On Buffer Limited Congestion Window Dynamics and Packet Loss
|
|
- Carol Crawford
- 5 years ago
- Views:
Transcription
1 On Buffer Limited Congestion Windo Dynamics and Packet Loss A. Fekete, G. Vattay Communication Netorks Laboratory, Eötvös University Pázmány P. sétány /A, Budapest, Hungary 7 Abstract The central result of this paper is an analytic formula describing the packet loss probability in a buffer as a function of the length of the buffer and the probability of external packet loss. This formula makes it possible to calculate the total loss along a multi-buffer, multi-link route. Also, ne types of congestion indo distributions are discovered hen the packet loss in the buffer is large. These are different from the usual Gaussian type single humped distributions and can help to develop a qualitative classification of indo distributions. TCP B Buffer 3 Link delay, D Packet size, P Loss rate, p Bandidth, C Sink Fig.. The finite buffer model. In numerical s packet size P = 5 byte and bandidth C = 56 kb/s has been used. I. INTRODUCTION Recently, a lot of study has been carried out to clarify the dynamics of TCP congestion control mechanism. The congestion indo distribution of idealized TCP has been investigated ith constant packet loss in [] and ith variable packet loss in []. Average indo size and throughput have been calculated in [3 5]. A stochastic Ito calculus has been developed in [6]. These studies considered persistent file transfers. In [7] short file transfers and the effect of slo start mechanism has been taken into account. The role of the exponential backoff mechanism in pseudo self-similar traffic has been analyzed in [8 ]. In [, ] the authors investigated a model here parallel TCP flos shared a common buffer. They supposed that the investigated common buffer as not a bottleneck buffer. The other extreme case, a severely loaded bottleneck buffer as investigated in []. While these models describe the dynamics of TCP in the presence of external packet loss quite accurately, little or no progress has been made to understand the detailed mechanism of packet loss in IP netorks. Packet loss in current netorks is generated by overloaded buffers predominantly. This is an inherent property of TCP congestion control mechanism since TCP increases its packet sending rate until packet loss occurs in one of the buffers along the route beteen the source and the destination. In this paper e take the first step to give a detailed mathematical description of the packet loss mechanism. We investigate the dynamics of TCP in the presence of a finite buffer and e derive analytic formulas for the packet loss and the congestion indo distribution. The ne formulas and distributions are validated by direct. II. THE FINITE BUFFER MODEL In this section e introduce a model for finite buffers. In our idealized model (Fig. ) one TCP injects packets into a buffer of size B [5, 6, ]. The remaining part of the netork is modeled by a fixed delay D, constant bandidth or link capacity C and random loss probability of p per packet. This probability represents the chance of link and hardare failures [3], incorrect handling of arriving packets by routers, losses and time variations due to ireless links in the path of the connection [3], and the likelihood of congestion in the buffers other than the modeled one. The buffer is large enough such that the TCPs can operate in congestion avoidance mode, but it is finite, so that packet loss can occur in it. According to the model to practically important cases ill be investigated in this paper: ) Local Area Netork (LAN) traffic, hen the bandidth delay product DC is small, only a fe packets can be out in the link and the buffer is never empty. ) Wide Area Netork (WAN) traffic, hen the bandidth delay product is large, packets are in the link and the buffer is mostly empty. From no on e ill refer to systems ith small and large bandidth delay products as LAN and WAN respectively. III. DYNAMICS OF A SINGLE TCP IN LOCAL AREA NETWORKS In this section e present an analysis of a typical LAN scenario ith a single TCP here the link delay is small and packet delay is caused mostly by buffering. The congestion indo counts the number of unacknoledged packets, and these packets can be found on the link and in the buffer. First e suppose that the link delay D is zero, and e discuss the effect of nonzero link delay later. At each packet-shift-time unit a packet is shifted from the buffer onto the link. The round trip time of a freshly sent packet ill be the time it should ait for the shifting of all previously sent packets in the system, hich is in turn measured by the congestion indo τ RTT =. Applying this equation, the congestion indo is governed by the differential equation d dτ =, () here [, B]. This equation can be solved and e obtain the time development of the congestion indo beteen losses: i (τ) = i () + τ, i [, B], ()
