Performance Analysis of Priority Queueing Schemes in Internet Routers

Size: px
Start display at page:

Download "Performance Analysis of Priority Queueing Schemes in Internet Routers"

Transcription

1 Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab and Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign lkshmknt@ifpuiucedu C L Beck Coordinated Science Lab and Department of General Engineering University of Illinois Urbana-Champaign beck@uiucedu R Srikant Coordinated Science Lab and Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign rsrikant@uiucedu Abstract It is well-known that file sizes in the Internet have a very large variance One implication of this fact is that most of the files are small and contribute to a small amount of the total traffic, while a few large files account for most of the traffic in the Internet If all the files share the available capacity in a fair manner to approximate weighted processor sharing, then short files may experience delays that are large in comparison to their file sizes In this paper, we study the performance of a simple priority scheme at the router which preferentially treats shortflows Using simple fluid models, we show that such a priority scheme improves the performance of shortflows significantly while the performance of long-flows does not deteriorate much I Introduction Many studies have shown that the file size distribution in the Internet is heavy tailed (see, for example, []) This fact implies that most of the files transferred over the Internet are small in size (of the order of a few tens of kilobytes) and only a small fraction of the files are large It is roughly estimated that -% of the flows (that correspond to large files) carry about 8-9% of the Internet traffic During the transmission of the small files, which we will refer to as short-flows, the underlying TCP congestion control mechanism does not leave the slow start phase For a discussion of TCP dynamics, we refer the reader to [] Any packet loss incurred in the slow-start phase of TCP causes restarts, ie, the window size is reset to one, thus resulting in a significant degradation of throughput The degradation may be dramatic, especially when the router is severely congested A natural solution to the above problem is to provide priorities to the short-flows Queues with class based priorities have been extensively studied in the past (see, for example, []) The main conclusion of these studies has been that one can achieve a reduction in the waiting times for higher priority queues, but this comes at the expense of the customers in the lower priority queues This conclusion led many to raise objections to providing higher priority to short-flows (commonly referred to as short jobs in queueing-theoretic literature) [] Specifically, it has been argued that providing priorities to smaller jobs can lead to large waiting times for the larger jobs These claims were investigated by Bansal and Harchol-Balter [] in a more recent work on SRPT (Shortest Remaining Processing Time) Under this policy, after a customer departs from the system, the server processes that customer who would take the least amount of time to complete service Their findings suggest that, if the file-size distribution is heavy tailed, then the additional delays suffered by the long-flows are insignificant Implementing SRPT in the Internet is however, a very difficult task; each router must be made aware of the remaining file sizes of all the incoming flows This requires per-flow information and given the current technology, such policies cannot be implemented without significantly affecting router speeds Therefore, one needs to look for alternative schemes that can achieve similar performance without compromising on the router abilities One such scheme is to divide files into two classes and enforce strict priority for one class over the other In other words, all files that are below some threshold will be given higher priority The priority can be enforced either at the edges of the network by setting a bit in each of the packet headers that belong to short-flows (for example, using the DiffServ architecture [, ]), or by identifying long flows at the router Using a sampling technique proposed by Estan and Varghese [] for traffic measurements, an algorithm called SIFT has been developed by Prabhakar et al [] where long-flows are identified and moved to a low-priority buffer at the router Assuming that long and short-flows are identified using some unspecified algorithm, the effect of such priority based policies is examined via ns- simulations by Chen and Heidemann [] The results in [, ] indicate that it is possible to achieve a significant improvement in the bandwidth of short-flows, while keeping the losses of long-flows to a minimum In this paper, we evaluate the performance of such prioritybased schemes in the Internet via a fluid model Specifically, we first show that, without priorities, the throughput attained by short-flows is small due to the nature of bandwidth sharing that occurs in the current Internet We further show, via analysis and simulations, that by providing priorities one can significantly reduce the delays faced by the short-flows, while the additional delays experienced by the long-flows are very small We note that we do not address the problem of identifying short and long-flows We assume that such mechanisms

