Worst Case Analysis - Network Calculus

Similar documents
6.6 Scheduling and Policing Mechanisms

Internet Quality of Service

Announcements. Midterms. Mt #1 Tuesday March 6 Mt #2 Tuesday April 15 Final project design due April 11. Chapters 1 & 2 Chapter 5 (to 5.

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback

Multimedia Requirements. Multimedia and Networks. Quality of Service

CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group

Real-time apps and Quality of Service

QoS scheduling. Scheduling algorithms

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Improving Quality of Service

Congestion Control Overview

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II IETF Integrated Services (IntServ)

Congestion Control Review Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Mixer/Translator VOIP/SIP. Translator. Mixer

Comparison of different classes of service curves in Network Calculus

Analysis of IP Network for different Quality of Service

Performance Evaluation of Linux Bridge

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

A Policy-Based Admission Control Scheme for Voice over IP Networks

Improving QOS in IP Networks. Principles for QOS Guarantees. Principles for QOS Guarantees (more) Principles for QOS Guarantees (more)

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN Vol 2 No 3 (May-2015) Active Queue Management

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Distributed Systems 3. Network Quality of Service (QoS)

AFDX networks. Computers and Real-Time Group, University of Cantabria

Integrated Service (IntServ) versus Differentiated Service (Diffserv)

PFS scheme for forcing better service in best effort IP network

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Latency on a Switched Ethernet Network

ESTIMATION OF TOKEN BUCKET PARAMETERS FOR VIDEOCONFERENCING SYSTEMS IN CORPORATE NETWORKS

Optimizing Converged Cisco Networks (ONT)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Fiber Channel Over Ethernet (FCoE)

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Load Balancing and Switch Scheduling

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Research Article Average Bandwidth Allocation Model of WFQ

Smart Queue Scheduling for QoS Spring 2001 Final Report

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

Protocols with QoS Support

COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

Real-Time Systems Hermann Härtig Real-Time Communication (following Kopetz, Liu, Schönberg, Löser)

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Comparative Analysis of Congestion Control Algorithms Using ns-2

Motivation. QoS Guarantees. Internet service classes. Certain applications require minimum level of network performance:

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

10CS64: COMPUTER NETWORKS - II

CHAPTER 1 ATM TRAFFIC MANAGEMENT

Network management and QoS provisioning - QoS in the Internet

How To Solve A Network Communication Problem

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov

Frame Metering in 802.1Q Version 01

CS 268: Lecture 13. QoS: DiffServ and IntServ

Technical Bulletin. Arista LANZ Overview. Overview

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

Per-Flow Queuing Allot's Approach to Bandwidth Management

Configuring QoS in a Wireless Environment

4 Internet QoS Management

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4

Delay, loss, layered architectures. packets queue in router buffers. packets queueing (delay)

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Computer Networks Homework 1

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Ethernet Fabric Requirements for FCoE in the Data Center

Chapter 3 ATM and Multimedia Traffic

QoS issues in Voice over IP

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Quality of Service (QoS)) in IP networks

How To Provide Qos Based Routing In The Internet

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

REAL TIME OPERATING SYSTEMS. Lesson-18:

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

This topic lists the key mechanisms use to implement QoS in an IP network.

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

VOICE OVER IP AND NETWORK CONVERGENCE

Requirements of Voice in an IP Internetwork

"Charting the Course to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

H.323 Traffic Characterization Test Plan Draft Paul Schopis,

TECHNICAL NOTE. FortiGate Traffic Shaping Version

Transcription:

Worst Case Analysis - Network Calculus Network Calculus Primer Networks in Network Calculus Packet Based Networks Tandem Networks Feed Forward Networks Non Feed Forward Networks Traffic Models in Network Calculus Formalisms in the Network Calculus Min-plus Algebra Arrival and Service Curves Latency and Backlog Bounds Tightening Bounds Convolution Form Network / Pay Bursts Only Once Pay Multiplexing Only Once Excursion to Network Analysis Tools Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 1

Network Calculus Primer Latencies in Networks Sample Delay Calculation Origins of Network Calculus Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 2

