Heavy Traffic Limits in a Wireless Queueing Model with Long Range Dependence

Size: px
Start display at page:

Download "Heavy Traffic Limits in a Wireless Queueing Model with Long Range Dependence"

Transcription

1 Heavy raffic Limits in a Wireless Queueing Model with Long Range Dependence Robert. Buche, Arka Ghosh, Vladas Pipiras Abstract High-speed wireless networks carrying multimedia applications are becoming a reality and the transmitted data exhibit long range dependence and heavy-tailed properties. We consider the heavy traffic approach in working towards queue models under these properties, extending the model in 3] from the short range dependence and light-tailed case. Our focus is on the scalings used in the heavy traffic approach which are determined by combinations of the source rate of an infinite source Poisson model of the arrival process, the tail distribution of data transmitted by these sources, and the rate of variation of the random process (channel process) modeling the wireless medium. A fundamental inequality between the exponent in the power tail distribution of the data from the source and the rate of channel variations is obtain. his inequality is important in both the fast growth and slow growth regimes for the arrival process and along with the source rate is used to define the possible cases for obtaining limit models for the queueing process. Across the cases, the possible limit models include reflected Brownian motion, reflected stable Lévy motion, or reflected fractional Brownian motion. I. INRODUCION he usefulness of the heavy traffic method for wireline systems under short range dependence (SRD) assumptions (for example, Poisson interarrival times of packets) and light tailed (L) assumptions (for example, finite second moments on the packet size and service times) is well established, having a large literature (see 17], 9] and the references therein). Loosely speaking, an actual stochastic queueing system may be intractable for analysis and the heavy traffic method scales time and the state space yielding an asymptotic model giving the queue-size dynamics which retains the important features of the actual queueing system. In the SRD/L case, the limit model is given by reflected Brownian motion (RBM). With the prevalence of wireless systems, the heavy traffic method has been extended to wireless models (for example, 3], 16]). he maor difference from the wireline model is the random environment for transmission due to physical surroundings and mobility characteristics of the user. But like the wireline case, the limit queue models are given by RBM. Recently, there has been a maor paradigm shift from short range dependence and light-tailed to long range dependent (LRD) and heavy-tailed (H) stochastic models of data traffic. LRD stands for a very strong temporal dependence in a time series, and H describes the tails of a Supported by the National Science Foundation grants DMS (RB), DMS (AG), DMS (VP). R. Buche is with the Mathematics Department, NC State Univ., Raleigh, NC 27695, rtbuche@unity.ncsu.edu A. Ghosh is with the Statistics Department, Iowa State Univ., Ames, IA 511, apghosh@iastate.edu V. Pipiras is with the Statistics and Operations Research Department, UNC-Chapel Hill, NC, 27599, pipiras@ .unc.edu distribution function. he shift to LRD/H initially occurred in wireline systems 2], 13], and then was followed by similar findings in wireless systems 7], 6], 1], 15]. In particular, there is evidence of LRD/H in wireless internet traffic due to large file sizes from WWW page downloads and multimedia applications including streaming video (music videos, news clips, movies, concerts) and interactive video (e-commerce and gaming). his traffic has bursty behavior affecting network requirements (e.g. capacity and queuesize). hese effects have a significant influence on the network design and are being incorporated in planning for the next generation 4G wireless networks (e.g. 12]). Following this paradigm shift, there has been some recent work on heavy traffic modeling of queueing systems under LRD/H assumptions on the data traffic in wireline systems (see 4], 8], 5]). In these papers reflected fractional Brownian motion (RBM) models for the queue process are obtained, under new state space scalings in the heavy traffic method. he arrival and departure process models in these papers are such that the same scaling of time and state space are natural for both the arrival and departure process; in other words, the same scalings are used in the functional central limit theorems (FCL) and lead to nontrivial (nonzero) limit processes. In this paper, to the best of our knowledge, we give a first result for extending the heavy traffic method under LRD/H assumptions to a wireless queueing system. A one-dimensional queue with wireline arrivals and departures through a wireless medium is considered. We restrict our analysis to a one-dimensional queuing model in order to focus on the development of the heavy traffic scalings, avoiding the complications of the reflected process in higher dimensions. In the 1-D case, the reflection direction is always in the positive queue direction. In higher dimensions, there are complications surrounding the reflected process (unlike the wireline case) due to the possibility of multiple sets of reflection directions on the boundary of the queue state space, each set corresponding to a channel state (see 3] for some furthur discussion). Nonetheless, the scaling results here for the 1-D case are expected to carry over to higher dimensions. More broadly, obtaining the queue limit models, while important in its own right for studying queue characteristics, is an important first step for considering the resource allocation problem. A maor difference from the wireline case is that in the wireless models we consider there are different natural scalings for the FCLs for the arrival and departure processes. In particular, the arrival processes models are from 14] where an infinite source Poisson model is used