2 here i () is the congestion indo value after the i th packet loss event. Since one packet is shifted out from the buffer onto the link in each time unit, and each packet might get lost ith the same probability p, in our continuous fluid model the inter-loss time intervals (τ i ) are independent, exponentially distributed random variables ith mean /p and probability distribution p(τ i ) = p exp( pτ i ), i Æ. (3) Note the folloing important property of this distribution: Suppose that a certain length of time has been elapsed since a packet loss. Then the probability distribution of the time interval remaining until the next packet loss is still given by (3) regardless of the elapsed time. We no derive the formula hich connects consecutive indo values before losses. Let s denote by bli the indo value immediately before the i th loss event and by i( bli ) the distribution of bli. If the value of the random variable τ i is small enough, the next bli+ can be obtained from (). Hoever, if τ i is so large that the indo ould gro above the buffer size then packets ill be dropped at the buffer, and the indo ill be set to B. Accordingly, a mapping can be given hich connects the consecutive bli values: f τi ( bli ) = bli /4 + τ i if τ i < B bli /4, B if τ i B bli /4. Such a ay, the time elapsed until the next packet loss might be smaller than τ i if τ i is too large. Due to the property of the distribution (3) noted above, at the succeeding application of (4) the next τ i+ time interval can be dran from distribution (3) again. The next indo distribution i+ ( bli+ ) can no be calculated by the Perron Frobenius operator, L, of the mapping: i+ ( bli+ ) = L i( bli ) = (5) = B δ ( bli+ f τi ( bli ) ) i( bli )p(τ i )dτ i d bli here δ() is the Dirac-delta distribution and e averaged over the distribution (3). The integration in τ i can be carried out. The stationary distribution ( bl ) is the fix point of (5). The stationary distribution ( bl ) can be ritten in the form (4) ( bl ) = A(p, B)δ( bl B) + f( bl ), (6) here f : Ê Ê continuous regular function and A(p, B) is a constant. For all n Æ e define the folloing functions: f n : ] B/ n+, B/ n] Ê; f(), (7) The pieceise solution of (5) on the disjoint intervals can be ritten in the form n f n ( bl ) = Ck n (p, B)p ble p bl 4k /. (8) k= Substituting (6), (7) and (8) into (5), recursive formulas for the constants Ck n(p, B) can be derived. The initial term C (p, B) of the iteration can be expressed by A(p, B) hich can be calculated [4] self-consistently from (5). With the folloing abbreviations: c L = k=, F(x) = e x/8 e x/ and 4 k G(x) = k= F ( x/4 k) k i= 4 e obtain i A ( pb ) = c L c L F ( pb ) G( pb ). (9) The numerical value of c L is approximately.454. Note that in this equation the parameters appear only ( in the pb combination. Consequently the constant C ) k n pb also depends on the pb product only, not separately on p or B. The pb expression is the control parameter in our model. Systems in hich external packet losses and buffer sizes differ, but the pb product is the same, are similar in the sense that they can be described ith the same constants Ck n. A. The Interpretation of A ( pb ) and the Effective Loss No e present a brief explanation of the meaning of A ( pb ). If e calculate the average time elapsed beteen to packet-loss events, e obtain τ = A( pb ) p () The meaning of this simple expression becomes clearer if e recognize that / τ is the probability of packet loss per unit time p : p = τ = p A(pB ). () This equation can also be ritten as p = ( A ( pb )) p and A ( pb ) can be interpreted as the ratio of the number of packets hich lost on the link and the total amount of lost packets. Similarly, A ( pb ) is the ratio of the number of packets hich are lost in the buffer to the total number of packet losses. The possibility that this ratio can be estimated from our model is the main result of this section. This interpretation and the exact knoledge of the form of A ( pb ) allos us to treat buffer-losses as if they ere link-losses. It also makes possible to calculate the total loss along a multi-buffer, multi-link route. According to () the measured p/p expression should be equal to A ( pb ) and it should not depend on p and B separately, only on the pb product. In order to verify () e implemented our model in Netork Simulator v..b7a (ns) [5] and carried out a number of s ith different B and p parameter values in the pb parameter range. The link capacity, link delay and packet size ere fixed in the study of LAN and only buffer size B and loss probability p ere varied. During the comparison of the s and the formulas e have to take into account that in reality the system can store more packets than the actual buffer size. For example the receiver is processing one packet, and one acknoledgment packet is traversing back to the sender during the file transfer increasing the maximum number of unacknoledged packets in the system by to. In other ords, the TCP behaves as if the buffer ould be bigger than it really is.
