A Leftover Service Curve Approach to Analyze Demultiplexing in Queueing Networks
|
|
|
- Branden Campbell
- 10 years ago
- Views:
Transcription
1 A Leftover Service Curve Approach to Analyze Demultiplexing in Queueing Networks Hao Wang University of Kaiserslautern Florin Ciucu T-Labs / TU Berlin [email protected] Jens Schmitt University of Kaiserslautern [email protected] Abstract Queueing networks are typically subject to demultiplexing operations, whereby network nodes split flows into multiple sub-flows. The demultiplexing operation captures relevant network aspects such as packet loss or multi-path routing. In this paper we propose a novel approach to analyze queueing networks with demultiplexing. The basic idea is to represent a network node implementing a demultiplexing operation on an output flow as an equivalent system for which the corresponding input flow is logically demultiplexed according to the demultiplexing operation at the output. In this way, the service given to one of the demultiplexed sub-flows at the output can be expressed in terms of a leftover service curve, and consequently performance bounds can be derived using the network calculus methodology. Using numerical illustrations, we show that the obtained bounds improve upon existing bounds, especially in the case of the rather small sub-flows. Index Terms Demultiplexing, network calculus, leftover service, scaling element. A. Motivation I. INTRODUCTION Over the last decade, the stochastic network calculus has established itself as a versatile alternative methodology to the classical queueing theory for the performance analysis of networks and distributed systems. The network calculus was pioneered by Cruz in the early 199s 5] in a deterministic framework, and soon after by Chang 2] in a probabilistic framework. Subsequently, a significant number of researchers have contributed to both the deterministic and stochastic formulations of the network calculus see the books of Chang 3], Le Boudec and Thiran 12], and Jiang and Liu 9]. The high modeling power of the network calculus has been transposed into several important applications for network engineering problems: traditionally in the Internet s Quality of Service proposals IntServ and DiffServ, and more recently in diverse environments such as wireless sensor networks 11], 14], switched Ethernets 16], Systems-on-Chip SoC 1], or even to speed-up simulations 1], to name a few. From a methodological point of view, the main prospect of stochastic network calculus is that it can deal with problems that are fundamentally hard for queueing theory based on the fact that it works with probabilistic bounds rather than striving for exact solutions. A great challenge of any methodology for queueing analysis is to deal with queueing networks subject to flow transformations, which occur when the flows data is altered inside the network. Flow transformations are in fact characteristic to many modern networked and distributed systems, e.g., a wireless sensor network processes the transported data, while delivering it to a sink node, for energy-efficiency purposes. On an abstract level, one very obvious and yet highly important case of flow transformation results from the demultiplexing of flows inside the network. By demultiplexing we mean here the separation of a flow into multiple sub-flows, one of which is subject to the analysis e.g., with respect to delay. Such an abstract demultiplexing allows to capture many concrete real-world effects like losing part of a data flow in, e.g., a wireless transmission, or distributing a data flow to a set of servers for load balancing with or without knowing the loads of the subsequent servers, or simply a randomized multi-path routing. Thus, the stochastic modeling of demultiplexing processes can be generally regarded as an important component in queueing network analysis, and in particular it opens up the modeling scope of network calculus widely. While we have addressed demultiplexing in network calculus in previous work of ours 4], 15], we come up with a new way to solve this analytically hard problem in this paper. Our approach is based on finding an equivalent formulation to 4] for the demultiplexing as a leftover service curve computation problem. Interestingly, with respect to the achievable delay bounds the two methods perform quite differently and none completely dominates the other see Section IV, though the new method shows a clear advantage in scenarios where the sub-flow of interest is rather small and only rarely outperformed by 4]. B. Related Work So far, demultiplexing has not seen that much treatment in network calculus yet. However, interestingly, despite this observation, Cruz in his pioneering papers 5] originally introduced a demultiplexer as a member of his set of basic network calculus modeling elements. For the demultiplexer s operation, it is assumed that data units are marked with information about their output path. This assumption essentially means that demultiplexing decisions are statically configured e.g., at the connection set-up in a virtual circuit setting and cannot be made dynamically as, for example, for load-balancing purposes. In 3], Chang introduces a network calculus modeling element called a router. The router has one data input and
2 output and one control input. The control input provides a functional relation between input and output data. This is very similar to a previous work of ours in which we introduced a wider framework of such scaling behavior as it is called therein in network calculus 7]. As we will also discuss in the course of this paper, such a router or scaling element may constitute the basis for the modeling of more flexible demultiplexing which is not statically decided. The key to real flexibility with respect to modeling dynamic demultiplexing is a stochastic bounding of the scaling behavior. This is only briefly touched on in 3] and not provided in 7]. In 15], we started to head into this direction by stochastically generalizing the scaling element from 7] and showing its utility in a load-balancing application. Though useful, the stochastic scaling from 15] has its limitations, most clearly documented by the fact that the scaling process cannot be an ergodic one. In 4], we therefore took a different approach to define a stochastic scaling element based on momentgenerating functions which is much more versatile than the one from 15]. Now, in the paper at hand we continue the work started in 4] concentrating on demultiplexing as a flow transformation