Advanced Internet Technologies
|
|
- Amos Willis Summers
- 6 years ago
- Views:
Transcription
1 Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen dressler@informatik.uni-tuebingen.de Advanced Internet Technologies, SS
2 Chapter 3 Performance Modeling Queuing Analysis Introduction Queuing Models Self-Similar Traffic Advanced Internet Technologies, SS
3 Queuing Analysis Introduction Goals Prediction of network/system behavior Performance modeling and estimation Benefits Real-world tests are expensive and often infeasible Analytic models based on queuing theory often provide the needed answers Queue Server Advanced Internet Technologies, SS
4 How Queues Behave A Simple Example Consider a system with the following capabilities Capacity of input and output: 1000 packets/s Processing time for an average request: 1ms Unlimited queue size Non-uniform arrival rate Three experiments Arrival rate of 500 requests/s (50% server capacity) Arrival rate of 950 requests/s (95% server capacity) Arrival rate of 990 requests/s (99% server capacity) Advanced Internet Technologies, SS
5 Queue Behavior with Normalized Arrival Rate of 0.5 Results Avg buffer size: 43 Peak: >600 Advanced Internet Technologies, SS
6 Queue Behavior with Normalized Arrival Rate of 0.95 Results Avg buffer size: 1859 Peak: >4200 Advanced Internet Technologies, SS
7 Queue Behavior with Normalized Arrival Rate of 0.99 Results Avg buffer size: 2583 Peak: >5300 Advanced Internet Technologies, SS
8 Performance Evaluation 1. Do an after-the-fact analysis based on actual values 2. Make a simple projection by scaling up from existing experience to the expected future environment 3. Develop an analytic model based on queuing theory 4. Program and run a simulation model Advanced Internet Technologies, SS
9 Queuing Models Single-Server Queue Theoretical maximum input rate that can be handled by the system (at utilization ρ=1): λ max = 1 T s Advanced Internet Technologies, SS
10 Single-Server Queue Model Characteristics (Assumptions) Item population Items arrive from an infinite source population Thus, the arrival rate is not altered as items enter the system (If the population is finite, then the population available for arrival is reduced by the number of items currently in the system; this would typically reduce the arrival rate proportionally) Queue size The queue size is infinite Thus, the queue can grow without bound (With a finite queue, items can be lost from the system; that is, if the queue is full and additional items arrive, some items must be discarded) Dispatching discipline When the server becomes free, and if there is more than one item waiting, a decision must be made as to which item to dispatch next Examples: FIFO, FCFS, LIFO,... Advanced Internet Technologies, SS
11 Example of a Queuing Process Advanced Internet Technologies, SS
12 Notations Advanced Internet Technologies, SS
13 Queuing Models Multiserver Queue Theoretical maximum input rate that can be handled by the system (at utilization Nρ, which is also called the traffic intensity, u): λ max = N Ts Advanced Internet Technologies, SS
14 Queuing Models Multiple Single-Server Queues Advanced Internet Technologies, SS
15 Queuing Analysis - Basics Input information Output information Arrival rate: λ Items waiting: w Service time: T s Number of servers: N Waiting time: T w Items queued: r Residence time: T r Average values (w, T w, r, T r ) Standard deviation (σ w, σ Tw, σ r, σ Tr ) Advanced Internet Technologies, SS
16 Queuing Analysis Basics II Distribution of the interarrival times Typically, we assume that the interarrival time is exponential, which is equivalent to saying that the number of arrivals in a period t obeys the Poisson distribution, which is equivalent to saying that the arrivals occur randomly and independent of one another. Kendall s notation X/Y/N X refers to the distribution of the interarrival times Y refers to the distribution of service times N refers to the number of servers Distributions G... General distribution of interarrival times GI... General distribution of interarrival times, interarrival times are independed M... Poisson distribution D... Deterministic distribution Example M/M/1 refers to a single-server queuing model with Poisson arrivals Advanced Internet Technologies, SS
17 Single-Server Queues Advanced Internet Technologies, SS
18 Single-Server Queues II Mean number of items in system for single-server queue Advanced Internet Technologies, SS
