Background Concrete Greedy Shapers Min-Plus Algebra Abstract Greedy Shapers Acknowledgment. Greedy Shaper
|
|
- Allyson Flynn
- 5 years ago
- Views:
Transcription
1 Greedy Shaper Modular Performance Analysis and Interface-Based Design for Embedded Real-Time Systems: Section 3.1 od Reading Group on Real-Time Calculus
2 Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
3 The Curves Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
4 The Curves Arrival Curves Number Of events Time Time
5 The Curves Bounds of Curves
6 Drawback Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
7 Drawback Some Drawbacks of Greedy
8 ig. 24: (a) A system architecture (a) a with internal re-shaping to reduce global buffer requirements. (b) A system architecture with external input-shaping to prevent Drawback Some Drawbacks of Greedy 3.1. Greedy Shapers 53 Burstiness of high-priority streams on shared BUS. (a) (b) R 1 R 2 CPU 1 CNI R 1 T 1 R1 σ R 1 1 CPU 2 CNI R 2 T 2 R2 σ R 2 2 Shared BUS R 1 CNI 3 R 2 CNI 4 R 1 R 2 R 3 σ1 σ2 σ3 R 1 R 2 R 3 MPSoC CPU 1 R T 1 R1 R T 2 R2 R T 3 R3
9 Drawback Some Drawbacks of Greedy. Greedy Shapers 53 R 1 R Greedy Shapers 53 Burstiness of high-priority streams on shared BUS. Buffer(a) requirements on subsequent network (b) nodes. (a) Shared (b) BUS Shared CPU 1 BUS MPSoC CPU 1 CNI R 1 MPSoC T 1 R1 CNI R σ R 1 R T 1 R1 σ R 1 CPU 1 1 CPU 1 R 1 R R R 1 R T 1 σ1 1 T 1 σ1 1 CPU R1 2 CPU R1 2 CNI 2 CNI R R 2 T 2 R 2 T 2 R2 σ R 2 R2 σ R R 2 R 2 σ2 R 2 σ2 R 2 R T 2 R2 R 1 R 1 CNI 3 CNI 3 R R 2 2 CNI CNI 4 4 R 3 R 3 σ3 σ3 R 3 R 3 T R2 R 2 T R T 3 R3 R3 ig. 24: (a) A system architecture (a) a with internal re-shaping to reduce (b) bglobal buffer requirements. architecture (b) A system with internal architecture re-shaping with external to reduce input-shaping globaltobuffer prevent ) A system re-
10 Playout Buffer Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
11 the first bit of data arrives, at time d r (0), where d r (0) = lim t 0,t>0 d(t) is the limit to the rig d 3, it is stored in the buffer until a fixed time Δ has elapsed. Then the buffer is served at a c whenever it is not empty. This gives us a second system S, with input R and output S. Cumulative functions are a powerful tool for studying delays and buffers. In order to illustrate the simple playout buffer problem that we describe now. Consider a packet switched netwo bits of information from a source with a constant bit rate r (Figure 1.2) as is the case for circuit emulation. We take a fluid model, as illustrated in Figure 1.2. We have a first system S with input function R(t) = rt. The network imposes some variable delay, because of q therefore the output R does not have a constant rate r. What can be done to recreate a cons? A standard mechanism is to smooth the delay variation in a playout buffer. It operates as f Playout Buffer Playout Buffer 4 J 4 J 5 J 5 5 \ > EJ I 4 J 4 J 5 J J @,, H H 4 Figure 1.2: A Simple Playout Buffer Example
12 the first bit of data arrives, at time d r (0), where d r (0) = lim t 0,t>0 d(t) is the limit to the rig d 3, it is stored in the buffer until a fixed time Δ has elapsed. Then the buffer is served at a c whenever it is not empty. This gives us a second system S, with input R and output S. Cumulative functions are a powerful tool for studying delays and buffers. In order to illustrate the simple playout buffer problem that we describe now. Consider a packet switched netwo bits of information from a source with a constant bit rate r (Figure 1.2) as is the case for circuit emulation. We take a fluid model, as illustrated in Figure 1.2. We have a first system S with input function R(t) = rt. The network imposes some variable delay, because of q therefore the output R does not have a constant rate r. What can be done to recreate a cons? A standard mechanism is to smooth the delay variation in a playout buffer. It operates as f Playout Buffer Playout Buffer 4 J 4 J 5 J 5 5 \ > EJ I 4 J 4 J 5 J J @,, H H 4 r(t d(0) ) R Figure (t) 1.2: r(ta Simple d(0) Playout + ) Buffer Example
13 Cumulative functions are a powerful tool for studying delays and buffers. In order to illustrate the simple playout buffer problem that we describe now. Consider a packet switched netwo bits of information from a source with a constant bit rate r (Figure 1.2) as is the case for circuit emulation. We take a fluid model, as illustrated in Figure 1.2. We have a first system S with input function R(t) = rt. The network imposes some variable delay, because of q therefore the output R does not have a constant rate r. What can be done to recreate a cons? A standard mechanism is to smooth the delay variation in a playout buffer. It operates as f Playout Buffer Playout Buffer 4 J 4 J 5 J 5 5 \ > EJ I 4 J 4 J 5 J J @,, H H 4 r(t d(0) ) R Figure (t) 1.2: r(ta Simple d(0) Playout + ) Buffer Example the first The bit of playout data arrives, buffer at time function d r (0), where σ(t) dis r (0) given = limby: t 0,t>0 d(t) is the limit to the rig d 3, it is σ(t) stored = in r(the buffer d(0) until ) a fixed time Δ has elapsed. Then the buffer is served at a c whenever it is not empty. This gives us a second system S, with input R and output S.