2 in a wireline setting. For the infinite source Poisson model, sources turn on according to a Poisson process with intensity (rate) λ, transmit at rate 1, and are on for a random interval which is heavy-tailed with parameter α (more detail is in Section II). he state space scaling for the arrival depends on the growth condition of λ = λ( ) with the scaling parameter : under a slow growth condition on λ( ) (see (15) and (21)) the FCL yields a stable Lévy motion model and under a fast growth condition (see (16) and (2)) the FCL yields a fraction Brownian motion model. However, for the departures process, the state space is scaled according to the rate of channel variations given by parameter (see (1)) and is such that the FCL yields a departure process which converges to a Brownian motion model. For the wireless model, determining the scaling to use in the heavy traffic method for obtaining a queue model is more complex than the wireline case. More precisely, given the operating conditions or characteristics of the arrivals, λ( ) and α, and those of the departures,, the question is: what is the right scaling to use, i.e., according to the arrivals or departures? his is tantamount to the question: given the operating conditions on the arrival and departure, what is the appropriate limit model characterizing the queue content size: reflected Brownian motion (RBM), reflected fractional Brownian motion (RFBM), or reflected stable Lévy motion (RSLM)? his question is answered in this paper; more generally, we give regions of operating conditions where the scalings and resulting limit models apply. What is surprising is that simple conditions emerge for defining these regions; furthermore, a simple inequality (see (23)) relating the channel rate (i.e., ) and heavy-tails in the arrivals (i.e., α) is used in defining some of the regions. his is described in Section II. In Section III is a short summary. In the remainder of this section we briefly highlight the heavy traffic method and results of 3]. hen in Section II we replace the arrival process with an infinite source Poisson model for multimedia traffic and analyze the various queue limit models. Heavy traffic queue model: SRD/L data assumptions. he following is a summary of the heavy traffic wireless queueing model adapted from 3] for a 1-D queue. In particular, an equivalent model is given where time is accelerated using the scaling parameter instead of the rates being scaled where n denotes the scaling parameter (as in 3]). In the heavy traffic method, one considers an embedded sequence of (scaled) queueing systems (Eq. (8) below) indexed by scaling parameter. he mean arrival rate and departure rate of the data in the scaled systems are O( ). he channel state is given by the process L( t) < < 1, (1) so that the rate of channel variations is slower than the rate of arrivals. his is reasonable as the channel coherence times (how long the channel is in a given state) are typically much longer than the service times for packets. he state space scaling is according to the channel process and is given by 1/ γ, where γ = 1 /2. his heavy traffic scaling leads to a RBM limit model which will be seen below. he limit model is obtained under a heavy traffic condition for the wireless model given by two conditions. First, the balance between mean arrival and departure rates Λ a. = λ a v b = J λ d () p()π(), (2) where π is the stationary distribution of the channel, λa is the canonical mean batch arrival rate, v b is the mean batch size, and p() is a nominal power in channel state. Second, any spare capacity beyond that needed to balance the mean arrival process asymptotically goes to zero. In our case, this is given by the reserve power in (14). Applying the heavy traffic scaling with parameter to the queue balance equations, we obtain x (t) = x () + A (t) D (t), (3) where x is the (scaled) size of the queue, A is the cumulative arrival process, and D is the cumulative departure process. he arrival model is given by the following. he l-th interarrival time for the -th system is given by a, l. Let S a, (t) be 1/ times the number of batches that have arrived by real time t, and vl b be the l-th batch size. hen, where M a, (t) = 1 γ A (t) = M a, (t) + S a, (t)] vb S a, (t)] a, a γ l, (4) v b l v b] + vb γ S a, (t)] 1 a, l a is the scaled variations of the arrival about the mean process. Assume that the centered and scaled sequence of processes ] t] w a, 1 (t) = 1 a, l and a w b, (t) = t] 1 v b l v b] (5) for the interarrival times and batch sizes are tight. his is typically the case in the traditional wireline setting under SRD/L assumptions and is appropriate here since the data is arriving to the queues via wireline. Note that the state space scaling γ > 1/2 used here is stronger than the standard 1/ scaling for the wireline case. his implies that M a,n (t). he sum term in equation (4) is the time t in the scaled system plus an error term e (t) that goes to as. he departure process is given by D (t) = 1 γ t I L (s)=} λ d () J p() + u(, ] x (s)) I /2 x (s)>} ds, (6) ]

3 where I } is the indicator function and I x (s)>} constrains the queues from being negative. Equation (6) can be rewritten as D (t) = M d, (t) /2 Λ a t z (t) + 1 t γ I L (s)=} λ d () u(, x (s)) /2 where M d, (t) = 1 (1+)/2 1+ t J J ds, I L(s)=} π() λd () p() ds,(7) and z (t) is the reflection process which represents the work that could have been done using the nominal power p( ), had the queues not been empty. Combining the expressions above and neglecting the error e (t), the prelimit equation is then given by x (t) = x () + M a, (t) M d, (t) + z (t) 1 1+ t 1+ I L(s)=} λd ()u(, x (s)) ds. (8) J he main result in 3] is that (8) weakly converges (in D, ) under the Skorokhod J 1 ]-topology) to the following RBM x(t) = x() + t b(u, x(s)) ds + w(t) + z(t), (9) where w( ) is Brownian motion, z( ) is the reflection process and the drift is given by b(u, x) = λ d ()u(, x)π(). II. SCALINGS FOR LIMI MODELS For the model in Section I the state space scaling 1/ 1 /2, (, 1), was chosen such that the centered departure process converged to Brownian motion. Under the assumptions (5) on the arrival process, this scaling dominated the centered arrival process in the sense that it converged to the zero process. If one chose the state space scaling to be 1/, so that the arrival process converged to a Brownian motion, the resulting limit model would be meaningless since the departure process would diverge. In this section we replace the arrival process by an infinite source Poisson process modeling multimedia traffic. From 14] it is known that the arrival process can be scaled and shown to converge in some (weak) sense to fractional Brownian motion (FBM) or stable Lévy motion (SLM) under a fast growth or slow growth condition, repectively (see (16) and (15) along with (2) and (21) below). he departure process model and scaling will remain unchanged. We will show that there are several possible scalings for meaningful (nondivergent) queue limit models and show which scaling to use depends on the characteristics of the arrival and channel processes. Before discussing the possible queue limit processes, we consider the infinite source Poisson arrival process and queue pre-limit models. Following 14], the fast growth and slow growth conditions are stated along with the state space scaling to be used in each case. A. Background Heavy traffic queue model: LRD/H assumptions. he infinite source Poisson process modeling the arrivals is given by N (s) = 1 Γk s<γ k +V k }, k= where Γ k } k= are Poisson arrivals with intensity λ( ) and X k } k= are i.i.d. positive variables with heavy tail distribution F V (v) = P (V > v) = v α L(v), (1) 1 < α < 2, and L(v) is a slowly varying function at v =. he cumulative arrival process is given by A (t) = 1 λ( ) t N (s) ds. (11) he normalizing factor λ( ) in the above ensures that the mean arrival rate is O( ): EA (t) = t µ on, µ on = EX. he channel process is as before except indexed by : L (s) = L( s), < < 1. Note that the arrival rate is faster than the channel rate, as in the model in Section I. he heavy traffic condition is analogous to that in Section I: a balance between the mean arrival and departure rates µ on = λ()p()π(), (12) and a small reserve power u (x) (see (14)) is assumed (for stability of the queue process). Denoting the state space scaling as β( ), analogous to equation (8) in Section I, we have for the system equation: x (t) = x () + β( ) ( A ) (t) tµ on β( ) β( ) +β( ) 1+ t t t ( 1L(s)=} π() ) p() ds 1 L (s)=} λ()u (x) ds 1 L (s)=} λ()p()1 x (s)=} ds = x () + Ma (t) Md (t) t β( ) 1 L (s)=} λ()u (x(s)) ds + z (t).(13) For fixed, the level of the reserve power is scaled such that its contribution is a drift term in the limit model (see

