Application of Network Calculus to the TSN Problem Space

Similar documents
T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd

Generalization of the RIN Result to Heterogeneous Networks of Aggregate Schedulers and Leaky Bucket Constrained Flows

The effect of per-input shapers on the delay bound in networks with aggregate scheduling

Network Model for Delay-Sensitive Traffic

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management

Stochastic upper bounds for heterogeneous flows using a Static Priority Queueing on an AFDX network

Analysis and modeling of asynchronous traffic shaping in time sensitive networks

Unit 2 Packet Switching Networks - II

Network Working Group

Worst-case Ethernet Network Latency for Shaped Sources

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY Application of Network Calculus to Guaranteed Service Networks

1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE

STOCHASTIC NETWORK CALCULUS FOR END-TO-END DELAY EVALUATION OF AVIONICS MULTI-HOP VIRTUAL LINKS

Lecture Outline. Bag of Tricks

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Lecture 5: Performance Analysis I

Advanced Computer Networks

Worst-Case Delay Analysis of Master-Slave Switched Ethernet Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Ultra-Low Latency Shaper

Network Support for Multimedia

Fundamental Trade-offs in Aggregate Packet Scheduling

IEEE Time-Sensitive Networking (TSN)

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Improving QOS in IP Networks. Principles for QOS Guarantees

Quality of Service (QoS)

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

Speeding up Transaction-oriented Communications in the Internet

QUALITY of SERVICE. Introduction

Stateless Resource Sharing AND ATS

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

A Min, + System Theory for Constrained Traffic Regulation and Dynamic Service Guarantees

A. Charny Delay Bounds In a Network with Aggregate Scheduling. Draft Version 4. 2/29/00. Delay Bounds In a Network With Aggregate Scheduling 1

Michael Johas Teener. April 11, 2008

An Efficient Implementation of Burst Fair Queuing for ATM Networking

Shuangyin Ren, Quanyou Feng, Yu Wang, and Wenhua Dou

Experimental evaluation of end-to-end delay in switched Ethernet application in the automotive domain

Congestion Control Open Loop

EP2210 Scheduling. Lecture material:

Robustness for Control-Data-Traffic in Time Sensitive Networks

Comparison of Shaping and Buffering for Video Transmission

Stream Sessions: Stochastic Analysis

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline

Fundamental Trade-Offs in Aggregate Packet Scheduling

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

Perspectives on Network Calculus No Free Lunch but Still Good Value

Master Course Computer Networks IN2097

Time-Sensitive Networking (TSN) How the additional value will meet your requirements

Master Course Computer Networks IN2097

Mohammad Hossein Manshaei 1393

Real-Time Protocol (RTP)

Queueing Delays in Rate Controlled ATM Networks

Alternative titles/subtitles

Insights on the performance and configuration of AVB and TSN in automotive applications

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Instability of FIFO at Arbitrarily Low Rates in the Adversarial Queueing Model

Impact of Traffic Aggregation on Network Capacity and Quality of Service

Admission Control Framework to Provide Guaranteed Delay in Error-Prone Wireless Channel

Real-time Performance Evaluation of Line Topology Switched Ethernet

Nested QoS: Providing Flexible Performance in Shared IO Environment

of-service Support on the Internet

048866: Packet Switch Architectures

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Week 7: Traffic Models and QoS

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Frame Relay. Frame Relay: characteristics

Urgency Based Scheduler Scalability - How many Queues?!

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

END-TO-END estimation of the spare capacity along a network

Why an additional Shaper

Analysis of IP-based Real-Time In-Car Networks with Network Calculus Revsbech, Kasper; Nielsen, Jimmy Jessen; Harritsø, Kevin; Steffen, Rainer

AVB Latency Math. v5 Nov, AVB Face to Face Dallas, TX Don Pannell -

QoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology

Proposal for a Resource Allocation Protocol based on 802.1CS LRP

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

On the Use of Greedy Shapers in Real-Time Embedded Systems

THE DELAY COMPOSITION THEOREM ON PIPELINE SYSTEMS WITH NON-PREEMPTIVE PRIORITY VARYING SCHEDULING ALGORITHMS YI LU THESIS

Formal Modeling and Analysis of Stream Processing Systems

Insights into the performance and configuration of TCP in Automotive Ethernet Networks

Differentiated Services

3. Quality of Service

PERFORMANCE COMPARISON OF TRADITIONAL SCHEDULERS IN DIFFSERV ARCHITECTURE USING NS

Worst-case end-to-end delay analysis of an avionics AFDX network

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

On the Necessity of Traffic Shaping for PMU Measurement Data Streams

Quality of Service (QoS)

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Stream Filtering and Policing for Industrial Control Applications