and provide a new analysis method based on leftover service computation. In fact, in many cases this allows to considerably improve the bounds over the ones calculated in 4], which are based on a direct analysis of the stochastic scaling. II. A NOVEL MODEL FOR FLOW DEMULTIPLEXING A network flow is an abstraction of the data carried between two nodes in a network, the source and the destination. At each traversed node, the flow s data can be represented by a point process, i.e., a bi-dimensional stochastic process t n, s n n 1, where t n s denote the arrival times and s n s denote the sizes of the flow s instantaneous arrivals or the number of data units, respectively. In practice, flows are typically subject to transformations at some of the traversed nodes. We are particularly interested in the operation of demultiplexing, whereby a flow is split into multiple sub-flows. For instance, if at some node the flow is subject to random routing say with two alternative paths, then the flow is split into two sub-flows, one for each path. As another example, if at some node the flow is subject to loss, then the flow is again split into two sub-flows: one consisting of the unaffected data, yet to be carried through, and another consisting of the lost data. If the original flow is represented by t n, s n n 1, then the sub-flows are represented by t n, s 1 n n 1 and t n, s 2 n 1, respectively, with n s n = s 1 n + s 2 n n 1. In this section, we introduce a novel model for the operation of demultiplexing a flow into two flows. This model is motivated by the need to analyze end-to-end performance metrics e.g., delay for general classes of arrival processes i.e., of flows subject to demultiplexing. We recall that, with the classical queueing networks theory, the demultiplexing analysis is typically possible for the class of Poisson arrivals FIFO a FIFO b Fig. 1. Two equivalent systems for the demultiplexing operation. In a, the output process Dt is demultiplexed according to a scaling process X. In b, the input process At is virtually demultiplexed according to the same X. In both a and b, the node S runs FIFO scheduling. and Bernoulli demultiplexing processes. Our goal herein is to extend these classes in a greater generality, e.g., by considering Markov modulated demultiplexing processes. Before presenting the novel demultiplexing model, let us briefly introduce some notations in the framework of the network calculus. The time model is discrete with events e.g., flows arrivals occurring at time instants t =, 1, 2,... In the framework of the network calculus, a flow t n, s n n 1 is described as a cumulative arrival process As, t counting the number of data units packets arrived in the time interval s, t]. The univariate representation is At = A, t, and the instantaneous arrival process is at = At 1, t. Note the duality between the two representations of a flow, i.e., either as a point process or as a cumulative arrival process. We next recall the scaling element model which was recently introduced by us in 4]. Definition 1: SCALING ELEMENT A scaling element transforms some arrival process into another. It consists of a random process X = X i i 1 taking non-negative integer values, an input arrival process At, and an output scaled process A X t for X, which is a transformed version of the input process, and it is defined as At A X t = X i t. i=1 The demultiplexing operation can be directly modelled with a scaling element. For brevity we focus on the particular case of two sub-flows demultiplexing, which can be modelled with a scaling process X with X i, 1} i 1. For an arrival flow At and a demultiplexing scaling process X, the demultiplexed sub-flows are A X t and A 1 X t, where 1 = 1, 1,.... Note that, in general, the demultiplexing operation into n sub-flows can be modelled with multiple scaling processes X 1,..., X n, such that n j=1 Xj = 1. Let us now consider a work-conserving network node, denoted by S, with arrival and departure processes At and Dt, respectively. We assume that a demultiplexing process X, which is independent from the data flows, splits Dt into two sub-processes: D X t and D 1 X t see Figure 1.a. Based on the demultiplexing process X, we can virtually split the arrival process At into two sub-processes, A X t and A 1 X t, and we denote the corresponding virtual output processes by D A Xt and D A 1 Xt see Figure 1.b. The next lemma establishes the equivalence between the two systems from Figures 1.a,b, and it is instrumental for our proposed approach to analyze queueing systems with general demultiplexing processes.
3 Lemma 1: EQUIVALENT SYSTEMS FOR THE DEMULTI- PLEXING OPERATION Consider the systems a and b depicted in Figure 1 and described above. If the node is locally FIFO then the two systems are equivalent in the sense that for all t D X t = D A Xt and 1 D 1 X t = D A 1 Xt. The proof is straightforward and relies on the assumption of locally FIFO scheduling, i.e., At s packets are served in the order of their arrivals. PROOF. Let t. The departure process Dt from system a can be represented as a sequence d 1 d 2 d Dt, where d i = i, i.e., d i s stand for the sequence numbers of Dt s packets. Then, because the scaling operation does not alter the order of the packets arrivals, with some abuse of notation, the X-scaled departure processes D X t and D 1 X t can be represented as the subsequences D X t = d x1 d x2 d xi d xm and D 1 X t = d y1 d y2 d yj d yn, where m, n, Dt], m+n = Dt, x i, y j, Dt], x i < x i+1, y j < y j+1, and x i y j, i, m] and j, n]. That means, those packets in Dt are mutually demultiplexed into D X t and D 1 X t. In turn, because the node S runs FIFO scheduling, the arrival process At must be represented again, with abuse of notation as the following sequence At = d 1 d 2 d Dt d Dt+1 d At, and furthermore after using the same scaling process X onto this sequence of arrivals we will get the virtual sub-processes A X t and A 1 X t. So the starting part must stay the same as for the X-scaled departures, and the remainder arrival packets are X-scaled in the similar ways with abuse of notation. Thus, we have A X t := d x1 d x2 d xi d xm d xm+1 d xm+a d xm+u, A 1 X t := d y1 d y2 d yj d yn d yn+1 d yn+b d yn+v, where u, v, At Dt], u + v = At Dt, x m+a, y n+b, At], x m+a < x m+a+1, y n+b < y n+b+1, and x m+a y n+b, a, u] and b, v]. So far, we only changed the notation and the departed sequences up to time t are still those two sequences d x1 d x2 d xi d xm and d y1 d y2 d yj d yn. We can find a matched sequence of d x1 d x2 