Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis

Size: px
Start display at page:

Download "Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis"

Transcription

1 Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis Emmanouil Fountoulakis, Qi Liao, Manuel Stein, Nikolaos Pappas Department of Science and Technology, Linköping University, Sweden Nokia Bell Labs, Stuttgart, Germany s: {emmanouil.fountoulakis, {qi.liao, arxiv:8.33v [cs.ni] 6 Nov 8 Abstract Future mobile networks supporting Internet of Things are expected to provide both high throughput and low latency to user-specific services. One way to overcome this challenge is to adopt network function virtualization and Multiaccess edge computing (MEC). In this paper, we analyze an end-to-end communication system that consists of both MEC servers and a server at the core network hosting different types of virtual network functions. We develop a queueing model for the performance analysis of the system consisting of both processing and transmission flows. The system is decomposed into subsystems which are independently analyzed in order to approximate the behaviour of the original system. We provide closed-form expressions of the performance metrics such as system drop rate and average number of tasks in the system. Simulation results show that our approximation performs quite well. By evaluating the system under different scenarios, we provide insights for the decision making on traffic flow control and its impact on critical performance metrics. Index Terms Network function virtualization, multi-access edge computing, queueing theory, performance analysis, flow control I. INTRODUCTION In future communication systems, mission-critical mobile applications, e.g., augmented reality, connected vehicles, ehealth, will provide services that require ultra-low latency [], []. To satisfy these low latency requirements, Multiaccess Edge Computing (MEC) has been proposed as a key solution []. The idea of MEC is to locate more computation resources closer to the users, e.g., at the base stations. Besides low latency requirements, these services may have strict function chaining requirements. In other words, each service has to be processed by a set of network functions (e.g., firewalls, transcoders, load balancers, etc.) in a specific order [3]. Furthermore, the requirements of 5G networks for flexibility and elasticity of the network inspire the idea of Network Function Virtualization (NFV) [3], [4]. The idea of NFV is to decouple the network functions from dedicated hardware equipment. Instead of dedicated hardware equipment, general purpose servers can host one or more types of network functions. By this means, the network can be This work has been supported by the European Unions Horizon research and innovation programme under the Marie Skłodowska-Curie grant agreement No flexible and deploy proper network functions according to the demands of various traffic types. NFV together with MEC are considered key technologies for 5G wireless sytems. However, the computation capabilities and the available resources of MEC servers are still limited compared to the high-end servers in the cloud. Therefore, it is interesting to further investigate the cooperation between the edge and the core, and the cooperation among MEC servers. Recently VNF placement and resource allocation problem has attracted a lot of attention, as shown in [5], [6]. In these works, the authors formulate the VNF placement problem as Mixed Integer Linear Problem (MILP) under the assumption of known traffic demand. In a dynamic and unknown traffic environment, the authors in [7] [] develop dynamic algorithms in order to control the flow by applying Lyapunov optimization theory. Flows traverse VNF chains and each node decides the resource allocation to each VNF and routes the flow to the next node. The authors in [] [3] investigate the problem of offloading tasks from mobile devices to MECs. They address the trade-off between the power consumption and the task processing delay. There are few works on analyzing networks and derive key performance metrics such as delay. Authors in [4] analyze the end-to-end delay for embedded VNF chains. They consider two types of services that transerve different VNF chains and provide the delay analysis for each different chain. In this paper, we model and analyze an exemplary endto-end communication system which consists of two MEC servers at the edge network and one at the core network hosting different types of VNFs. We provide expressions for the key performance metrics of our interests by applying tools from queueing theory. In order to simplify the analysis, we split the system into subsystems and analyze each particular system independently. We consider finite buffers for the MEC servers. Therefore, if a buffer is full and a new task arrives at the same time, the task is dropped and removed from the system. We provide closed-form expressions for the key performance metrics such as the average number of tasks in the system and the system drop rate for each subsystem. Simulation results validate our analysis and it is shown that our approximation performs well. Furthermore, by evaluating

