Delays in Packet Networks Packet Switch Fixedcapacity links
- Slides: 61
Delays in Packet Networks
Packet Switch • Fixed-capacity links • Variable delay due to waiting time in buffers • Delay depends on 1. Traffic 2. Scheduling
Traffic Arrivals Frame size Peak rate Mean rate Frame number
First-In-First-Out
Static Priority (SP) • Blind Multiplexing (BMux): All “other traffic” has higher priority
Earliest Deadline First (EDF) Benchmark scheduling algorithm for meeting delay requirements
Network
Disclaimer • This talk makes a few simplifications
Traffic Description Cumulative arrivals A • Traffic arrivals in time interval [s, t) is • Burstiness can be reduced by “shaping” traffic
Shaped Arrivals Flow 1 Flow N . . . C Flows are shaped Traffic Regulated arrivals is shaped by an envelope Popular envelope: “token bucket” Buffered Link such that:
What is the maximum number of shaped flows with delay requirements that can be put on a single buffered link? • Link capacity C • Each flows j has • arrival function Aj • envelope Ej • delay requirement dj
Delay Analysis of Schedulers • Consider a link scheduler with rate C • Consider arrival from flow i at t with t+di: Arrivals from flow j Tagged arrival Limit (Scheduler Dependent) • Tagged arrival departs by if Deadline of Tagged arrival
Delay Analysis of Schedulers Arrivals from flow j with FIFO: Static Priority: EDF:
Schedulability Condition We have: Therefore: An arrival from class i never has a delay bound violation if Condition is tight, when Ej is concave
Numerical Result C = 45 Mbps MPEG 1 traces: (Sigmetrics 1995) EDF Static Priority (SP) Peak Rate strong effective envelopes Lecture: d = 30 msec Movie (Jurassic Park): d = 50 msec Type 1 flows
Expected case Deterministic worst-case Probable worstcase
Statistical Multiplexing Gain Worst-case arrivals Flow 1 Arrivals Flow 2 Worst-case backlog Backlog Flow 3 Time With statistical multiplexing Backlog Flow 1 Arrivals Flow 2 Flow 3 Time
Statistical Multiplexing Gain Statistical multiplexing gain is the raison d’être for packet networks.
What is the maximum number of flows with delay requirements that can be put on a buffered link and considering statistical multiplexing? Arrivals are random processes • Stationarity: is stationary random processes • Independence: Any two flows and are stochastically independent
Envelopes for random arrivals Statistical envelope bounds arrival from flow j with high certainty • Statistical envelope • Statistical : sample path envelope : Statistical envelopes are non-random functions
Aggregating arrivals Arrivals from group of flows: with deterministic envelopes: with statistical envelopes:
Statistical envelope for group of indepenent (shaped) flows • Exploit independence and extract statistical multiplexing gain when calculating • For example, using the Chernoff Bound, we can obtain
Statistical Envelope Type 1 flows: P =1. 5 Mbps r =. 15 Mbps s =95400 bits Type 2 flows: P = 6 Mbps r =. 15 Mbps s = 10345 bits vs. Deterministic Envelopes (JSAC 2000) statistical envelopes Type 1 flows
Statistical vs. Envelope Deterministic Envelopes Traffic rate at t = 50 ms Type 1 flows (JSAC 2000)
Scheduling Algorithms • Work-conserving scheduler that serves Q classes • Class-q has delay bound dq . . . Scheduler • D-scheduling algorithm Deterministic Service Never a delay bound violation if: Statistical Service Delay bound violation with if:
Statistical Multiplexing vs. Scheduling (JSAC 2000) Example: MPEG videos with delay constraints at C= 622 Mbps Deterministic service vs. statistical service (e = 10 -6) Thick lines: EDF Scheduling Dashed lines: SP scheduling Statistical multiplexing makes a big difference Scheduling has small impact dterminator=100 ms dlamb=10 ms
More interesting traffic types • So far: Traffic of each flow was shaped • Next: • On-Off traffic • Fraction Brownian Motion (FBM) traffic Approach: • Exploit literature on Effective Bandwidth • Derived for many traffic types Peak rate effective bandwidth Mean rate
Statistical Envelopes and Effective Bandwidth (Kelly 1996) Given , an effective envelope is given by
Different Traffic Types (To. N 2007) Comparisons of statistical service guarantees for different schedulers and traffic types Schedulers: SP- Static Priority EDF – Earliest Deadline First GPS – Generalized Processor Sharing Traffic: Regulated – leaky bucket On-Off – On-off source FBM – Fractional Brownian Motion C= 100 Mbps, e = 10 -6
Delays on a path with multiple nodes: • Impact of Statistical Multiplexing • Role of Scheduling • How do delays scale with path length? • Does scheduling still matter in a large network?
