Delays in Packet Networks Packet Switch Fixedcapacity links

  • Slides: 61
Download presentation
Delays in Packet Networks

Delays in Packet Networks

Packet Switch • Fixed-capacity links • Variable delay due to waiting time in buffers

Packet Switch • Fixed-capacity links • Variable delay due to waiting time in buffers • Delay depends on 1. Traffic 2. Scheduling

Traffic Arrivals Frame size Peak rate Mean rate Frame number

Traffic Arrivals Frame size Peak rate Mean rate Frame number

First-In-First-Out

First-In-First-Out

Static Priority (SP) • Blind Multiplexing (BMux): All “other traffic” has higher priority

Static Priority (SP) • Blind Multiplexing (BMux): All “other traffic” has higher priority

Earliest Deadline First (EDF) Benchmark scheduling algorithm for meeting delay requirements

Earliest Deadline First (EDF) Benchmark scheduling algorithm for meeting delay requirements

Network

Network

Disclaimer • This talk makes a few simplifications

Disclaimer • This talk makes a few simplifications

Traffic Description Cumulative arrivals A • Traffic arrivals in time interval [s, t) is

Traffic Description Cumulative arrivals A • Traffic arrivals in time interval [s, t) is • Burstiness can be reduced by “shaping” traffic

Shaped Arrivals Flow 1 Flow N . . . C Flows are shaped Traffic

Shaped Arrivals Flow 1 Flow N . . . C Flows are shaped Traffic Regulated arrivals is shaped by an envelope Popular envelope: “token bucket” Buffered Link such that:

What is the maximum number of shaped flows with delay requirements that can be

What is the maximum number of shaped flows with delay requirements that can be put on a single buffered link? • Link capacity C • Each flows j has • arrival function Aj • envelope Ej • delay requirement dj

Delay Analysis of Schedulers • Consider a link scheduler with rate C • Consider

Delay Analysis of Schedulers • Consider a link scheduler with rate C • Consider arrival from flow i at t with t+di: Arrivals from flow j Tagged arrival Limit (Scheduler Dependent) • Tagged arrival departs by if Deadline of Tagged arrival

Delay Analysis of Schedulers Arrivals from flow j with FIFO: Static Priority: EDF:

Delay Analysis of Schedulers Arrivals from flow j with FIFO: Static Priority: EDF:

Schedulability Condition We have: Therefore: An arrival from class i never has a delay

Schedulability Condition We have: Therefore: An arrival from class i never has a delay bound violation if Condition is tight, when Ej is concave

Numerical Result C = 45 Mbps MPEG 1 traces: (Sigmetrics 1995) EDF Static Priority

Numerical Result C = 45 Mbps MPEG 1 traces: (Sigmetrics 1995) EDF Static Priority (SP) Peak Rate strong effective envelopes Lecture: d = 30 msec Movie (Jurassic Park): d = 50 msec Type 1 flows

Expected case Deterministic worst-case Probable worstcase

Expected case Deterministic worst-case Probable worstcase

Statistical Multiplexing Gain Worst-case arrivals Flow 1 Arrivals Flow 2 Worst-case backlog Backlog Flow

Statistical Multiplexing Gain Worst-case arrivals Flow 1 Arrivals Flow 2 Worst-case backlog Backlog Flow 3 Time With statistical multiplexing Backlog Flow 1 Arrivals Flow 2 Flow 3 Time

Statistical Multiplexing Gain Statistical multiplexing gain is the raison d’être for packet networks.

Statistical Multiplexing Gain Statistical multiplexing gain is the raison d’être for packet networks.