4 (24)). In particular, u (x) = ū β( ) x > x (14) where ū is a constant. Equation (14) essentially says, for our 1-D queue example, apply all the reserve power u (x) as long as the queue is not empty. Fast and slow growth conditions on arrivals. Some of the possible limit models given below use state space scalings β( ) determined from the arrival process. In particular, the results of 14] are used, where the infinite source Poisson model of the arrival process is shown to converge to SLM or FBM, depending on whether the source rate λ( ) for the arrival process is in the slow growth or fast growth regime. In particular, the regimes are given by slow growth: fast growth: b(λ( ) ) lim lim b(λ( ) ) where b( ) is given by ( ) b(v) = (v), v >, 1 FV = (15) =, (16) and the inverse is g (y) = infv : g(v) y} for a nondecreasing function g. Informally, letting L(v) = 1 in (1) we have F V (v) = v α, b(v) = v 1/α. he slow growth condition is then given by (consistent with (15) for large ) (λ( ) ) 1 α, (17) As in the model in Section I, for the departures we note that 1 ( ) 1 1/2 L(s)=} π() ds (22) converges to Brownian motion in the Skorokhod topology. B. Convergence theorems Here we investigate the possible limit processes for the queue under fast growth and slow growth conditions. In each case the state space scalings lead to either the centered arrival or centered departure being a dominating process where the other process is shown to converge to the zero process. he scaling used and the limit results depend on the parameters of the arrival process (λ( ), α) and departure process () (supposing L(x) = 1 for simplicity). Interestingly, the inequalities α (23) are important for determining the scaling and limit processes in both the fast and slow growth regimes. In the fast growth regime, the limit process is RBM except for a case when the intensity λ( ) lies in a region defined using (23) resulting in a RFBM limit model for the queue (heorem 3 below). In the slow growth regime the limit process is RSLM, except for a case where (23) is used to define a region for λ( ) where the limit process is RBM (heorem 6 below). he inequality is illustrated in Figure 1. he region above line l produces the case for convergence to RFBM in the fast growth case and the region below the line produces the case for convergence to RBM in the slow growth case. or λ( ) α 1 (18) and the fast growth condition by (consistent with (16) for large ) α 1 λ( ). (19) Convergence results for the arrival and departure processes. From 14], the convergence results (used in Section II-B) for the arrival processes are: 1) Under the fast growth condition, λ( ) ( A ( ) µ λ( ) 1/2 (3 α)/2 on ( ) ) (2) L( ) converges to FBM in D, ) with the usual Skorokhod J 1 ]-topology (see 17]). 2) Under the slow growth condition, λ( ) b(λ( ) ) (A ( ) µ on ( )) (21) converges to SLM in finite dimensional distributions and in D, ) with the M 1 -topology (see 17]). Fig. 1. Inequality < α, > α for α (1, 2), (, 1) 2 We suppose for simplicity that the slowly varying function in (1) is L 1 or even L 1 for simplicity. However, the general case is discussed in Remark 1 below. We also note that using standard averaging techniques, the drift term in

5 (14) can be shown to converge (as in 3]) to π() λ()u(x)t. (24) his holds for each case below and we will not comment further on this past heorem 1. Fast growth regime. In this regime, for large, α 1 λ( ) by (16) and the limit models are determined by the inequalities (23) as shown next. heorem 1: Let < α β( ) = = 1. (25) 1+ (1 )/2 hen x converge to RBM. Proof. Part 1: unreflected process. From < α, it follows 2 α+ α 1 λ( ). With β( ) in (25) we have that Md converges to BM this follows from the techniques discussed in the appendix of 3]. here a perturbed test function method using a martingale characterization of Brownian motion was applied (using heorems and in 11]). Noting that for large β( ) λ( )1/2 (3 α)/2 λ( ) we have that M a (t) = 1 α/2+/2 λ( ) 1/2 = 1 α/2+/2 λ( ) 1/2 1, (26) λ( ) ( A ) (t) tµ λ( ) 1/2 (3 α)/2 on (27) converges to the zero process. Indeed, the first term in (27) converges to from (26) and the second term in (27) converges to FBM from (2). he scaling in u (x) is defined such that the corresponding term in (13) (third line down) gives the drift term π() λ()u(x)t in the limit process. Part 2: reflected process. We wish to show z } converges to a reflection process, keeping the queue size nonnegative. A standard approach (see 9] or 1]) is to establish weak convergence to process z (z z) and apply the Skorokhod representation theorem to show z is a reflection process. A key for establishing the weak convergence is showing that the collection of processes z ; } is tight. Following the discussion in 9], section 5.2, an asymptotic continuity argument along with the the reflection map from the Skorokhod problem can be used to show z ; } is tight and we outline the argument for our case next. From (13), define h (t) = x () + Ma (t) Md (t) t β( ) 1 L (s)=} λ()u (x(s)) ds. Due to the convergence of Md to BM, M a to the zero processes, and the fact that x (), λu (x) are bounded, the asymptotic continuity condition holds: } lim δ lim sup P sup sup h (t + s) h (t) µ t Λ s δ =, (28) for each Λ > and µ >. his property implies that z ; } is tight by the following argument. he reflection term z satisfies the z = max }, min s t h (s), (29) where the right hand side is the reflection map (see 9]). From this we have, z (τ + t) z (τ) = max, min x (τ) + h (τ + s) h (τ) ]}.(3) s t he tightness needed for weak convergence of z follows from (3) and the asymptotic continuity in (28) (see 9] for the details of the general criterion for showing tightness). he following two theorems concern the opposite inequality in (23). In this case, the limit processes depend on a finer growth condition on λ( ). heorem 2: Let β( ) = > α 1+ = 1 (1 )/2. Furthermore suppose that λ( ) is such that for consistency α 1 2 α+ λ( ). (31) hen x converges to RBM. Proof. he argument is the same as before where we only need to note that under (31) we still have that the first term in (27) converges to. heorem 3: Let β( ) = > α λ( ). (32) λ( ) 1/2 (3 α)/2 Furthermore, suppose that λ( ) is such that α 1 λ( ) 2 α+. (33) hen x to converges to RFBM.