14 Leaky Bucket Shaper Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
15 The bucket has a hole and leaks at a rate of r units of fluid per second when it is not empty. Data from the flow R(t) has to pour into the bucket an amount of fluid equal to the amount of data. Data that Leaky Bucket wouldshaper cause the bucket to overflow is declared non-conformant, otherwise the data is declared conformant. Leaky Bucket Figure illustrates the definition. Fluid in the leaky bucket does not represent data, however, it is counted in the same unit as data. Data that is not able to pour fluid into the bucket is said to be non-conformant data. In ATM systems, non-conformant data is either discarded, tagged with a low priority for loss ( red cells), or can be put in a buffer (buffered leaky bucket controller). With the Integrated Services Internet, non-conformant data is in principle not marked, but simply passed as best effort traffic (namely, normal IP traffic). 4 J 4 J > N J # "! > EJI 4 J N J H! " # $ % & '! " Figure 1.4: A Leaky Bucket Controller. The second part of the figure shows (in grey) the level of the bucket x(t) for a sample input, with r =0.4 kbits per time unit and b =1.5 kbits. The packet arriving at time t =8.6 is not conformant, and no fluid is added to the bucket. If b would be equal to 2 kbits, then all packets would be conformant.
16 Leaky Bucket Shaper Shaping Curve Shaping Curve Shaping curve σ for a leaky bucket greedy shaper with bucket size b and filling rate r: σ( ) = b + r
17 Leaky Bucket Shaper Shaping Curve ǵr σ( ) = b + r b
18 In Figure 21(a) a greedy shaper component ingoing event stream R(t) with a shaping cur Leaky Bucket Shaper the events are emitted on the component s ou Upper Bound for Output Curve: σ outgoing event stream R (t). (a) Δ σ R(t) t σ R (t) t α(δ Fig. 21: (a) A concrete greedy shaper, shaping a concrete e greedy shaper, shaping an abstract event stream.
19 Cascade Leaky Bucket Shaper Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
20 Cascade Leaky Bucket Shaper Shaping Curve of Cascade Leaky Bucket Shaper 0 Chapter 3. Abstract Components R(t) σ b 1, r 1 b 2, r 2 R (t) r 1 r 2 σ 3 b 1 b ig. 22: A greedy shaper that is implemented by a cascade of two leaky bucket stages and the resulting total shaping curve.
21 Cascade Leaky Bucket Shaper Shaping Curve Shaping curve σ for a cascade leaky bucket greedy shaper with bucket sizes b i and filling rates r i : σ( ) = min i {(b i) + r i }
22 Cascade Leaky Bucket Shaper Properties Greedy Shapers Come for Free Shaping by a greedy shaper does not increase delay or buffer requirements. The output event trace R = R σ
23 Brief Introduction Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
24 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ).
25 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = 4 + 3
26 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5
27 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)...
28 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +).
29 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = 4 3
30 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = (4 5) = (3 4) 5
31 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = (4 5) = (3 4) 5 (3 4) + 5 = (3 + 5) (4 + 5)...
32 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = (4 5) = (3 4) 5 (3 4) + 5 = (3 + 5) (4 + 5)...
