Stream Sessions: Stochastic Analysis
|
|
- Leo Henry
- 6 years ago
- Views:
Transcription
1 Stream Sessions: Stochastic Analysis Hongwei Zhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar
2 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
3 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
4 Recap of deterministic analysis
5 Review: Law of large numbers & central limit theorem
6 Deterministic analysis can yield loose bounds: an motivating example
7
8
9
10 R A( t) n t 2 nσ max dist N(0,1)
11
12 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
13 Stochastic traffic model
14 Model for a single stream source
15
16 Superposition of sources
17 # of active sources
18
19
20 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
21 Some additional notation
22 Performance measures
23
24
25 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
26 Little s Theorem
27
28
29
30
31
32
33 Discussion
34 Invariance of mean system time
35
36 Generalization of Little s Theorem: Brumelle s Theorem
37
38 Recall: queueing system notation
39 Mean queue length in an M/G/1 queue
40
41 M/G/1 queue: remarks
42 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
43 Multiplexer analysis
44 Recall: Birkhoff s Ergodic Theorem
45 Analysis with marginal buffering (i.e., bufferless)
46
47
48 Marginal buffering: example
49 Recall: inequalities
50
51
52 Recall: limit theorems
53 Link design: taking advantage of statistical multiplexing
54
55 Analysis using central limit theorem
56
57 Analysis using Chernoff bound
58
59
60 From (ii) and (iii): for α > E(X1), l(α) is nondecreasing
61 Example 5.4: the two-state Markov source
62
63
64
65 Cramer s theorem
66
67 Multiplexing gain, link engineering, and admission contro
68 But, given the same resource provisioning, N would be larger in packet switching.
69
70 Analysis with arbitrary buffering
71 Stationary queue length: continuous time
72
73
74
75 Stationary queue length: discrete time
76 Queue length analysis using Chernoff s Bound: effective bandwidth
77
78
79
80 Example
81
82 Some properties of e(θ)
83
84
85 Calculating Γ(θ) for a Discrete Time Markov Source
86
87
88
89
90 Stationary Buer Distribution Asymptotics: A Review
91 Remark A capacity of C = Γ(θ)/ θ is not only sufficient but also necessary for achieving the desired QoS objective θ See analysis on PP of R0 for the analysis
92 An Approximation to the Stationary Buffer Distribution
93
94
95 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
96
97
98 (only) for small x
99
100 The Guerin, Ahmadi, Nagshineh (GAN) approach
101
102 X max affects whether C 0 or C EBW is chosen
103 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example see Section 5.8 of R0 Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
104 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
105 Stochastic analysis with shaped traffic Leaky bucket (LB) shaped traffic Challenge for stochastic analysis and traffic engineering with LB parameters alone is that they only specify the worst case behavior and do not uniquely specify a statistical characterization of the source Solution To analyze by assuming, for each source, a model compatible with the LB parameters but one that leads to the worst performance Thus, the problem reduces to one of determining the worst case stochastic models for a set of independent LB shaped sources
106 The case of marginal buffering For m statistically independent sources with LB parameters (σ i, ρ i, R i ), 1 i m For maximizing packet loss rate, Each source be an on-off source (taking values R i and 0) with mean rate r i Packet loss rate is maximized when r i = ρ I For maximizing fraction of packets lost, Each source be an on-off source (taking values R i and 0) with mean rate r i Nonetheless, packet loss rate is not maximized in general when r i = ρ i
107 The case of arbitrary buffering LB parameters: (σ, ρ, R) Extremal on-off source: switching between R and 0, with maximum possible burst length σ/(r-ρ) In general, extremal on-off source does not give the worst performance Two-level source can yield worse performance Intuition: by being active longer, the source can sustain congestion longer, thus causing loss for other sources in the multiplexer R r T 1 T 2 T 1 T 2 T 1
108 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
109 Challenges of multihop networks Need to characterize the departure process of each flow from each hop Flows become dependent within the network, and dependence is very difficult to characterize A network may carry both elastic and stream traffic, and the different flows interact whose impact is difficult to account for in design E.g., resources are used for stream traffic in the absence of elastic traffic bursts