19 Single-Server Queues III Mean residence time for single-server queue Advanced Internet Technologies, SS
20 Single-Server Queues IV σ Ts /T s is also known as the coefficient of variation and gives a normalized measure of variability The meaning of σ Ts /T s Zero: constant service time, e.g. if all transmitted packets are of the same length Ratio less then 1: ratio better than the exponential case, the M/M/1 model would give answers on the safe side Ratio close to 1: common occurrence, corresponds to exponential service time Ratio greater than 1: the M/G/1 model is required Advanced Internet Technologies, SS
21 Multiserver Queues (M/M/N) Poisson ratio function Erlang C function (probability that all servers are busy) C( N, ρ) 1 K( N, ρ) = 1 ρk( N, ρ) Equation for single-server systems C(1, ρ ) = ρ Advanced Internet Technologies, SS
22 An Example Single-Server Model Engineers use PCs plus a single graphic workstation. On a typical 8- hour day, 10 engineers will use the workstation and spend an average of 30 minutes at a session. Average time an engineer spends waiting for the workstation T w = ρts = 1 ρ 50 minutes Average rate of engineers λ = 10 = 8* engineers/minute Average number of engineers waiting w = λtw = engineers Advanced Internet Technologies, SS
23 An Example Single-Server Model II Calculating percentiles mr y ln(1 ) ( y) = ln( ρ) 90th percentile waiting time mtw Tw ( 90) = *ln(10ρ) = minutes ρ Results Engineers wait almost an hour to use the workstation In 10% of the cases they wait longer than 2 hours Advanced Internet Technologies, SS
24 An Example Multiserver Model Probability that both servers are busy C(2, ρ) = C(2,0.3125) = Average time an engineer spends waiting for a workstation T w = CTs N(1 ρ) = minutes 90th percentile waiting time m Tw Ts ( 90) = *ln(10c) = 2(1 ρ) 8.67 minutes Average number of engineers waiting w = λtw = 0.07 engineers Advanced Internet Technologies, SS
25 An Example Single-Server vs. Multiserver Model Advanced Internet Technologies, SS
26 Network of Queues In a distributed environment, isolated queues are unfortunately not the only problem presented to the analyst. Often, the problem to be analyzed consists of several interconnected queues. Partitioning and merging of traffic (nodes 1 and 5) Queues in tandem, or series (nodes 3 and 4) Advanced Internet Technologies, SS
27 Network of Queues Partitioning and Merging Partitioning If the incoming distribution is Poisson, then the two departing traffic flows also have Poisson distributions, with mean rates Pλ and (1-P)λ. Merging If two Poisson streams with mean rates λ 1 and λ 2 are merged, the resulting stream is Poisson with a mean rate of λ 1 + λ 2. Advanced Internet Technologies, SS
28 Network of Queues Queues in Tandem Assume that the input to the first queue is Poisson. Then, if the service time of each queue is exponential and the queues are of infinite capacity, the output of each queue is a Poisson stream statistically identical to the input. Thus, the queues are independent and may be analyzed one at a time. Therefore, the mean total delay for the tandem system is equal to the sum of the mean delay at each stage. Advanced Internet Technologies, SS
29 Jackson s Theorem Assumptions The queuing network consists of m nodes, each of which provides an independent exponential service. Items arriving from outside the system to any one of the nodes arrive with a Poisson rate. Once served at a node, an item goes (immediately) to one of the other nodes with a fixed probability, or out of the system. Jackson s Theorem Jackson s theorem states that in such a network of queues, each node is an independent queuing system, with Poisson input determined by the principles of partitioning, merging, and tandem queuing. Thus, each node may be analyzed separately from the others using the M/M/1 or M/M/N model, and the results may be combined by ordinary statistical methods. Advanced Internet Technologies, SS
30 Self-Similar Traffic Queuing analysis depends on the Poisson nature of the data traffic It has shown that for some environments the traffic pattern is selfsimilar rather than Poisson Self-similarity is a concept related to two others Fractals Chaos theory Outline Phenomenon of self-similarity Performance implications Storage Model with Self-Similar Advanced Internet Technologies, SS