33 Brief Introduction A little Complex... Let f(t) be a real-valued function, Conventional integral: Min-plus integral: t 0 f(s)ds (1) inf {f(s)} (2) s R,0 s t
34 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3)
35 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3) if f(t) and g(t) are two functions that are zero for t < 0, (f g)(t) = t 0 f(t s)g(s)ds (4)
36 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3) if f(t) and g(t) are two functions that are zero for t < 0, in min-plus algebra: (f g)(t) = t 0 f(t s)g(s)ds (4) (f g)(t) = inf {f(t s) + g(s)} (5) 0 s t
37 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3) if f(t) and g(t) are two functions that are zero for t < 0, in min-plus algebra: (f g)(t) = t 0 f(t s)g(s)ds (4) (f g)(t) = inf {f(t s) + g(s)} (5) 0 s t Min-plus deconvolutions: (f g)(t) = sup{f(t + µ) g(µ)} (6) µ>0
38 Some Examples Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
39 Some Examples Some Examples For an arrival curve R that α l (t s) R[s, t) α u (t s), t s 0,
40 Some Examples Some Examples For an arrival curve R that α l (t s) R[s, t) α u (t s), t s 0, Upper bound α u ( ) = sup{r( + µ) R(µ)} = R R (7) µ 0
41 Some Examples Some Examples For an arrival curve R that α l (t s) R[s, t) α u (t s), t s 0, Upper bound α u ( ) = sup{r( + µ) R(µ)} = R R (7) µ 0 Lower bound α l ( ) = inf {R( + µ) R(µ)} = R R (8) µ 0
42 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ(9) σ R O t
43 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(8) O t
44 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(7) O t
45 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(6) O t
46 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(5) O t
47 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(5 ) R R(4 + ) O t
48 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(4) R R(5) O t
49 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(3) R R(6) O t
50 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(3 ) R R(6 + ) O t
51 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(2) R R(7) O t
52 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(2 ) R R(7 + ) O t
53 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(1) R R(8) O t
54 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R O t
55 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R O t
56 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R O t
57 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 R O t
58 Bounds Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
59 ding Greedy Shapers a Bounds greedy shaper component is depicted that shapes an ream R(t) with a shaping curve σ. After being shaped, itted Bounds on the component s output, resulting in a shaped tream R (t). a) (b) 8 Δ σ Δ σ σ R (t) t α(δ) Δ GS α (Δ) Δ edy shaper, shaping a concrete event stream. (b) An abstract ping an abstract α u = event α u stream. σ α l = α l (σ σ) alysis of systems with greedy shapers within the MPA eed to introduce a new abstract component that models, as depicted in Figure 21(b). Here, an abstract event
60 Proof Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof
61 Proof α u Use properties: then: (f g) h = f (g h) (f g) g f (g g) α u = R R = (R σ) (R σ) = ((R σ) R) σ = ((σ R) R) σ (σ (R R)) σ = (σ α u ) σ = (α u σ) σ α u σ (10) (11)
62 Proof Proof of The Property 1 CHAPTER 3. BASIC MIN-PLUS AND MAX-PLUS CAL ((f g) h)(t) = sup{(f g)(t + u) h(u)} u 0 { } = sup sup {f(t + u + v) g(v)} h(u) u 0 v 0 { } = sup u 0 { sup f(t + v ) g(v u) } h(u) v u = { sup sup f(t + v ) { g(v u)+h(u) }} u 0 v u { = sup sup f(t + v ) { g(v u)+h(u) }} v 0 0 u v { = sup f(t + v { ) inf g(v u)+h(u) } } v 0 0 u v { = sup f(t + v ) (g h)(v ) } =(f (g h))(t). v 0
63 Proof Proof of The Property = sup 2 3) One computes that { = sup f(t + v { ) inf g(v u)+h(u) } } v 0 0 u v { f(t + v ) (g h)(v ) } =(f (g h))(t). v 0 ((f g) g)(t) = sup{(f g)(t + u) g(u)} u 0 = sup inf {f(t + u s)+g(s) g(u)} u 0 0 s t+u = sup inf u 0 u s t sup inf u 0 0 s t sup inf u 0 0 s t = inf 0 s t { f(t s )+g(s + u) g(u) } { f(t s )+g(s + u) g(u) } { } f(t s )+sup{g(s + v) g(v)} v 0 } {g(s + v) g(v)} { f(t s )+sup v 0 = inf { f(t s )+(g g)(s ) } =(f (g g))(t). 0 s t
64 Proof α l Use properties (proved in A.3): then: (f g) (h j) (f h) (g( )j) (12) α l = R R = (R σ) (R σ) (R R) (σ σ) α l (σ σ) (13)
65 Background ã g' PPT. ã Úy²g5NETWORK CALCULUS6 JEAN-YVES LE BOUDEC and PATRICK THIRAN. Ì SNg5Modular Performance Analysis and Interface-Based Design for Embedded Real-Time Systems63.1!.