Latencies in Networks Propagation Delay stable and almost negligible speed of light Queuing delay Processing Delay Hardware dependent relatively stable Transmission Delay Time it takes to transmit the whole frame Propagation delay Queuing Delay If output port is busy, frames must be queued Sum of transmission delay of other frames, that have to be served before Processing delay Transmission delay Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 3

Refreshing Token Bucket Model Extended version of [Tan2002] and [Sta2001] which allows some burstiness Shaping does not occur until burst is consumed Token Bucket Scheme Network Calculus Representation (accumulated arrivals) Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 4

Short Introduction to Network Calculus (I) Flows in terms of Arrival Envelopes / Arrival Curves Service experienced by switch in terms of Service Curve Example of fluid flows, preemptive f1 and f2 are multiplexed and traverse two servers / switches Flow of interest is f1 Delay given by horizontal deviation Node-by-Node Analysis Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 5

Short Introduction to Network Calculus (II) Flows in terms of Arrival Envelopes / Arrival Curves Service experienced by switch in terms of Service Curve Example of fluid flows, preemptive f1 and f2 are multiplexed and traverse two servers / switches Flow of interest is f1 Delay given by horizontal deviation Node-by-Node Analysis Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 6

Origins of Network Calculus Cruz introduced Network Calculus as alternative to Queuing Theory Investigated burstiness of traffic flows and the impact on the delay Investigated buffer requirements Le Boudec shifted Network Calculus towards (min, +)-algebra Reuse of convolution and deconvolution known from system theory Instead of integration, use infimuum and supremum Network Calculus is a competitor to classical queuing theory, but focused on the worst case Latest techniques try to bring stochastic into the network calculus Stochastic Network Calculus Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 7

Evolution of Network Calculus Evolution From basic calculus over (min,+)-algebra to Stochastical extensions (SNC) Tightness / Convolution-form networks Linear optimization based approaches early 90ies Cruz late 90ies Le Boudec since 2000 Jiang Liebeherr Bouillard Schmitt Fidler SNC DNC Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 8

Networks in Network Calculus Packet Based Networks Tandem Networks Feed Forward Networks Non Feed Forward Networks Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 9

Networks in Network Calculus Networks we know so far Packet Based Networks Overlay Networks But we abstract in the Network Calculus Tandem Networks Feed Forward Networks Non Feed Forward Networks We differentiate here, because the type of such abstracted networks has impact on tightness of bounds What are tight bounds? Tight bounds: Can this worst case constellation ever be reached? Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 10

Packet Switched Networks Example Network Basically, switches consist of input queues, switch fabric, and output queues IP routers/gateways modeled quite similar Each output queue will be later modeled by a Service Curve Input Ports Switch Fabric Output Ports Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 11

Tandem Network Tandem Network Tandem of Servers Multiplexing occurs only once Exactly one path from source to destination Pay Burst Only Once (PBOO) should be applied here Also known as Convolution-Form Network There exist polynomial algorithms to determine tightest bounds Optimization Based Approaches Linear Programming f1 f2 S S Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 12

Feed-Forward Network Feed-Forward Network Directed Acyclic Graph Multiplexing can occur several times Several paths from source to destination possible Pay Multiplexing Only Once (PMOO) should be applied here Determining tight bounds was shown to be NP-hard There exist linear optimization based approaches S f1 f2 S S S Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 13

Non Feed-Forward Network Non Feed-Forward Network Cycles can occur in Non Feed-Forward Networks Network Calculus tends to deliver infinite bounds for those networks However there are some algorithms to turn Non Feed-Forward Networks to Feed-Forward Networks Spanning Tree restrictive, eliminates links Creates tree Turn Prohibition Algorithm [Sta2003] Retain Graph Topology Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 14

Non-FIFO bounds Why do we talk about Non-FIFO bounds, queuing discipline should be FIFO? Consider following situation in a packet switch Usually switch fabric tries to find maximum matching in order to serve as many input ports as possible For FIFO multiplexing, switches would have to store arrival time So, no FIFO (with respect to packet forwarding) is guaranteed Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 15