6 Proof. Using the β( ) in (32) and noting (2), we have that Ma converges to FBM. Note that hen β( ) (1 )/2 = M d (t) = β( ) (1 )/2 1 (1+)/2 1+ t λ( )1/2 1. (34) 1 α/2+/2 ( 1L(s)=} π() ) λ()p() ds(35) converges to the zero process. Indeed, the first term in (35) converges to from (34) and the second term in (35) converges to BM from (22). he asymptotic continuity approach for obtaining the reflected process (described in heorem 1) can be applied here due to the continuity properties of the paths of fractional Brownian motion. Slow growth regime. In this regime, for large, λ( ) α 1. Limit models for subclasses obtained using the inequality illustrated in Figure 1 are given in the following theorems. For heorems 4 and 5 we note that the arrivals dominate departures and queue process converges to RSLM. heorem 4: Let β( ) = > α hen x converges to RSLM. λ( ). (36) λ( ) 1/α 1/α Proof. From > α it follows that (α 1)2 < 1 α 2 + α 2 and we have λ( ) α 1 1 α/2+α/2 α 1. With the β( ) in (36), we have from (21) that Ma converges to SLM. We note that β( ) (1 )/2 = = λ( ) 1 1/α 1/α+/2 1/2 ( λ( ) 1 α/2+α/2 α 1 ) α 1 α 1. (37) From this it follows, as in the discussion of heorem 3, that Md converges to the zero process. A remaining issue left to work out are the details for convergence of the reflection process since SLM is a discontinuous process; consequently, the asymptotic continuity approach described in the proof of heorem 1 cannot be applied. he following two theorems concern the opposite inequality in (23). As in the fast growth regime, the limit processes depend on a finer growth condition on λ( ). heorem 5: Let < α β( ) = λ( ). (38) λ( ) 1/α 1/α Furthermore, suppose that λ( ) is such that λ( ) 1 α/2+α/2 α 1 << α 1. hen x converges to RSLM. Proof. In this case we have that (37) still holds and so the discussion in heorem 4 carries over to this case. heorem 6: Let < α 1 β( ) =. (39) (1 )/2 Furthermore, suppose that λ( ) is such that λ( ) 1 α/2+α/2 α 1 α 1. hen x to converges to RBM. Proof. Under the β( ) in (39) and using (22), M d converges to Brownian motion. Note that β( ) λ( )1/α 1/α λ( ) so that by (21) we have that Ma process. = 1/α+/2 1/2 λ( ) 1 1/α 1, (4) converges to the zero Remark 1: We assumed for simplicity in heorems 1-6 that the slowly varying function appearing in (1) is L 1. However, the conditions determining the various limit processes can also be formulated for arbitrarily slowly varying functions L(v) (the most general case). For example, as shown in 14], fast growth is equivalent to α 1 λ( ) L( ). hen one can show that heorems 1-3 continue to hold if (31) is replaced by α 1 2 α+ L( ) 2 λ( ) L( ) and (33) is replaced by Remark 2: If α 1 λ( ) L( ) 2 α+ L( ) = α, then, loosely speaking, the limit process is expected to be a reflection of the combinations of Brownian motion, stable Lévy motion, or fractional Brownian motion.

7 Fig. 2. Summary of possible limit models. III. SUMMARY Figure 2 summarizes heorems 1-6. Note that the inequalities α relating the channel and arrival process are used in the fast growth and slow growth regimes. hey define regions for the growth conditions on λ( ) which cover the various possible limit models for the queue dynamics. o the best of our knowledge, these are the first results of their kind for wireless systems and have no analog in the current work in wireline models. Obtaining the queue models is an important step in characterizing the queue behavior and then considering the resource allocation problem in networks with competing queues. Our future work will broadly be in this direction, with a next focus on the details of RSLM and characterizing the queue behaviors using the collection of limit models obtained here. REFERENCES Personal Multimedia Communications (IEEE), Proceedings, 2(22), pp ] J. BERAN, R. SHERMAN, M.S. AQQU, AND W. WILLINGER, Longrange dependence in variable-bit-rate video traffic, IEEE ransactions on Communication, 43(1995), pp ] R.. BUCHE AND H.J. KUSHNER, Control of mobile communications with time-varying channels in heavy traffic, IEEE rans. Automatic Control, 47 (22), pp ] K. DȨBICKI, M. MANDJES, raffic with an fbm Limit: Convergence of the Stationary Workload Process, Queueing Systems, 46 (24), pp ] R. DELGADO A reflected fbm limit for fluid models with On/Off sources under heavy traffic, Stochastic processes and their applications (26), (in press) doi:1.116/.spa ] M. JIANG, M. NIKOLIC, S. HARDY, L. RAJKOVIC, Impact of selfsimilarity on wireless data network performance, IEEE Intl. Conference on Comm., 2, pp , 21. 7] R. KALDEN, S. IBRAHIM Searching for self-similarity in GPRS, Proceedings of the 5th annual Passive and Active Measurement Workshop (PAM 24), Antibes Juan-les-Pins, France, April 19-2, 24. 8]. KONSANOPOULOS, S. LIN Fractional Brownian Approximations of Queueing Networks, Stochastic Networks, Lecture Notes in Statistics, 117, Springer, NY, ] H.J. KUSHNER, Heavy raffic Analysis of Controlled Queueing and Communication Networks. Springer, New York, 21. 1] H.J. KUSHNER, P. DUPUIS, Numerical Methods for Stochastic Control Problems in Continuous ime, Second Edition, Springer, New York, ] H.J. KUSHNER Stochastic Approximation Algorithms and Applications. Springer, NY ] A. KRENDZEL, Y. KOUCHERYAVY, J. HARJU, S. LOPAIN, Network Planning Problems in 3G/4G Wireless Systems, he 1st COS 29 Management Committee Meeting, Malta, Oct ] W.E. LELAND, M.S. AQQU, W. WILLINGER, AND D.V. WILSON, On the self-similar nature of Ethernet traffic, IEEE/ACM ransactions on Networking, 2:1 (1994), pp ]. MIKOSCH, S. RESNICK, H. ROOZÉN, Is Network raffic Approximated by Stable Lévy Motion or Fractional Brownian Motion? he Annals of Applied Probability, 17, No. 1, pp ] R. NARASIMHA AND R. RAO, Modeling Variable Bit Rate Video On Wired and Wireless Networks Using Discrete-ime Self-Similar Systems, Proceedings, IEEE International Conference on Personal Wireless Communications, 22, pp ] A. L. SOLYAR, Max Weight scheduling in a generalized switch: State space collapse and workload minimization in heavy traffic, he Annals of Applied Probability, 14(1): 1 53 February ] W. WHI, Stochastic Process Limits Springer, New York, 22. 1] D.R. BASGEE, J. IRVINE, A. MUNRO, P. DUGENIE, D. KALESHI, O. LAZARO, Impact of Mobility on Aggregate raffic in Mobile Multimedia System, he 5th International Symposium on Wireless

HEAVY TRAFFIC METHODS IN WIRELESS SYSTEMS: TOWARDS MODELING HEAVY TAILS AND LONG RANGE DEPENDENCE

HEAVY TRAFFIC METHODS IN WIRELESS SYSTEMS: TOWARDS MODELING HEAVY TAILS AND LONG RANGE DEPENDENCE HEAVY TRAFFIC METHODS IN WIRELESS SYSTEMS: TOWARDS MODELING HEAVY TAILS AND LONG RANGE DEPENDENCE ROBERT T. BUCHE, ARKA GHOSH, VLADAS PIPIRAS, AND JIM X. ZHANG Abstract. Heavy traffic models for wireless