2 p Flow Controller Q Q 3 CPU µ Tx µ 3 VNF MEC Server Q Q4 Tx µ CPU µ 4 3 Q 5 Tx µ 5 VNF MEC Server Q 6 Wireless Wired CPU µ 6 VNF Fig. : The system model.the blue dashed lines group the queues located in the same server. the system under different scenarios we provide insights of how the routing decision affects the key performance metrics of our interest. This work can be considered as an initial, but important, step to take useful insights for developing optimal routing policies for critical performance metrics such as endto-end delay. II. SYSTEM MODEL We consider an exemplary end-to-end communication system consisting of a mobile device, two MEC servers Server and, and Server 3 located in the core network as depicted in Fig.. A task traverses a service chain of two consecutive Virtual Network Functions (VNFs): VNF and VNF. In the chosen system, a MEC server, called Server, is co-located with the base station and hosts one copy of VNF as the primary MEC server. A secondary MEC server, called Server, is located nearby and also hosts a copy of VNF. It may be located at a peer edge host with spare capacity or at a central office location within the metropolitan area network. In addition, Server 3 in the core network hosts VNF and has more advanced computation capabilities than Servers and. We assume a time-slotted system. At each time slot, the device transmits a task in form of a packet to a base station over a wireless channel. Because of the presence of fading in the wireless channel, transmissions may face errors. A task is successfully transmitted to the base station with a probability p that captures fading, attenuation, noise, etc. The device attempts for a new task transmission only if the previous task is successfully uploaded to the base station. The flow of tasks received at the base station needs to be distributed between the queue for local processing and the queue for transmission to the secondary MEC server. So, there are two possible routes to pass through the service chain. A flow controller at the base station decides randomly the routing for each task. With probability α the task is processed by Server first, and then forwarded to Server 3. With probability α the task is forwarded to Server, to be processed by VNF, and then forwarded to Server 3 for being processed by VNF. Each task that arrives at a server first waits in a queue for being processed by a VNF. Then, after the processing, it is 4 stored in the transmission queue, waiting to be forwarded and processed by the next VNF. Let Q i denote the i-th queue, where i K, and K is the set of the queues in the system. Note that the queues follow an early departure-late arrival model: at the beginning of the slot the departure takes place and a new arrival can enter the queue at the end of the slot. The queues for task transmission are Q, Q 3, and Q 5, and the queues for task processing are Q, Q 4, Q 6. The arrival rates for queues Q and Q 3 are pα and p( α), respectively. We denote by µ i, i K, the service rates of the queues. We assume that the service times are geometrically distributed. Therefore, Q and Q 3 can be seen as Geo/Geo/ queues [5]. Furthermore, given that Q, Q 3, and Q 4 are non empty, the arrival rates of Q, Q 4, and Q 5 are equivalent to the service rates of Q, Q 3, and Q 4 (i.e., µ, µ 3, and µ 4 ) respectively. Furthermore, the queues at Servers and are assumed to have finite buffer. Let M i denote the buffer size of each queue i K\ {6}. If a queue is full and no task departs and at the same time that a new one arrives, the new task is dropped and removed from the system. However, the queue of Server 3 (where Q 6 is located) is assumed to have infinite length of buffer because of large amount of hardware resources available in a server located in the core network. In this work, we analyze a simple end-to-end communication system consisting of a small number of servers and one mobile device. However, we can generalize the model for arbitrary number of servers following the same methodology that is described in the next section. III. PERFORMANCE ANALYSIS In this section, we perform the modeling and the performance analysis that allow us to derive the key performance metrics such as the system drop rate and the average number of tasks in the system as defined in Section IV. We model the considered queueing system utilizing Discrete Time Markov Chain (DTMC). Modeling the whole system as one Markov chain can drive in a quite complicated system difficult to be analyzed in terms of closed-form expressions that can provide useful insights. Thus, in order to simplify the analysis, we decompose our system into different subsystems. We consider the following four subsystems: ) Q and Q, ) Q 3 and Q 4 3) Q 5, and 4) Q 6. The performance metrics for the whole system are approximated with the closed-form expressions derived from the subsystems. The approximation performs well as shown in Section V. A. Subsystems and : Two queues in tandem The two queues in tandem Q and Q are considered a subsystem. The Markov chain {(X n, Y n )} is described by P i,j:u,k = P r {X n+ = i, Y n+ = j X n = u, Y n = k}, where X n and Y n denote the states (in terms of queue length) of Q and Q at the n-th time slot, respectively, and i and j are referred to as the level i and phase j, respectively. In order to facilitate the presentation and because of the space limitation, we first analyze a simple example with buffer size M = M =. The Markov chain of this example is shown in