3 p/p A ( p(b + b) ) B = 3 B = 4 B = 5 B = 6 B = p(b + b) Fig.. Comparison of the theoretical function A p(b + b) and the p/p expression obtained from numerical s (a) pb =. In order to treat this problem e assumed that e have to set the congestion indo limit to B + b and e must replace B ith B + b on our expressions: p/p = A ( p(b + b) ). () Number of s ere carried out for different buffer sizes B, and the unknon parameter b as fitted ith the help of (). It as found that b is constant and practically independent of B. The parameter b as set to the average of the estimated values obtained from s, b = Simulation results are shon in Fig., here e compared the theoretical A ( p(b + b) ) and the measured p/p. We got an almost perfect match. At the end of this subsection e sho the estimated effective loss p in the pb limit. This is the extreme bottleneck buffer case, hen packets get lost only in the buffer. It is easy to verify that p = 8 3B holds in the pb limit. This formula has been calculated in [6] for the same bottleneck scenario. This is a further indication that our calculation is correct. Since e obtained the above expression as a limit of our model, our ork can be vieed as a generalization of previous studies. So far e presented the analytic form of the distribution of before-loss values of the congestion indo. In practice the distribution of the congestion indo at an arbitrary moment is relevant. We calculated this distribution, and e obtained = f() A(pB ), (3) It can be seen that the final distribution is proportional to the regular part of the before-loss distribution, and there is no Dirac-delta distribution in (3). To verify our results e carried out s by ns. During the s at least, loss events ere recorded to obtain statistically reliable results. We varied the pb control parameter through the pb range and the buffer size B beteen 3 and 7. The actual buffer size has been shifted to B + b in accordance ith Subsection III-A. For demonstration e compare the results and our model in Fig. 3 at pb =. and 4. parameter values and at B = 7 buffer size (b) pb = 4. Fig. 3. Comparison of results and theoretical model at buffer size B = 7. i(), i N denote pieces of the congestion indo distribution i() = f i ()/ A pb. For the interpretation of the results e have consider to minor effects: ) after a packet loss TCP does not increase its cnd instantly, but keeps it at a constant value for a small amount of time generating small plateaus in the time evolution of cnd. We supposed in the calculations that TCP increases its indo immediately. So, these plateaus ere filtered out during the preparation of the histograms in Fig. 3. ) TCP does not simply take the half of the congestion indo, but it also takes its integer part. This and the discrepancy beteen the fluid and the discrete model makes it necessary to shift the histogram to the right along the -axis by units. Keeping in mind the above empirical corrections, e obtain very impressive agreement beteen the s and the analytical calculations. B. Discussion of the Model Traditionally it is assumed that the congestion indo distributions in systems ith random packet loss are single humped Gaussian like functions []. Hoever this is not the case in general in systems here finite buffers dominate the in-
4 do evolution. No e are in the position to investigate the qualitatively different types of congestion indo distributions. The distribution is non-zero only on the [, B] interval, and e can classify the histograms according to the monotonity of the last segment of the pieceise distribution, = f ()/ ( A ( pb )). It can be shon that the folloing three situations are possible: pb : the last segment is monotonously increasing in this parameter range (see Fig. 3(a)). The total packet loss is dominated by the buffer in this range. < pb < 4 : the maximum of the last segment is beteen B/ and B The buffer and external losses are comparable in this case. 4 pb < + : the last segment is monotonously decreasing in this case. In this parameter range the buffer plays a limited role. The congestion indo is mostly limited by the external loss(see Fig. 3(b)). We have assumed in the previous analysis that the link delay is zero. We can easily extend the validity of the results for situations here the link delay is non-zero. In this case in addition to the buffer, N l = CD/P number of packets and acknoledgments can be found on the link here C, D and P are the link capacity, the link delay and the packet size respectively. The congestion indo limit in this situation must be set to the total number of packets B + N l in the system and the link can be treated as a part of the buffer. IV. DYNAMICS OF A SINGLE TCP IN WIDE AREA NETWORKS In this section e present the analysis of an idealized WAN scenario here buffering delay is small compared to the link delay. In an ideal WAN scenario the buffer size ould be zero. Hoever, in ns simulator the buffer must be set to a small finite number B, otherise the packets cannot pass over the buffer in the simulator. In WAN situation the round-trip time of a freshly injected packet is approximately constant, τ RTT N l, if e neglect the buffering delay, and the development of the congestion indo can be given by bli (τ i ) = bli () + N l τ i. bli [, B + N l ], (4) here /λ is the average time beteen external losses. The Perron Frobenius equation (5) can be solved, and the stationary distribution ( bl ) can be ritten in the form (6) again. No the pieceise components of the regular part of the stationary distribution, f n : ] (B + N l )/ n+, (B + N l )/ n] Ê; bl f( bl ), can be given by f n ( bl ) = n Ck n (λn l(b + N l ))λn l e λn l bl k. (6) k= With the ne definitions of c W = k=, F(X) = k e X/ e X and G(X) = k= F(X/k ) k i= get A(X) = i e c W c W F( X) G( X), (7) here X = λn l (B + N l ), and the numerical value of c W is approximately With the help of A(λN l (B + N l )) the coefficients C n k (λn l(b + N l )) can be calculated recursively. The average time elapsed beteen to consecutive packet losses can be calculated similarly to (). The probability of packet loss per unit time λ can be expressed by the inverse of this average: λ = τ = λ A(λN l (B + N l )). (8) According to (8) the measured λ/λ should be equal to A(λN l (B + N l )). While both λ and λ are loss probabilities per unit time, their ratio is simply the ratio of the external and the total packet loss: p/p = λ/λ. The value of λ appearing in A(λN l (B + N l )) is the number of the packets lost on the link divided by the time TCP actively transferred packets. This time is the total time minus the inactive periods (plateaus in cnd) after packet losses discussed at the end of Section III- A. Simulation results are shon in Fig 4, here e compared the theoretical A(λN l (B + N l )) and the measured p/p. The measured data point fit A(λN l (B + N l )) almost perfectly. In s the link capacity, packet size and buffer size ere fixed, and only the link delay D and the external packet loss probability p ere altered. The corresponding mapping, hich connects the consecutive bli values and analogous to (4), can be given by.8 A(λN l(b + N l)) B + N l = 63 f τi ( bli ) = { bli + τi τ RTT B + N l if τ i < τ RTT (B + N l bli ), if τ i τ RTT (B + N l bli ). The difficulty of the WAN scenario is that the distribution of times beteen packet losses cannot be given by a simple formula like (3) exactly. There are periods, hen there is no queue in the buffer, and packets cannot get lost. In order to handle the model analytically, e assumed that the distribution of times beteen consecutive losses can be approximated ith an effective exponential distribution p(τ i ) = λe λτi, (5) p/p λn l (B + N l ) Fig. 4. Comparison of the theoretical function A(λN l (B + N l )) and the p/p expression obtained from numerical s.