Real-Time Calculus. LS 12, TU Dortmund
Real-Time Calculus Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 09, Dec., 2014 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 35 Arbitrary Deadlines The worst-case response time of τ i by only considering
More informationNetwork management and QoS provisioning - Network Calculus
Network Calculus Network calculus is a metodology to study in a deterministic approach theory of queues. First a linear modelization is needed: it means that, for example, a system like: ρ can be modelized
More informationSome properties of variable length packet shapers
Some properties of variable length packet shapers Jean-Yves Le Boudec EPFL-DSC CH-1015 Lausanne, Switzerland EPFL-DSC esearch eport DSC/2000/037 20 Decembre 2000 Abstract The
More informationNETWORK CALCULUS. A Theory of Deterministic Queuing Systems for the Internet JEAN-YVES LE BOUDEC PATRICK THIRAN
NETWORK CALCULUS A Theory of Deterministic Queuing Systems for the Internet JEAN-YVES LE BOUDEC PATRICK THIRAN Online Version of the Book Springer Verlag - LNCS 2050 Version April 26, 2012 2 A Annelies
More informationOptimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks
Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks Olivier Verscheure and Pascal Frossard Jean-Yves Le Boudec IBM Watson Research Center Swiss Federal Institute of Tech.
More informationLatency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping
Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping Ehsan Mohammadpour, Eleni Stai, Maaz Mohuiddin, Jean-Yves Le Boudec September 7 th 2018,
More informationDifferent Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes
ICNS 03 : The Ninth International Conference on Networking and Services Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes Ulrich Klehmet Kai-Steffen Hielscher Computer Networks
More informationA Demand Response Calculus with Perfect Batteries
A Demand Response Calculus with Perfect Batteries Dan-Cristian Tomozei Joint work with Jean-Yves Le Boudec CCW, Sedona AZ, 07/11/2012 Demand Response by Quantity = distribution network operator may interrupt
More informationLecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen
Lecture Notes in Computer Science 2050 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Jean-Yves Le Boudec Patrick
More informationRecent Progress on a Statistical Network Calculus
Recent Progress on a Statistical Network Calculus Jorg Liebeherr Deartment of Comuter Science University of Virginia Collaborators Almut Burchard Robert Boorstyn Chaiwat Oottamakorn Stehen Patek Chengzhi
More informationCyclic Dependencies in Modular Performance Analysis
Cyclic Dependencies in Modular Performance Analysis ABSTRACT Bengt Jonsson Dept. Information Technology Uppsala University Box 337, 751 05 Uppsala bengt@it.uu.se Lothar Thiele Computer Engineering and
More informationTemperature-Aware Analysis and Scheduling
Temperature-Aware Analysis and Scheduling Lothar Thiele, Pratyush Kumar Overview! Introduction! Power and Temperature Models! Analysis Real-time Analysis Worst-case Temperature Analysis! Scheduling Stop-and-go
More informationWorst Case Burstiness Increase due to FIFO Multiplexing
Worst Case Burstiness Increase due to FIFO Multiplexing EPFL esearch eport IC/22/17 Vicent Cholvi DLSI Universitat Jaume I 1271 Castelló (Spain) vcholvi@lsi.uji.es Juan Echagüe DICC Universitat Jaume I
More informationScaling Properties in the Stochastic Network Calculus
Scaling Properties in the Stochastic Network Calculus A Dissertation Presented to the faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements
More informationModeling Fixed Priority Non-Preemptive Scheduling with Real-Time Calculus
Modeling Fixed Priority Non-Preemptive Scheduling with Real-Time Calculus Devesh B. Chokshi and Purandar Bhaduri Department of Computer Science and Engineering Indian Institute of Technology Guwahati,
More informationStochastic Network Calculus
Stochastic Network Calculus Assessing the Performance of the Future Internet Markus Fidler joint work with Amr Rizk Institute of Communications Technology Leibniz Universität Hannover April 22, 2010 c
More informationResource Allocation for Video Streaming in Wireless Environment
Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming
More informationA Network Calculus with Effective Bandwidth
A Network Calculus with Effective Bandwidth Technical Report: University of Virginia, CS-2003-20, November 2003 Chengzhi Li Almut Burchard Jörg Liebeherr Department of Computer Science Department of Mathematics
More informationA Calculus for End-to-end Statistical Service Guarantees
A Calculus for End-to-end Statistical Service Guarantees Almut Burchard y Jörg Liebeherr Stephen Patek y Department of Mathematics Department of Computer Science Department of Systems and Information Engineering
More informationWorst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network
DOI: 102298/CSIS101201033X Worst Case Performance Bounds for Multimedia Flows in os-enhanced TNPOSS Network Ke Xiong 1,2, Yu Zhang 1, Shenghui Wang 1, Zhifei Zhang 1, and Zhengding iu 1 1 School of Computer
More informationWorst case burstiness increase due to FIFO multiplexing
Performance Evaluation 49 (2002) 491 506 Worst case burstiness increase due to FIFO multiplexing Vicent Cholvi a,, Juan Echagüe b, Jean-Yves Le Boudec c a Universitat Jaume I (DLSI), 12071 Castelló, Spain
More information1 Introduction Future high speed digital networks aim to serve integrated trac, such as voice, video, fax, and so forth. To control interaction among
On Deterministic Trac Regulation and Service Guarantees: A Systematic Approach by Filtering Cheng-Shang Chang Dept. of Electrical Engineering National Tsing Hua University Hsinchu 30043 Taiwan, R.O.C.
