Read Chapter 4 of Kurose-Ross

Similar documents
HW3 and Quiz. P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) TCP), 20 mins

CS 3516: Advanced Computer Networks

Chapter 4 Network Layer

CS 3516: Computer Networks

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

Lecture 5: Performance Analysis I

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane

Teletraffic theory (for beginners)

Äriprotsesside modelleerimine ja automatiseerimine Loeng 9 Järjekorrateooria ja äriprotsessid. Enn Õunapuu

Introduction to Queuing Systems

Computer Networks. Instructor: Niklas Carlsson

CSE 3214: Computer Network Protocols and Applications Network Layer

Digital Communication Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

The Network Layer and Routers

CMSC 332 Computer Networks Network Layer

Key Network-Layer Functions

Lecture 8. Network Layer (cont d) Network Layer 1-1

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Topic 4a Router Operation and Scheduling. Ch4: Network Layer: The Data Plane. Computer Networking: A Top Down Approach

Network Traffic Characterisation

Chapter 4 Network Layer: The Data Plane

Lecture 3. The Network Layer (cont d) Network Layer 1-1

JAMES F. KUROSE AND KEITH W. ROSS

Lecture 16: Network Layer Overview, Internet Protocol

CSC 401 Data and Computer Communications Networks

Queuing Networks Modeling Virtual Laboratory

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4

Computer Networking. Introduction. Quintin jean-noël Grenoble university

CSCI Computer Networks Fall 2016

Network layer overview

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Data Networks. Lecture 1: Introduction. September 4, 2008

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

internet technologies and standards

internet technologies and standards

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

CSCE 463/612 Networks and Distributed Processing Spring 2018

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Application. Transport. Network. Link. Physical

2. Traffic. Contents. Offered vs. carried traffic. Characterisation of carried traffic

Teletraffic theory I: Queuing theory

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCD 330 Network Programming

CS 3516: Computer Networks

Data Network Protocol Analysis & Simulation

CSCE 463/612 Networks and Distributed Processing Spring 2018

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Chapter 4: Network Layer

Chapter 4 Network Layer

Äriprotsesside modelleerimine ja automatiseerimine Loeng 8 Järjekorrateooria ja äriprotsessid. Enn Õunapuu

Point-to-Point Network Switching. Computer Networks Term B10

TDTS06: computer Networks

COMP211 Chapter 4 Network Layer: The Data Plane

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Week 7: Traffic Models and QoS

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

Unit 2 Packet Switching Networks - II

Last time. BGP policy. Broadcast / multicast routing. Link virtualization. Spanning trees. Reverse path forwarding, pruning Tunneling

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga

Chapter 4 Network Layer

Data & Computer Communication

Chapter 4 Network Layer

CSC 4900 Computer Networks: Network Layer

UNIT 2 TRANSPORT LAYER

Faculty of Science and IT Course title. Pre-requisite/corequisite

CS343: Data Communication Switched Communication Network

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

UNIT 4: QUEUEING MODELS

Time-Step Network Simulation

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 3 Transport Layer

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Inter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

CS 3516: Computer Networks

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

Resource Allocation and Queuing Theory

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Internet Architecture and Protocol

Model suitable for virtual circuit networks

ECE 333: Introduction to Communication Networks Fall 2001

Chapter 4 Network Layer

Network Layer: Control/data plane, addressing, routers

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Lecture 7. Network Layer. Network Layer 1-1

Queueing Networks. Lund University /

Chapter 4: Network Layer. Lecture 12 Internet Routing Protocols. Chapter goals: understand principles behind network layer services:

EEC-484/584 Computer Networks

UNIT IV -- TRANSPORT LAYER

===================================================================== Exercises =====================================================================

CSCE 463/612 Networks and Distributed Processing Spring 2017

EP2200 Queueing theory and teletraffic systems

Transcription:

CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures are repeated, with permission, from Computer Networks, 2nd through 4th Editions, by A. S. Tanenbaum, Prentice Hall. Some figures are repeated from an OPNET Technologies presentation by Dmitri Bertsekas and course notes from Rutgers University. The remainder of the materials were developed by Philip McKinley and Dennis Phillips at Michigan State University Assignment: Read Chapter 4 of Kurose-Ross Transport Layer 1

Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing, ICMP, NAT) Ipv6 Routing in the Internet Autonomous Systems Routing protocols (RIP, OSPF, BGP) Network layer deliver segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer layer protocols in every host, router router examines header fields in all IP datagrams passing through it application transport application transport 2

Two Key Network-Layer Functions routing: determine route taken by packets from source to destination Distributed routing in the Internet Could also be centralized (drawbacks?) forwarding: move packets from router s input to appropriate router output Interplay between routing and forwarding routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 2 2 1 value in arriving packet s header 0111 3 2 1 3

Network layer connection and connection-less service Flavors of service datagram provides -layer connectionless service (e.g., IP) virtual circuit (such as ATM) provided -layer connection service analogous to the transport-layer services UDP and TCP, but: service: host-to-host no choice: provides one or the other implementation: in core, not on hosts A quick word about ATM Asynchronous Transfer Mode started in late 1980s attempt to merge telecom and computer s Based on virtual circuit packet switching reserve the route between source and destination do not reserve capacity All data broken into tiny, fixed size packets these ATM cells were only 53 bytes long (!) virtual circuit identifiers (not full destination addresses) in cell headers used to switch data streams through the 4

ATM Discussion Why small, fixed-size packets? Advantages of ATM? Disadvantages? So, what happened to ATM? Currently dominating: Datagrams no call setup at layer routers: no state about end-to-end connections no -level concept of connection packets forwarded using destination host address packets between same source-dest pair may take different paths application transport 1. Send data 2. Receive data application transport 5

Datagram Issues Since capacity is not reserved, datagrams compete for resources: Communication links Router buffers Bursty traffic creates periods of high and low demand, resulting in queueing of datagrams at routers. Performance depends on complex interactions. Advent of packet switching produced need to: analyze performance of existing s predict performance of new designs Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing, ICMP, NAT) Ipv6 Routing in the Internet Autonomous Systems Routing protocols (RIP, OSPF, BGP) 6

Brief Review of Queueing Theory Definition: Any system in which arrivals place demands upon a finite-capacity resource may be termed a queueing system. Applications of Queueing Theory analysis of computer s telephone switching systems customer service centers automobile traffic control almost any application involving entities waiting for and receiving service For studying computer s View as collections of queues First-in, first-out (FIFO) data structures Queueing theory provides probabilistic analysis of these queues Examples: Average queue length Average waiting (and service) time Probability that queue is at a certain length Probability of queue overflow (packets will be dropped) 7

References: Definitive text on queueing theory: Kleinrock, Queueing Systems, Volume I: Theory, John Wiley, New York, 1975. Little s Law Parameters and metrics N -average number of customers in the system (basically, queue size plus customer currently being serviced) T -average delay per customer (time that the customer waits plus time that customer is serviced) - average customer arrival rate 8

Little s Law Relationship: Proof A customer arrives at the queue After a period of time T (average), the customer is at the front of the queue How many new customers have queued behind this one? Examples Example 1 Meijer at 5:30 p.m. N =6, =0.33 Example 2 Meijer at 1:00 a.m. N =0.25, =0.1 9

Networking Example Arrival of packet at a router is 2000 pps Average time in the router 6 ms. Average number of packets in router? Summary System Arrivals Departures Little s Law: Mean number tasks in system = mean arrival rate x mean response time Observed for centuries, Little was first to prove Applies to any queueing system in equilibrium, as long as nothing in black box is creating or destroying tasks 10

Packet Queueing If arrivals are regular or sufficiently spaced apart, no queueing delay occurs Regular Traffic Irregular but Spaced Apart Traffic Burstiness causes interference Note that the departures are less bursty 11

Burstiness Example Same packet rate, different burstiness Length variation Length variation also causes interference and, hence, delays Queueing Delays 12

Traffic volume High utilization exacerbates interference and leads to more queueing Queueing Delays Bottlenecks Types of bottlenecks At entry points At routers within the core Bottlenecks result from overloads caused by: High load sessions, or Convergence of sufficient number of moderate load sessions at the same queue 13

Analysis How to capture the randomness associated with: Packet volume? Packet arrival patterns? Packet lengths? Little s Law is useful for analyzing an existing system, but designing a new system (e.g., a router) requires deeper analysis. Example: how many buffers are needed, given expected traffic patterns and loads? Stochastic Processes Definition: A random variable is a variable value depends on the outcome of a random experiment For each outcome ω of an experiment, we associate a real number X(ω), X(ω) is the value the random variable takes on when the experimental outcome is ω. Example: payoffs for various rolls of dice Definition: A stochastic process is a function of time X(t, ω), usually written as simply X(t) values are random variables can be discrete or continuous 14