2 exist and they can be implemented without causing significant errors [, ] The reason for studying fluid models, as compared to stochastic models, is that they are simpler to analyze and can be generalized to both non-exponential distributions (which we consider in a longer version of the paper) and systems with access bandwidth constraints, although we only discuss access bandwidth constraints in this paper and do not deal with non-exponential file sizes here On the other hand, the stochastic model of the considered system is very hard to solve analytically and closed form solutions exist only when the file-size distributions are exponential[, 7, ] The rest of the paper is organized as follows In Section II we briefly describe the model and evaluate the performance when no priorities are enforced In Section III we analyze the performance of the system when priorities are enforced The simulation results are contained in Section IV and we provide the conclusions in Section V II Fluid Models with No Priorities We consider a single link accessed by many users Shortflows arrive at the system according to a Poisson process with mean rate λ s We assume that the short-flow file sizes are exponentially distributed with mean Similarly, the longflows arrive according to another independent Poisson process with mean rate λ l and their file sizes are exponentially distributed with mean Note that from a well-known property of Poisson processes, this arrival model can be viewed as a single Poisson process, with a hyper-exponential file-size distribution In fact, one can generalize this model to allow the file size to be a mixture of many exponential distributions, thus closely approximating any heavy-tailed distribution [8] We do not consider such generalizations here; however, it would be fairly straightforward to extend our analysis to the more general model It is assumed that / / Typically, around 8-9% of the flows are short-flows and therefore, λ s λ l However, most of the bytes in the Internet are carried by the long-flows Hence we further assume λ s < λ l To avoid trivial cases, we assume λ s, λ l > The rate at which any user can transmit is determined by the capacity of the bottleneck link and by the way in which the link capacity is shared among the competing users Let the number of long-flows in the system be denoted by n l and the number of short-flows be n s It is well known that the data rate of a user can be approximated by its window size divided by its RTT (round-trip time) Thus, at any given time, the data rate of a flow is proportional to window size As the short-flows never leave the slow-start phase of TCP, the window sizes of the short-flows will be very small Thus, the bandwidth received by short-flows will be small On the other hand, the long-flows will be in the congestion avoidance phase and thus, their window sizes will be much higher than that of short-flows To model this, we assume that the capacity of the bottleneck link is shared in a proportional manner with weights w s and w l (w l > w s) Specifically, the data rate of a short-flow is given by x s = w sc n sw s + n l w l, () where C denotes the capacity of the link Similarly, the data rate of a long-flow is given by x l = w l C n sw s + n l w l () Such a sharing policy tends to be unfair to short-flows It is easy to see that xs x l = ws w l As w s < w l, the bandwidth seen by short-flows can be much smaller than the bandwidth seen by the large-flows Without loss of generality, we can assume C = Then, under an appropriate scaling [9], we can describe the evolution of the flows in the system by the following differential equations: n l = λ l n l x l, n s = λ s n sx s Let us denote the total load on the system by () ρ = λ l + λs = ρ l + ρ s () We will now calculate the average bandwidth received by a short-flow and a long-flow at equilibrium, when the system is critically loaded, ie, ρ = IIA Convergence to Equilibrium The stationary point of the system of differential equations () is given by ρ l = n l x l, ρ s = n () sx s, where n s and n l denote the equilibrium values We now show that under critically-loaded conditions, the system will asymptotically converge to this stationary point The amount of work remaining in the system is given by W (t) = ns + n l Since the system is critically loaded the total work remaining in the system, denoted by W (t), is invariant with time To see this, note that Ẇ (t) = d dt ( ns + n l ) = ρ s n sx s + ρ l n l x l = (ρ s + ρ l ) (n sx s + n l x l ) = So, if at any point in time, say t, ṅ s(t ) =, then ṅ l (t ) = Further, for all t > t, the system will be at equilibrium To prove that either ṅ l (t) or ṅ s(t) reaches zero, we note the following Suppose, n s >, then by (), n l < Also, for all values of n s > and n l >, the functions, n s and n l are continuous and further, n l Therefore, n l is a monotonically decreasing function, bounded below by zero Convergence to equilibrium immediately follows IIB Equilibrium analysis ()