More informationStatistical Per-Flow Service Bounds in a Network with Aggregate Provisioning
Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Technical Report: University of Virginia, S-2002-27 Jörg Liebeherr Stephen Patek Almut Burchard y y Department of Mathematics
More informationBounded Delay for Weighted Round Robin with Burst Crediting
Bounded Delay for Weighted Round Robin with Burst Crediting Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-0230-08 Telecommunications and Information Sciences Laboratory Department of
More informationThe Burstiness Behavior of Regulated Flows in Networks
The Burstiness Behavior of Regulated Flows in Networks Yu Ying 1, Ravi Mazumdar 2, Catherine Rosenberg 2 and Fabrice Guillemin 3 1 Dept. of ECE, Purdue University, West Lafayette, IN, 47906, U.S.A. yingy@ecn.purdue.edu
More informationStatistical Per-Flow Service Bounds in a Network with Aggregate Provisioning
1 Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Jörg Liebeherr, Department of omputer Science, University of Virginia Stephen D. Patek, Department of Systems and Information
More informationTechnion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling
On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized
More informationEmbedded Systems 23 BF - ES
Embedded Systems 23-1 - Measurement vs. Analysis REVIEW Probability Best Case Execution Time Unsafe: Execution Time Measurement Worst Case Execution Time Upper bound Execution Time typically huge variations
More information1 Introduction Future high speed digital networks aim to provide integrated services, including voice, video, fax, and data. To control interaction am
A Min-Plus System Theory for Constrained Trac Regulation and Dynamic Service Guarantees Cheng-Shang Chang, Rene L. Cruz y, Jean-Yves Le Boudec z, and Patrick Thiran x May 6, 1999 Abstract: By extending
More informationSolutions to COMP9334 Week 8 Sample Problems
Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items
More informationA Mechanism for Pricing Service Guarantees
A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm
More informationI 2 (t) R (t) R 1 (t) = R 0 (t) B 1 (t) R 2 (t) B b (t) = N f. C? I 1 (t) R b (t) N b. Acknowledgements
Proc. 34th Allerton Conf. on Comm., Cont., & Comp., Monticello, IL, Oct., 1996 1 Service Guarantees for Window Flow Control 1 R. L. Cruz C. M. Okino Department of Electrical & Computer Engineering University
More informationin accordance with a window ow control protocol. Alternatively, the total volume of trac generated may in fact depend on the network feedback, as in a
Proc. Allerton Conf. on Comm.,Control, and Comp., Monticello, IL. Sep t. 1998. 1 A Framework for Adaptive Service Guarantees Rajeev Agrawal ECE Department University of Wisconsin Madison, WI 53706-1691
More informationA Network Calculus with Effective Bandwidth
A Network Calculus with Effective Bandwidth Chengzhi Li, Almut Burchard, Jörg Liebeherr Abstract This paper establishes a link between two principal tools for the analysis of network traffic, namely, effective
More informationModeling Buffers with Data Refresh Semantics in Automotive Architectures
Modeling Buffers with Data Refresh Semantics in Automotive Architectures Linh T.X. Phan 1 Reinhard Schneider 2 Samarjit Chakraborty 2 Insup Lee 1 1 Department of Computer and Information Science, University
More informationDelay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic
Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic Jörg Liebeherr, Almut Burchard, Florin Ciucu Abstract 1 arxiv:0911.3856v1 [cs.ni] 19 Nov 2009 We provide upper bounds on the end-to-end
More informationOn the Impact of Link Scheduling on End-to-End Delays in Large Networks
1 On the Impact of Link Scheduling on End-to-End Delays in Large Networks Jörg Liebeherr, Yashar Ghiassi-Farrokhfal, Almut Burchard Abstract We seek to provide an analytical answer whether the impact of
More informationCyclic Dependencies in Modular Performance Analysis
Cyclic Dependencies in Modular Performance Analysis ABSTRACT Bengt Jonsson Dept. Information Technology Uppsala University Sweden bengt@it.uu.se Lothar Thiele Computer Engineering and Networks Lab. ETH
More informationModeling Buffers With Data Refresh Semantics in Automotive Architectures
University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science 10-2010 Modeling Buffers With Data Refresh Semantics in Automotive Architectures Linh