31 Self-Similarity Statement by Manfred-Schroeder: The unifying concept underlying fractals, chaos, and power laws is self-similarity. Self-similarity, or invariance against changes in scale or size, is an attribute of many laws in nature and innumerable phenomena in the world around us. Self-similarity is, in fact, one of the decisive symmetries that shape our universe and our effort to comprehend it. Advanced Internet Technologies, SS
32 Self-Similarity An Example Network monitoring, analysis of the interarrival time of single frames Minimum transmission time for one frame: 4ms Recorded arrivals (ms): Clustering all samples with gaps smaller than 20ms: Clustering all samples with gaps smaller than 40ms: Advanced Internet Technologies, SS
33 Self-Similarity An Example II Repeating patterns: arrival, short gap, arrival, long gap, arrival, short gap, arrival) Gaps between single frames / clusters [ms] Reihe1 Reihe2 Reihe Advanced Internet Technologies, SS
34 Self-Similarity An Example III Repeating patterns: arrival, short gap, arrival, long gap, arrival, short gap, arrival) Advanced Internet Technologies, SS
35 Cantor Set Famous construct appearing in virtually every book on chaos, fractals, and nonlinear dynamics Construction rules: Begin with the closed interval [0,1], represented by a line segment Remove the open middle third of a line For each succeeding step, remove the middle third of the lines left by the preceding step Cantor set: S 0 = [0, 1] S 1 = [0, 1/3] U [2/3, 1] S 3 = [0, 1/9] U [2/9, 1/3] U [2/3, 7/9] U [8/9, 1] Advanced Internet Technologies, SS
36 Cantor Set II Properties of Cantor sets seen in all self-similar phenomena It has a structure at arbitrarily small scales. If we magnify part of the set repeatedly, we continue to see a complex pattern of points separated by gaps of various sizes. The process seems unending. In contrast, when we look at a smooth, continuous curve under repeated magnification, it becomes more and more featureless. The structure repeat. A self-similar structure contains smaller replicas of itself at all scales. For example, at every step, the left (and right) portion of the Cantor set is an exact replica of the full set in the preceding step. These properties do not hold indefinitely for real phenomena. At some point under magnification, the structure and the self-similarity break down. But over a large range of scales, many phenomena exhibit selfsimilarity. Advanced Internet Technologies, SS
37 Stochastical Self-Similarity So far, we examined exact self-similarity: A pattern is reproduced exactly at different scales Data traffic is a stochastic process, therefore we talk about statistical self-similarity. For a stochastic process, we say that the statistics of the process do not change with the change in the time scale. The average behavior of the process in the short-term is the same as it is in the long term. Examples Data traffic Earthquakes Ocean waves Fluctuations in the stock market Advanced Internet Technologies, SS
38 Self-Similar Stochastic Process Advanced Internet Technologies, SS
39 Examples of Self-Similar Data Traffic Ethernet Traffic W. Leland, M. Taqqu, W. Willinger: On the Self-Similar Nature of Ethernet Traffic. Proceedings of the SIGCOMM 93, September World-Wide Web Traffic M. Crovella, A. Bestavros: Self-Similarity in World-Wide Web Traffic: Evidence and Possible Causes. Proceedings of the ACL Sigmetrics Conference on Measurement and Modeling of Computer Systems, May Signaling System Number 7 (SS7) Traffic D. Duffy, A. McIntosh, M. Rosenstein, W. Willinger: Statistical Analysis of CCSN/SS7 Traffic from Working CCS Subnetworks. IEEE Journal on Selected Areas in Communication, April TCP, FTP, and TELNET Traffic V. Paxson, S. Floyd: Wide Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking, June Variable-Bit-Rate (VBR) Video M. Garnett, W. Willinger: Analysis, Modeling, and Generation of Self-Similar VBR Video Traffic. Proceedings of the SIGCOMM 94, August Advanced Internet Technologies, SS
40 Performance Implications Ethernet Traffic Advanced Internet Technologies, SS
41 Storage Model with Self-Similar Input Buffer requirement q = ρ (1 ρ) 1/ 2(1 H ) H /(1 H ) For H = 0.5, this relationship simplifies to q = ρ/(1- ρ), which is the classic queuing result of a system with exponential interarrival times and exponential service times (M/M/1). Hurst parameter H defines the degree of self-similarity, i.e. the higher the parameter H, the higher the self-similarity. Advanced Internet Technologies, SS
42 Storage Model with Self-Similar Input II Advanced Internet Technologies, SS
Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012
Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing
More informationIntroduction to Queuing Systems
Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationSelf Similar Network Traffic present by Carl Minton. Definition of Self Similarity
Self Similar Network Traffic present by Carl Minton Agenda Definition of self similarity Quantifying self similarity Self similarity of network traffic Implications for network performance Pointers for
More informationQueueing Networks. Lund University /
Queueing Networks Queueing Networks - Definition A queueing network is a network of nodes in which each node is a queue The output of one queue is connected to the input of another queue We will only consider
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationAnalytic Performance Models for Bounded Queueing Systems
Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,
More informationCongestion Propagation among Routers in the Internet
Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,
More informationActive Queue Management for Self-Similar Network Traffic
Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir
More informationAnalysis of Random Access Protocol under Bursty Traffic
Analysis of Random Access Protocol under Bursty Traffic Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles, CA 90095 {jbgao, rubin}@ee.ucla.edu Abstract.
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationBuffer Management for Self-Similar Network Traffic
Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering
More informationApplication of QNA to analyze the Queueing Network Mobility Model of MANET
1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:
More informationModel suitable for virtual circuit networks
. The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in
More informationNetwork Traffic Characterisation
Modeling Modeling Theory Outline 1 2 The Problem Assumptions 3 Standard Car Model The Packet Train Model The Self - Similar Model 4 Random Variables and Stochastic Processes The Poisson and Exponential
More informationSimulation Studies of the Basic Packet Routing Problem
Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using
More informationM/G/c/K PERFORMANCE MODELS
M/G/c/K PERFORMANCE MODELS J. MacGregor Smith Department of Mechanical and Industrial Engineering, University of Massachusetts Amherst, Massachusetts 01003 e-mail: jmsmith@ecs.umass.edu Abstract Multi-server
More informationFundamentals of Queueing Models
Fundamentals of Queueing Models Michela Meo Maurizio M. Munafò Michela.Meo@polito.it Maurizio.Munafo@polito.it TLC Network Group - Politecnico di Torino 1 Modeling a TLC network Modelization and simulation
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationTELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh
TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills
More informationIEEE Broadband Wireless Access Working Group <
Project IEEE 802.16 Broadband Wireless Access Working Group Title 4IPP Traffic Model for IEEE 802.16.3 Date Submitted Source(s) 2000-10-31 C. R. Baugh, Ph.D. Harris Communications,
More informationOn the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System
Proceedings of the 2th International Conference on Distributed Computing Systems (ICDCS 2). On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System Peerapol Tinnakornsrisuphap,
More informationUNIT 4: QUEUEING MODELS
UNIT 4: QUEUEING MODELS 4.1 Characteristics of Queueing System The key element s of queuing system are the customer and servers. Term Customer: Can refer to people, trucks, mechanics, airplanes or anything
More informationSIMULATING CDPD NETWORKS USING OPNET
SIMULATING CDPD NETWORKS USING OPNET Michael Jiang, Stephen Hardy, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia Canada V5A 1S6 {zjiang, steve,
More informationCharacterizing Internet Load as a Non-regular Multiplex of TCP Streams
Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es
More informationUCLA Computer Science. Department. Off Campus Gateway. Department. UCLA FDDI Backbone. Servers. Traffic Measurement Connection
Contradictory Relationship between Hurst Parameter and Queueing Performance Ronn Ritke, Xiaoyan Hong and Mario Gerla UCLA { Computer Science Department, 45 Hilgard Ave., Los Angeles, CA 924 ritke@cs.ucla.edu,
More informationSIMULATING CDPD NETWORKS USING OPNET