Traffic Models in the Network Calculus Token / Leaky Bucket in the Wild Token Bucket for Traffic Limiting Leaky Bucket for Traffic Shaping Token Bucket for Traffic Shaping Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 16

Token Bucket / Leaky Bucket in the Wild (1) Traffic Shapers shape traffic In packet based networks we guarantee that the inter frame gap is greater or equal to the corresponding bandwidth Traffic Policers determine, whether a traffic flow is in accordance with a specified traffic pattern If the burst is consumed, policer might trigger actions as Dropping frames Send PAUSE Message for Flow Control (According to IEEE 802.3x) Major difference: Traffic policers do not manipulate the inter frame gap while traffic shapers might do Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 17

Token Bucket / Leaky Bucket in the Wild (2) Input Flow Shaper Output Flow Data Flow 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 Rate Shaping 13 12 11 9 8 7 6 5 4 3 2 1 10 Counter queue size forwarded at constant rate allowed to send Frame IFG Frame IFG Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 18 Time

Token Bucket / Leaky Bucket in the Wild (3) Input Flow Limiter/Policer Output Flow Data Flow 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 Rate Limiting / Policing Burst Counter Limit Frame Frame Frame Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 19 Time

Token Bucket for Traffic Limiting Used to constrain flows in Network Calculus [Tan2002] Can be enforced by some sort of hardware limiters Packets are not delayed but either removed from the traffic flow or some flow control mechanism is triggered Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 20

Leaky Bucket for Traffic Shaping Used to constrain flows in Network Calculus [Sta2001] Can be enforced by some sort of hardware shapers Traffic is shaped, i.e., inter frame gap (IFG) is guaranteed to be greater than some specified value For this version, shaping already occures at first packet Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 21

Token Bucket for Traffic Shaping Extended version which allows some burstiness Shaping does not occur until burst is consumed Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 22

Multiple Token Bucket Models Sometimes it is not reasonable, to model traffic with only one (peak) rate we need several buckets Other examples Model packets at line rate You do not want the token bucket model with parameters (200 Bytes, 100MBit/s) Better: (200 Bytes, 100MBit/s, 10000 Bytes, 800kBit/s) E.g. VoIP with input buffers, also buffers in protocol stack Intserv s TSPEC Peak rate Burst at peak rate Average rate Burst at average rate Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 23

Formalisms in the Network Calculus Min-plus Algebra Arrival and Service Curves Latency and Backlog Bounds Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 24

Min,+ Algebra Min,+ Algebra is a semi-ring, dioid on, so Closure and Associativity of Zero element existent for Idempotency and Commutativity of Closure and Associativity of + Zero element for is absorbing for + Neutral element existent for + Distributivity of + with respect to is infimuum (or minimum if exists) is supremum (or maximum if exists) Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 25

[Bou2004] Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 26

Arrival Curve Arrival Curve specifies a traffic envelope to arrivals Used for nodes creating traffic but also for forwarding nodes at output How do we model arrivals of traffic in networks? Flow α t 0 R α t Given a wide-sense increasing functions defined for A flow is constrained by if and only if for all s Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 27

Output Arrival Curve Horizontal deviation d(t) gives FIFO bound on delay One bit in Arrival corresponds to exactly one bit in Departure Vertical deviation h(t) gives maximum backlog Flow How to determine bound for departures? Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 28

Service Curve Concept to abstract service offered from systems In accordance to scheduling (GPS, EDF) disciplines S S R S β β β ( 0) = 0 R * R β Consider a system and a flow through with input and output * function R and. offers to the flow a service curve if and only if is wide sense increasing, and. Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 29

Strict Service Curve We say that system offers a strict service curve to a flow if, during any backlogged period of duration u, the output of the flow is at least equal to. β(u) S Backlogged Period: Timespan where backlog is greater than 0. β Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 30

Token Bucket Constrained Arrival Curve Token Bucket, -constrained Burst often gives maximum packet size Rate gives the average rate If peak rate and average rate should also be modeled, we use dual or even multiple Token Buckets Example for -constrained arrival curve with Example for dual Token Bucket IntServ TSpec (r,b,p,m) average rate r, burst b, peak rate p, maximum packet size M formal Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 31