3 Fig.. However, the analysis presented below is quite general and independent of the specific buffer size. The Markov chain is a Quasi-Birth-and-Death (QBD) DTMC [5]. Note that the QBD only goes a maximum level up or down, the transition matrix has a block partitioned form: B C E A A P = A A A. () A A + A For the sake of simplicity, given a probability of an event, denoted by p, we denote the probability of its complementary event by p p. The block matrices of P are shown below. B = A = αp b () b () b () b () E = A =, C = αpµ αpµ µ αpµ µ αpµ µ αp αpµ a () a () a () a () a () αp µ a () a () a () a (), A = αp c c c c,, a (), a () a () a (). In the example above, we construct the Markov chain of this particular example. Let us define b () = αp µ, b () = αpµ, c = αp µ, c = αpµ, a () = αp µ µ, a () = αp µ µ, a () = αpµ µ, a () = αpµ µ + αp µ µ, a () = αp µ µ, = αpµ µ. The Markov chain is and a () = αpµ µ, a () shown in Fig.. Then, we construct the transition matrix of the Markov chain and observe a particular structure of the matrix because of the properties of a QBD DTMC. Utilizing the properties of a QBD DTMC, we can analyze such systems with arbitrary buffer size in the following steps. First we define the following matrices [5] P () = µ µ µ µ, () and αp αp µ αp µ µ αp b b (),,, c a () αpµ c a () a () b (),,, αpµ a () αpµ µ αpµ αpµ αpµ µ µ,,, µ µ µ µ αp + µ µ µ µ αp + µ µ +µ αp µ a () a () c a () b a () a () a () a () c a () αpµ Fig. : Two dimensional Markov chain for the subsystem consisting of Q and Q. P () = µ µ µ µ αp µ µ + µαp. (3) Then, the block matrices of the transition matrix are calculated as [5] B = λ P (), C = ap(), E = λ µ P (), A = λ µ P (), A = λ µ P () +λ µ P (), A = ᾱµ P (), where λ is the arrival rate of Q. Our goal is to derive the steady state distribution of the Markov chain defined above. We can apply direct methods in order to find the steady state distribution [5, Chapter 4]. Note that there are several efficient algorithms that can be used for this purpose, e.g., logarithmic reduction method. Please refer to [5] for a detailed instruction. We denote [ the steady state distribution by a ] row vector π () = π (),, π(),,..., π(),m, π (),,..., π() M,M. We find π () by solving the following linear system of equations π () P = π (), π () =, (4) where denotes the column vector of ones. Hereafter we use π (n) to denote the steady state distribution vector of the n-th subsystem for n =,, 3, 4. Along similar lines, we can construct the transition matrix P and the steady state distribution π () for the second subsystem consisting of Q 3 and Q 4.

4 µ 4 µ 5 + µ 4 µ 4 µ 4 µ 5 + µ 4 µ 5 µ 4 µ 5 + µ 4 µ 5 µ 4 µ 4 µ 5 µ 4 µ 5 µ... 4 µ 5 M 5 Fig. 3: Markov chain for the Geo/Geo//M 5 Q 5. B. Subsystem 3: One Geo/Geo//M 5 queue We consider Q 5 as an independent subsystem which can be seen as a Geo/Geo//M 5 queue, where M 5 is the buffer size of the queue. The Markov chain of this system is shown in Fig. 3. The transition matrix of this Markov chain is described below P 3 = µ 4 µ 4 µ 4 µ 5 + µ 4 µ 5 µ 4 µ 5 µ 4 µ 5 + µ 4 µ 5 µ 4 µ µ 4 µ 5 + µ 4. We denote [ the steady state distribution of Subsystem 3 by π (3) = π (3), π(3),..., π(3) M 5 ]. In order to derive the steady state distribution, we solve the following linear system of equations π (3) P = π (3), π (3) =. Using balance equations [6], we have and π (3) i (5) = µi 4 µ (i ) 5 µ i π (3) 4 µi, for i =,..., M 5, (6) 5 π (3) = [ M 5 + i= C. Subsystem 4: Q 6 with infinite buffer size ] µ i 4 µ i 5 µ i. (7) 4 µi 5 The arrival rate for Q 6 depends on the service rate of Q and Q 5. We model the system as a Markov chain as shown in Fig. 4, where p = µ µ 5, p = µ µ 5 + µ 5 µ, p = µ µ 5, p = µ 5 µ µ 6 + µ 5 µ µ 6 + µ 5 µ 6 µ, p = µ µ 5 µ 6 + µ µ 5 µ 6 + µ µ 5 µ 6, p = µ µ 5 µ 6, p = µ µ 5 µ 6. The transition matrix that describes the Markov chain above is shown below a b a b b P 6 = a b b b, (8) b 3 b b. b 3 b where a = p, a = p, a = p, b = p, b = p, b = p, b 3 = p. The transition matrix is a lower Hessenberg matrix. We denote [ the steady state distribution of Subsystem 4 by =, π(4) ].,... The general expression for the equilibrium equations for the states is given by the i-th term in the following equation [6] i = a i i+ + j= b i j j. (9) For the DTMC with infinite state space, we apply z-tansform approach to solve the state equations. The z-transform for the state transition probabilities a i and b i are A(z) = a i z i and B(z) = i= 3 b i z i, i= respectively. The z-transform for the steady state distribution vector is Π(z) = i z i = z A(z) B(z) z. () B(z) i= The solution for i = i = c i + is given by + B () + B () A (), () m r j (p j ) (i ), i >, () j= where r, p, and c are the residues, poles, and directs terms, respectively. ) Stability Conditions: Since Q 6 has infinite buffer size, we need to characterize the conditions under which the queue is stable. Stability is important since it implies finite queueing delay. A definition of queue stability is shown below [7]. Definition. Denote by Q i (t) the length of queue i at the beginning of time slot t. The queue is said to be stable if lim Pr[Q i(t) < x] = F (x) and lim F (x) =. t x The corollary consequence of the previous definition is the Loyne s theorem [8] that states: if the arrival and service processes of a queue are strictly jointly stationary and the average arrival rate is less than the average service rate, then the queue is stable. In this scenario, we have at most two arrivals at each time slot and up to one departure. The average arrival rate is the following λ 6 = (Pr {Q } µ )(Pr {Q 5 } µ 5 ) + (Pr {Q } µ )( Pr {Q 5 } µ 5 ) + (Pr {Q 5 } µ 5 )( Pr {Q } µ ). (3) Therefore, Q 6 is stable if and only if the inequality above holds λ 6 < µ 6. (4)