Michael Jiang Stephen Hardy Ljiljana Trajkovic SIMULATING CDPD NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road Map Introduction Simulation
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationTraffic Modeling of Communication Networks
EÖTVÖS LORÁND UNIVERSITY, BUDAPEST Traffic Modeling of Communication Networks PÉTER VADERNA THESES OF PHD DISSERTATION Doctoral School: Physics Director: Prof. Zalán Horváth Doctoral Program: Statistical
More informationStream Sessions: Stochastic Analysis
Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds
More informationSELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN
SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum Faculty Of Mathematical Sciences hudaalhajj@yahoo.com The
More informationStochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego
Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego http://www.math.ucsd.edu/~williams 1 OUTLINE! What is a Stochastic Processing Network?! Applications!
More informationQueuing Networks Modeling Virtual Laboratory
Queuing Networks Modeling Virtual Laboratory Dr. S. Dharmaraja Department of Mathematics IIT Delhi http://web.iitd.ac.in/~dharmar Queues Notes 1 1 Outline Introduction Simple Queues Performance Measures
More informationTeletraffic theory I: Queuing theory
Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five
More informationQueuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1
Queuing Networks Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queuing Networks - Renato Lo Cigno 1 Moving between Queues Queuing Networks - Renato Lo Cigno - Interconnecting Queues 2 Moving
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More information3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2)
Contents Model for telephone traffic Packet level model for data traffic Flow level model for elastic data traffic Flow level model for streaming data traffic lect03.ppt S-38.45 - Introduction to Teletraffic
More informationTeletraffic theory (for beginners)
Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationModelling data networks research summary and modelling tools
Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at
More informationA PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING
A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer
More informationSENSITIVITY OF OUTPUT PERFORMANCE MEASURES TO INPUT DISTRIBUTIONS IN QUEUEING NETWORK MODELING. Donald Gross Denise M.
Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. SENSITIVITY OF OUTPUT PERFORMANCE MEASURES TO INPUT DISTRIBUTIONS IN QUEUEING NETWORK
More informationInternational Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,
More informationEC1009 HIGH SPEED NETWORKS UNIT - I HIGH SPEED NETWORKS
SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING EC1009 HIGH SPEED NETWORKS
More informationPerformance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic
Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad
More information048866: Packet Switch Architectures
048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationROORKEE COLLEGE OF ENGINEERING
ROORKEE COLLEGE OF ENGINEERING OPERATIONS RESEARCH LECTURE NOTES RAHUL BHARTI Assistant Professor RCE, ROORKEE Introduction The mathematical models which tells to optimise (minimize or maximise) the objective
More informationThis formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go
Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet
More informationA SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC. Yunkai Zhou and Harish Sethu
Proceedings of the IEEE Workshop on Statistical Signal and Array Processing Pocono Manor, Pennsylvania, USA, August 14 16, 2000 A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES
More informationPerspectives on Network Calculus No Free Lunch but Still Good Value
ACM Sigcomm 2012 Perspectives on Network Calculus No Free Lunch but Still Good Value Florin Ciucu T-Labs / TU Berlin Jens Schmitt TU Kaiserslautern Outline Network Calculus (NC): A Theory for System Performance
More informationQueuing Systems. Computer Exercise 2. Loss Systems and Queuing Networks
Queuing Systems Computer Exercise 2 Loss Systems and Queuing Networks 1 Instructions To be able to understand the computer exercise and to complete it within the given time limits, you have to prepare
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS
ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS JUAN CARLOS ARAGON SUMMIT STANFORD UNIVERSITY TABLE OF CONTENTS 1.