5 Finally, the distribution of the congestion indo at an arbitrary moment as calculated, and as the result of the calculations e get = f() A(λN l (B + N l )) (9) similarly to the LAN case. As a demonstration of formula (9) e carried out WAN s here maximum N l = 6 TCP and acknoledgment packets could be on the link simultaneously and the buffer size as set to B = 3. The parameter λ has been determined as the ratio of the external losses and the active TCP time. The external loss rate as varied in the pn l (B + N l ) range, all other parameters ere fixed. The theoretical distributions and histograms obtained from ns s can be seen in Fig. 5. Our model gives a qualitatively correct description of the WAN situation (a) λn l (B + N l ) = (b) λn l (B + N l ) = 3.4 Fig. 5. Comparison of results and theoretical model. The link could carry maximal N l = 6 number of TCP and ACK packets. i(), i N denote pieces of the congestion indo distribution i() = f i ()/ ( A(λN l (B + N l ))). V. CONCLUSIONS In this paper e investigated the TCP congestion avoidance algorithm in netorks here the finite buffer size limits the maximal achievable congestion indo size. This ork is the first attempt to treat mathematically the buffer-limited behavior of TCP. The stationary probability distribution of the congestion indo process as presented in LAN and WAN situations. The calculations ere validated by computer s and it as shoed that our analysis agrees ith the s properly. The most important development accomplished by this study is that the total loss felt by the TCP, including the buffer and the external packet loss, can be predicted from the netork parameters. The presented analytical expression, A(x), can be computed numerically ithout difficulty and the total loss can be calculated by a simple formula. It as also shon that A(x) and the coefficients that appear in the probability distributions depend only on a certain combination of the parameters. This combination is the control parameter in our model. Netorks ith the same control parameter are equivalent in the sense that the same portion of the total packet loss occur at the buffer, and the coefficients are the same in the distribution function. We hope that this model can be used as the base element of a more complex netork and it can be extended to more complicated systems. REFERENCES [] T. J. Ott, J. H. B. Kemperman, and M. Mathis, The stationary behavior of ideal TCP congestion avoidance, in Proceedings of IEEE INFOCOM 99, Ne York, 999. [] Archan Misra and Teunis Ott, The indo distribution of idealized TCP congestion avoidance ith variable packet loss, in INFOCOM 99, March 999. [3] T. V. Lakshman and Upamanyu Madho, The performance of TCP/IP for netorks ith high bandidth-delay products and random loss, IEEE/ACM Transactions on Netorking, June 997. [4] Eitan Altman, Konstantin Avrachenkov, and Chadi Barakat, Stochastic model of TCP/IP ith stationary random losses, in ACM SIGCOMM,. [5] Patric Bron, Resource sharing of TCP connections ith different round trip times, in INFOCOM,. [6] V. Misra, W. Gong, and D. Tosley, Stochastic differential equation modeling and analysis of TCP indosize behavior, in Proc. Performance 99, Istambul, Turkey, october 999. [7] N. Cardell, S. Savage, and T. Anderson, Modeling TCP latency, in IEEE Infocom, Tel-Aviv, Israel, March. [8] L. Guo, M. Crovella, and I. Matta, TCP congestion control and heavy tails, Tech. Rep. BUCS-TR--7, Computer Science Dep., Boston University,. [9] D. R. Figueiredo, B. Liu, V. Mishra, and D. Tosley, On the autocorrelation structure of TCP traffic, Tech. Rep. -55, Dep. of Computer Science, University of Massachusetts, Amherst, November. [] A. Fekete and G. Vattay, Self-similarity in bottleneck buffers, in Globecom, November. [] A. Misra, T. Ott, and J. Baras, The indo distribution of multiple TCPs ith random queues, in IEEE GLOBECOM, December 999. [] A. Fekete, G. Vattay, and A. Veres, Improving the / p la for single and parallel TCP flos, in 7th International Teletraffic Congress, December. [3] J. Bolot, End-to-end packet delay and loss behavior in the Internet, in ACM SIGCOMM, 993. [4] A. Fekete and G. Vattay, On buffer limited congestion indo dynamics and packet loss, Tech. Rep., Communication Netorks Laboratory,, [5] Ucb/lbnl/vint netork simulator ns (version ), [6] M. Mathis, J. Semke, J. Mahdavi, and T. Ott, The macroscopic behavior of the TCP congestion aviodance algorithm, Computer Communications Revie, vol. 7, pp. 3, July 997.