5 p p p p p p p p... p p Fig. 4: Markov chain for Q 6. p IV. KEY PERFORMANCE METRICS In this section, we provide closed-form expressions of the performance metrics of our interests, i.e., the system drop rate and average number of tasks of the system. We utilize the results of the previous section in order to obtain the corresponding expressions. The probabilities to have a dropped task at each time slot for Q Q 5 are shown respectively in below M P D = αp µ j= M 4 P D3 = αp µ 3 j= P D5 = µ 4 µ 5 π (3) M 5, π () M, P M,j D = µ µ i= π () M, P M 3 3,j D 4 = µ 3 µ 4 i= π () i,m, π () i,m 4, where P Di is the probability to have a dropped task of queue i. The average length of each queue is given by M M Q = π () i,j i, M Q = i= j= i= j= M j= i= M 3 M 4 Q 3 = π () i,j i, M 4 Q4 = M 5 Q 5 = π (3) i i, Q6 = i= i= M 3 j= i= i i. π () i,j j, π () i,j j, Therefore, the system drop rate and the average number of task in the system can be described as P D = Q i, (5) i K\{6} P Di and Q = i K respectively. In the next section we evaluate numerically the performance of the system and we validate through simulations the accuracy of the approximated model. V. NUMERICAL RESULTS In this section, we evaluate the performance of our approximated model by comparing the theoretical and simulation results. We compare the results of the closed-form expressions for the key performance metrics with those of simulations. Furthermore, we provide results that show how different values of µ and µ affect the optimal routing decision. Note that our key performance metrics are the system drop rate and the average number of tasks in the system. We provide results for two different scenarios: ) Our objective is to minimize the drop rate when the buffer capacities are small, ) Our objective is to minimize the average number of tasks in the system when the buffer capacities are large. The results for the two scenarios are shown below in two different subsections. The simulation set-up is: µ 3 = µ 4 = µ 5 =.5, µ 6 =.9, p =.8. The values of M i, i, are different for each scenario. We developed a MATLAB-based behavioural simulator and each case run for 6 timeslots. A. Effect of µ and µ on the drop rate in small buffered systems Fig. 5: Optimal values of α. Objective: To minimize the system drop rate. M i =, i Fig. 6: Achieved minimum drop rate. Objective: To minimize the system drop rate. M i =, i. In this subsection, we observe the performance of the system in terms of the drop rate when the size of the buffers is small (M i =, i.). In Fig. 5, we provide the optimal values of α (probabilistic routing decision) for different values of µ and µ. Note that we obtain the optimal α for each value of µ and µ by applying brute force. We observe that for small values of µ and µ, the value of α is small (around ). Therefore, the routing selects to route the traffic flow to the secondary MEC server (Server ). Furthermore, it is shown that the value.3