d xi d xm in A X t, which proves that D A Xt = d x1 d x2 d xi d xm, and thus D X t = D A Xt. Similarly, one can show that D 1 X t = D A 1 Xt, which completes the proof. Using the equivalence of systems a and b from Figure 1, we will next compute statistical end-to-end delay bounds in queueing systems subject to the demultiplexing operation. The basic idea is to use the representation from system b in order to construct the so-called leftover service curves for the demultiplexed processes. Using these service curves, the desired performance bounds follow by applying conventional techniques from stochastic network calculus. III. STATISTICAL END-TO-END DELAY BOUNDS In this section, we compute end-to-end delay bounds in a network with flow demultiplexing. For illustrative purposes, we focus on the single and two nodes cases, and later comment on the generalization to an arbitrary number of nodes. For numerical comparisons, we also reproduce an existing parallel result from 4]. First we briefly introduce the service curve concept and then give the leftover service curve for the flow of interest, i.e., A X from Figure 1.b. Service curves in 3] called dynamic servers provide lower bounds on the service received by an arrival flow at a network node, and are formally defined as below. Definition 2: SERVICE CURVE Assume At and Dt are the arrival respectively departure process of a node. A bivariate random process Ss, t for s t is called a service curve provided by this node, if for all t it holds that Dt A St, where denotes the min, +-convolution defined as A St = inf st As + Ss, t}. Note, through this work we use service curve instead of service curve process for the simplicity of naming. Further, if the inequality is replaced by equality then the service curve is called exact. The service curve of two concatenated nodes with service curves S 1 and S 2 is S 1 S 2 3], which is achieved using the associativity property of the min, +-convolution. The leftover service curve under a FIFO scheduling model 6], 12] is derived using the following proposition. Proposition 1: Consider two flows with arrival processes A 1 s, t and A 2 s, t which are FIFO-scheduled at a service curve Ss, t. Assume that Ss, t is nonnegative, increasing in t, and Ss, s =. Flow 1 sees a service curve S 1 s, t = Ss, t A 2 s, t x] + 1 t x>s}, where parameter x, y] + := max, y and 1 cond = 1 if cond = true, 1 cond = otherwise. The proof follows directly using the bivariate arrival processes and service curves instead of arrival curve and service curve functions see the proof of Proposition in 12]. Note, Ss, t is not necessarily strict. We also point out that the leftover service curve here is a bivariate process presentation of the service, which is different from a probabilistic sample path bound presentation as given in 13]. Knowing additional information of the leftover service curve, the transformation between both presentations might be possible. But such discuss is not the scope of this paper. So far, we know that the leftover service curve for A X, obtained in the particular case of FIFO scheduling, is S LO s, t = Ss, t A 1 X s, t x ] + 1 t x>s},
4 where x is an optimization parameter. A. Single Node: Main Idea Referring to Figure 1.a, we are interested in the virtual delay of the sub-flow of interest D X. The corresponding arrival process is A X see the interpretation from system b, and the leftover service curve is S LO s, t shown above. Then, a probabilistic delay bound can be obtained as below PW t d = P A X t d D A Xt = P A X t d D X t P A X t d A X s Ss, t A 1 X s, t x ] + 1 t x>s}}, where in the third line we used Lemma 1, in the fourth line we used the definition of a service curve and moved the infimum to the left side of the inequality. The derivation can be continued depending on two cases for x: i x > d, i.e., t x < t d: = P max = P max = 1 ii x d = P P s<t x t xs<t d s<t x A X s, t d Ss, t A 1 X s, t x ] }, + A X s, t d } A X s, t d Ss, t A 1 X s, t x ] }, + A X t x, t d A X s, t d Ss, t A 1 X s, t x ] + } As, t d } Ss, t + A 1 X t d, t x The optimal value is for x = d, and the last probability becomes = P As, t d Ss, t}. Interestingly, the same bound can be obtained for the delay of the aggregate departure flow D. In other words, the perflow delay bound is equal to the aggregate delay bound; the equality between the per-flow and aggregate delays is known to FIFO FIFO Fig. 2. A network with two nodes, S 1 and S 2, and a demultiplexer element in between. hold, on average, in the case of Poisson arrivals and Bernoulli demultiplexing, as a consequence of the PASTA property. B. Two Nodes In this section, we derive statistical end-to-end delay bounds in a network consisting of two service nodes and one scaling element implementing a demultiplexing operation in between see Figure 2. We shall use the idea presented above, of first computing the leftover service curve for one demultiplexed flow of interest. Before carrying out the derivations, it is useful to compute the moment generating functions MGFs as well as MGF bounds of the scaled processes in terms of the MGFs of the arrival processes and scaling processes. First we recall an example of a scaling process from 4], called Markovmodulated scaling process MMSP. Let the scaling process X = X i i 1 be modulated by a discrete and homogeneous Markov process Si with states 1, 2,, M and transition probabilities λ i,j for all 1 i, j M, as in Figure 3. Every state i, 1 i M, has an i.i.d. random process L i n n 1. Then the scaling process is defined as X i = L Si i. In the cases of a single state, or two states with λ 1,2 + λ 2,1 = 1, the scaling process X is i.i.d. j 1 i M n L 1 n L i λ i,j λ j,i L j n L M n Fig. 3. A Markov chain Si with M states and transition probabilities λ i,j, modulating the scaling process X as X i = L Si i. Now denoting M X θ := E e θx] for some r.v. X and θ > we have the following lemma 4]. Lemma 2: MOMENT GENERATING FUNCTION OF SCALED PROCESSES Let an arrival process At and an MMSP X = X i i 1 defined as above. Then we have the MGFs for some θ > : 1 General case If the matrix λ = λ i,j i,j is irreducible and aperiodic then M AX tθ M At log sp ϕθλ, 2 where ϕθ := diag M L11θ,..., M LM 1θ and sp ϕθλ denotes the spectral radius of ϕθλ. 2 I.i.d. case If X i s are i.i.d. then M A X tθ = M At log M X θ. 3
