bandwidth Network calculus Traffic classes (incl. self-similar, heavy-tailed) Limited Broad Broad (but loose) Scheduling No Yes QoS (bounds on loss, throughput delay) Very limited Loss, throughput Deterministic Statistical Multiplexing Some