6 of optimal α is affected by the smallest value between µ and µ. For example, when µ =.5 and µ =.7, the optimal alpha is.5, that is equal to the optimal α for the case of µ = µ =.5. Therefore, it is shown by the results that the buffer with the smallest transmission or computation capacity becomes the bottleneck for the subsystem. This could be the case, for example, when the connection between the MEC server and the server in the core network is weak. Fig. 6 shows the system drop rate for the corresponding optimal values of α. We observe that the performance of the system in terms of drop rate increases when both µ and µ increase. The reason why the drop rate is affected only if both µ and µ increase is because the smallest value between µ and µ operates as bottleneck. This observation is important not only for obtaining the optimal routing decisions but also for system design purposes, e.g., allocation of the resources. B. Effect of µ and µ on the number of tasks in the system for large buffered systems Fig. 7: Optimal values of α. Objective: To minimize the average number of tasks. M i = 5, i. In this subsection, we provide results for the performance of the system in terms of average number of tasks in the system. In this case, our objective is to minimize the average number of tasks in the system when the buffer size is large (M i = 5, i.). In Fig. 7, the optimal α s for different values of µ and µ are shown. We observe that for small values of µ, the optimal value of α is equal to. Therefore, the flow controller selects to route the whole traffic to the first server. This decision is optimal in terms of minimization of the average number of tasks in the system, but it increases significantly the system drop rate. Therefore, the reason why the average number of tasks in the system is minimized is because a large percentage of the tasks are dropped and but not served as shown in Fig. 9. Furthermore, with fixed µ =, the value of optimal α increases as µ increases. Since µ increases, the arrival rate for Q also increases. However, µ is equal to zero, therefore, the larger the values of α and µ the larger the system drop rate. Hence, the average number of tasks in the system decreases. For values of µ and µ that are greater or equal than.4, we observe that the values of α s increase smoothly as µ, µ increase. However, we also observe that the smallest value between µ and µ operates as bottleneck in the subsystem and subsequently in the whole system. For example, when µ is fixed and equal to.5, the routing decision and the performance of the system do not improve as we increase the value of µ. In Fig., we compare the theoretical with experimental results in terms of optimal α and the corresponding system drop rates. For the ease of presentation, we fix µ 5 =.5. We select the optimal α according to the minimum drop rate and provide results for different values of µ. It is shown that our approximation model works well. Similarly, in Fig., we compare the theoretical with experimental results for the case that we select the optimal α according to the minimum number of tasks in the system. Overall, we also calculate the corresponding α for all the cases that are shown above (Fig. 5 9) according to our theoretical model. For the case that our objective is the minimization of drop rate the average absolute error is equal to.5, while in the case of minimizing the average number of tasks in the system the average absolute error yields Fig. 8: Achieved minimum average number of tasks. Objective: To minimize the average number of tasks in the system. M i = 5, i. VI. CONCLUSIONS & FUTURE DIRECTIONS In this work, we consider an exemplary network topology with two MEC servers, a high-end server at core network, and VNF chains embedded in the servers. We model the network and provide a theoretical study on the system performance in terms of system drop rate and average number of the tasks in the system that can be useful for more general setups. We provide both experimental and theoretical results in order to evaluate the performance of our approximated model and as it is shown our derived model can approximate the system with high accuracy. Numerical results show that, we are able to offer some useful insights on the design of such systems or resource allocation at each server. Furthermore,

7 Fig. 9: System drop rate. Objective: To minimize the system drop rate. M i = 5, i Fig. : Theoretical vs experimental results. Objective: To minimize the average number of tasks. M i = 5, i., µ = Fig. : Theoretical vs experimental results. Objective: To minimize the system drop rate. M i =, i, µ =.5. we investigate numerically the routing policy that minimizes the system drop rate for different set-ups of the system. This work can be considered as an initial, but significant, step for analyzing and optimizing end-to-end delay, and throughput of such networks. The developed analysis, can provide guidelines for delay-aware routing and resource allocation schemes in similar systems. REFERENCES [] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, Mobile edge computing A key technology towards 5G, ETSI white paper, vol., no., pp. 6, 5. [] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration, IEEE Communications Surveys & Tutorials, vol. 9, no. 3, pp , 7. [3] R. Mijumbi, J. Serrat, J.-L. Gorricho, N. Bouten, F. De Turck, and R. Boutaba, Network function virtualization: State-of-the-art and research challenges, IEEE Communications Surveys & Tutorials, vol. 8, no., pp. 36 6, 6. [4] M. S. Bonfim, K. L. Dias, and S. F. Fernandes, Integrated NFV/SDN architectures: A systematic literature review, arxiv preprint arxiv:8.56, 8. [5] R. Cohen, L. Lewin-Eytan, J. S. Naor, and D. Raz, Near optimal placement of virtual network functions, in IEEE INFOCOM, 5, pp [6] L. Wang, Z. Lu, X. Wen, R. Knopp, and R. Gupta, Joint optimization of service function chaining and resource allocation in network function virtualization, IEEE Access, vol. 4, pp , 6. [7] H. Feng, J. Llorca, A. M. Tulino, and A. F. Molisch, Optimal dynamic cloud network control, IEEE/ACM Transactions on Networking, no. 99, pp. 4, 8. [8] M. Barcelo, J. Llorca, A. M. Tulino, and N. Raman, The cloud service distribution problem in distributed cloud networks, in IEEE ICC, 5, pp [9] H. Feng, J. Llorca, A. M. Tulino, and A. F. Molisch, Dynamic network service optimization in distributed cloud networks, in IEEE INFOCOM Workshops, 6, pp [] H. Feng, J. Llorca, A. M. Tulino, and A. Molisch, Optimal control of wireless computing networks, vol. abs/7.356, 7. [Online]. Available: [] J. Liu, Y. Mao, J. Zhang, and K. B. Letaief, Delay-optimal computation task scheduling for mobile-edge computing systems, in IEEE ISIT, 6, pp [] Y. Mao, J. Zhang, S. Song, and K. B. Letaief, Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems, IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp , 7. [3] D. Han, W. Chen, and Y. Fang, Power-optimal scheduling for delay constrained mobile computation offloading, in IEEE ICC, May 8, pp. 6. [4] Q. Ye, W. Zhuang, X. Li, and J. Rao, End-to-end delay modeling for embedded VNF chains in 5G core networks, IEEE Internet of Things Journal, pp., 8. [5] A. S. Alfa, Applied discrete-time queues. Springer, 6. [6] F. Gebali, Analysis of Computer and Communication Networks, st ed. Springer,. [7] W. Szpankowski, Stability conditions for some distributed systems: Buffered random access systems, Advances in Applied Probability, vol. 6, no., pp , 994. [8] R. M. Loynes, The stability of a queue with non-independent interarrival and service times, in Mathematical Proceedings of the Cambridge Philosophical Society, vol. 58, no. 3. Cambridge University Press, 96, pp

Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times

Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times Nikolaos Pappas Department of Science and Technology, Linköping University, Sweden E-mail: nikolaospappas@liuse arxiv:1809085v1

More information

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing

Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Energy-Efficient Resource Allocation for Multi-User Mobile Edge Computing Junfeng Guo, Zhaozhe Song, Ying Cui Department of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, P. R. China

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Fairness and Optimal Stochastic Control for Heterogeneous Networks

Fairness and Optimal Stochastic Control for Heterogeneous Networks λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

EP2200 Course Project 2017 Project II - Mobile Computation Offloading

EP2200 Course Project 2017 Project II - Mobile Computation Offloading EP2200 Course Project 2017 Project II - Mobile Computation Offloading 1 Introduction Queuing theory provides us a very useful mathematic tool that can be used to analytically evaluate the performance of

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Multi Stage Queuing Model in Level Dependent Quasi Birth Death Process

Multi Stage Queuing Model in Level Dependent Quasi Birth Death Process International Journal of Statistics and Systems ISSN 973-2675 Volume 12, Number 2 (217, pp. 293-31 Research India Publications http://www.ripublication.com Multi Stage Queuing Model in Level Dependent

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Privacy-Aware Offloading in Mobile-Edge Computing

Privacy-Aware Offloading in Mobile-Edge Computing Privacy-Aware Offloading in Mobile-Edge Computing Xiaofan He Juan Liu Richeng Jin and Huaiyu Dai EE Dept., Lamar University EE Dept., Ningbo University ECE Dept., North Carolina State University e-mail:

More information

BS-assisted Task Offloading for D2D Networks with Presence of User Mobility

BS-assisted Task Offloading for D2D Networks with Presence of User Mobility BS-assisted Task Offloading for D2D Networks with Presence of User Mobility Ghafour Ahani and Di Yuan Department of Information Technology Uppsala University, Sweden Emails:{ghafour.ahani, di.yuan}@it.uu.se

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Approximate Queueing Model for Multi-rate Multi-user MIMO systems. An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is

More information

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1

Input-queued switches: Scheduling algorithms for a crossbar switch. EE 384X Packet Switch Architectures 1 Input-queued switches: Scheduling algorithms for a crossbar switch EE 84X Packet Switch Architectures Overview Today s lecture - the input-buffered switch architecture - the head-of-line blocking phenomenon

More information

Stochastic Optimization for Undergraduate Computer Science Students

Stochastic Optimization for Undergraduate Computer Science Students Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline

More information

Analysis of Software Artifacts

Analysis of Software Artifacts Analysis of Software Artifacts System Performance I Shu-Ngai Yeung (with edits by Jeannette Wing) Department of Statistics Carnegie Mellon University Pittsburgh, PA 15213 2001 by Carnegie Mellon University

More information

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines

Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Optimal Resource Allocation for Multi-User MEC with Arbitrary Task Arrival Times and Deadlines Xinyun Wang, Ying Cui, Zhi Liu, Junfeng Guo, Mingyu Yang Abstract In this paper, we would like to investigate

More information

Session-Based Queueing Systems

Session-Based Queueing Systems Session-Based Queueing Systems Modelling, Simulation, and Approximation Jeroen Horters Supervisor VU: Sandjai Bhulai Executive Summary Companies often offer services that require multiple steps on the

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems

Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems Juan Liu, Yuyi Mao, Jun Zhang, and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science and Technology,

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy

Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Energy Cooperation and Traffic Management in Cellular Networks with Renewable Energy Hyun-Suk Lee Dept. of Electrical and Electronic Eng., Yonsei University, Seoul, Korea Jang-Won Lee Dept. of Electrical

More information

Stability of the Maximum Size Matching

Stability of the Maximum Size Matching Stability of the Maximum Size Matching Mohsen Bayati Dept. of Electrical Engineering Stanford University Stanford, CA 9405-950 bayati@stanford.edu Neda Beheshti Dept. of Electrical Engineering Stanford

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

Time Reversibility and Burke s Theorem

Time Reversibility and Burke s Theorem Queuing Analysis: Time Reversibility and Burke s Theorem Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. Yannis A. Korilis. Outline Time-Reversal

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This

More information

A discrete-time priority queue with train arrivals

A discrete-time priority queue with train arrivals A discrete-time priority queue with train arrivals Joris Walraevens, Sabine Wittevrongel and Herwig Bruneel SMACS Research Group Department of Telecommunications and Information Processing (IR07) Ghent