3 Now we analyze the system at equilibrium As observed previously, the amount of work in the system is constant Hence, n l + n s = n l() + ns() = W () (7) Using () and () in (), we get From (8) and (7), we get ρ s ρ l = n sw s n l w l (8) x s = ρsw l + ρ l w s (w l )W () x l = ρsw l + ρ l w s (w s )W () III Fluid Models with Priorities From the analysis carried out in the preceding sections, it is clear that the long-flows on average get much higher bandwidths due to the fact that they can transmit more packets in one RTT We now show that by giving priority one can significantly enhance the bandwidth provided to short-flows while still maintaining high bandwidth to the long-flows This analysis shows that the benefits obtained by the short-flows can be arbitrarily large while the additional delay suffered by the long-flows is well bounded Throughout this analysis we assume that the arrival pattern and the file-size distributions are unchanged We analyze the performance of the system under prioritiesin other words, the long-flows are served only when the system is devoid of the short-flow The short-flows transmit data while the underlying TCP is in the slow-start phase In the slow-start phase, the window size is slowly increased from The window size doubles each RTT if all the acknowledgments are received Thus, it is possible that even though enforcing priority ensures that the short-flows are served first, the short-flows may not end up utilizing all the bandwidth as the TCP is not designed for data transmissions at such high rates in the slow-start phase We model this by imposing a limit r s on the maximum rate at which a short-flow can transmit the data This would ensure that the maximum rate achieved by the short-flows cannot exceed the inherent limit imposed by TCP The simulations conducted show that the bandwidth received by the shortflows is very close to this limit The bandwidths received by short-flows and long-flows are given by, x s = min r s, n s, nsr s x l = max, I ns= n l With x s and x l defined as above the fluid model now is given by () We analyze this system at equilibrium n l (9) If the short-flows are given priority, then at equilibrium, their transmission rates would be x s = r s The number of short-flows at equilibrium is given by, n s = ρs r s Using the fact that the amount of work left in the system is invariant with time, we can calculate the number of long-flows at equilibrium: n l = W () ρs r s The bandwidth received by long-flows at equilibrium is therefore equal to x l = ρ l n l = ρ l W () ρs r s Let x swop (x swp ) denote the bandwidth received by the shortflows at equilibrium when the priorities are not enforced (enforced) Then, using (9), we get the improvement in performance of the short-flows to be x swp ρ l w s W () = x swop ρ sw l + ρ l w s r s Similarly, the degradation in throughput of the long-flows is given by (with x lwop and (x lwp ) defined appropriately), x lwop = + ρs w l ρ s x lwp ρ l w s r sw () () The above analysis indicates that it is possible to achieve arbitrary improvement in the performance of the short-flows, depending on the value of W () Thus, the main question is the following: how do priorities affect the performance of long-flows? To get a bound on the throughput degradation of longflows, we now consider the situation where r s Clearly, r s is going to benefit short-flows as they now can transmit at arbitrary rates Thus, the long-flows will suffer a higher degradation Taking this limit, we get from (), x lwop lim r s x lwp = + ρs ρ l w l w s Let us now suppose that =, ρ s =, ρ l = 8 These values are consistent with our brief discussion regarding the nature of Internet traffic in the first section of the paper Further, our numerical simulations indicate that the short-flows on an average receive about a third of the bandwidth received by the long-flows Using these values, we get x lwop x lwp = 7 Thus, the long-flows see a reduction in bandwidth of only 7%, while the short-flow performance can improve dramatically, especially if the work in the system is very high This very clearly supports giving priority to short-flows IIIA Equilibrium Analysis IV Simulation results

4 CiscoSystems Workgroup Switch Catalyst CiscoSystems Workgroup Switch Catalyst In this section, we study the effect of priorities on the system via ns- simulations We consider a Mb bottleneck link, which is being accessed by many flows (Fig ) The users arrive into the network as a Poisson process at the rate of 9 users/sec An arriving user belongs to the short-flow class with probability 9 These users will bring files that are exponentially distributed with mean KB Users belonging to the long-flow class have files that are exponentially distributed with mean MB Obviously, any arriving user belongs to the long-flow class with probability The load on the system is therefore equal to 9 (by ()) The data rates obtained by various flows in the presence and absence of priorities are plotted in Figure The shortflows receive data rates close to 8 KB/sec when there are no priorities However, when priorities are enforced, they receive an average data rate of 9 KB/sec This is a increase of more than 9% On the other hand the data rates seen by long-flows drops only by about 8% This shows that giving priority helps improve the throughput of 9% of the flows by about 9% while the reduction in bandwidth seen by the longflows is comparatively small The performance of the priority based queue under 9% load and 98% load is given in Figure and respectively These results show similar trends though the actual improvement achieved depends on the load on the system job streams In Proceedings of the 9th Annual ACM- SIAM Symposium on Discrete Algorithms, 998 [] S Blake, D Black, M Carlson, E Davies, Z Wang, and W Weiss An architecture for Differentiated Services In IETF RFC7, 998 [] X Chen and J Heidemann Preferential treatment for short flows to reduce web latency Computer Networks, [] ME Crovella and A Bestavros Self-similarity in the World Wide Web traffic: Evidence and possible causes IEEE/ACM transactions on Networking, pages 8 8, 997 [] C Estan and G Varghese New directions in traffic measurement and accounting In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, [7] G Fayolle, I Mitrani, and R Iasnogorodski Sharing a processor among many classes Journal of the ACM, pages 9, 98 Mbps [8] A Feldmann and W Whitt Fitting mixtures of exponentials to long tail distributions to analyze network performance analysis In Proceedings of INFOCOM, 997 Figure : Simulated Topology V Conclusions In this paper, we have introduced a simple fluid model to study the performance of long and short-flows in the Internet We have shown that when the router is severely congested, giving priority to short-flows will significantly enhance their throughput without significantly degrading the data rates seen by the long-flows Acknowledgments: This work was supported in part by an AFOSR URI Grant F9--- References [] C Psounis A Ghosh and B Prabhakar SIFT: a simple algorithm for identifying large flows, Presented at the Stochastic Networks Conference, Montreal, Canada [] M Bender, S Chakrabarti, and S Muthukrishnan Flow and stretch metrics for scheduling continuous [9] HC Gromoll, A L Puha, and R J Williams The fluid limit of a heavily loaded processor sharing queue Annals of Applied Probability, [] N Bansal M Harchol-Balter Analysis of SRPT scheduling: Investigating unfairness In Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems, [] L Kleinrock Time shared systems : A theoretical treatment Journal of ACM, pages, 97 [] L Kleinrock Queueing Systems: Vol Wiley- Interscience Publication, 97 [] K Nichols, S Blake, and F Baker Definition of the Differentiated Services field (DS field) in the IPv and IPv headers In IETF RFC7, 998 [] TM O Donovan Direct solutions of M/G/ processor sharing models Operations Research, pages, 97 [] L L Peterson and BS Davie Computer Networks: A Systems Approach Morgan-Kaufman, 999