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 22 12/09/2013. Skorokhod Mapping Theorem. Reflected Brownian Motion

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 22 12/09/2013. Skorokhod Mapping Theorem. Reflected Brownian Motion MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.7J Fall 213 Lecture 22 12/9/213 Skorokhod Mapping Theorem. Reflected Brownian Motion Content. 1. G/G/1 queueing system 2. One dimensional reflection mapping

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic Èíôîðìàöèîííûå ïðîöåññû, Òîì 5, 1, 2005, ñòð. 4046. c 2004 D'Apice, Manzo. INFORMATION THEORY AND INFORMATION PROCESSING Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Design of IP networks with Quality of Service

Design of IP networks with Quality of Service Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. Pag. 1 Design of IP networks with Quality of Service 1 Course of Multimedia Internet (Sub-course Reti Internet

More information

Estimation of the long Memory parameter using an Infinite Source Poisson model applied to transmission rate measurements

Estimation of the long Memory parameter using an Infinite Source Poisson model applied to transmission rate measurements of the long Memory parameter using an Infinite Source Poisson model applied to transmission rate measurements François Roueff Ecole Nat. Sup. des Télécommunications 46 rue Barrault, 75634 Paris cedex 13,

More information

Network Traffic Characteristic

Network Traffic Characteristic Network Traffic Characteristic Hojun Lee hlee02@purros.poly.edu 5/24/2002 EL938-Project 1 Outline Motivation What is self-similarity? Behavior of Ethernet traffic Behavior of WAN traffic Behavior of WWW

More information

Poisson Cluster process as a model for teletraffic arrivals and its extremes

Poisson Cluster process as a model for teletraffic arrivals and its extremes Poisson Cluster process as a model for teletraffic arrivals and its extremes Barbara González-Arévalo, University of Louisiana Thomas Mikosch, University of Copenhagen Gennady Samorodnitsky, Cornell University

More information

1954 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 49, NO. 11, NOVEMBER Robert Buche, Member, IEEE, and Harold J. Kushner, Life Fellow, IEEE

1954 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 49, NO. 11, NOVEMBER Robert Buche, Member, IEEE, and Harold J. Kushner, Life Fellow, IEEE 1954 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 49, NO. 11, NOVEMBER 2004 Control of Mobile Communication Systems With Time-Varying Channels via Stability Methods Robert Buche, Member, IEEE, and Harold

More information

Queue Analysis for Wireless Packet Data Traffic

Queue Analysis for Wireless Packet Data Traffic Queue Analysis for Wireless Packet Data Traffic Shahram Teymori and Weihua Zhuang Centre for Wireless Communications (CWC), Department of Electrical and Computer Engineering, University of Waterloo, Waterloo,

More information

Stochastic Network Calculus

Stochastic Network Calculus Stochastic Network Calculus Assessing the Performance of the Future Internet Markus Fidler joint work with Amr Rizk Institute of Communications Technology Leibniz Universität Hannover April 22, 2010 c

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin Multiplicative Multifractal Modeling of Long-Range-Dependent (LRD) Trac in Computer Communications Networks Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles

More information

Effect of the Traffic Bursts in the Network Queue

Effect of the Traffic Bursts in the Network Queue RICE UNIVERSITY Effect of the Traffic Bursts in the Network Queue by Alireza KeshavarzHaddad A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science Approved, Thesis

More information

Quality of Real-Time Streaming in Wireless Cellular Networks : Stochastic Modeling and Analysis

Quality of Real-Time Streaming in Wireless Cellular Networks : Stochastic Modeling and Analysis Quality of Real-Time Streaming in Wireless Cellular Networs : Stochastic Modeling and Analysis B. Blaszczyszyn, M. Jovanovic and M. K. Karray Based on paper [1] WiOpt/WiVid Mai 16th, 2014 Outline Introduction

More information

Stochastic-Process Limits

Stochastic-Process Limits Ward Whitt Stochastic-Process Limits An Introduction to Stochastic-Process Limits and Their Application to Queues With 68 Illustrations Springer Contents Preface vii 1 Experiencing Statistical Regularity

More information

FRACTIONAL BROWNIAN MOTION WITH H < 1/2 AS A LIMIT OF SCHEDULED TRAFFIC

FRACTIONAL BROWNIAN MOTION WITH H < 1/2 AS A LIMIT OF SCHEDULED TRAFFIC Applied Probability Trust ( April 20) FRACTIONAL BROWNIAN MOTION WITH H < /2 AS A LIMIT OF SCHEDULED TRAFFIC VICTOR F. ARAMAN, American University of Beirut PETER W. GLYNN, Stanford University Keywords:

More information

Exploring regularities and self-similarity in Internet traffic

Exploring regularities and self-similarity in Internet traffic Exploring regularities and self-similarity in Internet traffic FRANCESCO PALMIERI and UGO FIORE Centro Servizi Didattico Scientifico Università degli studi di Napoli Federico II Complesso Universitario

More information

Data Network Models of

Data Network Models of Data Network Models of Sidney Resnick School of Operations Research and Industrial Engineering Rhodes Hall, Cornell University Ithaca NY 14853 USA http://www.orie.cornell.edu/ sid sir1@cornell.edu August

More information

A source model for ISDN packet data traffic *

A source model for ISDN packet data traffic * 1 A source model for ISDN packet data traffic * Kavitha Chandra and Charles Thompson Center for Advanced Computation University of Massachusetts Lowell, Lowell MA 01854 * Proceedings of the 28th Annual

More information

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract

More information

HEAVY-TRAFFIC EXTREME-VALUE LIMITS FOR QUEUES

HEAVY-TRAFFIC EXTREME-VALUE LIMITS FOR QUEUES HEAVY-TRAFFIC EXTREME-VALUE LIMITS FOR QUEUES by Peter W. Glynn Department of Operations Research Stanford University Stanford, CA 94305-4022 and Ward Whitt AT&T Bell Laboratories Murray Hill, NJ 07974-0636

More information

IEOR 8100: Topics in OR: Asymptotic Methods in Queueing Theory. Fall 2009, Professor Whitt. Class Lecture Notes: Wednesday, September 9.