A Stochastic Model for TCP with Stationary Random Losses
A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline
More informationUsing Partial Differential Equations to Model TCP Mice and Elephants in Large IP Networks
Using Partial Differential Equations to Model TCP Mice and Elephants in Large IP Netorks M.Ajmone Marsan, M.Garetto, P.Giaccone, E.Leonardi, E.Schiattarella, A.Tarello Dipartimento di Elettronica, Politecnico
More informationTCP modeling in the presence of nonlinear window growth
TCP modeling in the presence of nonlinear window growth Eitan Altman, Kostia Avrachenkov, Chadi Barakat Rudesindo Núñez-Queija Abstract We develop a model for TCP that accounts for both sublinearity and
More informationModelling TCP with a Discrete Time Markov Chain
Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet
More informationOn the Energy-Delay Trade-off of a Two-Way Relay Network
On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University
More informationAnalysis of Scalable TCP in the presence of Markovian Losses
Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr
More informationMarkovian Model of Internetworking Flow Control
Информационные процессы, Том 2, 2, 2002, стр. 149 154. c 2002 Bogoiavlenskaia. KALASHNIKOV MEMORIAL SEMINAR Markovian Model of Internetworking Flow Control O. Bogoiavlenskaia Petrozavodsk State University
More informationTHE prediction of network behavior is an important task for
TCP Networ Calculus: The case of large delay-bandwidth product Eitan Altman, Konstantin Avrachenov, Chadi Baraat Abstract We present in this paper an analytical model for the calculation of networ load
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is donloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Amplify-and-forard based to-ay relay ARQ system ith relay combination Author(s) Luo, Sheng; Teh, Kah Chan
More informationA Mathematical Model of the Skype VoIP Congestion Control Algorithm
A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision
More informationAIMD, Fairness and Fractal Scaling of TCP Traffic
AIMD, Fairness and Fractal Scaling of TCP Traffic Francois Baccelli & Dohy Hong INRIA-ENS, ENS, 45 rue d Ulm 755 Paris, France, Francois.Baccelli, Dohy.Hong@ens.fr Abstract We propose a natural and simple
More informationReducing Age-of-Information for Computation-Intensive Messages via Packet Replacement
Reducing Age-of-Information for Computation-Intensive Messages via Packet Replacement arxiv:191.4654v1 [cs.it] 15 Jan 19 Jie Gong, Qiaobin Kuang, Xiang Chen and Xiao Ma School of Data and Computer Science,
More informationPerformance Analysis of Priority Queueing Schemes in Internet Routers
Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab
More informationCOS 424: Interacting with Data. Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007
COS 424: Interacting ith Data Lecturer: Rob Schapire Lecture #15 Scribe: Haipeng Zheng April 5, 2007 Recapitulation of Last Lecture In linear regression, e need to avoid adding too much richness to the
More informationMice and Elephants Visualization of Internet
Mice and Elephants Visualization of Internet Traffic J. S. Marron, Felix Hernandez-Campos 2 and F. D. Smith 2 School of Operations Research and Industrial Engineering, Cornell University, Ithaca, NY, 4853,
More informationTCP-friendly SIMD Congestion Control and Its Convergence Behavior
Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1-5-8 TCP-friendly SIMD Congestion Control and Its Convergence Behavior Jin, Shudong Boston University
More informationTCP throughput and timeout steady state and time-varying dynamics
TCP throughput an timeout steay state an time-varying ynamics Stephan Bohacek an Khushboo Shah Dept. of Electrical an Computer Engineering Dept. of Electrical Engineering University of Delaare University
More informationcommunication networks
Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth
More informationCompound TCP with Random Losses
Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com
More informationTheoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances
Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Tsuyoshi Ito and Mary Inaba Department of Computer Science, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationNetwork Traffic Characteristic
Network Traffic Characteristic Hojun Lee hlee02@purros.poly.edu 5/24/2002 EL938-Project 1 Outline Motivation What is self-similarity? Behavior of Ethernet traffic Behavior of WAN traffic Behavior of WWW
More informationA flow-based model for Internet backbone traffic
A flow-based model for Internet backbone traffic Chadi Barakat, Patrick Thiran Gianluca Iannaccone, Christophe iot Philippe Owezarski ICA - SC - EPFL Sprint Labs LAAS-CNRS {Chadi.Barakat,Patrick.Thiran}@epfl.ch
More informationOn Tandem Blocking Queues with a Common Retrial Queue
On Tandem Blocking Queues with a Common Retrial Queue K. Avrachenkov U. Yechiali Abstract We consider systems of tandem blocking queues having a common retrial queue. The model represents dynamics of short
More informationCHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum
CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction
More informationAnalysis of TCP Westwood+ in high speed networks
Analysis of TCP Westwood+ in high speed networks 1 E. Altman, C. Barakat, S. Mascolo, N. Möller and J. Sun Abstract TCP Westwood+ is modelled and analyzed using stochastic recursive equations. It is shown
More informationMin Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min
JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science
More informationLocal and Global Stability of Symmetric Heterogeneously-Delayed Control Systems
Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract
More informationA Generalization of a result of Catlin: 2-factors in line graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu
More informationA Stochastic Model of TCP/IP with Stationary Random Losses
1 A Stochastic Model of TCP/IP with Stationary Random Losses Eitan Altman, Konstantin Avrachenkov, Chadi Barakat INRIA, 24 route des Lucioles, 692 Sophia Antipolis, France Email:{altman,kavratch,cbarakat}@sophiainriafr
More informationOSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION
International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,
More informationCapturing Network Traffic Dynamics Small Scales. Rolf Riedi
Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,
More informationA turbulence closure based on the maximum entropy method
Advances in Fluid Mechanics IX 547 A turbulence closure based on the maximum entropy method R. W. Derksen Department of Mechanical and Manufacturing Engineering University of Manitoba Winnipeg Canada Abstract
More informationreader is comfortable with the meaning of expressions such as # g, f (g) >, and their
The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Introduction: The general Hidden Subgroup Problem is as follos. Let G be
More informationDynamic resource sharing
J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus
More informationModelling multi-path problems
1 Modelling multi-path problems Richard Gibbens Computer Laboratory, University of Cambridge 2nd Annual Conference on Information Sciences and Systems Princeton University 19 21 March 2 2 Multi-path flow
More informationPacket Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes
Packet Loss Analysis of Load-Balancing Switch with ON/OFF Input Processes Yury Audzevich, Levente Bodrog 2, Yoram Ofek, and Miklós Telek 2 Department of Information Engineering and Computer Science, University
More informationEndogeny for the Logistic Recursive Distributional Equation
Zeitschrift für Analysis und ihre Anendungen Journal for Analysis and its Applications Volume 30 20, 237 25 DOI: 0.47/ZAA/433 c European Mathematical Society Endogeny for the Logistic Recursive Distributional
More informationA ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT
Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic
More informationModels and Techniques for Network Tomography
Proceedings of the 21 IEEE Worshop on Information Assurance and Security T1C2 13 United States Military Academy West Point NY 5 6 June 21 Models and Techniques for Networ Tomography Stephan Bohace bohace@mathuscedu
More informationFairness comparison of FAST TCP and TCP Vegas
Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated
More informationPareto-Improving Congestion Pricing on General Transportation Networks
Transportation Seminar at University of South Florida, 02/06/2009 Pareto-Improving Congestion Pricing on General Transportation Netorks Yafeng Yin Transportation Research Center Department of Civil and
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationModeling and Stability of PERT
Modeling Stability of PET Yueping Zhang yueping@cs.tamu.edu I. SYSTEM MODEL Our modeling of PET is composed of three parts: window adjustment ED emulation queuing behavior. We start with the window dynamics.
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationjwperiod. font=small,labelsep=jwperiod,justification=justified,singlelinecheck=false
jwperiod. font=smalllabelsep=jwperiodjustification=justifiedsinglelinecheck=false 1 EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. : 2?? Published online in Wiley InterScience www.interscience.wiley.com
More informationImpact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis
Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina
More informationNonlinear Instabilities in TCP-RED
Nonlinear Instabilities in TCP-RED Priya Ranjan, Eyad H. Abed and Richard J. La Abstract This work develops a discrete time feedback system model for a simplified TCP (Transmission Control Protocol) network
More informationIN today s high speed telecommunication networks, a large
State-dependent M/G/ type queueing analysis for congestion control in data networks Eitan Altman, Kostya Avrachenkov, Chadi Barakat, Rudesindo Núñez-Queija Abstract We study in this paper a TCP-like linear-increase
More informationInternet Congestion Control: Equilibrium and Dynamics
Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)
More informationContinuous-time hidden Markov models for network performance evaluation
Performance Evaluation 49 (2002) 129 146 Continuous-time hidden Markov models for network performance evaluation Wei Wei, Bing Wang, Don Towsley Department of Computer Science, University of Massachusetts,