5 x Avg Bandwith =8KB/sec x Avg Bandwith =9KB/sec x 8 x Long Flows Avg Bandwith =9KB/sec x 8 x Long Flows Avg Bandwith =KB/sec (a) No priorities (a) No priorities x Avg Bandwith =9KB/sec x Avg Bandwith =KB/sec x 8 x Long Flows Avg Bandwith =79KB/sec x 7 x Long Flows Avg Bandwith =KB/sec (b) Priority for short-flow (b) Priority for short-flow Figure : Data rates got by short and long-flows in presence and absence of priorities at load 9 Figure : Data rates got by short and long-flows in presence and absence of priorities at load 9

6 x Avg Bandwith =8 KB/sec Bandwidth (KB/sec) x 8 x Long Flows Avg Bandwith =7KB/sec Bandwidth (KB/sec) (a) No priorities x Avg Bandwith =9KB/sec x 8 x Long Flows Avg Bandwith =KB/sec (b) Priority for short-flow Figure : Data rates got by short and long-flows in presence and absence of priorities at load 98

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

M/G/1/MLPS compared to M/G/1/PS

M/G/1/MLPS compared to M/G/1/PS Operations Research Letters 33 (25) 519 524 Operations Research Letters www.elsevier.com/locate/orl M/G/1/MLPS compared to M/G/1/PS Samuli Aalto a,, Urtzi Ayesta b, Eeva Nyberg-Oksanen a,1 a Networking

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Impact of size-based scheduling on flow level performance in wireless downlink data channels

Impact of size-based scheduling on flow level performance in wireless downlink data channels Impact of size-based scheduling on flow level performance in wireless downlink data channels Samuli Aalto and Pasi Lassila TKK Helsinki University of Technology, Networking Laboratory, P.O. Box 3, FIN-25

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

Size-based Adaptive Bandwidth Allocation:

Size-based Adaptive Bandwidth Allocation: Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows Shanchieh Yang (scyang@ece.utexas.edu), Gustavo de Veciana (gustavo@ece.utexas.edu) Department of Electrical and Computer

More information

Dynamic resource sharing

Dynamic resource sharing J. Virtamo 38.34 Teletraffic Theory / Dynamic resource sharing and balanced fairness Dynamic resource sharing In previous lectures we have studied different notions of fair resource sharing. Our focus

More information

CS276 Homework 1: ns-2

CS276 Homework 1: ns-2 CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows

More information

Competitive Management of Non-Preemptive Queues with Multiple Values

Competitive Management of Non-Preemptive Queues with Multiple Values Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem

More information

The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads

The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads Malith Jayasinghe 1 Zahir Tari 1 Panlop Zeephongsekul 2 1 School of Computer Science and Information

More information

Servers. Rong Wu. Department of Computing and Software, McMaster University, Canada. Douglas G. Down

Servers. Rong Wu. Department of Computing and Software, McMaster University, Canada. Douglas G. Down MRRK-SRPT: a Scheduling Policy for Parallel Servers Rong Wu Department of Computing and Software, McMaster University, Canada Douglas G. Down Department of Computing and Software, McMaster University,

More information

Combining Opportunistic and Size-Based Scheduling in Wireless Systems

Combining Opportunistic and Size-Based Scheduling in Wireless Systems Combining Opportunistic and Size-Based Scheduling in Wireless Systems Pasi Lassila TKK Helsinki University of Technology P.O.Box 3, FI-15 TKK, Finland Pasi.Lassila@tkk.fi Samuli Aalto TKK Helsinki University

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009.