Formal Modeling and Analysis of Stream Processing Systems

Internet Services & Protocols. Quality of Service Architecture

Announcements. Quality of Service (QoS) Goals of Today s Lecture. Scheduling. Link Scheduling: FIFO. Link Scheduling: Strict Priority

Scheduling Algorithms to Minimize Session Delays

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

Packet Scheduling and QoS

Formal Timing Analysis of Ethernet AVB for Industrial Automation

Ethernet TSN as Enabling Technology for ADAS and Automated Driving Systems

Transcription:

Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch 3 IP Parallel Redundancy Protocol https://github.com/lca2 EPFL/iprp

What is Network Calculus? A theory and tools to compute bounds on queuing delays, buffers, burstiness of flows, etc C.S. Chang, R. Cruz, JY Le Boudec, P. Thiran, For deterministic networking, per flow and perclass queuing, asynchronous traffic Derive system equations formal proofs 2

Arrival Curve For a flow, at an observation point Flow is constrained by arrival curve iff the amount of basic data units (e.g. bytes) observed in any interval of duration is token bucket with rate burst : and token bucket + peak rate : and MTU bytes bytes time interval time interval 3

Service Curve Network Element amount of basic data units observed in Network element offers to this flow a service curve if 4

Service Curve Example Rate latency service curve : Models many schedulers: DRR, PGPS, RFC 2212, etc. Example: service received by a high priority flow (no pre emption): line rate of low priority packets bytes (e.g. max 0, for some s beginning of busy period) 5

Service Curve Example: Non Pre emptive Priority One server of rate, two priorities Every high priority flow is leaky bucket controlled Let Then if the aggregate of all low priority flows receives a ratelatency service curve with [Le Boudec and Thiran 2001, Section 1.3] 6

Service Curve Example: AVB / CBS The aggregate of all flows (streams) served in one server as AVB class A receives a rate latency service curve with, Similar results for class B [Ruiz Boyer 2014] = idle slope, = send slope, = max packet size other than class A 7

Basic Results: 3 Tight Bounds Service curve Flow is constrained by arrival curve ; served in network element with service curve. Then bytes,, 1. backlog 2. if FIFO per flow, delay 3. output is constrained by arrival curve 8

Example One flow, constrained by one token bucket is served in a network element that offers a rate latency service curve Assume,, Backlog bound: Delay bound: Output arrival curve: with (burstiness is increased by ) 9

Concatenation Service curve Service curve A flow is served in series, network element offers service curve. The concatenation offers the service curve defined by 10

Min Plus Convolution This operation is called min plus convolution. It has the same nice properties as usual convolution; e.g. It can be computed easily: e.g. min, 11

Pay Bursts Only Once one flow constrained at source by 1 2 end to end delay bound computed node by node (also accounting for increased burstiness at node 2): computed by concatenation: i.e. worst cases cannot happen simultaneously concatenation captures this! 12

Shapers size leak with rate shaper Burstiness increases as flows traverse network elements Shapers are used to reduce burstiness Example: leaky bucket shaper releases a packet only if there is space to put an equivalent amount of fluid into bucket 13

The Mathematics of Per Flow Shapers fresh traffic shaper For leaky bucket flow shaper min plus equation: max plus equation arrival time of packet, departure time (at shaper) total nb of bytes seen on arrival at shaper in 0,, seen on departure 14

Per Flow Re Shaping is For Free Per flow re shaping does not increase worst case end to end delay (per flow = (TSN) per stream) fresh traffic shaper constrained by same end to end delay bound with or without shaper 15

Per Class Networks A set of flows, each constrained by leaky bucket are aggregated into one class; At one node, this class receives a rate latency service curve priority node, DRR, AVB, CBS). FIFO inside the class; (e.g. delay bound for any packet of any flow in : backlog bound for the aggregate of whole : output arrival curve for flow is leaky bucket with [Le Boudec Thiran 2001, Section 6.4] 16

Cascading Burstiness Unlike in a per flow network, in a per class network with FIFO inside every class, burstiness of every flow increases at every hop as a function of other flows burstiness: Increased burstiness causes increased burstiness (cascade). Good delay bounds depend on the topology and on the number of hops. In non tree topologies, delay bounds are generally bad even at low utilizations and small numbers of hop. [Bennett et al 2002] 17

Avoiding Cascading Burstiness in Per Class Networks Solution 1: re shape every flow at every hop (per flow shaping) Solves the problem but defeats the purpose of per class network. Solution 2: Interleaved shaper FIFO queue of all packets of all flows in class packet at head of queue is examined versus arrival curve of its flow; this packet is delayed if it came too early packets not at head of queue wait for their turn to come [Fecht Samii 2016] 18