Staircase Arrival Curve Periodic Arrival Curve Used for Discrete Events such as packet bursts periodic messages Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 32

Service Curves Strict Service Curve Service Curve Strict Service Curve Generalized Processor Sharing (GPS) Theoretical model to serve several flows in parallel Practical implementation requires different service curve Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 33

Service Curves - Rate Latency Service Curve Service of a Forwarding Node / Switch / Router Packetized GPS Weighted Fair Queuing Intserv Guaranteed Service Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 34

Service Curve - Non-Preemtive Priority Node Service Curve Non-Preemptive Priority Node Constant Rate C High priority flow Low priority flow Rate Latency Service Curve is the standard tool to model Guaranteed Rate Servers Practical implementations of GPS Non-Preemptiveness Store-and-Forward delay Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 35

Service Curves - EDF Service Curve Burst Delay Earliest Deadline First (EDF) Guaranteed Delay Node Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 36

Convolution (I) Application Infimuum (lower) bound for output curve Latest appearance of bits at output Concatenation of Servers Convolution of tandem of service curves (convolution-form networks) Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 37

Convolution (II) Move mirrored green curve to the right (orange curve) Determine minimum of sum of orange and blue curve Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 38

Deconvolution Move red curve to the left Determine maximum of difference between red curve and green curve Application Supremum (upper) bound for output curve Earliest appearance of bits at output Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 39

Tightening Bounds Convolution Form Network / Pay Bursts Only Once Pay Multiplexing Only Once Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 40

Node-by-Node Edge Analysis Obvious way to calculuate worst case delays Calculate delay per traversing node and add them up Also known under the term Node-by-Node Analysis Implemented as Total Flow Analysis (TFA) in DISCO Problem in terms of overestimation: In reality, burst should only be paid at the first node. With Node-by- Node, it will be paid at every traversing node. Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 41

Tightness of Network Calculus Bounds However, with the so called Node-by-Node Analysis (as seen before) Latency is determined at each node, such that burst is paid at every server, i.e., s1 as well as s2 Also known as algorithm: Total Flow Analysis (TFA) Tightening bounds Pay Bursts Only Once [RIZ2005] Burst will only be paid at first node Edge-by-Edge Analysis (First: Service Curve over all edges, Then: horizontal deviation) Also known as algorithm: Separated Flow Analysis (SFA) Addresses the following case Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 42

Tightness of Network Calculus Bounds Tightening bounds Pay Multiplexing Only Once [SCH2008] If flow is multiplexed several times, SFA will pay too much at each multiplexing Also known as algorithm: PMOO-SFA Edge-by-Edge Analysis (First: Service Curve over all edges, Then: horizontal deviation) Idea: Eliminate rejoining flows from service curve Addresses the following case Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 43

Non-Preemptiveness of Switched Ethernet (I) We showed how to determine worst cases in fluid flow models But how to deal with non-preemptiveness of Switched Ethernet? Mapping by Discrete Sized Bursts Additional latency in Rate Latency Service Curve (Packetizer) Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 44

Non-Preemptiveness of Switched Ethernet (II) The discrete bursts approach in switched Ethernet has some pitfalls: Packet bursts must be preserved when not modeled by additional rate latency Okay for TFA Store-and-forward delay of flow of interest must be added to SFA result (If n nodes, add (n-1) times the store-and-forward delay) PMOO does not preserve packet bursts Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 45

Non-Preemptiveness of Switched Ethernet (III) However, NC cannot map the following situation accurately (speed is Fast Ethernet): Assume a small packet being delayed by a larger packet At Server/Switch S1, the small packet is delayed by the full large packet At Server/Switch S2, the small packet is delayed only by the remaining 1454 bytes 64 64 1518 64 1518 1518 S1 S2 But for FastEthernet, exact worst case is 0.2480 ms (omitting IFG and preamble) Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 46