More informationbe a deterministic function that satisfies x( t) dt. Then its Fourier
Lecture Fourier ransforms and Applications Definition Let ( t) ; t (, ) be a deterministic function that satisfies ( t) dt hen its Fourier it ransform is defined as X ( ) ( t) e dt ( )( ) heorem he inverse
More informationUtility Analysis of Simple FEC Schemes for VoIP
Utility Analysis of Simple FEC Schemes for VoIP Parijat Dube and Eitan Altman,2 INRIA, BP93, 692 Sophia-Antipolis, France{pdube,altman}@sophiainriafr 2 CESIMO, Facultad de Ingeneria, Universidad de Los
More informationCompound TCP with Random Losses
Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com
More informationTCP over Cognitive Radio Channels
1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done
More informationArtificial Neural Networks. Part 2
Artificial Neural Netorks Part Artificial Neuron Model Folloing simplified model of real neurons is also knon as a Threshold Logic Unit x McCullouch-Pitts neuron (943) x x n n Body of neuron f out Biological
More informationIN THIS PAPER, we describe a design oriented modelling
616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 3, JUNE 2006 A Positive Systems Model of TCP-Like Congestion Control: Asymptotic Results Robert Shorten, Fabian Wirth, and Douglas Leith Abstract We
More informationy(x) = x w + ε(x), (1)
Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationMMSE Equalizer Design
MMSE Equalizer Design Phil Schniter March 6, 2008 [k] a[m] P a [k] g[k] m[k] h[k] + ṽ[k] q[k] y [k] P y[m] For a trivial channel (i.e., h[k] = δ[k]), e kno that the use of square-root raisedcosine (SRRC)
More informationRandomized Smoothing Networks
Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA
More informationExtended Analysis of Binary Adjustment Algorithms
1 Extended Analysis of Binary Adjustment Algorithms Sergey Gorinsky Harrick Vin Technical Report TR22-39 Department of Computer Sciences The University of Texas at Austin Taylor Hall 2.124, Austin, TX
More informationA Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks
A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networs Xiang Yu, Yang Chen and Chunming Qiao Department of Computer Science and Engineering State University of New Yor
More informationEnhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment
Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China
More informationSymbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm
Symbolic Dynamical odel of Average Queue Size of Rom Early Detection Algorithm Charlotte Yuk-Fan Ho Telehone: 44 () 788 5555 ext. 4333 Fax: 44 () 788 7997 Email: c.ho@mul.ac.uk School of athematical Sciences
More informationCSC Metric Embeddings Lecture 8: Sparsest Cut and Embedding to
CSC21 - Metric Embeddings Lecture 8: Sparsest Cut and Embedding to Notes taken by Nilesh ansal revised by Hamed Hatami Summary: Sparsest Cut (SC) is an important problem ith various applications, including
More informationOptimal Measurement-based Pricing for an M/M/1 Queue
Optimal Measurement-based Pricing for an M/M/1 Queue Yezekael Hayel 1 and Bruno Tuffin 1 IRISA-INRIA Rennes, Campus universitaire de Beaulieu 3542 Rennes Cedex - FRANCE {yhayel,btuffin}@irisa.fr tel: (+33)299847134
More informationExploring regularities and self-similarity in Internet traffic
Exploring regularities and self-similarity in Internet traffic FRANCESCO PALMIERI and UGO FIORE Centro Servizi Didattico Scientifico Università degli studi di Napoli Federico II Complesso Universitario
More informationPacket Size
Long Range Dependence in vbns ATM Cell Level Trac Ronn Ritke y and Mario Gerla UCLA { Computer Science Department, 405 Hilgard Ave., Los Angeles, CA 90024 ritke@cs.ucla.edu, gerla@cs.ucla.edu Abstract
More informationLoad Balancing in Distributed Service System: A Survey
Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and
More informationNonlinear Instabilities in TCP-RED
Nonlinear Instabilities in TCP-RED Priya Ranjan, Eyad H Abed and Richard J La Abstract This work develops a discrete time feedback system model for a simplified TCP (Transmission Control Protocol) network
More informationMethodology for Computer Science Research Lecture 4: Mathematical Modeling
Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals
More informationAnalysis of two competing TCP/IP connections
Performance Evaluation 49 (2002 43 55 Analysis of two competing TCP/IP connections E. Altman a,b,, T. Jiménez b, R. Núñez-Queija c,d a INRIA, 2004 Route des Lucioles, 06902 Sophia Antipolis, France b CESIMO,
More informationOn Tandem Blocking Queues with a Common Retrial Queue
On Tandem Blocking Queues with a Common Retrial Queue K. Avrachenkov U. Yechiali Abstract We consider systems of tandem blocking queues having a common retrial queue, for which explicit analytic results
More informationUse. of a Computer and Vehicle Loop Detectors To Measure Queues and Delays At Signalized Intersections
Use. of a Computer and Vehicle Loop Detectors To Measure Queues and Delays At Signalized ntersections A. CHRSTENSEN, Computing Devices of Canada, Ottaa A computer program has been developed to obtain from
More informationSingular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.
Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research
More informationM/G/1/MLPS compared to M/G/1/PS
Operations Research Letters 33 (25) 519 524 Operations Research Letters www.elsevier.com/locate/orl M/G/1/MLPS compared to M/G/1/PS Samuli Aalto a,, Urtzi Ayesta b, Eeva Nyberg-Oksanen a,1 a Networking
More informationPreliminaries. Definition: The Euclidean dot product between two vectors is the expression. i=1
90 8 80 7 70 6 60 0 8/7/ Preliminaries Preliminaries Linear models and the perceptron algorithm Chapters, T x + b < 0 T x + b > 0 Definition: The Euclidean dot product beteen to vectors is the expression
More informationModelling the Arrival Process for Packet Audio
Modelling the Arrival Process for Packet Audio Ingemar Kaj and Ian Marsh 2 Dept. of Mathematics, Uppsala University, Sweden ikaj@math.uu.se 2 SICS AB, Stockholm, Sweden ianm@sics.se Abstract. Packets in
More informationScalable Scheduling in Parallel Processors
00 Conference on Information Sciences and Systems, Princeton University, March 0, 00 Scalable Scheduling in Parallel Processors Jui Tsun Hung Hyoung Joong Kim Thomas G Robertai 3 Abstract A study of scalable
More informationModelling an Isolated Compound TCP Connection
Modelling an Isolated Compound TCP Connection Alberto Blanc and Denis Collange Orange Labs 905 rue Albert Einstein Sophia Antipolis, France {Email: alberto.blanc,denis.collange}@orange-ftgroup.com Konstantin
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each
More informationCompetitive Management of Non-Preemptive Queues with Multiple Values
Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem
More informationTuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods
Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that
More information3-D FINITE ELEMENT MODELING OF THE REMOTE FIELD EDDY CURRENT EFFECT
3-D FINITE ELEMENT MODELING OF THE REMOTE FIELD EDDY CURRENT EFFECT Y. Sun and H. Lin Department of Automatic Control Nanjing Aeronautical Institute Nanjing 2116 People's Republic of China Y. K. Shin,
More informationLinear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.
Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also
More informationOn Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks
2014 IEEE 15th International Conference on High Performance Sitching and Routing (HPSR) On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Netorks Chenyang Zhou, Anisha
More informationAdaptive Noise Cancellation
Adaptive Noise Cancellation P. Comon and V. Zarzoso January 5, 2010 1 Introduction In numerous application areas, including biomedical engineering, radar, sonar and digital communications, the goal is
More informationDecodability Analysis of Finite Memory Random Linear Coding in Line Networks
Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Nima Torabkhani, Faramarz Fekri School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta GA 30332,
More information1 Effects of Regularization For this problem, you are required to implement everything by yourself and submit code.
This set is due pm, January 9 th, via Moodle. You are free to collaborate on all of the problems, subject to the collaboration policy stated in the syllabus. Please include any code ith your submission.
More informationModèles stochastiques II
Modèles stochastiques II INFO 154 Gianluca Bontempi Département d Informatique Boulevard de Triomphe - CP 1 http://ulbacbe/di Modéles stochastiques II p1/50 The basics of statistics Statistics starts ith
More informationDefinition of a new Parameter for use in Active Structural Acoustic Control
Definition of a ne Parameter for use in Active Structural Acoustic Control Brigham Young University Abstract-- A ne parameter as recently developed by Jeffery M. Fisher (M.S.) for use in Active Structural
More informationExact Sampling of TCP Window States
UNPUBLISHED MANUSCRIPT 1 Exact Sampling of TCP Window States Ashish Goel University of Southern California Michael Mitzenmacher Harvard University Abstract We demonstrate how to apply Coupling from the
More informationON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM ALGORITHMS
K Y B E R N E T I K A V O L U M E 4 7 ( 2 0 1 1 ), N U M B E R 6, P A G E S 9 3 0 9 4 3 ON MAIN CHARACTERISTICS OF THE M/M/1/N QUEUE WITH SINGLE AND BATCH ARRIVALS AND THE QUEUE SIZE CONTROLLED BY AQM
More informationBurst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks
Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University
More informationA NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC
Proceedings of IEEE Conference on Local Computer Networks, Tampa, Florida, November 2002 A NOVEL APPROACH TO THE ESTIMATION OF THE HURST PARAMETER IN SELF-SIMILAR TRAFFIC Houssain Kettani and John A. Gubner
More informationCALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION
CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION Jericho L. P. Reyes, Chih-Ying Chen, Keen Li and Roland N. Horne Stanford Geothermal Program,
More informationCS276 Homework 1: ns-2
CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows
More informationSTATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler
STATC141 Spring 2005 The materials are from Pairise Sequence Alignment by Robert Giegerich and David Wheeler Lecture 6, 02/08/05 The analysis of multiple DNA or protein sequences (I) Sequence similarity
More informationHomework 6 Solutions
Homeork 6 Solutions Igor Yanovsky (Math 151B TA) Section 114, Problem 1: For the boundary-value problem y (y ) y + log x, 1 x, y(1) 0, y() log, (1) rite the nonlinear system and formulas for Neton s method
More information