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009. Capacity management for packet-switched networks with heterogeneous sources Linda de Jonge Master Thesis July 29, 2009 Supervisors Dr. Frank Roijers Prof. dr. ir. Sem Borst Dr. Andreas Löpker Industrial

More information

A Note on the Event Horizon for a Processor Sharing Queue

A Note on the Event Horizon for a Processor Sharing Queue A Note on the Event Horizon for a Processor Sharing Queue Robert C. Hampshire Heinz School of Public Policy and Management Carnegie Mellon University hamp@andrew.cmu.edu William A. Massey Department of

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Solutions to COMP9334 Week 8 Sample Problems

Solutions to COMP9334 Week 8 Sample Problems Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items

More information

Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead

Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead Analysis of Round-Robin Implementations of Processor Sharing, Including Overhead Steve Thompson and Lester Lipsky Computer Science & Engineering University of Connecticut Storrs, CT 669 Email: sat3@engr.uconn.edu;

More information

These are special traffic patterns that create more stress on a switch

These are special traffic patterns that create more stress on a switch Myths about Microbursts What are Microbursts? Microbursts are traffic patterns where traffic arrives in small bursts. While almost all network traffic is bursty to some extent, storage traffic usually

More information

Processor Sharing Flows in the Internet

Processor Sharing Flows in the Internet STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm

More information

The Timing Capacity of Single-Server Queues with Multiple Flows

The Timing Capacity of Single-Server Queues with Multiple Flows The Timing Capacity of Single-Server Queues with Multiple Flows Xin Liu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana Champaign March 14, 2003 Timing Channel Information

More information

On the Partitioning of Servers in Queueing Systems during Rush Hour

On the Partitioning of Servers in Queueing Systems during Rush Hour On the Partitioning of Servers in Queueing Systems during Rush Hour This paper is motivated by two phenomena observed in many queueing systems in practice. The first is the partitioning of server capacity

More information

COMP9334: Capacity Planning of Computer Systems and Networks

COMP9334: Capacity Planning of Computer Systems and Networks COMP9334: Capacity Planning of Computer Systems and Networks Week 2: Operational analysis Lecturer: Prof. Sanjay Jha NETWORKS RESEARCH GROUP, CSE, UNSW Operational analysis Operational: Collect performance

More information

Network Traffic Characteristic

Network Traffic Characteristic Network Traffic Characteristic Hojun Lee hlee02@purros.poly.edu 5/24/2002 EL938-Project 1 Outline Motivation What is self-similarity? Behavior of Ethernet traffic Behavior of WAN traffic Behavior of WWW

More information

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control Saurabh Jain Joint work with Dr. Dmitri Loguinov June 21, 2007 1 Agenda Introduction Analysis of RCP QI-RCP PIQI-RCP Comparison Wrap

More information

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks by Doo Il Choi, Charles Knessl and Charles Tier University of Illinois at Chicago 85 South

More information

DIMENSIONING BANDWIDTH FOR ELASTIC TRAFFIC IN HIGH-SPEED DATA NETWORKS

DIMENSIONING BANDWIDTH FOR ELASTIC TRAFFIC IN HIGH-SPEED DATA NETWORKS Submitted to IEEE/ACM Transactions on etworking DIMESIOIG BADWIDTH FOR ELASTIC TRAFFIC I HIGH-SPEED DATA ETWORKS Arthur W. Berger * and Yaakov Kogan Abstract Simple and robust engineering rules for dimensioning

More information

A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL

A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL by Rodney B. Wallace IBM and The George Washington University rodney.wallace@us.ibm.com Ward Whitt Columbia University

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

Window Flow Control Systems with Random Service

Window Flow Control Systems with Random Service Window Flow Control Systems with Random Service Alireza Shekaramiz Joint work with Prof. Jörg Liebeherr and Prof. Almut Burchard April 6, 2016 1 / 20 Content 1 Introduction 2 Related work 3 State-of-the-art

More information

M/G/1 and Priority Queueing

M/G/1 and Priority Queueing M/G/1 and Priority Queueing Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks Outline PASTA M/G/1 Workload and FIFO Delay Pollaczek Khinchine Formula

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Non-clairvoyant Scheduling for Minimizing Mean Slowdown

Non-clairvoyant Scheduling for Minimizing Mean Slowdown Non-clairvoyant Scheduling for Minimizing Mean Slowdown N. Bansal K. Dhamdhere J. Könemann A. Sinha April 2, 2003 Abstract We consider the problem of scheduling dynamically arriving jobs in a non-clairvoyant

More information

IN THIS PAPER, we describe a design oriented modelling

IN THIS PAPER, we describe a design oriented modelling 616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 3, JUNE 2006 A Positive Systems Model of TCP-Like Congestion Control: Asymptotic Results Robert Shorten, Fabian Wirth, and Douglas Leith Abstract We