More information

6 Solving Queueing Models

6 Solving Queueing Models 6 Solving Queueing Models 6.1 Introduction In this note we look at the solution of systems of queues, starting with simple isolated queues. The benefits of using predefined, easily classified queues will

More information

Wireless Networks for Mobile Edge Computing: Spatial Modeling and Latency Analysis

Wireless Networks for Mobile Edge Computing: Spatial Modeling and Latency Analysis Wireless Networks for Mobile Edge Computing: Spatial Modeling and Latency Analysis Seung-Woo Ko, Kaifeng Han, and Kaibin Huang arxiv:709.0702v2 [cs.it] 9 Jan 208 Abstract Next-generation wireless networks

More information

Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing

Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING VOL XX NO YY MONTH 019 1 Computation Offloading Strategy Optimization with Multiple Heterogeneous Servers in Mobile Edge Computing Keqin Li Fellow IEEE Abstract

More information

ECE-517: Reinforcement Learning in Artificial Intelligence. Lecture 4: Discrete-Time Markov Chains

ECE-517: Reinforcement Learning in Artificial Intelligence. Lecture 4: Discrete-Time Markov Chains ECE-517: Reinforcement Learning in Artificial Intelligence Lecture 4: Discrete-Time Markov Chains September 1, 215 Dr. Itamar Arel College of Engineering Department of Electrical Engineering & Computer

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-

More information

Discrete-event simulations

Discrete-event simulations Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle  holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/39637 holds various files of this Leiden University dissertation Author: Smit, Laurens Title: Steady-state analysis of large scale systems : the successive

More information

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Quiz 1 EE 549 Wednesday, Feb. 27, 2008 UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

MARKOV PROCESSES. Valerio Di Valerio

MARKOV PROCESSES. Valerio Di Valerio MARKOV PROCESSES Valerio Di Valerio Stochastic Process Definition: a stochastic process is a collection of random variables {X(t)} indexed by time t T Each X(t) X is a random variable that satisfy some

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S

More information

Optimal Link Adaptation in Wideband CDMA Systems

Optimal Link Adaptation in Wideband CDMA Systems Optimal Link Adaptation in Wideband CDMA Systems Tim Holliday, Andrea Goldsmith, and Peter Glynn Stanford University Abstract We develop a general framework for optimizing link adaptation for multiuser

More information

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival

Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival 1 Optimal Sleeping Mechanism for Multiple Servers with MMPP-Based Bursty Traffic Arrival Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, arxiv:1711.07912v1 [cs.it] 21 Nov 2017 Zhisheng Niu, Fellow,

More information

System occupancy of a two-class batch-service queue with class-dependent variable server capacity

System occupancy of a two-class batch-service queue with class-dependent variable server capacity System occupancy of a two-class batch-service queue with class-dependent variable server capacity Jens Baetens 1, Bart Steyaert 1, Dieter Claeys 1,2, and Herwig Bruneel 1 1 SMACS Research Group, Dept.

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

On the Partitioning of Servers in Queueing Systems during Rush Hour

On the Partitioning of Servers in Queueing Systems during Rush Hour On the Partitioning of Servers in Queueing Systems during Rush Hour Bin Hu Saif Benjaafar Department of Operations and Management Science, Ross School of Business, University of Michigan at Ann Arbor,

More information

COMP9334: Capacity Planning of Computer Systems and Networks

COMP9334: Capacity Planning of Computer Systems and Networks COMP9334: Capacity Planning of Computer Systems and Networks Week 2: Operational analysis Lecturer: Prof. Sanjay Jha NETWORKS RESEARCH GROUP, CSE, UNSW Operational analysis Operational: Collect performance

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Exploiting Non-Causal CPU-State Information for Energy-Efficient Mobile Cooperative Computing

Exploiting Non-Causal CPU-State Information for Energy-Efficient Mobile Cooperative Computing 1 Exploiting Non-Causal CPU-State Information for Energy-Efficient Mobile Cooperative Computing Changsheng You and Kaibin Huang Abstract arxiv:1704.04595v4 [cs.it] 4 Sep 2017 Scavenging the idling computation

More information

Dynamic Service Migration and Workload. Scheduling in Edge-Clouds

Dynamic Service Migration and Workload. Scheduling in Edge-Clouds Dynamic Service Migration and Workload 1 Scheduling in Edge-Clouds Rahul Urgaonkar, Shiqiang Wang, Ting He, Murtaza Zafer, Kevin Chan, and Kin K. Leung Abstract Edge-clouds provide a promising new approach

More information

Advanced Queueing Theory

Advanced Queueing Theory Advanced Queueing Theory 1 Networks of queues (reversibility, output theorem, tandem networks, partial balance, product-form distribution, blocking, insensitivity, BCMP networks, mean-value analysis, Norton's

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Part I Stochastic variables and Markov chains

Part I Stochastic variables and Markov chains Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Stability analysis of a cognitive multiple access channel with primary QoS constraints