110 Status of the art End-to-end stochastic analysis of multihop packet networks has not yet yielded a complete solution With solutions to limited situation only, e.g., the effective envelope approach (see Section 5.10 of R0) Definition: for a given ε>0, a function E ε (t) is an ε-effective envelope for A(t) if, for every t and τ 0, Pr(A(t+τ)-A(t)> E ε (τ)) ε One (approximate) approach: splitting end-to-end QoS objectives (e.g., latency) into per-hop objectives Existence of optimal splitting
111 Outline Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
112 Long-range-dependent traffic
113
114
115
116 Summary Loose bounds by deterministic calculus Stochastic traffic models Performance measures Little s Theorem, Brumelle s Theorem, and applications Multiplexer analysis with stationary and ergodic traffic Effective bandwidth approach to admission control Applications to packet voice example Stochastic analysis with shaped traffic Multihop networks Long-range-dependent traffic
117 Additional readings Admission control and QoS E. W. Knightly and N. B. Shroff, Admission control for statistical QoS: Theory and practice, IEEE Network Magazine, pp , March/April 1999 Long range dependent (LRD) traffic W. E. Leland et al., On the self-similar nature of Ethernet traffic, IEEE/ACM Transactions on Networking, 2(1):1-15, Feb W. Willinger et al., Self-similarity in high-speed packet traffic: analysis and modeling of Ethernet traffic measurements, Statistical Science, 10(1):67-85, 1995
118 Homework #4 Chapter 5 of R0 Exercise 5.8: prove the claims on the additivity of effective bandwidth Problems 5.1, 5.5 (a)-(b), Distribution of points: total = points for Exercise points for Problem 5.1: 10 for (a), 20 for (b) and (c) each 30 points for problem 5.5 (a)-(b)
Introduction: Two motivating examples for the analytical approach
Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline
More informationOn Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering
On Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering Shivendra S. Panwar New York State Center for Advanced Technology in Telecommunications (CATT) Department of Electrical
More informationFrom ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?
Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get
More informationCross Clock-Domain TDM Virtual Circuits for Networks on Chips
Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm
More informationTraffic theory for the Internet and the future Internet
Traffic theory for the Internet and the future Internet Orange Labs Jim Roberts, Research & Development 29 August 2008, MAS Seminar Internet traffic theory understanding the relationship between demand,
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationIEEE Communications Surveys & Tutorials 3rd Quarter
3RD QUARTER 26, VOLUME 8, NO. 3 www.comsoc.org/pubs/surveys A SURVEY OF ENVELOPE PROCESSES AND THEIR APPLICATIONS IN QUALITY OF SERVICE PROVISIONING SHIWEN MAO, AUBURN UNIVERSITY SHIVENDRA S. PANWAR, POLYTECHNIC
More informationPerspectives on Network Calculus No Free Lunch but Still Good Value
ACM Sigcomm 2012 Perspectives on Network Calculus No Free Lunch but Still Good Value Florin Ciucu T-Labs / TU Berlin Jens Schmitt TU Kaiserslautern Outline Network Calculus (NC): A Theory for System Performance
More informationWorst-case Ethernet Network Latency for Shaped Sources
Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................
More informationLecture 17: Distributed Multimedia
06-06798 Distributed Systems Lecture 17: Distributed Multimedia Distributed Systems 1 Overview Characteristics of multimedia systems audio, video, etc delivery in real time, on time Quality of service
More informationApplication of Network Calculus to the TSN Problem Space
Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationConnection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information
Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationLecture 17 Multimedia Transport Subsystem (Part 3)
CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:
More informationUNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline
UNIVERSITY OF CALIFORNIA, SAN DIEGO A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline A thesis submitted in partial satisfaction of the requirements for the degree Master
More informationEVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD
Journal of ELECTRICAL ENGINEERING, VOL. 57, NO. 6, 2006, 360 364 EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Peter Kvačkaj
More informationCS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm
CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: Answers SUNet ID: root @stanford.edu Check if you would like exam routed
More informationQoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose
QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain
More informationStochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego
Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego http://www.math.ucsd.edu/~williams 1 OUTLINE! What is a Stochastic Processing Network?! Applications!