More information

Stochastic Hybrid Systems: Applications to Communication Networks

Stochastic Hybrid Systems: Applications to Communication Networks research supported by NSF Stochastic Hybrid Systems: Applications to Communication Networks João P. Hespanha Center for Control Engineering and Computation University of California at Santa Barbara Talk

More information

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Tsuyoshi Ito and Mary Inaba Department of Computer Science, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

DIMENSIONING BANDWIDTH FOR ELASTIC TRAFFIC IN HIGH-SPEED DATA NETWORKS

DIMENSIONING BANDWIDTH FOR ELASTIC TRAFFIC IN HIGH-SPEED DATA NETWORKS Submitted to IEEE/ACM Transactions on etworking DIMESIOIG BADWIDTH FOR ELASTIC TRAFFIC I HIGH-SPEED DATA ETWORKS Arthur W. Berger and Yaakov Kogan AT&T Labs 0 Crawfords Corner Rd. Holmdel J, 07733 U.S.A.

More information

Scheduling I. Today. Next Time. ! Introduction to scheduling! Classical algorithms. ! Advanced topics on scheduling

Scheduling I. Today. Next Time. ! Introduction to scheduling! Classical algorithms. ! Advanced topics on scheduling Scheduling I Today! Introduction to scheduling! Classical algorithms Next Time! Advanced topics on scheduling Scheduling out there! You are the manager of a supermarket (ok, things don t always turn out

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,

More information

Mixed Stochastic and Event Flows

Mixed Stochastic and Event Flows Simulation Mixed and Event Flows Modeling for Simulation Dynamics Robert G. Cole 1, George Riley 2, Derya Cansever 3 and William Yurcick 4 1 Johns Hopkins University 2 Georgia Institue of Technology 3

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

CS418 Operating Systems

CS418 Operating Systems CS418 Operating Systems Lecture 14 Queuing Analysis Textbook: Operating Systems by William Stallings 1 1. Why Queuing Analysis? If the system environment changes (like the number of users is doubled),

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

A New Technique for Link Utilization Estimation

A New Technique for Link Utilization Estimation A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables S. Amarnath and Anurag Kumar* Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

Dynamic Control of Parallel-Server Systems

Dynamic Control of Parallel-Server Systems Dynamic Control of Parallel-Server Systems Jim Dai Georgia Institute of Technology Tolga Tezcan University of Illinois at Urbana-Champaign May 13, 2009 Jim Dai (Georgia Tech) Many-Server Asymptotic Optimality

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS. S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974

THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS. S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974 THE HEAVY-TRAFFIC BOTTLENECK PHENOMENON IN OPEN QUEUEING NETWORKS by S. Suresh and W. Whitt AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT This note describes a simulation experiment involving

More information

UC Irvine UC Irvine Previously Published Works

UC Irvine UC Irvine Previously Published Works UC Irvine UC Irvine Previously Published Works Title Throughput in processor-sharing queues Permalink https://escholarship.org/uc/item/98599m4 Journal IEEE Transactions on Automatic Control, 52(2) ISSN

More information

On the stability of flow-aware CSMA

On the stability of flow-aware CSMA On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .

More information

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina

More information

Competitive Analysis of M/GI/1 Queueing Policies

Competitive Analysis of M/GI/1 Queueing Policies Competitive Analysis of M/GI/1 Queueing Policies Nikhil Bansal Adam Wierman Abstract We propose a framework for comparing the performance of two queueing policies. Our framework is motivated by the notion

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract

More information

Multi-layered Round Robin Routing for Parallel Servers

Multi-layered Round Robin Routing for Parallel Servers Multi-layered Round Robin Routing for Parallel Servers Douglas G. Down Department of Computing and Software McMaster University 1280 Main Street West, Hamilton, ON L8S 4L7, Canada downd@mcmaster.ca 905-525-9140

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

A Mathematical Model of the Skype VoIP Congestion Control Algorithm A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision

More information

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1 A Globally Stable Adaptive ongestion ontrol Scheme for Internet-Style Networks with Delay Tansu Alpcan 2 and Tamer Başar 2 (alpcan, tbasar)@control.csl.uiuc.edu Abstract In this paper, we develop, analyze

More information

CS 798: Homework Assignment 3 (Queueing Theory)

CS 798: Homework Assignment 3 (Queueing Theory) 1.0 Little s law Assigned: October 6, 009 Patients arriving to the emergency room at the Grand River Hospital have a mean waiting time of three hours. It has been found that, averaged over the period of

More information

Reliable Data Transport: Sliding Windows

Reliable Data Transport: Sliding Windows Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time