5 We now consider the network scenario of interest from Figure 2a, of which the first node and the demultiplexing element can be equivalently transformed as detailed in the previous section. The result is shown in Figure 2b. The next theorem provides the end-to-end delay bounds under different assumptions regarding the increments of the arrival process At. : STATISTICAL END-TO-END DELAY BOUNDS IN A TWO NODES NETWORK WITH DEMULTIPLEXING Consider the network scenario from Figure 2a. A stationary arrival process At crosses two FIFO nodes offering the stationary service curves S 1 s, t and S 2 s, t. Assume the MGF bounds of arrivals and services: M As,t θ e θrθt s and M Sk s,t θ e θc kt s, where k = 1, 2 and for some free parameter θ >. The demultiplexing process X is such that X i s are either or 1, and denote δθ = 1 θ log M Xθ and δθ = 1 θ log M 1 Xθ. All the processes are assumed to be statistically independent, and we focus on the end-to-end sub-flow with departure process Et. 1 If At has statistically independent increments then under some stability conditions, to be explicitly given in the proof, we have the following delay bounds for all d PW t d K 1 e θc2d x + K 2 e θc1d e θ δθrθ δθd x + K 3 e θc1d e θc1 C2d x, where K 1, K 2 and K 3 are constants to be given in the proof. x is an optimization parameter introduced by FIFO leftover service. 2 If the increments of At are not necessarily independent then under some stability conditions, to be explicitly given in the proof, we have the following delay bounds for all d PW t d Ke θc 2d, where the constant K will be given in the proof. Note, since θ is a free parameter for each MGF function, we use the same θ for the simplicity of denotation. A direct representation of the theorem using different θ s follows by applying MGF bound respectively with different private θ s. PROOF. As discussed in Section II, we can equivalently transform the system a from Figure 2 into the system b from the same figure. Then we have for the end-to-end subflow of interest with input A X t and output Et: PW t d = P A X t d Et P A X t d A X s P sut S LO S 2 s, t } A X t d A X s S LO s, u S 2 u, t } = P A X t d A X s S 1 s, u sut A 1 X s, u x ] 1 + u x>s} S 2 u, t } 4 In the second line we used the definition of the virtual delay process for the arrival process A X t and the departure process Et, and also the equivalence W t d A X t d Et. In the third line we used the definition and the convolution property of service curves and then expanded the convolution and the expression of S LO s, u in the rest lines. The rest of the proof follows the derivations from Subsection III-A, depending on the value of the parameter x: i x > d, or, u x < t d. Let us consider only a part of the domain for the remum as below A X t d A X s t xs<t d sut S1 s, u A 1 X s, u x ] + 1 u x>s} S 2 u, t } = t xs<t d sut, A X t d A X s S 2 u, t } and thus the optimal value of x does not fall in this interval. ii x d, and we continue Eq. 4 as follows: = P max A X s, t d sus+x S1 s, u A 1 X s, u x ] + 1 u x>s} S 2 u, t}, A X s, t d S 1 s, u s+x<ut A 1 X s, u x ] 1 + u x>s} S 2 u, t} } P A X s, t d S 2 s + x, t + s+x<ut s+x<ut P A X s, t d S1 s, u A 1 X s, u x ] + S 2u, t P A X s, t d S 2 s + x, t + P A X s, t d + A 1 X s, u x S 1 s, u S 2 u, t The first line is just a separation of the interval of u in order to eliminate the indicator function 1. Besides that we applied the union bound in the second line. In the third line, we eliminated ] +. Next we use the properties of the arrival process At in order to prove 1 and 2, respectively. 1 At has independent increments. Since the two intervals s, t d] and s, u x] are overlapping, we can merge the overlapping parts of A X s, t d and A 1 X s, u x. Yet we do not know which value, t d or u x, is larger. So from 5
6 Eq. 5 we separate the interval of u as below P A X s, t d S 2 s + x, t + s+x<ut d+x t d+x<ut P A X u x, t d + As, u x S 1 s, u S 2 u, t + P A 1 X t d, u x + As, t d S 1 s, u S 2 u, t e θc2t s x e θδθrθδθt d s + s+x<ut d+x e θc1u s e θc2t u e θrθu x s e θδθrθδθt d u+x + t d+x<ut e θc1u s e θc2t u e θrθt d s e θ δθrθ δθu x t+d e θc2d x e θc2 δθrθδθ e θc 1 rθ 1 e θc 2 δθrθδθ 1 e θc1d e θc 1 C 2 d x 1 e θc1 C2 rθ+δθrθδθ e θc1d e θ δθrθ δθd x e θc1 C2d x + 1 e θc1 C2 δθrθ δθ. 6 θc 1 θrθ In the second line we used the Chernoff bound for some θ > together with Lemma 2 for i.i.d. X i s Eq. 3. Because A has independent increments and is independent of X, it follows that A X u x, t d is independent of As, u x and A 1 X t d, u x is independent of As, t d. In the case when X is MMSP, we have that δθ = 1 θ log sp ϕ Xθλ X and δθ = log sp ϕ 1 X θλ 1 X, according to Eq. 2. In the third line, imposing the following two stability conditions θc 1 rθ > and θc 2 δθrθδθ > for the first term by letting t, we get an infinite geometric series; for the second term we computed the sum of geometric series over u and got the exact sum of infinite geometric series by letting t ; the computation for the third term is similar. By letting K 1 = K 2 = 1 e θc2 δθrθδθ 1 1 e θc 1 rθ 1 1 e θc1 C2 δθrθ δθ K 3 = K 1 K 2 1 e θc1 δθrθδθ δθrθ δθ in Eq. 6, we get PW t d K 1 e θc2d x + K 2 e θc1d e θ δθrθ δθd x + K 3 e θc1d e θc1 C2d x, and the proof of 1 is complete. 2 The increments of At are not necessarily independent. We can continue Eq. 5 as follows e θc2t s x e θδθrθδθt d s + s+x<ut E e θc 1u s e θc 2t u e θax s,t d+a 1 X s,u x ], after using the Chernoff bound. To compute the bound of the expectation we use Hölder s inequality because of the possible dependence between A X and A 1 X. Let g, h 1 such that 1 g + 1 h = 1. For t, we continue the above inequality with e θc2d x θc 2 δθrθδθ + e θc1d e θc1 C2d x θc 1 C 2 δhθrhθ δhθ θc 2 δgθrgθδgθ. Here, without losing tightness, we used an upper bound on the infinite geometric series for simplicity. Let us now assume the stability conditions θ C 2 δθr θδθ > θ C 2 δgθr gθδgθ > θ C 1 C 2 δhθr hθ δhθ >. To continue the previous derivation, we use the next convex optimization result inf x> We finally obtain that where K = C 1 αe βx + e γx} = αβ γ C 2 γ β+γ PW t d Ke θc 2d, β + γ β C 1 C 1 C 2 θc 2 δθrθδθ θc 1 C 2 δhθrhθ δhθ C 2 C 1 θc 2 δgθrgθδgθ. The proof is now complete.. 1 C 2 C 1 C. Statistical End-to-End Bounds by Commuting Scaling Element and Service Here we briefly reproduce the computation of the end-toend delay bound in a demultiplexing network by commuting scaling and service elements, as proposed in 4]. Starting from Figure 4.a, we can find another system, as shown in Figure 4.b, where At goes first through X and then through the exact service curve T s, t := As+Ss,t i=as+1 X i, such that the departures for both systems in a and b satisfy Et D X t for all t ; a tacit assumption is that A, X, and S are independent.