More informationStrong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers
Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Jonathan Turner Washington University jon.turner@wustl.edu January 30, 2008 Abstract Crossbar-based switches are commonly used
More informationEfficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation
Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,
More informationModeling Buffers with Data Refresh Semantics in Automotive Architectures
Modeling Buffers with Data Refresh Semantics in Automotive Architectures Linh T.X. Phan Reinhard Schneider Samarjit Chakraborty Insup Lee Department of Computer and Information Science, University of Pennsylvania,
More informationInequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers
IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract
More informationQuiz 1 EE 549 Wednesday, Feb. 27, 2008
UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops
More informationAsymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic
Èíôîðìàöèîííûå ïðîöåññû, Òîì 5, 1, 2005, ñòð. 4046. c 2004 D'Apice, Manzo. INFORMATION THEORY AND INFORMATION PROCESSING Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by
More informationExact emulation of a priority queue with a switch and delay lines
ueueing Syst (006) 53:115 15 DOI 10.1007/s11134-006-6669-x Exact emulation of a priority queue with a switch and delay lines A. D. Sarwate V. Anantharam Received: 30 October 004 / Revised: 13 December
More informationExact emulation of a priority queue with a switch and delay lines
Exact emulation of a priority queue with a switch and delay lines A. D. Sarwate (asarwate@eecs.berkeley.edu) and V. Anantharam (ananth@eecs.berkeley.edu) Department of Electrical Engineering and Computer
More informationUNIVERSITY OF CALIFORNIA, SAN DIEGO. Quality of Service Guarantees for FIFO Queues with Constrained Inputs
UNIVERSITY OF ALIFORNIA, SAN DIEGO Quality of Service Guarantees for FIFO Queues with onstrained Inputs A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy
More informationNetwork Calculus Analysis of Feedback Systems with Random Service. Alireza Shekaramiz
Network Calculus Analysis of Feedback Systems with Random Service by Alireza Shekaramiz A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department
More information5 Lecture 5: Fluid Models
5 Lecture 5: Fluid Models Stability of fluid and stochastic processing networks Stability analysis of some fluid models Optimization of fluid networks. Separated continuous linear programming 5.1 Stability
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationExact Worst-case Delay for FIFO-multiplexing Tandems
Exact Worst-case Delay for FIFO-multiplexing Tandems Anne Bouillard Department of Informatics ENS/INRIA, France 45 Rue d Ulm, 75230 Paris CEDEX 05 Anne.Bouillard@ens.fr Giovanni Stea Department of Information
More informationFair Scheduling in Input-Queued Switches under Inadmissible Traffic
Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent
More informationNotes on uniform convergence
Notes on uniform convergence Erik Wahlén erik.wahlen@math.lu.se January 17, 2012 1 Numerical sequences We begin by recalling some properties of numerical sequences. By a numerical sequence we simply mean
More informationTiming Analysis of AVB Traffic in TSN Networks using Network Calculus
Timing Analysis of AVB Traffic in TSN Networks using Network Calculus Luxi Zao, Paul Pop Tecnical University of Denmark Zong Zeng, Qiao Li Beiang University Outline Introduction System Model Arcitecture
More informationCool Shapers: Shaping Real-Time Tasks for Improved Thermal Guarantees
Cool Shapers: Shaping Real-Time Tasks for Improved Thermal Guarantees Pratyush Kumar and Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zürich {pratyush.kumar, lothar.thiele}@tik.ee.ethz.ch
More informationDesign of IP networks with Quality of Service
Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. Pag. 1 Design of IP networks with Quality of Service 1 Course of Multimedia Internet (Sub-course Reti Internet
More informationCyber Physical Power Systems Power in Communications
1 Cyber Physical Power Systems Power in Communications Information and Communications Tech. Power Supply 2 ICT systems represent a noticeable (about 5 % of total t demand d in U.S.) fast increasing load.