IEOR 8100: Topics in OR: Asymptotic Methods in Queueing Theory. Fall 2009, Professor Whitt. Class Lecture Notes: Wednesday, September 9. IEOR 8100: Topics in OR: Asymptotic Methods in Queueing Theory Fall 2009, Professor Whitt Class Lecture Notes: Wednesday, September 9. Heavy-Traffic Limits for the GI/G/1 Queue 1. The GI/G/1 Queue We will

More information

A Review of Basic FCLT s

A Review of Basic FCLT s A Review of Basic FCLT s Ward Whitt Department of Industrial Engineering and Operations Research, Columbia University, New York, NY, 10027; ww2040@columbia.edu September 10, 2016 Abstract We briefly review

More information

Optimal scaling of average queue sizes in an input-queued switch: an open problem

Optimal scaling of average queue sizes in an input-queued switch: an open problem DOI 10.1007/s11134-011-9234-1 Optimal scaling of average queue sizes in an input-queued switch: an open problem Devavrat Shah John N. Tsitsiklis Yuan Zhong Received: 9 May 2011 / Revised: 9 May 2011 Springer

More information

SMALL AND LARGE TIME SCALE ANALYSIS OF A NETWORK TRAFFIC MODEL

SMALL AND LARGE TIME SCALE ANALYSIS OF A NETWORK TRAFFIC MODEL SMALL AND LARGE IME SCALE ANALYSIS OF A NEWORK RAFFIC MODEL KRISHANU MAULIK AND SIDNEY RESNICK Abstract Recent empirical studies of the internet and WAN traffic data have observed multifractal behavior

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

Long range dependent Markov chains with applications

Long range dependent Markov chains with applications Long range dependent Markov chains with applications Barlas Oğuz, Venkat Anantharam Department of Electrical Engineering and Computer Sciences University of California, Berkeley Email: {barlas, ananth}@eecs.berkeley.edu

More information

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale 222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale Do Young Eun and Ness B. Shroff, Senior

More information

Stochastic Optimization for Undergraduate Computer Science Students

Stochastic Optimization for Undergraduate Computer Science Students Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline

More information

Managing Service Systems with an Offline Waiting Option and Customer Abandonment: Companion Note

Managing Service Systems with an Offline Waiting Option and Customer Abandonment: Companion Note Managing Service Systems with an Offline Waiting Option and Customer Abandonment: Companion Note Vasiliki Kostami Amy R. Ward September 25, 28 The Amusement Park Ride Setting An amusement park ride departs

More information

A Virtual Queue Approach to Loss Estimation

A Virtual Queue Approach to Loss Estimation A Virtual Queue Approach to Loss Estimation Guoqiang Hu, Yuming Jiang, Anne Nevin Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology, Norway

More information

Kalman filtering with intermittent heavy tailed observations

Kalman filtering with intermittent heavy tailed observations Kalman filtering with intermittent heavy tailed observations Sabina Zejnilović Abstract In large wireless sensor networks, data can experience loss and significant delay which from the aspect of control

More information

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel

A Simple Memoryless Proof of the Capacity of the Exponential Server Timing Channel A Simple Memoryless Proof of the Capacity of the Exponential Server iming Channel odd P. Coleman ECE Department Coordinated Science Laboratory University of Illinois colemant@illinois.edu Abstract his

More information

On the departure process of a leaky bucket system with long-range dependent input traffic

On the departure process of a leaky bucket system with long-range dependent input traffic Queueing Systems 28 (998) 9 24 9 On the departure process of a leaky bucket system with long-range dependent input traffic Socrates Vamvakos and Venkat Anantharam EECS Department, University of California,

More information

Performance Analysis of Priority Queueing Schemes in Internet Routers

Performance Analysis of Priority Queueing Schemes in Internet Routers Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab

More information

A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks

A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networs Xiang Yu, Yang Chen and Chunming Qiao Department of Computer Science and Engineering State University of New Yor

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH 1998 315 Asymptotic Buffer Overflow Probabilities in Multiclass Multiplexers: An Optimal Control Approach Dimitris Bertsimas, Ioannis Ch. Paschalidis,

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

MODELS FOR COMPUTER NETWORK TRAFFIC

MODELS FOR COMPUTER NETWORK TRAFFIC MODELS FOR COMPUTER NETWORK TRAFFIC Murad S. Taqqu Boston University Joint work with Walter Willinger, Joshua Levy and Vladas Pipiras,... Web Site http://math.bu.edu/people/murad OUTLINE Background: 1)

More information

Evaluation of Effective Bandwidth Schemes for Self-Similar Traffic

Evaluation of Effective Bandwidth Schemes for Self-Similar Traffic Proceedings of the 3th ITC Specialist Seminar on IP Measurement, Modeling and Management, Monterey, CA, September 2000, pp. 2--2-0 Evaluation of Effective Bandwidth Schemes for Self-Similar Traffic Stefan

More information

queue KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology

queue KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology Analysis of the Packet oss Process in an MMPP+M/M/1/K queue György Dán, Viktória Fodor KTH, Royal Institute of Technology, Department of Microelectronics and Information Technology {gyuri,viktoria}@imit.kth.se

More information

Statistical analysis of peer-to-peer live streaming traffic

Statistical analysis of peer-to-peer live streaming traffic Statistical analysis of peer-to-peer live streaming traffic Levente Bodrog 1 Ákos Horváth 1 Miklós Telek 1 1 Technical University of Budapest Probability and Statistics with Applications, 2009 Outline

More information

Long-Range Dependence and Self-Similarity. c Vladas Pipiras and Murad S. Taqqu

Long-Range Dependence and Self-Similarity. c Vladas Pipiras and Murad S. Taqqu Long-Range Dependence and Self-Similarity c Vladas Pipiras and Murad S. Taqqu January 24, 2016 Contents Contents 2 Preface 8 List of abbreviations 10 Notation 11 1 A brief overview of times series and

More information

Packet Size

Packet Size Long Range Dependence in vbns ATM Cell Level Trac Ronn Ritke y and Mario Gerla UCLA { Computer Science Department, 405 Hilgard Ave., Los Angeles, CA 90024 ritke@cs.ucla.edu, gerla@cs.ucla.edu Abstract

More information

CONVERGENCE TO FRACTIONAL BROWNIAN MOTION AND LOSS PROBABILITY. Jin-Chun Kim and Hee-Choon Lee

CONVERGENCE TO FRACTIONAL BROWNIAN MOTION AND LOSS PROBABILITY. Jin-Chun Kim and Hee-Choon Lee Kangweon-Kyungki Math. Jour. (2003), No., pp. 35 43 CONVERGENCE TO FRACTIONAL BROWNIAN MOTION AND LOSS PROBABILITY Jin-Chun Kim and Hee-Choon Lee Abstract. We study the weak convergence to Fractional Brownian

More information

Maximum pressure policies for stochastic processing networks

Maximum pressure policies for stochastic processing networks Maximum pressure policies for stochastic processing networks Jim Dai Joint work with Wuqin Lin at Northwestern Univ. The 2011 Lunteren Conference Jim Dai (Georgia Tech) MPPs January 18, 2011 1 / 55 Outline