Deterministic Network Calculus • Systems theory for networks in (min, +) algebra developed by Rene Cruz, C. S. Chang, JY Le. Boudec (1990’s) • Service curve S characterizes node • Used to obtain worst-case bounds on delay and backlog (1/3)
Deterministic Network Calculus • Worst-case view of • arrivals: • service : • Implies worst-case bounds • backlog: • delay : • (min, +) algebra operators • Convolution: • Deconvolution: (2/3)
Deterministic Network Calculus • Main result: If (3/3) describes the service at each node, then describes the service given by the network as a whole.
Stochastic Network Calculus • Probabilistic view on arrivals and service • Statistical Sample Path Envelope • Statistical Service Curve • Results on performance bounds carry over, e. g. : • Backlog Bound
Stochastic Network Calculus • Hard problem: Find so that • Technical difficulty: is a random variable!
Statistical Network Service Curve (Sigmetrics 2005) • Notation: • Theorem: If curves, then for any : are statistical service is a statistical network service curve with some finite violation probability.
EBB model • Traffic with Exponentially Bounded Burstiness (EBB) • Sample path statistical envelope obtained via union bound
Example: Scaling of Delay Bounds • Traffic is Markov Modulated On-Off Traffic (EBB model) • All links have capacity C • Same cross-traffic (not independent!) at each node • Through flow has lower priority:
Example: Scaling of Delay Bounds • Two methods to compute delay bounds: 1. Add per-node bounds: Compute delay bounds at each node and sum up 2. Network service curve: Compute single-node delay bound with statistical network service curve
Example: Scaling of Delay Bounds (Sigmetrics 2005) • C = 100 Mbps • Peak rate: P = 1. 5 Mbps Average rate: r = 0. 15 Mbps • Cross traffic = through traffic • T= 1/m + 1/l = 10 msec • e = 10 -9 • Addition of pernode bounds grows O(H 3) • Network service curve bounds grow O(H log H)
Result: Lower Bound on E 2 E Delay (To. N 2011) • M/M/1 queues with identical exponential service at each node Theorem: E 2 E delay Corollary: -quantile satisfies for all of satisfies
Numerical examples • Tandem network without cross traffic • Node capacity: • Arrivals are compound Poisson process • Packets arrival rate: • Packet size: • Utilization:
Upper and Lower Bounds on E 2 E Delays (To. N 2011)
Superlinear Scaling of Network Delays • For traffic satisfying “Exponential Bounded Burstiness”, E 2 E delays follow a scaling law of • This is different than predicted by … worst-case analysis … networks satisfying “Kleinrock’s independence assumption”
Back to scheduling … So far: Through traffic has lowest priority and gets leftover capacity BMux C Leftover Service or Blind Multiplexing How do end-to-end delay bounds look like for different schedulers? Does link scheduling matter on long paths?
Service curves vs. schedulers (JSAC 2011) • How well can a service curve describe a scheduler? • For schedulers considered earlier, the following is ideal: with indicator function and parameter
Example: End-to-End Bounds • Traffic is Markov Modulated On-Off Traffic (EBB model) • Fixed capacity link
Example: Deterministic E 2 E Delays (Infocom ‘ 11) • C = 100 Mbps • Peak rate: P = 1. 5 Mbps Average rate: r = 0. 15 Mbps BMUX EDF (delay-tolerant) FIFO EDF (delay intolerant
Example: Statistical E 2 E Delays • C = 100 Mbps • Peak rate: P = 1. 5 Mbps -9 Average rate: r = 0. 15 Mbps • e = 10 (Infocom`11)
Example: Statistical Output Burstiness • C = 100 Mbps • Peak rate: P = 1. 5 Mbps -9 Average rate: r = 0. 15 Mbps • e = 10 (Infocom ‘ 11)
Can we compute scaling of delays for nasty traffic ?