More informationAdvanced Internet Technologies
Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
More informationTraffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011
Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationTeletraffic theory I: Queuing theory
Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five
More informationVoIP Protocols and QoS
Announcements I. Times have been posted for demo slots VoIP Protocols and QoS II. HW5 and HW6 solutions have been posted HW6 being graded Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University
More information3.3. Traffic models and teletraffic dimensioning
3.3. Traffic models and teletraffic dimensioning Sándor Molnár, author Béla Frajka: reviewer 3.3.1. Introduction The basic teletraffic principles, equations and an overview of the nature of network traffic
More informationCSC6290: Data Communication and Computer Networks. Hongwei Zhang
CSC6290: Data Communication and Computer Networks Hongwei Zhang http://www.cs.wayne.edu/~hzhang Objectives of the course Ultimate goal: To help students become deep thinkers in computer networking! Humble
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More information048866: Packet Switch Architectures
048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/
More informationNested QoS: Providing Flexible Performance in Shared IO Environment
Nested QoS: Providing Flexible Performance in Shared IO Environment Hui Wang Peter Varman hw5@rice.edu pjv@rice.edu Rice University, USA Abstract The increasing popularity of storage and server consolidation
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationEECS 122: Introduction to Computer Networks Resource Management and QoS. Quality of Service (QoS)
EECS 122: Introduction to Computer Networks Resource Management and QoS Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationConvergence of communication services
Convergence of communication services Lecture slides for S-38.191 5.4.2001 Mika Ilvesmäki Networking laboratory Contents Services and contemporary networks IP service Voice over IP DataoverIP Convergence
More informationCommon network/protocol functions
Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: important topics not covered in introductory courses Overview:
More information1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE
1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER 2005 End-to-End Delay Bounds for Traffic Aggregates Under Guaranteed-Rate Scheduling Algorithms Wei Sun, Student Member, IEEE, and Kang
More informationModelling data networks research summary and modelling tools
Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at
More informationScheduling Algorithms to Minimize Session Delays
Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of
More informationCS 268: Integrated Services
Limitations of IP Architecture in Supporting Resource Management CS 268: Integrated Services Ion Stoica February 23, 2004 IP provides only best effort service IP does not participate in resource management
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control
More informationTDDD82 Secure Mobile Systems Lecture 6: Quality of Service
TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani
More informationAdmission Control Framework to Provide Guaranteed Delay in Error-Prone Wireless Channel
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering January 2007 Admission Control Framework to Provide Guaranteed Delay in Error-Prone
More informationComputer Networking. Queue Management and Quality of Service (QOS)
Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationPacket Scheduling and QoS
Packet Scheduling and QoS EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Thursday Oct 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Packet
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY Application of Network Calculus to Guaranteed Service Networks
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 1087 Application of Network Calculus to Guaranteed Service Networks Jean-Yves Le Boudec, Member, IEEE Abstract We use recent network calculus
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationImpact of Traffic Aggregation on Network Capacity and Quality of Service
Impact of Traffic Aggregation on Network Capacity and Quality of Service Towela Nyirenda-Jere (towela@ittc.ukans.edu) Information and Telecommunications Technology Center University of Kansas http:// www.ittc.ukans.edu
More informationCS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 4pm
CS144: Intro to Computer Networks Homework 1 Scan and submit your solution online. Due Friday January 30, 2015 @ 4pm Your Name: SUNet ID: @stanford.edu Check if you would like exam routed back via SCPD:
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationCS244a: An Introduction to Computer Networks
Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete
More informationBandwidth Provisioning in ADSL Access Networks
Bandwidth Provisioning in ADSL Access Networks Kaiqi Xiong, Harry Perros, and Steven Blake 2 Department of Computer Science, NC State University, Raleigh, NC 27695-7534, USA {xiong,hp}@csc.ncsu.edu 2 Extreme
More informationATM Quality of Service (QoS)
ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special
More informationIntroduction to the course
Introduction to the course Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ http://www.cs.tut.fi/kurssit/tlt-2706/ 1. What is the teletraffic theory? Multidisciplinary
More informationThe difference between TTC JT-Y1221 and ITU-T Y.1221
The difference between TTC JT-Y1221 and ITU-T Y.1221 Traffic control and congestion control in IP based networks (The English Edition) Version 1.0 Published on March 27, 2013 THE TELECOMMUNICATION TECHNOLOGY
More informationPROBABILISTIC SCHEDULING MICHAEL ROITZSCH
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group PROBABILISTIC SCHEDULING MICHAEL ROITZSCH DESKTOP REAL-TIME 2 PROBLEM worst case execution time (WCET) largely exceeds
More informationTracking Frequent Items Dynamically: What s Hot and What s Not To appear in PODS 2003
Tracking Frequent Items Dynamically: What s Hot and What s Not To appear in PODS 2003 Graham Cormode graham@dimacs.rutgers.edu dimacs.rutgers.edu/~graham S. Muthukrishnan muthu@cs.rutgers.edu Everyday
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More informationPage 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service.