More information

OPTIMAL CONTROL OF A FLEXIBLE SERVER

OPTIMAL CONTROL OF A FLEXIBLE SERVER Adv. Appl. Prob. 36, 139 170 (2004) Printed in Northern Ireland Applied Probability Trust 2004 OPTIMAL CONTROL OF A FLEXIBLE SERVER HYUN-SOO AHN, University of California, Berkeley IZAK DUENYAS, University

More information

Maximum pressure policies for stochastic processing networks

Maximum pressure policies for stochastic processing networks Maximum pressure policies for stochastic processing networks Jim Dai Joint work with Wuqin Lin at Northwestern Univ. The 2011 Lunteren Conference Jim Dai (Georgia Tech) MPPs January 18, 2011 1 / 55 Outline

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Motivating Quote for Queueing Models Good things come to those who wait - poet/writer

More information

Performance Effects of Two-way FAST TCP

Performance Effects of Two-way FAST TCP Performance Effects of Two-way FAST TCP Fei Ge a, Sammy Chan b, Lachlan L. H. Andrew c, Fan Li b, Liansheng Tan a, Moshe Zukerman b a Dept. of Computer Science, Huazhong Normal University, Wuhan, P.R.China

More information

variability in size, see e.g., [10]. 2 BTD is similar to slow-down used for scheduling problems, e.g., [11], [12].

variability in size, see e.g., [10]. 2 BTD is similar to slow-down used for scheduling problems, e.g., [11], [12]. Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows Shanchieh Yang (scyang@ece.utexas.edu), Gustavo de Veciana (gustavo@ece.utexas.edu) Department of Electrical and Computer

More information

An M/M/1 Queue in Random Environment with Disasters

An M/M/1 Queue in Random Environment with Disasters An M/M/1 Queue in Random Environment with Disasters Noam Paz 1 and Uri Yechiali 1,2 1 Department of Statistics and Operations Research School of Mathematical Sciences Tel Aviv University, Tel Aviv 69978,

More information

Multiaccess Problem. How to let distributed users (efficiently) share a single broadcast channel? How to form a queue for distributed users?

Multiaccess Problem. How to let distributed users (efficiently) share a single broadcast channel? How to form a queue for distributed users? Multiaccess Problem How to let distributed users (efficiently) share a single broadcast channel? How to form a queue for distributed users? z The protocols we used to solve this multiaccess problem are

More information

Worst-case delay control in multigroup overlay networks. Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia. Article (peer-reviewed)

Worst-case delay control in multigroup overlay networks. Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia. Article (peer-reviewed) Title Author(s) Worst-case delay control in multigroup overlay networks Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia Publication date 2007-0 Original citation Type of publication Link to publisher's version

More information

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it?

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it? Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

High speed access links. High speed access links. a(t) process (aggregate traffic into buffer)

High speed access links. High speed access links. a(t) process (aggregate traffic into buffer) Long Range Dependence in Network Traffic and the Closed Loop Behaviour of Buffers Under Adaptive Window Control Arzad A. Kherani and Anurag Kumar Dept. of Electrical Communication Engg. Indian Institute

More information

CDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory

CDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory CDA5530: Performance Models of Computers and Networks Chapter 4: Elementary Queuing Theory Definition Queuing system: a buffer (waiting room), service facility (one or more servers) a scheduling policy

More information

Analysis of an M/G/1 queue with customer impatience and an adaptive arrival process

Analysis of an M/G/1 queue with customer impatience and an adaptive arrival process Analysis of an M/G/1 queue with customer impatience and an adaptive arrival process O.J. Boxma 1, O. Kella 2, D. Perry 3, and B.J. Prabhu 1,4 1 EURANDOM and Department of Mathematics & Computer Science,

More information

Advanced Computer Networks Lecture 3. Models of Queuing

Advanced Computer Networks Lecture 3. Models of Queuing Advanced Computer Networks Lecture 3. Models of Queuing Husheng Li Min Kao Department of Electrical Engineering and Computer Science University of Tennessee, Knoxville Spring, 2016 1/13 Terminology of

More information

A positive systems model of TCP-like congestion control: Asymptotic results

A positive systems model of TCP-like congestion control: Asymptotic results A positive systems model of TCP-like congestion control: Asymptotic results Robert Shorten Fabian Wirth Douglas Leith April 7, 2004 Abstract In this paper we study communication networks that employ drop-tail

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

NATCOR: Stochastic Modelling

NATCOR: Stochastic Modelling NATCOR: Stochastic Modelling Queueing Theory II Chris Kirkbride Management Science 2017 Overview of Today s Sessions I Introduction to Queueing Modelling II Multiclass Queueing Models III Queueing Control

More information

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale

A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale 222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 A Measurement-Analytic Approach for QoS Estimation in a Network Based on the Dominant Time Scale Do Young Eun and Ness B. Shroff, Senior