More informationEffective Bandwidth for Traffic Engineering
Brigham Young University BYU ScholarsArchive All Faculty Publications 2-5- Effective Bandwidth for Traffic Engineering Mark J. Clement clement@cs.byu.edu Rob Kunz See next page for additional authors Follow
More informationMixed Stochastic and Event Flows
Simulation Mixed and Event Flows Modeling for Simulation Dynamics Robert G. Cole 1, George Riley 2, Derya Cansever 3 and William Yurcick 4 1 Johns Hopkins University 2 Georgia Institue of Technology 3
More informationDelay Bounds in Communication Networks with Heavy-Tailed and Self-Similar Traffic
Delay Bounds in Communication Networks with Heavy-Tailed and Self-Similar Traffic Jörg Liebeherr, Almut Burchard, Florin Ciucu 1 Abstract Traffic with self-similar and heavy-tailed characteristics has
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationExact Worst-case Delay in FIFO-multiplexing Feed-forward Networks
Exact Worst-case Delay in FIFO-multiplexing Feed-forward Networks Anne Bouillard and Giovanni Stea May 28, 2014 Abstract In this paper we compute the actual worst-case end-to-end delay for a flow in a
More informationUNCERTAINTY FUNCTIONAL DIFFERENTIAL EQUATIONS FOR FINANCE
Surveys in Mathematics and its Applications ISSN 1842-6298 (electronic), 1843-7265 (print) Volume 5 (2010), 275 284 UNCERTAINTY FUNCTIONAL DIFFERENTIAL EQUATIONS FOR FINANCE Iuliana Carmen Bărbăcioru Abstract.
More informationStochastic Optimization for Undergraduate Computer Science Students
Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline
More informationMath 3313: Differential Equations Laplace transforms
Math 3313: Differential Equations Laplace transforms Thomas W. Carr Department of Mathematics Southern Methodist University Dallas, TX Outline Introduction Inverse Laplace transform Solving ODEs with Laplace
More informationSection 4.4 The Fundamental Theorem of Calculus
Section 4.4 The Fundamental Theorem of Calculus The First Fundamental Theorem of Calculus If f is continuous on the interval [a,b] and F is any function that satisfies F '() = f() throughout this interval
More informationBurst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks
Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University
More information20.6. Transfer Functions. Introduction. Prerequisites. Learning Outcomes
Transfer Functions 2.6 Introduction In this Section we introduce the concept of a transfer function and then use this to obtain a Laplace transform model of a linear engineering system. (A linear engineering
More informationclass class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an
Modeling RED with Two Traffic Classes P. Kuusela and J. T. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P. O. Box 3000, FIN-005 HUT, Finland Email: fpirkko.kuusela,
More informationOn Integration-by-parts and the Itô Formula for Backwards Itô Integral
11 On Integration-by-parts and the Itô Formula for... On Integration-by-parts and the Itô Formula for Backwards Itô Integral Jayrold P. Arcede a, Emmanuel A. Cabral b a Caraga State University, Ampayon,
More informationHomework 1 - SOLUTION
Homework - SOLUTION Problem M/M/ Queue ) Use the fact above to express π k, k > 0, as a function of π 0. π k = ( ) k λ π 0 µ 2) Using λ < µ and the fact that all π k s sum to, compute π 0 (as a function
More informationEE/ME/AE324: Dynamical Systems. Chapter 7: Transform Solutions of Linear Models
EE/ME/AE324: Dynamical Systems Chapter 7: Transform Solutions of Linear Models The Laplace Transform Converts systems or signals from the real time domain, e.g., functions of the real variable t, to the
More informationOn the Resource/Performance Tradeoff in Large Scale Queueing Systems
On the Resource/Performance Tradeoff in Large Scale Queueing Systems David Gamarnik MIT Joint work with Patrick Eschenfeldt, John Tsitsiklis and Martin Zubeldia (MIT) High level comments High level comments
More informationService curves in Network Calculus: dos and don ts
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Service curves in Network Calculus: dos and don ts Anne Bouillard, Laurent Jouhet, Eric Thierry N 7094 Novembre 2009 apport de recherche
More informationCo-design of control and platform with dropped signals
Co-design of control and platform with dropped signals he MI Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationDEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING EXAMINATIONS 2010
[E2.5] IMPERIAL COLLEGE LONDON DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING EXAMINATIONS 2010 EEE/ISE PART II MEng. BEng and ACGI SIGNALS AND LINEAR SYSTEMS Time allowed: 2:00 hours There are FOUR
More informationStochastic-Process Limits
Ward Whitt Stochastic-Process Limits An Introduction to Stochastic-Process Limits and Their Application to Queues With 68 Illustrations Springer Contents Preface vii 1 Experiencing Statistical Regularity
More informationRevisiting GPC and AND Connector in Real-Time Calculus