7 FIFO Fig. 4. FIFO a b Commuting service and scaling elements. We rewrite this as = E e ] log1 p +p e θ Rt s = 1 p + p e θ Rt s. M As,t θ = e θ 1 θ log1 p +p e θ R t s = e θ rθ t s, The following theorem also from 4] provides the statistical end-to-end delay bound. Theorem 2: END-TO-END DELAYS IN A FLOW TRANS- FORMATION NETWORK Consider the network scenario from Figure 4.a where a stationary arrival process At crosses a series of alternate stationary and mutually independent service and scaling elements denoted by S 1, S 2,..., S n and i.i.d. X 1, X 2,..., X n 1, respectively. Assume the MGF bounds M As,t θ e θrθt s and M Sk t θ e θc kt, for k = 1,..., n, and some θ >. Under a stability condition where a n 1 ra n 1 + log b <, a = θ, a k+1 = log E e a kx k,1 ], b = e a kc n k, k=,,n 1 we have the following end-to-end steady-state delay bounds for all d P W > d K n b d, where the constant K = 1+ n d 1+ d n. n d n d IV. COMPARISON So far, we presented the dual analytical methods to calculate statistical end-to-end delay bounds in a demultiplexing scenario. Next, we compare them quantitatively. Before we can do so, we need to provide some results regarding MGF bounds, because for both methods, we assume to have the MGF bounds for the arrivals and the service, and also need to use the MGF bounds of the scaling processes and the scaled processes to compute the delay bounds. A. MGF Bounds In this section, we present necessary prerequisites regarding MGF bounds for three examples of arrival processes At: Bernoulli-modulated arrivals with rate R together with Bernoulli parameter p, Poisson arrivals with rate λ and MMOO arrivals with peak rate P. We also present results for the MGF bounds of scaled processes with two examples of scaling processes X: Bernoulli scaling and MMOO scaling. For Bernoulli arrivals with rate R, we consider arrivals with constant rate R passing through a Bernoulli scaling process with Bernoulli parameter p. We know that the MGF of a Bernoulli r.v. X B with parameter p B, 1] is M XB θ = 1 p B + p B e θ. So Lemma 2 yields the MGF bound for the i.i.d. Bernoulli arrivals with rate R and probability p, 1] as M As,t θ = M Rt s log 1 p + p e θ where we denote 1 θ log 1 p + p e θ R as rθ according to the form of MGF bound for the arrivals in. Next, we derive δθ for the scaling process X as a Bernoulli process with parameter p, 1] and δθ for its conjugate scaling process 1 X. Again, knowing the MGF of the i.i.d. Bernoulli process X we have δθ = 1 θ log M Xθ = 1 θ log 1 p + pe θ δθ = 1 θ log M 1 Xθ = 1 θ log p + 1 pe θ. Now we have rθ, δθ as well as δθ. As all other parameters in are already given, we can compute the delay bounds for the two nodes network. On the other hand, noting that a 1 is θδθ, we can use Theorem 2 to compute alternative delay bounds. In the following, we consider the following scenario: Poisson process as arrivals and Markov-Modulated On-Off MMOO process as scaling. The MMOO scaling processes are presented in Figure 5. µ 1 and µ 2 are transition probabili- Fig. 5. Markov-Modulated On-Off MMOO scaling process. ties. The processes let data pass along this sub-flow while in state on thus the rate is 1 and block while in state off. If the scaling processes are MMOO, we derive δθ and δθ from as δθ = 1 θ log sp ϕ Xθλ X = 1 θ log µ 2 + µ 1 e θ + µ 2 + µ 1 e θ 2 4µ 1 + µ 2 1e θ 2 δθ = 1 θ log sp ϕ 1 Xθλ 1 X = 1 θ log µ 1 + µ 2 e θ + µ 1 + µ 2 e θ 2 4µ 2 + µ 1 1e θ, 2 where µ 1 and µ 2 have the following relation for Figure 5a, given the average on probability p for scaling process X, p = 1 µ 2 1 µ µ 2. Then, of course, the scaling process 1 X has the average on probability 1 p. Hence, knowing p, given µ 1 we can
8 compute µ 2, and vice versa. Further knowing the MGF bound of the Poisson arrival process, which is M At θ = e θrθt, where rθ = 1 θ λeθ 1, we can again use to compute the delay bounds for the two nodes network. Similarly, considering an MMOO process as arrival process, we use P as the peak rate instead of 1 and λ 1, λ 2 as transition probabilities instead of µ 1, µ 2. We compute the MGF bound of the arrivals as E e θat] e θrθt, where rθ = 1 θ log λ 1e θp +λ 2 + λ 1 e θp +λ 2 2 4λ 1 +λ 2 1e θp 2. For other combinations of different arrival and scaling cases, we have similar computations. B. Bounds Next, we numerically compare the statistical delay bounds using both methods in the above mentioned three examples of arrivals: Bernoulli with probability p and rate R, Poisson with rate λ, and MMOO with peak rate P and transition probabilities λ 1, λ 2. We consider the network senario with two nodes shown in Figure 2a. For the scaling process we consider for two examples: Bernoulli process with probability p and MMOO process with average probability p and transition probabilities µ 1, µ 2. Here, we only show the results for MMOO arrivals with MMOO scaling, so we have five combinations and for all the combinations we compare the statistical delay bounds of the two nodes network using the dual analytical methods presented in Section III. Moreover, for the five combinations we compare the delay bounds in different utilizations for the first node - low and high utilization 3% and 8%. As a reference, we also provide the results of discrete-event simulations. We use OMNeT++ 17] version 4.2 to simulate the queueing network. To compute the empirical 1 3 -quantiles, we observe 1 6 packets and use the P 2 algorithm 8] for calculating the quantiles without storing so many observations. Random number generating during the simulations is done using the class clcg32. In the following, we give the numerical settings. First, the service rate of the first node C 1 is normalized to one packet per time unit. Correspondingly, we set the utilization of the first node as either.3 or.8, i.e., the average rates of arrivals are set as.3 and.8, respectively. We let R = 2, thus in the case of Bernoulli arrivals p equals to.15 and.4, respectively. For the case of MMOO arrivals, we also set P = 2 and λ 1 =.75. With the average passing probability p of the scaling process X the capacity at the second node C 2 is set to C 2 = p C 1. These settings guarantee the stability conditions. We vary p from.1 to.9 in steps of.1. In the case of MMOO scaling, we set µ 1 as.75. We plot the ε-quantiles in time units of the end-to-end delay bounds with ε = 1 3. In all figures, we can perceive, that the delays decrease for higher values of the pass probabilities p. This behavior is due to setting C 2 = p C 1 for a constant C a Utilization of S 1 = Fig b Utilization of S 1 =.8 Bernoulli arrivals, Bernoulli scaling. a Utilization of S 1 =.3 Fig. 7. a Utilization of S 1 = Fig b Utilization of S 1 =.8 Bernoulli arrivals, MMOO scaling. a Utilization of S 1 = Fig b Utilization of S 1 =.8 Poisson arrivals, Bernoulli scaling. a Utilization of S 1 =.3 Fig b Utilization of S 1 =.8 Poisson arrivals, MMOO scaling b Utilization of S 1 =.8 MMOO arrivals, MMOO scaling.