More information

Analysis of Software Artifacts

Analysis of Software Artifacts Analysis of Software Artifacts System Performance I Shu-Ngai Yeung (with edits by Jeannette Wing) Department of Statistics Carnegie Mellon University Pittsburgh, PA 15213 2001 by Carnegie Mellon University

More information

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe

Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

Finite-time Ruin Probability of Renewal Model with Risky Investment and Subexponential Claims

Finite-time Ruin Probability of Renewal Model with Risky Investment and Subexponential Claims Proceedings of the World Congress on Engineering 29 Vol II WCE 29, July 1-3, 29, London, U.K. Finite-time Ruin Probability of Renewal Model with Risky Investment and Subexponential Claims Tao Jiang Abstract

More information

Stability and Rare Events in Stochastic Models Sergey Foss Heriot-Watt University, Edinburgh and Institute of Mathematics, Novosibirsk

Stability and Rare Events in Stochastic Models Sergey Foss Heriot-Watt University, Edinburgh and Institute of Mathematics, Novosibirsk Stability and Rare Events in Stochastic Models Sergey Foss Heriot-Watt University, Edinburgh and Institute of Mathematics, Novosibirsk ANSAPW University of Queensland 8-11 July, 2013 1 Outline (I) Fluid

More information

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974 LIMITS FOR QUEUES AS THE WAITING ROOM GROWS by Daniel P. Heyman Ward Whitt Bell Communications Research AT&T Bell Laboratories Red Bank, NJ 07701 Murray Hill, NJ 07974 May 11, 1988 ABSTRACT We study the

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Least Mean Square Algorithms With Markov Regime-Switching Limit

Least Mean Square Algorithms With Markov Regime-Switching Limit IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 5, MAY 2005 577 Least Mean Square Algorithms With Markov Regime-Switching Limit G. George Yin, Fellow, IEEE, and Vikram Krishnamurthy, Fellow, IEEE

More information

Mice and Elephants Visualization of Internet

Mice and Elephants Visualization of Internet Mice and Elephants Visualization of Internet Traffic J. S. Marron, Felix Hernandez-Campos 2 and F. D. Smith 2 School of Operations Research and Industrial Engineering, Cornell University, Ithaca, NY, 4853,

More information

THE SKOROKHOD OBLIQUE REFLECTION PROBLEM IN A CONVEX POLYHEDRON

THE SKOROKHOD OBLIQUE REFLECTION PROBLEM IN A CONVEX POLYHEDRON GEORGIAN MATHEMATICAL JOURNAL: Vol. 3, No. 2, 1996, 153-176 THE SKOROKHOD OBLIQUE REFLECTION PROBLEM IN A CONVEX POLYHEDRON M. SHASHIASHVILI Abstract. The Skorokhod oblique reflection problem is studied

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

arxiv: v1 [cs.sy] 24 Jul 2012

arxiv: v1 [cs.sy] 24 Jul 2012 Delay Stability Regions of the Max-Weight Policy under Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis arxiv:1207.5746v1 [cs.sy] 24 Jul 2012 Abstract We carry out a delay

More information

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance

Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This

More information

On the Impact of Traffic Characteristics on Radio Resource Fluctuation in Multi-Service Cellular CDMA Networks

On the Impact of Traffic Characteristics on Radio Resource Fluctuation in Multi-Service Cellular CDMA Networks On the Impact of Traffic Characteristics on Radio Resource Fluctuation in Multi-Service Cellular CDMA Networks Keivan Navaie Sys. and Comp. Department Carleton University, Ottawa, Canada keivan@sce.carleton.ca

More information

Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic

Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic 1 Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic Mihalis G. Markakis, Eytan Modiano, and John N. Tsitsiklis Abstract We study multi-hop networks with flow-scheduling

More information

Asymptotics for Polling Models with Limited Service Policies

Asymptotics for Polling Models with Limited Service Policies Asymptotics for Polling Models with Limited Service Policies Woojin Chang School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205 USA Douglas G. Down Department

More information

A discrete-time priority queue with train arrivals

A discrete-time priority queue with train arrivals A discrete-time priority queue with train arrivals Joris Walraevens, Sabine Wittevrongel and Herwig Bruneel SMACS Research Group Department of Telecommunications and Information Processing (IR07) Ghent

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Approximate Queueing Model for Multi-rate Multi-user MIMO systems. An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is

More information

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov

More information

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,

More information

SELF-SIMILAR COMMUNICATION MODELS AND VERY HEAVY TAILS. By Sidney Resnick 1 and Holger Rootzén 2 Cornell University and Chalmers University

SELF-SIMILAR COMMUNICATION MODELS AND VERY HEAVY TAILS. By Sidney Resnick 1 and Holger Rootzén 2 Cornell University and Chalmers University he Annals of Applied Probability 2000, Vol. 10, No. 3, 753 778 SELF-SIMILAR COMMUNICAION MODELS AND VERY HEAVY AILS By Sidney Resnick 1 and Holger Rootzén 2 Cornell University and Chalmers University Several

More information

Functional Limit Theorems for A New Class of Non-Stationary Shot Noise Processes

Functional Limit Theorems for A New Class of Non-Stationary Shot Noise Processes Functional Limit Theorems for A New Class of Non-Stationary Shot Noise Processes GUODONG PANG AND YUHANG ZHOU Abstract. We study a class of non-stationary shot noise processes which have a general arrival

More information

Computer Networks More general queuing systems

Computer Networks More general queuing systems Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a

More information

Performance Analysis and Enhancement of the Next Generation Cellular Networks

Performance Analysis and Enhancement of the Next Generation Cellular Networks 1 Performance Analysis and Enhancement of the Next Generation Cellular Networks Xiang Yu, Chunming Qiao, Xin Wang and Dahai Xu Department of Computer Science, Frostburg State University Department of Computer

More information

Stochastic process. X, a series of random variables indexed by t

Stochastic process. X, a series of random variables indexed by t Stochastic process X, a series of random variables indexed by t X={X(t), t 0} is a continuous time stochastic process X={X(t), t=0,1, } is a discrete time stochastic process X(t) is the state at time t,

More information

Performance Evaluation and Service Rate Provisioning for a Queue with Fractional Brownian Input

Performance Evaluation and Service Rate Provisioning for a Queue with Fractional Brownian Input Performance Evaluation and Service Rate Provisioning for a Queue with Fractional Brownian Input Jiongze Chen 1, Ronald G. Addie 2, Moshe Zukerman 1 Abstract The Fractional Brownian motion (fbm) traffic

More information

CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. XI Stochastic Stability - H.J. Kushner

CONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. XI Stochastic Stability - H.J. Kushner STOCHASTIC STABILITY H.J. Kushner Applied Mathematics, Brown University, Providence, RI, USA. Keywords: stability, stochastic stability, random perturbations, Markov systems, robustness, perturbed systems,

More information

Internet Traffic Modeling and Its Implications to Network Performance and Control

Internet Traffic Modeling and Its Implications to Network Performance and Control Internet Traffic Modeling and Its Implications to Network Performance and Control Kihong Park Department of Computer Sciences Purdue University park@cs.purdue.edu Outline! Motivation! Traffic modeling!