Network With Interleaved Shaper [Fecht Samii 2016] Interleaved Shaper Output of interleaved shaper is shaped per flow delay bound at next server is controlled no cascading One interleaved shaper per class and per input Question: what is the delay due to interleaved shaper? 19

Interleaved Shaping Does Not Increase Worst Case Delay FIFO System Interleaved Shaper arrival time of packet (numbered in arrival order) Every flow is shaped before input to with parameters Output of is fed to interleaved shaper with parameters for flow Theorem: [Proof in appendix] 20

Implications for TSN Worst case end to end queuing delay can ignore interleaved shapers. Delay bound at one interleaved shaper is absorbed by delay at previous hop Queuing delay at every hop (without shaper) can be computed with e.g. by where is rate latency service curve allocated to the class and is the sum of burstiness enforced by the interleaved shaper at this node. Worst case delay at one node cannot ignore interleaved shaper. Worst case end to end delay is generally less than sum of perhop delays. 21

Network Calculus can Conclusions help understand some physical properties of deterministic networks (e.g. pay bursts only once, per flow reshaping does not increase end to end delay bound, interleaved shaper can delay can be ignored) provide formal guarantees on extreme delays that are hard to reach by simulation or by ad hoc analysis, provide a simple language to abstract a node without prescribing an implementation. 22

Future Work? Obtain service curve characterization of TSN/other schedulers and shapers. Formally prove end to end bounds. Quantify of improvement to end to end delay bounds by exporting service curves instead of per node delay bounds. Explore implications for path computation and setup (distributed, centralized). Propose and test abstract node models. 23

References Textbook: [Le Boudec Thiran 2001] Le Boudec, Jean Yves, and Patrick Thiran. Network calculus: a theory of deterministic queuing systems for the internet. Vol. 2050. Springer Science & Business Media, 2001, legally and freely available online at http://ica1www.epfl.ch/ps_files/netcal.htm Ultra short tutorial: [Le Boudec Thiran 2000] Le Boudec, J Y., and Patrick Thiran. "A short tutorial on network calculus. I. Fundamental bounds in communication networks." Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on. Vol. 4. IEEE, 2000, also at http://www.cse.cuhk.edu.hk/~cslui/csc6480/nc_intro1.pdf Path Computation [Frangioni et al 2014] Frangioni, A., Galli, L., & Stea, G. (2014). Optimal joint path computation and rate allocation for real time traffic. The Computer Journal, 58(6), 1416 1430. Per flow networks [Bennett et al 2002] Bennett, J.C., Benson, K., Charny, A., Courtney, W.F. and Le Boudec, J.Y., 2002. Delay jitter bounds and packet scale rate guarantee for expedited forwarding. IEEE/ACM Transactions on Networking (TON), 10(4), pp.529 540. 24

References Automotive: [Queck 2012] Queck, Rene. "Analysis of ethernet avb for automotive networks using network calculus." Vehicular Electronics and Safety (ICVES), 2012 IEEE International Conference on. IEEE, 2012. Worst case bounds for class based queuing: [Bondorf et al, 2017], Bondorf, Steffen, Paul Nikolaus, and Jens B. Schmitt. "Quality and Cost of Deterministic Network Calculus: Design and Evaluation of an Accurate and Fast Analysis." Proceedings of the ACM on Measurement and Analysis of Computing Systems 1.1 (2017) and arxiv:1603.02094v3 AVB [Ruiz Boyer 2014 ] Ruiz, J.A. and Boyer, M., 2014, October. Complete modelling of AVB in network calculus framework. In Proceedings of the 22nd International Conference on Real Time Networks and Systems (p. 55). TSN [Specht Samii 2016] Specht, J. and Samii, S., 2016, July. Urgency based scheduler for time sensitive switched ethernet networks. In Real Time Systems (ECRTS), 2016 28th Euromicro Conference on (pp. 75 85). IEEE. 25

Proof of Theorem 1 The interleaved shaper releases packet at time max,,, where is the earliest possible time allowed by the leaky bucket constraints (see Eq. (2)): max with:,,, indices of packets of flow in the global packet sequence and flow of packet. Using the operator notation for maximum, this gives 3 Call the worst case delay at FIFO system and prove by induction on that. Obviously this holds for 1(first packet is not delayed by shaper). Now assume for. We will prove that every terms in right handside of 3 is. 26

the first term is ; by definition of the second term is ; by induction hypothesis; furthermore, by definition of the arrival times ; thus the third and following terms are of the form ; now by induction hypothesis. Furthermore, the input to system is leaky bucket constrained per flow. Thus (by Eq (2)): It follows that the third term is QED 27