What is the maximum number of flows with delay requirements that can be put

What is the maximum number of flows with delay requirements that can be put on a buffered link and considering statistical multiplexing? Arrivals are random processes • Stationarity: is stationary random processes • Independence: Any two flows and are stochastically independent

Envelopes for random arrivals Statistical envelope bounds arrival from flow j with high certainty

Envelopes for random arrivals Statistical envelope bounds arrival from flow j with high certainty • Statistical envelope • Statistical : sample path envelope : Statistical envelopes are non-random functions

Aggregating arrivals Arrivals from group of flows: with deterministic envelopes: with statistical envelopes:

Aggregating arrivals Arrivals from group of flows: with deterministic envelopes: with statistical envelopes:

Statistical envelope for group of indepenent (shaped) flows • Exploit independence and extract statistical

Statistical envelope for group of indepenent (shaped) flows • Exploit independence and extract statistical multiplexing gain when calculating • For example, using the Chernoff Bound, we can obtain

Statistical Envelope Type 1 flows: P =1. 5 Mbps r =. 15 Mbps s

Statistical Envelope Type 1 flows: P =1. 5 Mbps r =. 15 Mbps s =95400 bits Type 2 flows: P = 6 Mbps r =. 15 Mbps s = 10345 bits vs. Deterministic Envelopes (JSAC 2000) statistical envelopes Type 1 flows

Statistical vs. Envelope Deterministic Envelopes Traffic rate at t = 50 ms Type 1

Statistical vs. Envelope Deterministic Envelopes Traffic rate at t = 50 ms Type 1 flows (JSAC 2000)

Scheduling Algorithms • Work-conserving scheduler that serves Q classes • Class-q has delay bound

Scheduling Algorithms • Work-conserving scheduler that serves Q classes • Class-q has delay bound dq . . . Scheduler • D-scheduling algorithm Deterministic Service Never a delay bound violation if: Statistical Service Delay bound violation with if:

Statistical Multiplexing vs. Scheduling (JSAC 2000) Example: MPEG videos with delay constraints at C=

Statistical Multiplexing vs. Scheduling (JSAC 2000) Example: MPEG videos with delay constraints at C= 622 Mbps Deterministic service vs. statistical service (e = 10 -6) Thick lines: EDF Scheduling Dashed lines: SP scheduling Statistical multiplexing makes a big difference Scheduling has small impact dterminator=100 ms dlamb=10 ms

More interesting traffic types • So far: Traffic of each flow was shaped •

More interesting traffic types • So far: Traffic of each flow was shaped • Next: • On-Off traffic • Fraction Brownian Motion (FBM) traffic Approach: • Exploit literature on Effective Bandwidth • Derived for many traffic types Peak rate effective bandwidth Mean rate

Statistical Envelopes and Effective Bandwidth (Kelly 1996) Given , an effective envelope is given

Statistical Envelopes and Effective Bandwidth (Kelly 1996) Given , an effective envelope is given by

Different Traffic Types (To. N 2007) Comparisons of statistical service guarantees for different schedulers

Different Traffic Types (To. N 2007) Comparisons of statistical service guarantees for different schedulers and traffic types Schedulers: SP- Static Priority EDF – Earliest Deadline First GPS – Generalized Processor Sharing Traffic: Regulated – leaky bucket On-Off – On-off source FBM – Fractional Brownian Motion C= 100 Mbps, e = 10 -6

Delays on a path with multiple nodes: • Impact of Statistical Multiplexing • Role

Delays on a path with multiple nodes: • Impact of Statistical Multiplexing • Role of Scheduling • How do delays scale with path length? • Does scheduling still matter in a large network?

Deterministic Network Calculus • Systems theory for networks in (min, +) algebra developed by

Deterministic Network Calculus • Systems theory for networks in (min, +) algebra developed by Rene Cruz, C. S. Chang, JY Le. Boudec (1990’s) • Service curve S characterizes node • Used to obtain worst-case bounds on delay and backlog (1/3)

Deterministic Network Calculus • Worst-case view of • arrivals: • service : • Implies

Deterministic Network Calculus • Worst-case view of • arrivals: • service : • Implies worst-case bounds • backlog: • delay : • (min, +) algebra operators • Convolution: • Deconvolution: (2/3)

Deterministic Network Calculus • Main result: If (3/3) describes the service at each node,

Deterministic Network Calculus • Main result: If (3/3) describes the service at each node, then describes the service given by the network as a whole.