Revisiting GPC and AND Connector in Real-Time Calculus Yue Tang 1, Nan Guan 1, Weichen Liu 2, Linh Thi Xuan Phan 3, Wang Yi 4 1 The Hong Kong Polytechnic University, Hong Kong 2 Chongqing University, China
More informationQueueing Theory and Simulation. Introduction
Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan
More informationA Concise Course on Stochastic Partial Differential Equations
A Concise Course on Stochastic Partial Differential Equations Michael Röckner Reference: C. Prevot, M. Röckner: Springer LN in Math. 1905, Berlin (2007) And see the references therein for the original
More informationI forgot to mention last time: in the Ito formula for two standard processes, putting
I forgot to mention last time: in the Ito formula for two standard processes, putting dx t = a t dt + b t db t dy t = α t dt + β t db t, and taking f(x, y = xy, one has f x = y, f y = x, and f xx = f yy
More informationIEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug
IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug. 1995. Quality of Service Guarantees in Virtual Circuit Switched Networks
More informationVector Functions & Space Curves MATH 2110Q
Vector Functions & Space Curves Vector Functions & Space Curves Vector Functions Definition A vector function or vector-valued function is a function that takes real numbers as inputs and gives vectors
More informationAn Algebraic Approach to Network Coding
An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively
More informationElementary properties of functions with one-sided limits
Elementary properties of functions with one-sided limits Jason Swanson July, 11 1 Definition and basic properties Let (X, d) be a metric space. A function f : R X is said to have one-sided limits if, for
More informationA Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems
More informationReal-World Testing of On-Path Support
Real-World Testing of On-Path Support Kishan Shenoi, Chip Webb, Josh Karnes Ixia This material is for informational purposes only and subject to change without notice. It describes Ixia s present plans
More informationSequential Circuits Sequential circuits combinational circuits state gate delay
Sequential Circuits Sequential circuits are those with memory, also called feedback. In this, they differ from combinational circuits, which have no memory. The stable output of a combinational circuit
More informationLaplace Transforms and use in Automatic Control
Laplace Transforms and use in Automatic Control P.S. Gandhi Mechanical Engineering IIT Bombay Acknowledgements: P.Santosh Krishna, SYSCON Recap Fourier series Fourier transform: aperiodic Convolution integral
More informationMATHEMATICAL MODELING OF CONTROL SYSTEMS
1 MATHEMATICAL MODELING OF CONTROL SYSTEMS Sep-14 Dr. Mohammed Morsy Outline Introduction Transfer function and impulse response function Laplace Transform Review Automatic control systems Signal Flow
More informationChapter 2 Queueing Theory and Simulation
Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,
More informationOnline Packet Buffering
Online Packet Buffering Dissertation zur Erlangung des Doktorgrades der Fakultät für Angewandte Wissenschaften der Albert-Ludwigs-Universität Freiburg im Breisgau Markus Schmidt Freiburg im Breisgau Februar
More informationA model for a network of conveyor belts with discontinuous speed and capacity
A model for a network of conveyor belts with discontinuous speed and capacity Adriano FESTA Seminario di Modellistica differenziale Numerica - 6.03.2018 work in collaboration with M. Pfirsching, S. Goettlich
More informationTraffic Engineering in a Multipoint-to-Point Network
1 Traffic Engineering in a Multioint-to-Point Network Guillaume Urvoy-Keller, Gérard Hébuterne, and Yves Dallery Abstract The need to guarantee Quality of Service (QoS) to multimedia alications leads to
More informationINF2270 Spring Philipp Häfliger. Lecture 8: Superscalar CPUs, Course Summary/Repetition (1/2)
INF2270 Spring 2010 Philipp Häfliger Summary/Repetition (1/2) content From Scalar to Superscalar Lecture Summary and Brief Repetition Binary numbers Boolean Algebra Combinational Logic Circuits Encoder/Decoder
More informationEDF Feasibility and Hardware Accelerators
EDF Feasibility and Hardware Accelerators Andrew Morton University of Waterloo, Waterloo, Canada, arrmorton@uwaterloo.ca Wayne M. Loucks University of Waterloo, Waterloo, Canada, wmloucks@pads.uwaterloo.ca
More informationWorst-case delay control in multigroup overlay networks. Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia. Article (peer-reviewed)
Title Author(s) Worst-case delay control in multigroup overlay networks Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia Publication date 2007-0 Original citation Type of publication Link to publisher's version
More informationCHAPTER 4 DIFFERENTIAL VECTOR CALCULUS
CHAPTER 4 DIFFERENTIAL VECTOR CALCULUS 4.1 Vector Functions 4.2 Calculus of Vector Functions 4.3 Tangents REVIEW: Vectors Scalar a quantity only with its magnitude Example: temperature, speed, mass, volume
More information