9 Figure 6 shows the statistical delay bounds obtained with and Theorem 2 existing result as well as the simulation results in the case of Bernoulli arrivals and Bernoulli scaling. For demultiplexing probabilities p.7 the figures clearly illustrate the order of the results, with the new leftover service computation method as a erior option especially for smaller pass probabilities p. For p >.7, the results of with independent increments and Theorem 2 are nearly the same. Going to the higher utilization of.8 in Figure 6.b of course results in higher delays, but also seems to loosen the bounds somewhat as the gap to the simulation results grows. Figure 7 shows the statistical delay bounds in the case of Bernoulli arrivals and MMOO scaling. Basically the same observations as in the previous paragraph, for Bernoulli arrivals and Bernoulli scaling, can be made. It is interesting to note, however, how the MMOO scaling leads to much higher delay bounds compared to the Bernoulli scaling case. Next, Figure 8-9 display the same as Figure 6-7, but now for Poison arrivals. For most of it, the conclusions for the Poisson arrivals are the same as for the Bernoulli arrivals, yet one interesting observation is that for Poisson arrivals and Bernoulli scaling for the high utilization case, the leftover service compution results in slightly, but clearly visible worse delay bounds than the method from Theorem 2. This is not the case for the MMOO scaling which indicates that things are not so simple here Figure 1 shows the statistical delay bounds in the case of MMOO arrivals and MMOO scaling. Note that in this scenario we do not have independent increments of arrivals any more and and thus have to resort to the respective case in. We can see that the method by commuting service curve and scaling element now clearly dominates the leftover service method. As a general remark, we can observe that the bounds are quite pessimistic for low values of the pass probability p when they are compared to the simulation results. It is simply harder to cope with the correlations in arrivals and scaling processes. C. Discussion In the previous subsection we compared the results obtained by the dual methods from and Theorem 2 for some numerical examples. We can see that, on one hand, provides the opportunity to utilize some additional information on arrivals to show an advantage, especially in scenarios where the sub-flow of interest is small. On the other hand, a disadvantage of using the leftover service curve method is that the delay bound computation is not easily extensible to the n nodes case. This is because we would have to introduce different x for the leftover service curve element at each node, which makes the analytical solution very complicated. In contrast, Theorem 2 is more easily applicable to the n nodes case. However, the door is still open for the method using the leftover service curve. In the following, we sketch the Fig. 11. A flow demultiplexing network consisting of services and scaling elements. iterative computation steps to be taken, but keep the detailed computation as future work. Consider a network scenario from Figure 11a which is the general extension of Figure 2a. Because the service curves of the nodes are not necessarily strict, we can firstly apply all the scaling effects to A and after iteratively computing the leftover service curves we then obtain the transformed system in Figure 11b. The iteration can be stated as the following equations with n = 2, 3,... S LO1 s, t = S 1 s, t A 1 X s, t x 1 ] 1 + t x 1 >s} S LOn 1 s, t = S LOn 2 S n 1 s, t ] A X 1X 2 1 X n 1 s, t x n 1 V. CONCLUSIONS + 1 t x n 1 >s}. We have presented a novel approach to analyze queueing networks with flow demultiplexing, e.g., due to loss or dynamic routing. First we used a scaling element to model the demultiplexing and showed how to transform a network node with a demultiplexing operation on the output flow into an equivalent system with a logically demultiplexed input flow. Then we applied network calculus leftover service computation for the logically demultiplexed input sub-flow of interest to compute a statistical delay bound. We compared this result with an alternative result from previous work of ours 4]. Although the new computation cannot completely dominate the other approach, it tends to be a more intuitive way of dealing with demultiplexing in the framework of stochastic network calculus. Furthermore, it has the advantage that specific information on the arrivals can be easier incorporated than for 4]. On the downside, the generalization to the n nodes for the leftover service method still remains open whereas the other method is already more advanced with respect to this. REFERENCES 1] S. Chakraborty, S. Kuenzli, L. Thiele, A. Herkersdorf, and P. Sagmeister. Performance evaluation of network processor architectures: Combining simulation with analytical estimation. Computer Networks, 425: , April 23. 2] C. S. Chang. Stability, queue length and delay, Part II: Stochastic queueing networks. In Proceedings of the 31st IEEE Conference on Decision and Control, pages 15 11, December 1992.