Non-Preemptiveness of Switched Ethernet (IV) Additionally, NC can not map the following situation accurately: Assume three equally sized frames in a simple network Packet of interest is 1 1. Packet 1 and 2 arrive at first switch, Packet 1 is delayed by Packet 2 2. Packet 2 is transmitted and arrives at second switch as Packet 3 does 3. Packet 2 waits at second switch until transmission of Packet 3 finished 4. Packet 1 will be delayed by Packet 2 Additional delay by 2 packets But NC gives additional delay of 3 packets Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 47

Non-Preemptiveness of Switched Ethernet (IV) However, NC can not map the following situation accurately: Assume three equal sized frames in a simple network Packet of interest is 1 1. Packet 1 and 2 arrive at first switch, Packet 1 is delayed by Packet 2 2. Packet 2 is transmitted and arrives at second switch as Packet 3 does 3. Packet 2 waits at second switch until transmission of Packet 3 finished 4. Packet 1 will be delayed by Packet 2 Additional delay by 2 packets But NC gives additional delay of 3 packets Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 48

Non-Preemptiveness of Switched Ethernet (IV) However, NC can not map the following situation accurately: Assume three equal sized frames in a simple network Packet of interest is 1 1. Packet 1 and 2 arrive at first switch, Packet 1 is delayed by Packet 2 2. Packet 2 is transmitted and arrives at second switch as Packet 3 does 3. Packet 2 waits at second switch until transmission of Packet 3 finished 4. Packet 1 will be delayed by Packet 2 Additional delay by 2 packets But NC gives additional delay of 3 packets Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 49

Non-Preemptiveness of Switched Ethernet (IV) However, NC can not map the following situation accurately: Assume three equal sized frames in a simple network Packet of interest is 1 1. Packet 1 and 2 arrive at first switch, Packet 1 is delayed by Packet 2 2. Packet 2 is transmitted and arrives at second switch as Packet 3 does 3. Packet 2 waits at second switch until transmission of Packet 3 finished 4. Packet 1 will be delayed by Packet 2 Additional delay by 2 packets But NC gives additional delay of 3 packets Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 50

Non-Preemptiveness of Switched Ethernet (IV) However, NC can not map the following situation accurately: Assume three equal sized frames in a simple network Packet of interest is 1 1. Packet 1 and 2 arrive at first switch, Packet 1 is delayed by Packet 2 2. Packet 2 is transmitted and arrives at second switch as Packet 3 does 3. Packet 2 waits at second switch until transmission of Packet 3 finished 4. Packet 1 will be delayed by Packet 2 Additional delay by 2 packets But NC gives additional delay of 3 packets Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 51

Excursion to Network Analysis Tools DISCO Network Analyzer http://disco.informatik.uni-kl.de/ COINC http://perso.bretagne.ens-cachan.fr/~bouillar/coinc/ CyNC http://www.control.aau.dk/~henrik/cync/ Real Time Calculus http://www.mpa.ethz.ch/ Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 52

References [Tan2002] Computer Networks (4th Edition), 2002, Andrew S. Tanenbaum [Sta2001] High-Speed Networks and Internets: Performance and Quality of Service (2nd Edition), William Stallings [Sta2003] Starobinski, D.; Karpovsky, M. & Zakrevski, L. A. Application of network calculus to general topologies using turn-prohibition, IEEE/ACM Transaction on Networking, IEEE Press, 2003, 11, 411-421 [Sch2008] Schmitt, J. B.; Zdarsky, F. A. & Martinovic, I. Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once Measuring, Modelling and Evaluation of Computer and Communication Systems (MMB), 2008 14th GI/ITG Conference -, Proc. of the 14th Conference on Measuring, Modelling and Evaluation of Computer and Communication Systems (MMB), 2008 [Sch2005] Schmitt, J. B. & Zdarsky, F. A. The DISCO Network Calculator: A Toolbox for Worst Case Analysis Proc. of the 1st international conference on Performance evaluation methodolgies and tools. ValueTools 2006, 2006 [Bou2004] Le Boudec, J. Network Calculus: A Theory of Deterministic Queuing Systems for the Internet 2004 [Jia2008] Jiang, Y. & Liu, Y. Stochastic network calculus Springer-Verlag New York Inc, 2008 Network IN2072 - Security, Analyse von WS Systemperformanz 2008/09, Chapter 9 53