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master
More informationCOPYRIGHTED MATERIAL. Introduction. Chapter 1
Chapter 1 Introduction Performance Analysis, Queuing Theory, Large Deviations. Performance analysis of communication networks is the branch of applied probability that deals with the evaluation of the
More informationImproving VoD System Efficiency with Multicast and Caching
Improving VoD System Efficiency with Multicast and Caching Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 1. Introduction 2. Previous Works 3. UVoD
More informationTime-Step Network Simulation
Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationVisualization of Internet Traffic Features
Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationCover sheet for Assignment 3
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationLecture 14: M/G/1 Queueing System with Priority
Lecture 14: M/G/1 Queueing System with Priority Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE723: Telephony. Priority Queueing Systems Until the moment, we assumed identical
More informationDynamics of Feedback-induced Packet Delay in Power-law Networks
Dynamics of Feedback-induced Packet Delay in Power-law Networks Takahiro Hirayama, Shin ichi Arakawa, Ken-ichi Arai, and Masayuki Murata Graduate School of Information Science and Technology Osaka University,
More informationIP Traffic Characterization for Planning and Control
IP Traffic Characterization for Planning and Control V. Bolotin, J. Coombs-Reyes 1, D. Heyman, Y. Levy and D. Liu AT&T Labs, 200 Laurel Avenue, Middletown, NJ 07748, U.S.A. IP traffic modeling and engineering
More informationA Comparative Approach to Reduce the Waiting Time Using Queuing Theory in Cloud Computing Environment
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 469-474 International Research Publications House http://www. irphouse.com /ijict.htm A Comparative
More informationDDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing
DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,
More information2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring
lect02.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2005 1 Contents Traffic characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow
More informationA VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR.
UNIVERSITY OF LJUBLJANA Faculty of Electrical Engineering Daniel Alonso Martinez A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. Erasmus exchange project
More informationETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.
ETSN01 Exam August 22nd 2015 8am 1pm Instructions Clearly label each page you hand in with your name and the page number in the bottom right hand corner. Materials allowed: calculator, writing material.
More informationDimensioning Links for IP Telephony
Dimensioning Links for IP Telephony Ian Marsh (SICS/KTH) Bengt Ahlgren, Anders Andersson (SICS) Olof Hagsand (Dynarc) ianm@sics.se Columbia University, USA Monday 2nd April, 2001 http://www.sics.se/ ianm/talks/columbia.
More informationA model for Endpoint Admission Control Based on Packet Loss
A model for Endpoint Admission Control Based on Packet Loss Ignacio Más and Gunnar Karlsson ACCESS Linneaus Center School of Electrical Engineering KTH, Royal Institute of Technology 44 Stockholm, Sweden
More informationIntroduction to Performance Engineering and Modeling
Introduction to Performance Engineering and Modeling Dr. Michele Mazzucco Software Engineering Group Michele.Mazzucco@ut.ee http://math.ut.ee/~mazzucco What is Performance Engineering? Whether you design,
More informationData Network Protocol Analysis & Simulation
Module Details Title: Long Title: Data Network PENDING APPROVAL Data Network Module Code: EE509 Credits: 7.5 NFQ Level: 9 Field of Study: Electronic Engineering Valid From: 2017/18 (Sep 2017) Module Delivered
More informationRandom Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks
Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail
More informationTable 9.1 Types of Scheduling
Table 9.1 Types of Scheduling Long-term scheduling Medium-term scheduling Short-term scheduling I/O scheduling The decision to add to the pool of processes to be executed The decision to add to the number
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationAlgorithm Development for Measurement and Prediction the Traffic in Broad Band Integrated Service Networks
Journal of Computer Science 6 (10): 1164-1169, 2010 ISSN 1549-3636 2010 Science Publications Algorithm Development for Measurement and Prediction the Traffic in Broad Band Integrated Service Networks Mohammad
More informationChapters 1, 2 & 3: A Brief Introduction. Barry L. Nelson Northwestern University July 2017
Chapters 1, 2 & 3: A Brief Introduction Barry L. Nelson Northwestern University July 2017 1 Why do we simulate? We typically choose to simulate a dynamic, stochastic system when the performance measure
More informationWhy is scheduling so difficult?