10 3] C.-S. Chang. Performance Guarantees in Communication Networks. Telecommunication Networks and Computer Systems. Springer-Verlag, 2. 4] F. Ciucu, J. Schmitt, and H. Wang. On expressing networks with flow transformation in convolution-form. In Proceedings of IEEE INFOCOM, pages , April ] R. L. Cruz. A calculus for network delay, parts I and II. IEEE Transactions on Information Theory, 371: , January ] R. L. Cruz. SCED+: Efficient management of quality of service guarantees. In Proc. IEEE INFOCOM, volume 2, pages , March ] M. Fidler and J. Schmitt. On the way to a distributed systems calculus: An end-to-end network calculus with data scaling. In Proceedings of ACM SIGMETRICS/Performance, pages , 26. 8] R. Jain and I. Chlamtac. The P-Square algorithm for dynamic calculation of percentiles and histograms without storing observations. Communications of the ACM, pages , October ] Y. M. Jiang and Y. Liu. Stochastic Network Calculus. Springer, 28. 1] H. Kim and J.C. Hou. Network calculus based simulation: theorems, implementation, and evaluation. In Proceedings of IEEE INFOCOM, March ] A. Koubaa, M. Alves, and E. Tovar. Modeling and worst-case dimensioning of cluster-tree wireless sensor networks. In Proceedings of the 27th IEEE International Real-Time Systems Symposium, pages , December ] J.-Y. Le Boudec and P. Thiran. Network Calculus A Theory of Deterministic Queuing Systems for the Internet. Number 25 in Lecture Notes in Computer Science. Springer-Verlag, ] J. Liebeherr, Y. Ghiassi-Farrokhfal, and A. Burchard. On the impact of link scheduling on end-to-end delays in large networks. IEEE Journal on Selected Areas in Communications, 295:19 12, May ] J. Schmitt and U. Roedig. Sensor network calculus - a framework for worst case analysis. In Proceedings of Distributed Computing on Sensor Systems, pages , June ] J. B. Schmitt, H. Wang, and I. Martinovic. Dynamic Demultiplexing in Network Calculus - Theory and Application. Performance Evaluation, 682: , February ] T. Skeie, S. Johannessen, and O. Holmeide. Timeliness of real-time IP communication in switched industrial ethernet networks. IEEE Transactions on Industrial Informatics, 21:25 39, February ] A. Varga. OMNeT++.
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Worst Case Analysis - Network Calculus
Worst Case Analysis - Network Calculus Network Calculus Primer Networks in Network Calculus Packet Based Networks Tandem Networks Feed Forward Networks Non Feed Forward Networks Traffic Models in Network
Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling
Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Praveen K. Muthusamy, Koushik Kar, Sambit Sahu, Prashant Pradhan and Saswati Sarkar Rensselaer Polytechnic Institute
Comparison of different classes of service curves in Network Calculus
Comparison of different classes of service curves in Network Calculus nne Bouillard Laurent Jouhet Éric Thierry ENS Cachan (Bretagne) / IRIS, Rennes, France (e-mail: [email protected]).
M/M/1 and M/M/m Queueing Systems
M/M/ and M/M/m Queueing Systems M. Veeraraghavan; March 20, 2004. Preliminaries. Kendall s notation: G/G/n/k queue G: General - can be any distribution. First letter: Arrival process; M: memoryless - exponential
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
A Network Calculus Approach to Probabilistic Quality of Service Analysis of Fading Channels
A Network Calculus Approach to Probabilistic Quality of Service Analysis of Fading Channels Markus Fidler Department of Electrical and Computer Engineering University of Toronto, Ontario, Canada [email protected]
Chapter 1. Introduction
Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
The Relative Worst Order Ratio for On-Line Algorithms
The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, [email protected]
6.6 Scheduling and Policing Mechanisms
02-068 C06 pp4 6/14/02 3:11 PM Page 572 572 CHAPTER 6 Multimedia Networking 6.6 Scheduling and Policing Mechanisms In the previous section, we identified the important underlying principles in providing
How To Balance In A Distributed System
6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 1, JANUARY 2000 How Useful Is Old Information? Michael Mitzenmacher AbstractÐWe consider the problem of load balancing in dynamic distributed
Bounding of Performance Measures for Threshold-Based Queuing Systems: Theory and Application to Dynamic Resource Management in Video-on-Demand Servers
IEEE TRANSACTIONS ON COMPUTERS, VOL 51, NO 3, MARCH 2002 1 Bounding of Performance Measures for Threshold-Based Queuing Systems: Theory and Application to Dynamic Resource Management in Video-on-Demand
The Exponential Distribution
21 The Exponential Distribution From Discrete-Time to Continuous-Time: In Chapter 6 of the text we will be considering Markov processes in continuous time. In a sense, we already have a very good understanding
1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let
Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
Analysis of a Production/Inventory System with Multiple Retailers
Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University
Functional Optimization Models for Active Queue Management
Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA [email protected]
Master s Theory Exam Spring 2006
Spring 2006 This exam contains 7 questions. You should attempt them all. Each question is divided into parts to help lead you through the material. You should attempt to complete as much of each problem
Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning
1524 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 9, SEPTEMBER 2003 Effective Bandwidth of Multiclass Markovian Traffic Sources and Admission Control With Dynamic Buffer Partitioning Yu Cheng, Student
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol
Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,
A Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
The Heat Equation. Lectures INF2320 p. 1/88
The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)
Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations
56 Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations Stochastic Processes and Queueing Theory used in Cloud Computer Performance Simulations Florin-Cătălin ENACHE
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
PFS scheme for forcing better service in best effort IP network
Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic
Single item inventory control under periodic review and a minimum order quantity
Single item inventory control under periodic review and a minimum order quantity G. P. Kiesmüller, A.G. de Kok, S. Dabia Faculty of Technology Management, Technische Universiteit Eindhoven, P.O. Box 513,
Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
How To Calculate Max Likelihood For A Software Reliability Model
International Journal of Reliability, Quality and Safety Engineering c World Scientific Publishing Company MAXIMUM LIKELIHOOD ESTIMATES FOR THE HYPERGEOMETRIC SOFTWARE RELIABILITY MODEL FRANK PADBERG Fakultät
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Mathematical Finance
Mathematical Finance Option Pricing under the Risk-Neutral Measure Cory Barnes Department of Mathematics University of Washington June 11, 2013 Outline 1 Probability Background 2 Black Scholes for European
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Examining Self-Similarity Network Traffic intervals
Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS
GESJ: Computer Science and Telecommunications 21 No.3(26) BRAESS-LIKE PARADOXES FOR NON-COOPERATIVE DYNAMIC LOAD BALANCING IN DISTRIBUTED COMPUTER SYSTEMS Said Fathy El-Zoghdy Department of Computer Science,
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
Vilnius University. Faculty of Mathematics and Informatics. Gintautas Bareikis
Vilnius University Faculty of Mathematics and Informatics Gintautas Bareikis CONTENT Chapter 1. SIMPLE AND COMPOUND INTEREST 1.1 Simple interest......................................................................
Firewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin [email protected] M. G. Gouda National Science Foundation University of Texas at Austin [email protected]
CALL CENTER PERFORMANCE EVALUATION USING QUEUEING NETWORK AND SIMULATION
CALL CENTER PERFORMANCE EVALUATION USING QUEUEING NETWORK AND SIMULATION MA 597 Assignment K.Anjaneyulu, Roll no: 06212303 1. Introduction A call center may be defined as a service unit where a group of
Pareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing
Pareto Set, Fairness, and Nash Equilibrium: A Case Study on Load Balancing Atsushi Inoie, Hisao Kameda, Corinne Touati Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS
IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS There are four questions, each with several parts. 1. Customers Coming to an Automatic Teller Machine (ATM) (30 points)
How performance metrics depend on the traffic demand in large cellular networks
How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented
Optical interconnection networks with time slot routing
Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Discrete-Event Simulation
Discrete-Event Simulation Prateek Sharma Abstract: Simulation can be regarded as the emulation of the behavior of a real-world system over an interval of time. The process of simulation relies upon the
Monte Carlo Methods in Finance
Author: Yiyang Yang Advisor: Pr. Xiaolin Li, Pr. Zari Rachev Department of Applied Mathematics and Statistics State University of New York at Stony Brook October 2, 2012 Outline Introduction 1 Introduction
SPARE PARTS INVENTORY SYSTEMS UNDER AN INCREASING FAILURE RATE DEMAND INTERVAL DISTRIBUTION
SPARE PARS INVENORY SYSEMS UNDER AN INCREASING FAILURE RAE DEMAND INERVAL DISRIBUION Safa Saidane 1, M. Zied Babai 2, M. Salah Aguir 3, Ouajdi Korbaa 4 1 National School of Computer Sciences (unisia),
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
A Tool for Generating Partition Schedules of Multiprocessor Systems
A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
1 Short Introduction to Time Series
ECONOMICS 7344, Spring 202 Bent E. Sørensen January 24, 202 Short Introduction to Time Series A time series is a collection of stochastic variables x,.., x t,.., x T indexed by an integer value t. The
Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network
Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science
On the mathematical theory of splitting and Russian roulette
On the mathematical theory of splitting and Russian roulette techniques St.Petersburg State University, Russia 1. Introduction Splitting is an universal and potentially very powerful technique for increasing
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1
Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 J. Zhang Institute of Applied Mathematics, Chongqing University of Posts and Telecommunications, Chongqing
Nonparametric adaptive age replacement with a one-cycle criterion
Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: [email protected]
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
Linear Programming I
Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins
Analysis of Load Frequency Control Performance Assessment Criteria
520 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 3, AUGUST 2001 Analysis of Load Frequency Control Performance Assessment Criteria George Gross, Fellow, IEEE and Jeong Woo Lee Abstract This paper presents
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
A QUICK GUIDE TO THE FORMULAS OF MULTIVARIABLE CALCULUS
A QUIK GUIDE TO THE FOMULAS OF MULTIVAIABLE ALULUS ontents 1. Analytic Geometry 2 1.1. Definition of a Vector 2 1.2. Scalar Product 2 1.3. Properties of the Scalar Product 2 1.4. Length and Unit Vectors
Notes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Chapter 4 Lecture Notes
Chapter 4 Lecture Notes Random Variables October 27, 2015 1 Section 4.1 Random Variables A random variable is typically a real-valued function defined on the sample space of some experiment. For instance,
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
This material is posted here with permission of the IEEE Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services Internal
OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN. E.V. Grigorieva. E.N. Khailov
DISCRETE AND CONTINUOUS Website: http://aimsciences.org DYNAMICAL SYSTEMS Supplement Volume 2005 pp. 345 354 OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN E.V. Grigorieva Department of Mathematics
Structure Preserving Model Reduction for Logistic Networks
Structure Preserving Model Reduction for Logistic Networks Fabian Wirth Institute of Mathematics University of Würzburg Workshop on Stochastic Models of Manufacturing Systems Einhoven, June 24 25, 2010.
5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. [email protected].
5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] April 2008 Overview Service Management Performance Mgt QoS Mgt
Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling
Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,
OPTIMAL CONTROL OF FLEXIBLE SERVERS IN TWO TANDEM QUEUES WITH OPERATING COSTS
Probability in the Engineering and Informational Sciences, 22, 2008, 107 131. Printed in the U.S.A. DOI: 10.1017/S0269964808000077 OPTIMAL CONTROL OF FLEXILE SERVERS IN TWO TANDEM QUEUES WITH OPERATING
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Computational Finance Options
1 Options 1 1 Options Computational Finance Options An option gives the holder of the option the right, but not the obligation to do something. Conversely, if you sell an option, you may be obliged to
Lecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
Dynamic Multi-User Load Balancing in Distributed Systems
Dynamic Multi-User Load Balancing in Distributed Systems Satish Penmatsa and Anthony T. Chronopoulos The University of Texas at San Antonio Dept. of Computer Science One UTSA Circle, San Antonio, Texas
CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 QoS Why a New Service Model? Best effort clearly insufficient Some applications need more assurances from the network What is the basic