Stability analysis of a cognitive multiple access channel with primary QoS constraints tability analysis of a cognitive multiple access channel with primary o constraints J. Gambini 1,2,O.imeone 1, U. pagnolini 2,.Bar-Ness 1 andungsooim 3 1 CWCR, NJIT, Newark, New Jersey 07102-1982, UA 2

More information

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Nima Torabkhani, Faramarz Fekri School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta GA 30332,

More information

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems On Stability and Sojourn Time of Peer-to-Peer Queuing Systems Taoyu Li Minghua Chen Tony Lee Xing Li Tsinghua University, Beijing, China. {ldy03@mails.tsinghua.edu.cn,xing@cernet.edu.cn} The Chinese University

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Resource and Task Scheduling for SWIPT IoT Systems with Renewable Energy Sources

Resource and Task Scheduling for SWIPT IoT Systems with Renewable Energy Sources This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 1.119/JIOT.218.2873658,

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Latency analysis for Distributed Storage

Latency analysis for Distributed Storage Latency analysis for Distributed Storage Parimal Parag Archana Bura Jean-François Chamberland Electrical Communication Engineering Indian Institute of Science Electrical and Computer Engineering Texas

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability

Crowdsourcing in Cyber-Physical Systems: Stochastic Optimization with Strong Stability Received 1 April 2013; revised 25 May 2013; accepted 29 June 2013. Date of publication 15 July 2013; date of current version 21 January 2014. Digital Object Identifier 10.1109/EC.2013.2273358 Crowdsourcing

More information

Traffic Modelling for Moving-Block Train Control System

Traffic Modelling for Moving-Block Train Control System Commun. Theor. Phys. (Beijing, China) 47 (2007) pp. 601 606 c International Academic Publishers Vol. 47, No. 4, April 15, 2007 Traffic Modelling for Moving-Block Train Control System TANG Tao and LI Ke-Ping

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT

ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT (The 4th New York Metro Area Networking Workshop, New York City, Sept. 2004) ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT Ibrahim Hökelek 1, Mariusz A. Fecko 2, M. Ümit Uyar 1

More information

Chapter 1. Introduction. 1.1 Stochastic process

Chapter 1. Introduction. 1.1 Stochastic process Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.

More information

A Study on Performance Analysis of Queuing System with Multiple Heterogeneous Servers

A Study on Performance Analysis of Queuing System with Multiple Heterogeneous Servers UNIVERSITY OF OKLAHOMA GENERAL EXAM REPORT A Study on Performance Analysis of Queuing System with Multiple Heterogeneous Servers Prepared by HUSNU SANER NARMAN husnu@ou.edu based on the papers 1) F. S.

More information

ring structure Abstract Optical Grid networks allow many computing sites to share their resources by connecting

ring structure Abstract Optical Grid networks allow many computing sites to share their resources by connecting Markovian approximations for a grid computing network with a ring structure J. F. Pérez and B. Van Houdt Performance Analysis of Telecommunication Systems Research Group, Department of Mathematics and

More information

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],

More information

Data analysis and stochastic modeling

Data analysis and stochastic modeling Data analysis and stochastic modeling Lecture 7 An introduction to queueing theory Guillaume Gravier guillaume.gravier@irisa.fr with a lot of help from Paul Jensen s course http://www.me.utexas.edu/ jensen/ormm/instruction/powerpoint/or_models_09/14_queuing.ppt

More information

BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS

BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS BIRTH DEATH PROCESSES AND QUEUEING SYSTEMS Andrea Bobbio Anno Accademico 999-2000 Queueing Systems 2 Notation for Queueing Systems /λ mean time between arrivals S = /µ ρ = λ/µ N mean service time traffic

More information

Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals

Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals Robust Lifetime Measurement in Large- Scale P2P Systems with Non-Stationary Arrivals Xiaoming Wang Joint work with Zhongmei Yao, Yueping Zhang, and Dmitri Loguinov Internet Research Lab Computer Science

More information

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1 Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Statistics 150: Spring 2007

Statistics 150: Spring 2007 Statistics 150: Spring 2007 April 23, 2008 0-1 1 Limiting Probabilities If the discrete-time Markov chain with transition probabilities p ij is irreducible and positive recurrent; then the limiting probabilities

More information

Revenue Maximization in a Cloud Federation

Revenue Maximization in a Cloud Federation Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05

More information

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations

Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations Call Completion Probability in Heterogeneous Networks with Energy Harvesting Base Stations Craig Wang, Salman Durrani, Jing Guo and Xiangyun (Sean) Zhou Research School of Engineering, The Australian National

More information

Performance analysis of clouds with phase-type arrivals

Performance analysis of clouds with phase-type arrivals Performance analysis of clouds with phase-type arrivals Farah Ait Salaht, Hind Castel-Taleb To cite this version: Farah Ait Salaht, Hind Castel-Taleb. Performance analysis of clouds with phase-type arrivals.

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information