Stochastic Network Calculus • Probabilistic view on arrivals and service • Statistical Sample Path

Stochastic Network Calculus • Probabilistic view on arrivals and service • Statistical Sample Path Envelope • Statistical Service Curve • Results on performance bounds carry over, e. g. : • Backlog Bound

Stochastic Network Calculus • Hard problem: Find so that • Technical difficulty: is a

Stochastic Network Calculus • Hard problem: Find so that • Technical difficulty: is a random variable!

Statistical Network Service Curve (Sigmetrics 2005) • Notation: • Theorem: If curves, then for

Statistical Network Service Curve (Sigmetrics 2005) • Notation: • Theorem: If curves, then for any : are statistical service is a statistical network service curve with some finite violation probability.

EBB model • Traffic with Exponentially Bounded Burstiness (EBB) • Sample path statistical envelope

EBB model • Traffic with Exponentially Bounded Burstiness (EBB) • Sample path statistical envelope obtained via union bound

Example: Scaling of Delay Bounds • Traffic is Markov Modulated On-Off Traffic (EBB model)

Example: Scaling of Delay Bounds • Traffic is Markov Modulated On-Off Traffic (EBB model) • All links have capacity C • Same cross-traffic (not independent!) at each node • Through flow has lower priority:

Example: Scaling of Delay Bounds • Two methods to compute delay bounds: 1. Add

Example: Scaling of Delay Bounds • Two methods to compute delay bounds: 1. Add per-node bounds: Compute delay bounds at each node and sum up 2. Network service curve: Compute single-node delay bound with statistical network service curve

Example: Scaling of Delay Bounds (Sigmetrics 2005) • C = 100 Mbps • Peak

Example: Scaling of Delay Bounds (Sigmetrics 2005) • C = 100 Mbps • Peak rate: P = 1. 5 Mbps Average rate: r = 0. 15 Mbps • Cross traffic = through traffic • T= 1/m + 1/l = 10 msec • e = 10 -9 • Addition of pernode bounds grows O(H 3) • Network service curve bounds grow O(H log H)

Result: Lower Bound on E 2 E Delay (To. N 2011) • M/M/1 queues

Result: Lower Bound on E 2 E Delay (To. N 2011) • M/M/1 queues with identical exponential service at each node Theorem: E 2 E delay Corollary: -quantile satisfies for all of satisfies

Numerical examples • Tandem network without cross traffic • Node capacity: • Arrivals are

Numerical examples • Tandem network without cross traffic • Node capacity: • Arrivals are compound Poisson process • Packets arrival rate: • Packet size: • Utilization:

Upper and Lower Bounds on E 2 E Delays (To. N 2011)

Upper and Lower Bounds on E 2 E Delays (To. N 2011)

Superlinear Scaling of Network Delays • For traffic satisfying “Exponential Bounded Burstiness”, E 2

Superlinear Scaling of Network Delays • For traffic satisfying “Exponential Bounded Burstiness”, E 2 E delays follow a scaling law of • This is different than predicted by … worst-case analysis … networks satisfying “Kleinrock’s independence assumption”

Back to scheduling … So far: Through traffic has lowest priority and gets leftover

Back to scheduling … So far: Through traffic has lowest priority and gets leftover capacity BMux C Leftover Service or Blind Multiplexing How do end-to-end delay bounds look like for different schedulers? Does link scheduling matter on long paths?

Service curves vs. schedulers (JSAC 2011) • How well can a service curve describe

Service curves vs. schedulers (JSAC 2011) • How well can a service curve describe a scheduler? • For schedulers considered earlier, the following is ideal: with indicator function and parameter

Example: End-to-End Bounds • Traffic is Markov Modulated On-Off Traffic (EBB model) • Fixed

Example: End-to-End Bounds • Traffic is Markov Modulated On-Off Traffic (EBB model) • Fixed capacity link

Example: Deterministic E 2 E Delays (Infocom ‘ 11) • C = 100 Mbps

Example: Deterministic E 2 E Delays (Infocom ‘ 11) • C = 100 Mbps • Peak rate: P = 1. 5 Mbps Average rate: r = 0. 15 Mbps BMUX EDF (delay-tolerant) FIFO EDF (delay intolerant