Quality of Service CS 268: Lecture 3 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationApplication of Importance Sampling in Simulation of Buffer Policies in ATM networks
Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW
More informationRESOURCE MANAGEMENT MICHAEL ROITZSCH
Department of Computer Science Institute for System Architecture, Operating Systems Group RESOURCE MANAGEMENT MICHAEL ROITZSCH AGENDA done: time, drivers today: misc. resources architectures for resource
More informationETSF10 Internet Protocols Transport Layer Protocols
ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.2 Kaan Bür, Jens Andersson Transport Layer Protocols Special Topic: Quality of Service (QoS) [ed.4 ch.24.1+5-6] [ed.5 ch.30.1-2]
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master
More informationEND-TO-END estimation of the spare capacity along a network
130 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis Xiliang Liu, Kaliappa Ravindran, and Dmitri Loguinov,
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationReferences. [7] J. G. Gruber. Delay related issues in integrated voice and data networks. In IEEE Trans. on Commun., pages , June 1981.
have adopted the leaky bucket mechanism to satisfy the application required quality of service parameters. The basic performance metrics such as the delay, delay jitter, and system utilization are evaluated
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationNEW STABILITY RESULTS FOR ADVERSARIAL QUEUING
NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.
More informationQuality Differentiation with Source Shaping and Forward Error Correction
Quality Differentiation with Source Shaping and Forward Error Correction György Dán and Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology, {gyuri,viktoria}@imit.kth.se
More informationA SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC. Yunkai Zhou and Harish Sethu
Proceedings of the IEEE Workshop on Statistical Signal and Array Processing Pocono Manor, Pennsylvania, USA, August 14 16, 2000 A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES
More informationMultihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks
Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationEffective Capacity: A Wireless Link Model for Support of Quality of Service
630 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 4, JULY 2003 Effective Capacity: A Wireless Link Model for Support of Quality of Service Dapeng Wu, Student Member, IEEE, and Rohit Negi, Member,
More informationEP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control
EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,
More informationQoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology
QoS provisioning Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 6, 2012 Outline 1 Introduction 2 QoS support elements
More informationPacket Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.
Problem: not all networks are directly connected Limitations of directly connected networks: limit on the number of hosts supportable limit on the geographic span of the network Packet Switching Hongwei
More informationLow Latency via Redundancy
Low Latency via Redundancy Ashish Vulimiri, Philip Brighten Godfrey, Radhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker Presenter: Meng Wang 2 Low Latency Is Important Injecting just 400 milliseconds
More informationDelay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin
Delay Analysis of Fair Queueing Algorithms with the Stochastic Comparison Approach Nihal Pekergin PRi SM, Universite de Versailles-St-Quentin 45 av des Etats Unis, 78 035 FRANCE CERMSEM, Universite de
More informationNetwork Calculus: A Comparison
Time-Division Multiplexing vs Network Calculus: A Comparison Wolfgang Puffitsch, Rasmus Bo Sørensen, Martin Schoeberl RTNS 15, Lille, France Motivation Modern multiprocessors use networks-on-chip Congestion
More informationEECS 454: Modeling and Analysis of Communication Networks
: Modeling and Analysis of Communication Networks Spring Quarter 2008 Meeting time: 12:30-1:50 MW Instructor: Randall Berry Office: Tech, Rm. M318 Office Hours: by appointment Course Overview Primary goal
More informationA PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING
A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer
More informationQoS Policy Parameters
CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,
More informationApplication of QNA to analyze the Queueing Network Mobility Model of MANET
1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationRouting over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks
2002 Conference on Information Sciences and Systems, Princeton University, March 20-22, 2002 Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks
More informationA Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Weighted Fair Queuing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu
More informationMultimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management
Multimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management Lawrence Stewart α, David Hayes α, Grenville Armitage α, Michael Welzl β, Andreas Petlund β α Centre for Advanced Internet
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationCongestion Control and Resource Allocation
Problem: allocating resources Congestion control Quality of service Congestion Control and Resource Allocation Hongwei Zhang http://www.cs.wayne.edu/~hzhang The hand that hath made you fair hath made you
More informationTHE INHERENT QUEUING DELAY OF PARALLEL PACKET SWITCHES (Extended Abstract)
139 THE INHERENT QUEUING DELAY OF PARALLEL PACKET SWITCHES (Extended Abstract) Hagit Attiya and David Hay Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel {hagit,hdavid}@cs.technion.ac.il
More informationB. Bellalta Mobile Communication Networks
IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance
More information