Queueing Page 1 Why is scheduling so difficult? Wednesday, November 8, 2017 7:35 AM Scheduling is a matter of great controversy. Should it be fair? (O(log n)) Should it instead be fast? (O(1)) As well,
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationWeb application performance
Web application performance A Lecture for LinuxDays 2017 by Ing. Tomáš Vondra Cloud Architect at Capacity planning Marketing gives you: estimate of the number of customers and its trend > You need to translate
More informationPARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS
THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:
More informationClass-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informationVoice and Data Session Capacity over Local Area Networks
Voice and ata Session Capacity over Local Area Networks Theresa A. Fry, Ikhlaq Sidhu, Guido Schuster, and Jerry Mahler epartment of Electrical and Computer Engineering Northwestern University, Evanston,
More information136 Proceedings of the rd International Teletraffic Congress (ITC 2011)
Gaussian Approximation of CDN Call Level Traffic Andrzej Bak and Piotr Gajowniczek Institute of Telecommunications Warsaw University of Technology Nowowiejska 5/9, -665 Warsaw, Poland Email: bak@tele.pw.edu.pl
More informationUtilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns
Utilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns Homayoun Yousefi zadeh; EECS Dept; UC, Irvine Edmond A. Jonckheere; EE-Systems Dept; USC John A. Silvester; EE-Systems
More informationKernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract
1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined
More informationCross Clock-Domain TDM Virtual Circuits for Networks on Chips
Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm
More informationLoad Balancing with Minimal Flow Remapping for Network Processors
Load Balancing with Minimal Flow Remapping for Network Processors Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,
More informationPerformance Modeling of Proxy Cache Servers
Journal of Universal Computer Science, vol. 2, no. 9 (2006), 39-53 submitted: 3/2/05, accepted: 2/5/06, appeared: 28/9/06 J.UCS Performance Modeling of Proxy Cache Servers Tamás Bérczes, János Sztrik (Department
More informationLecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool
SMA6304 M2 ---Factory Planning and scheduling Lecture Discrete Event of Manufacturing Systems Simulation Sivakumar AI Lecture: 12 copyright 2002 Sivakumar 1 Simulation Simulation - A Predictive Tool Next
More informationAn Enhanced Dynamic Packet Buffer Management
An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared
More informationMean Value Analysis and Related Techniques
Mean Value Analysis and Related Techniques 34-1 Overview 1. Analysis of Open Queueing Networks 2. Mean-Value Analysis 3. Approximate MVA 4. Balanced Job Bounds 34-2 Analysis of Open Queueing Networks Used
More informationA multichannel Ethernet protocol for a WDM local area star network
A multichannel Ethernet protocol for a WDM local area star network D. Rodellar, C. Bungarzeanu, H. Garcia, C. Brisson, A. Küng, Ph. Robert Telecommunications Laboratory (1), Metrology Laboratory Swiss
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationEP2200 Queueing theory and teletraffic systems
EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's
More informationTitle: Proposed modifications to Performance Testing Baseline: Throughput and Latency Metrics
1 ATM Forum Document Number: ATM_Forum/97-0426. Title: Proposed modifications to Performance Testing Baseline: Throughput and Latency Metrics Abstract: This revised text of the baseline includes better
More informationThe Failure of TCP in High-Performance Computational Grids
The Failure of TCP in High-Performance Computational Grids W. Feng and P. Tinnakornsrisuphap feng@lanl.gov, tinnakor@cae.wisc.edu Research & Development in Advanced Network Technology (RADIANT) P.O. Box
More information