Examples Dow Jones closing averages. Number of cars that have pulled into Meijer s parking lot by time t. Number of packets generated by a host by time t. Number of packets arriving at a router by time t. Poisson Processes Definition: A stochastic process {A(t) t > 0} taking on nonnegative integer values is said to be a Poisson process with rate if A(t) is a counting process that represents the total number of arrivals that have occurred from 0 to time t. The numbers of arrivals that occur in disjoint time intervals are independent. The number of arrivals in any interval of length is Poisson distributed with parameter P {A(t + ) A(t) = n} = for n =0, 1, 2,... 15

Example Customers join Meijer s checkout lane with an average arrival rate of one customer every 2 minutes. What is the probability that exactly 2 customers join the queue in a period of 5 minutes? What is the probability that no customers join the queue in this time? Poisson Process Properties Interarrival times are independent and exponentially distributed with parameter P{ n t} = 1 e t, t 0 Why? Graph? 16

Different values of Probability that interarrival time is less than t (x axis) 1 e t time (t) Example Assume that phone call times are exponentially distributed about some mean 1/λ, that is, P{call duration t} = 1 e t 1/λ = mean length of a call. Why? Suppose 1/λ = 2 minutes, so λ = 0.5/min P{call duration 2 minutes} = 1 e -0.5*2 = 0.632 Hmm. Not 0.5? P{call duration 10 minutes} = 1 e -0.5*10 = 0.993 P{call duration 20 minutes} = 1 e -0.5*20 = 0.99995 17

Consider this situation: You are attending a retreat in a remote location No cell phone service!?! Two public phones are available in the lobby of the lodge You need to make a call, but both phones are currently busy A person nearby tells you that one person just started his/her call, while the other has been on the phone for 30 minutes. Which phone should you wait for? The Markov Property The exponential distribution is said to be: Specifically, Why does this property hold? 18

Queueing System Characterization Five components Interarrival-time pdf Service-time pdf Number of servers Queuing discipline, that is, how customers are taken from the queue Number of buffers (for customers) We will consider infinite-buffer, single-server systems, using a FIFO queueing discipline Notation Notation for first 3 components: A/B/m, with A and B chosen from M -Markov (exponential pdf) D -Deterministic (all customers have same value) G -General (arbitrary pdf) Example of M/M/1? Example of M/D/1? Example of D/D/1? 19

The M/M/1 Queueing System Both arrival-time pdf and service-time pdf are exponential, with a single server = arrival rate, µ = server capacity Let the state i of the queueing system be the number of customers in the system When a customer arrives or a customer departs the system, the system moves to an adjacent state (i +1 or i 1) P i = P {system is in state i} M/M/1 Queue N Nq m Tq 1 m T 20

M/M/1 (cont.) In equilibrium, P i does not change over time! Such queueing systems are known as birthdeath systems. State diagram: n-1 n n+1 m m m m State probabilities Diagram: P 0 = mp 1 21

Solve for P 0 M/M/1 at a glance What is ρ? Since and m are constants, P i alone describes the current state of the system. Why can we describe the ENTIRE state of the system by a single parameter? 22

Computing N Computing T 23

Example Checkout lane. = 0.25 and m = 1.0 M/M/1 Results The analysis gives the steady-state probabilities of number of packets in queue or transmission P{n packets} = r n (1-r) where r = /m From this we can get the averages: N = r/(1 - r) T = N/ = r/ (1 - r) = 1/(m - ) 24

Networking Example On a router, measurements show that packets arrive at a mean rate of 125 packets per second (pps) and the router takes about 2 milliseconds to forward them. Assuming an M/M/1 model, What is the probability of buffer overflow if the router had only 13 buffers? How many buffers are needed to keep packet loss below one packet per million? Example (cont.) Arrival rate λ = Service rate μ = Gateway utilization ρ = λ/μ = Prob. of n packets in gateway = Mean number of packets in router = 25

Example (cont.) Probability of buffer overflow: = P(more than 13 packets in gateway) Example (cont.) To limit the probability of loss to less than 10-6 : 26