More information

Multi-Access Interference Processes Are Self-Similar in Multimedia CDMA Cellular Networks

Multi-Access Interference Processes Are Self-Similar in Multimedia CDMA Cellular Networks Multi-Access Interference Processes Are Self-Similar in Multimedia CDMA Cellular Networks Junshan Zhang Dept. of EE Arizona State University Tempe, AZ 85287, USA email: junshan.zhang@asu.edu Takis Konstantopoulos

More information

A Direct Approach to Transient Queue-Size Distribution in a Finite-Buffer Queue with AQM

A Direct Approach to Transient Queue-Size Distribution in a Finite-Buffer Queue with AQM Appl. Math. Inf. Sci. 7, No. 3, 99-915 (213) 99 Applied Mathematics & Information Sciences An International Journal A Direct Approach to Transient Queue-Size Distribution in a Finite-Buffer Queue with

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer

More information

Convexity Properties of Loss and Overflow Functions

Convexity Properties of Loss and Overflow Functions Convexity Properties of Loss and Overflow Functions Krishnan Kumaran?, Michel Mandjes y, and Alexander Stolyar? email: kumaran@lucent.com, michel@cwi.nl, stolyar@lucent.com? Bell Labs/Lucent Technologies,

More information

The Burstiness Behavior of Regulated Flows in Networks

The Burstiness Behavior of Regulated Flows in Networks The Burstiness Behavior of Regulated Flows in Networks Yu Ying 1, Ravi Mazumdar 2, Catherine Rosenberg 2 and Fabrice Guillemin 3 1 Dept. of ECE, Purdue University, West Lafayette, IN, 47906, U.S.A. yingy@ecn.purdue.edu

More information

Tighter Effective Bandwidth Estimation for Multifractal Network Traffic

Tighter Effective Bandwidth Estimation for Multifractal Network Traffic Tighter Effective Bandwidth Estimation for Multifractal Network Traffic Jeferson Wilian de Godoy Stênico and Lee Luan Ling School of Electrical and Computer Engineering State University of Campinas - Unicamp

More information

Modeling Video Traffic Using M/G/ Input Processes: A Compromise Between Markovian and LRD Models. Marwan M. Krunz and Armand M.

Modeling Video Traffic Using M/G/ Input Processes: A Compromise Between Markovian and LRD Models. Marwan M. Krunz and Armand M. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 5, JUNE 1998 733 Modeling Video Traffic Using M/G/ Input Processes: A Compromise Between Markovian and LRD Models Marwan M. Krunz and Armand

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Network Traffic Modeling using a Multifractal Wavelet Model

Network Traffic Modeling using a Multifractal Wavelet Model 5-th International Symposium on Digital Signal Processing for Communication Systems, DSPCS 99, Perth, 1999 Network Traffic Modeling using a Multifractal Wavelet Model Matthew S. Crouse, Rudolf H. Riedi,

More information

OPEN MULTICLASS HL QUEUEING NETWORKS: PROGRESS AND SURPRISES OF THE PAST 15 YEARS. w 1. v 2. v 3. Ruth J. Williams University of California, San Diego

OPEN MULTICLASS HL QUEUEING NETWORKS: PROGRESS AND SURPRISES OF THE PAST 15 YEARS. w 1. v 2. v 3. Ruth J. Williams University of California, San Diego OPEN MULTICLASS HL QUEUEING NETWORKS: PROGRESS AND SURPRISES OF THE PAST 15 YEARS v 2 w3 v1 w 2 w 1 v 3 Ruth J. Williams University of California, San Diego 1 PERSPECTIVE MQN SPN Sufficient conditions

More information

On the Partitioning of Servers in Queueing Systems during Rush Hour

On the Partitioning of Servers in Queueing Systems during Rush Hour On the Partitioning of Servers in Queueing Systems during Rush Hour This paper is motivated by two phenomena observed in many queueing systems in practice. The first is the partitioning of server capacity

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson

More information

Throughput Optimal Scheduling in the presence of Heavy-Tailed Traffic

Throughput Optimal Scheduling in the presence of Heavy-Tailed Traffic Forty-Eighth Annual Allerton Conference Allerton ouse, UIUC, Illinois, USA September 29 - October 1, 2010 Throughput Optimal Scheduling in the presence of eavy-tailed Traffic Krishna Jagannathan, Mihalis

More information

Stochastic volatility models: tails and memory

Stochastic volatility models: tails and memory : tails and memory Rafa l Kulik and Philippe Soulier Conference in honour of Prof. Murad Taqqu 19 April 2012 Rafa l Kulik and Philippe Soulier Plan Model assumptions; Limit theorems for partial sums and

More information

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley)

Job Scheduling and Multiple Access. Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) Job Scheduling and Multiple Access Emre Telatar, EPFL Sibi Raj (EPFL), David Tse (UC Berkeley) 1 Multiple Access Setting Characteristics of Multiple Access: Bursty Arrivals Uncoordinated Transmitters Interference

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS

TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS by Ward Whitt AT&T Bell Laboratories Murray Hill, NJ 07974-0636 March 31, 199 Revision: November 9, 199 ABSTRACT

More information

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks by Doo Il Choi, Charles Knessl and Charles Tier University of Illinois at Chicago 85 South

More information

The Fluid Limit of an Overloaded Processor Sharing Queue

The Fluid Limit of an Overloaded Processor Sharing Queue MATHEMATICS OF OPERATIONS RESEARCH Vol. 31, No. 2, May 26, pp. 316 35 issn 364-765X eissn 1526-5471 6 312 316 informs doi 1.1287/moor.15.181 26 INFORMS The Fluid Limit of an Overloaded Processor Sharing

More information

MARKOV PROCESSES. Valerio Di Valerio

MARKOV PROCESSES. Valerio Di Valerio MARKOV PROCESSES Valerio Di Valerio Stochastic Process Definition: a stochastic process is a collection of random variables {X(t)} indexed by time t T Each X(t) X is a random variable that satisfy some

More information