More information

Stochastic-Process Limits

Stochastic-Process Limits Ward Whitt Stochastic-Process Limits An Introduction to Stochastic-Process Limits and Their Application to Queues With 68 Illustrations Springer Contents Preface vii 1 Experiencing Statistical Regularity

More information

Asymptotics for Polling Models with Limited Service Policies

Asymptotics for Polling Models with Limited Service Policies Asymptotics for Polling Models with Limited Service Policies Woojin Chang School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205 USA Douglas G. Down Department

More information

Extended Analysis of Binary Adjustment Algorithms

Extended Analysis of Binary Adjustment Algorithms 1 Extended Analysis of Binary Adjustment Algorithms Sergey Gorinsky Harrick Vin Technical Report TR22-39 Department of Computer Sciences The University of Texas at Austin Taylor Hall 2.124, Austin, TX

More information

VARUN GUPTA. Takayuki Osogami (IBM Research-Tokyo) Carnegie Mellon Google Research University of Chicago Booth School of Business.

VARUN GUPTA. Takayuki Osogami (IBM Research-Tokyo) Carnegie Mellon Google Research University of Chicago Booth School of Business. VARUN GUPTA Carnegie Mellon Google Research University of Chicago Booth School of Business With: Taayui Osogami (IBM Research-Toyo) 1 2 Homogeneous servers 3 First-Come-First-Serve Buffer Homogeneous servers

More information

Effective Bandwidth for Traffic Engineering

Effective Bandwidth for Traffic Engineering Brigham Young University BYU ScholarsArchive All Faculty Publications 2-5- Effective Bandwidth for Traffic Engineering Mark J. Clement clement@cs.byu.edu Rob Kunz See next page for additional authors Follow

More information

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an Modeling RED with Two Traffic Classes P. Kuusela and J. T. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P. O. Box 3000, FIN-005 HUT, Finland Email: fpirkko.kuusela,

More information

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems

On Stability and Sojourn Time of Peer-to-Peer Queuing Systems On Stability and Sojourn Time of Peer-to-Peer Queuing Systems Taoyu Li Minghua Chen Tony Lee Xing Li Tsinghua University, Beijing, China. {ldy03@mails.tsinghua.edu.cn,xing@cernet.edu.cn} The Chinese University

More information

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

MASTER THESIS. Development and Testing of Index Policies in Internet Routers

MASTER THESIS. Development and Testing of Index Policies in Internet Routers Universidad del País Vasco / Euskal Herriko Unibertsitatea MASTER THESIS Development and Testing of Index Policies in Internet Routers Author: Josu Doncel Advisor: Peter Jacko Urtzi Ayesta Leioa, September

More information

Modelling an Isolated Compound TCP Connection

Modelling an Isolated Compound TCP Connection Modelling an Isolated Compound TCP Connection Alberto Blanc and Denis Collange Orange Labs 905 rue Albert Einstein Sophia Antipolis, France {Email: alberto.blanc,denis.collange}@orange-ftgroup.com Konstantin

More information

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 43, NO. 3, MARCH 1998 315 Asymptotic Buffer Overflow Probabilities in Multiclass Multiplexers: An Optimal Control Approach Dimitris Bertsimas, Ioannis Ch. Paschalidis,

More information

Concise Paper: Deconstructing MPTCP Performance

Concise Paper: Deconstructing MPTCP Performance 04 IEEE nd International Conference on Network Protocols Concise Paper: Deconstructing MPTCP Performance Behnaz Arzani, Alexander Gurney, Sitian Cheng, Roch Guerin and Boon Thau Loo University Of Pennsylvania

More information

An engineering approximation for the mean waiting time in the M/H 2 b /s queue

An engineering approximation for the mean waiting time in the M/H 2 b /s queue An engineering approximation for the mean waiting time in the M/H b /s queue Francisco Barceló Universidad Politécnica de Catalunya c/ Jordi Girona, -3, Barcelona 08034 Email : barcelo@entel.upc.es Abstract

More information

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974 LIMITS FOR QUEUES AS THE WAITING ROOM GROWS by Daniel P. Heyman Ward Whitt Bell Communications Research AT&T Bell Laboratories Red Bank, NJ 07701 Murray Hill, NJ 07974 May 11, 1988 ABSTRACT We study the

More information

6 Solving Queueing Models

6 Solving Queueing Models 6 Solving Queueing Models 6.1 Introduction In this note we look at the solution of systems of queues, starting with simple isolated queues. The benefits of using predefined, easily classified queues will

More information

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic Èíôîðìàöèîííûå ïðîöåññû, Òîì 5, 1, 2005, ñòð. 4046. c 2004 D'Apice, Manzo. INFORMATION THEORY AND INFORMATION PROCESSING Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by

More information