Example: Statistical E 2 E Delays • C = 100 Mbps • Peak rate:

Example: Statistical E 2 E Delays • C = 100 Mbps • Peak rate: P = 1. 5 Mbps -9 Average rate: r = 0. 15 Mbps • e = 10 (Infocom`11)

Example: Statistical Output Burstiness • C = 100 Mbps • Peak rate: P =

Example: Statistical Output Burstiness • C = 100 Mbps • Peak rate: P = 1. 5 Mbps -9 Average rate: r = 0. 15 Mbps • e = 10 (Infocom ‘ 11)

Can we compute scaling of delays for nasty traffic ?

Can we compute scaling of delays for nasty traffic ?

Heavy-Tailed Self-Similar Traffic • A heavy-tailed process satisfies with • A self-similar process satisfies

Heavy-Tailed Self-Similar Traffic • A heavy-tailed process satisfies with • A self-similar process satisfies Hurst Parameter

htts Traffic Envelope • Heavy-tailed self-similar (htss) envelope: • Main difficulty: Backlog and delay

htts Traffic Envelope • Heavy-tailed self-similar (htss) envelope: • Main difficulty: Backlog and delay bounds require sample path envelopes of the form • Key contribution (not shown): Derive sample path bound for htss traffic

Example: Node with Pareto Traffic parameters: Node: • Capacity C=100 Mbps with packetizer •

Example: Node with Pareto Traffic parameters: Node: • Capacity C=100 Mbps with packetizer • No cross traffic Compared with: • Lower bound from To. N 2011 paper • Simulations (Infocom 2010)

Example: Nodes with Pareto Traffic (End-to-end) Parameters: Compared with: • Lower bound from To.

Example: Nodes with Pareto Traffic (End-to-end) Parameters: Compared with: • Lower bound from To. N 2011 paper • Simulation traces of 108 packets

Illustration of scaling bounds (Infocom 2010) Upper Bound: Lower Bound: Bounds: a = 1.

Illustration of scaling bounds (Infocom 2010) Upper Bound: Lower Bound: Bounds: a = 1. 5 Upper Bound Lower Bound (N log N) (N)

Summary of insights 1995 (1) 2000 2005 (2) (3) 2010 (4), (5) ① Satisfying

Summary of insights 1995 (1) 2000 2005 (2) (3) 2010 (4), (5) ① Satisfying delay bounds does not require peak rate allocation for complex traffic ② Statistical multiplexing gain dominates gain due to link scheduling ③ scaling law of end-to-end delays ④ New laws for heavy-tailed traffic ⑤ Link scheduling plays a role on long path

Example: Pareto Traffic • Size of i–th arrival: • Arrivals are evenly spaced with

Example: Pareto Traffic • Size of i–th arrival: • Arrivals are evenly spaced with gap : • With Generalized Central Limit Theorem … … and tail bound a-stable distribution • . . . we get htss envelope

Example: Envelopes for Pareto Traffic Parameters: Comparison of envelopes: • htss GCLT envelope •

Example: Envelopes for Pareto Traffic Parameters: Comparison of envelopes: • htss GCLT envelope • Average rate • Trace-based • deterministic envelope • htts trace envelope (Infocom 2010)

Single Node Delay Bound • htss envelope: • ht service curve: • Delay bound:

Single Node Delay Bound • htss envelope: • ht service curve: • Delay bound:

Conclusions Requirements Queueing Effective networks bandwidth Traffic classes Limited Broad Scheduling Limited Qo. S

Conclusions Requirements Queueing Effective networks bandwidth Traffic classes Limited Broad Scheduling Limited Qo. S (incl. self-similar, heavy-tailed) (bounds on loss, throughput delay) Statistical Multiplexing Network calculus Stochastic network calculus Broad (but loose) Broad No Yes Very limited Loss, throughput Deterministic Yes Some Yes No Yes