Heavy-Tailed Self-Similar Traffic • A heavy-tailed process satisfies with • A self-similar process satisfies Hurst Parameter
htts Traffic Envelope • Heavy-tailed self-similar (htss) envelope: • Main difficulty: Backlog and delay bounds require sample path envelopes of the form • Key contribution (not shown): Derive sample path bound for htss traffic
Example: Node with Pareto Traffic parameters: Node: • Capacity C=100 Mbps with packetizer • No cross traffic Compared with: • Lower bound from To. N 2011 paper • Simulations (Infocom 2010)
Example: Nodes with Pareto Traffic (End-to-end) Parameters: Compared with: • Lower bound from To. N 2011 paper • Simulation traces of 108 packets
Illustration of scaling bounds (Infocom 2010) Upper Bound: Lower Bound: Bounds: a = 1. 5 Upper Bound Lower Bound (N log N) (N)
Summary of insights 1995 (1) 2000 2005 (2) (3) 2010 (4), (5) ① Satisfying delay bounds does not require peak rate allocation for complex traffic ② Statistical multiplexing gain dominates gain due to link scheduling ③ scaling law of end-to-end delays ④ New laws for heavy-tailed traffic ⑤ Link scheduling plays a role on long path
Example: Pareto Traffic • Size of i–th arrival: • Arrivals are evenly spaced with gap : • With Generalized Central Limit Theorem … … and tail bound a-stable distribution • . . . we get htss envelope
Example: Envelopes for Pareto Traffic Parameters: Comparison of envelopes: • htss GCLT envelope • Average rate • Trace-based • deterministic envelope • htts trace envelope (Infocom 2010)
Single Node Delay Bound • htss envelope: • ht service curve: • Delay bound:
Conclusions Requirements Queueing Effective networks bandwidth Traffic classes Limited Broad Scheduling Limited Qo. S (incl. self-similar, heavy-tailed) (bounds on loss, throughput delay) Statistical Multiplexing Network calculus Stochastic network calculus Broad (but loose) Broad No Yes Very limited Loss, throughput Deterministic Yes Some Yes No Yes
- In a banyan switch micro switch
- Go switch working principle
- Switch boot sequence
- Shipping delays
- Transport delay verilog
- Red flags for developmental delays
- Timing diagram for 3 input and gate
- Difference between datagram and virtual circuit operation
- Basestore iptv
- Packet-based networks
- Packet tracer - troubleshoot enterprise networks
- Vorne hinten links rechts
- Contextual links in discourse analysis
- Schoology grms
- Diagramming prepositional phrases
- Power point links
- We gaan naar links
- Copy all links
- Links and joints
- Irnc links
- Twidosuite
- Cp links tor
- Sasquatch slim jim
- Business data links
- Missing links quiz questions answers
- Apa in a nutshell
- Funda denizhan
- Intermediaries in marketing
- Louisiana immunization links
- Steensnede ligging
- Nide dropbox links
- Kinship links definition ap human geography
- How to fix broken links in dreamweaver
- Florida technology integration matrix
- Abyz newslinks
- The glen moodle
- Power point links
- Strafzettel parken
- Reciprocal link means
- Irnc links
- Gufoni manöver links
- Logical view of data in relational database model
- Contextual links in macbeth
- Monofasige motor
- Food chain begins with
- Irnc links
- Point to point links in optical fiber communication
- 21st century literary genres
- Kinship links definition
- Vorne hinten links rechts
- Chapter 24 global links and imperialism
- Links butt
- New york links
- Whereas cohesive devices
- Midland isd staff links
- Q switch laser machine
- Brocade enc out errors
- Tdc switch
- 49p11-843
- Perulangan switch case
- Silicon unilateral switch (sus) application
- Tamaño de trama ethernet