Background Concrete Greedy Shapers Min-Plus Algebra Abstract Greedy Shapers Acknowledgment. Greedy Shaper

Size: px
Start display at page:

Download "Background Concrete Greedy Shapers Min-Plus Algebra Abstract Greedy Shapers Acknowledgment. Greedy Shaper"

Transcription

1 Greedy Shaper Modular Performance Analysis and Interface-Based Design for Embedded Real-Time Systems: Section 3.1 od Reading Group on Real-Time Calculus

2 Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

3 The Curves Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

4 The Curves Arrival Curves Number Of events Time Time

5 The Curves Bounds of Curves

6 Drawback Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

7 Drawback Some Drawbacks of Greedy

8 ig. 24: (a) A system architecture (a) a with internal re-shaping to reduce global buffer requirements. (b) A system architecture with external input-shaping to prevent Drawback Some Drawbacks of Greedy 3.1. Greedy Shapers 53 Burstiness of high-priority streams on shared BUS. (a) (b) R 1 R 2 CPU 1 CNI R 1 T 1 R1 σ R 1 1 CPU 2 CNI R 2 T 2 R2 σ R 2 2 Shared BUS R 1 CNI 3 R 2 CNI 4 R 1 R 2 R 3 σ1 σ2 σ3 R 1 R 2 R 3 MPSoC CPU 1 R T 1 R1 R T 2 R2 R T 3 R3

9 Drawback Some Drawbacks of Greedy. Greedy Shapers 53 R 1 R Greedy Shapers 53 Burstiness of high-priority streams on shared BUS. Buffer(a) requirements on subsequent network (b) nodes. (a) Shared (b) BUS Shared CPU 1 BUS MPSoC CPU 1 CNI R 1 MPSoC T 1 R1 CNI R σ R 1 R T 1 R1 σ R 1 CPU 1 1 CPU 1 R 1 R R R 1 R T 1 σ1 1 T 1 σ1 1 CPU R1 2 CPU R1 2 CNI 2 CNI R R 2 T 2 R 2 T 2 R2 σ R 2 R2 σ R R 2 R 2 σ2 R 2 σ2 R 2 R T 2 R2 R 1 R 1 CNI 3 CNI 3 R R 2 2 CNI CNI 4 4 R 3 R 3 σ3 σ3 R 3 R 3 T R2 R 2 T R T 3 R3 R3 ig. 24: (a) A system architecture (a) a with internal re-shaping to reduce (b) bglobal buffer requirements. architecture (b) A system with internal architecture re-shaping with external to reduce input-shaping globaltobuffer prevent ) A system re-

10 Playout Buffer Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

11 the first bit of data arrives, at time d r (0), where d r (0) = lim t 0,t>0 d(t) is the limit to the rig d 3, it is stored in the buffer until a fixed time Δ has elapsed. Then the buffer is served at a c whenever it is not empty. This gives us a second system S, with input R and output S. Cumulative functions are a powerful tool for studying delays and buffers. In order to illustrate the simple playout buffer problem that we describe now. Consider a packet switched netwo bits of information from a source with a constant bit rate r (Figure 1.2) as is the case for circuit emulation. We take a fluid model, as illustrated in Figure 1.2. We have a first system S with input function R(t) = rt. The network imposes some variable delay, because of q therefore the output R does not have a constant rate r. What can be done to recreate a cons? A standard mechanism is to smooth the delay variation in a playout buffer. It operates as f Playout Buffer Playout Buffer 4 J 4 J 5 J 5 5 \ > EJ I 4 J 4 J 5 J J @,, H H 4 Figure 1.2: A Simple Playout Buffer Example

12 the first bit of data arrives, at time d r (0), where d r (0) = lim t 0,t>0 d(t) is the limit to the rig d 3, it is stored in the buffer until a fixed time Δ has elapsed. Then the buffer is served at a c whenever it is not empty. This gives us a second system S, with input R and output S. Cumulative functions are a powerful tool for studying delays and buffers. In order to illustrate the simple playout buffer problem that we describe now. Consider a packet switched netwo bits of information from a source with a constant bit rate r (Figure 1.2) as is the case for circuit emulation. We take a fluid model, as illustrated in Figure 1.2. We have a first system S with input function R(t) = rt. The network imposes some variable delay, because of q therefore the output R does not have a constant rate r. What can be done to recreate a cons? A standard mechanism is to smooth the delay variation in a playout buffer. It operates as f Playout Buffer Playout Buffer 4 J 4 J 5 J 5 5 \ > EJ I 4 J 4 J 5 J J @,, H H 4 r(t d(0) ) R Figure (t) 1.2: r(ta Simple d(0) Playout + ) Buffer Example

13 Cumulative functions are a powerful tool for studying delays and buffers. In order to illustrate the simple playout buffer problem that we describe now. Consider a packet switched netwo bits of information from a source with a constant bit rate r (Figure 1.2) as is the case for circuit emulation. We take a fluid model, as illustrated in Figure 1.2. We have a first system S with input function R(t) = rt. The network imposes some variable delay, because of q therefore the output R does not have a constant rate r. What can be done to recreate a cons? A standard mechanism is to smooth the delay variation in a playout buffer. It operates as f Playout Buffer Playout Buffer 4 J 4 J 5 J 5 5 \ > EJ I 4 J 4 J 5 J J @,, H H 4 r(t d(0) ) R Figure (t) 1.2: r(ta Simple d(0) Playout + ) Buffer Example the first The bit of playout data arrives, buffer at time function d r (0), where σ(t) dis r (0) given = limby: t 0,t>0 d(t) is the limit to the rig d 3, it is σ(t) stored = in r(the buffer d(0) until ) a fixed time Δ has elapsed. Then the buffer is served at a c whenever it is not empty. This gives us a second system S, with input R and output S.

14 Leaky Bucket Shaper Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

15 The bucket has a hole and leaks at a rate of r units of fluid per second when it is not empty. Data from the flow R(t) has to pour into the bucket an amount of fluid equal to the amount of data. Data that Leaky Bucket wouldshaper cause the bucket to overflow is declared non-conformant, otherwise the data is declared conformant. Leaky Bucket Figure illustrates the definition. Fluid in the leaky bucket does not represent data, however, it is counted in the same unit as data. Data that is not able to pour fluid into the bucket is said to be non-conformant data. In ATM systems, non-conformant data is either discarded, tagged with a low priority for loss ( red cells), or can be put in a buffer (buffered leaky bucket controller). With the Integrated Services Internet, non-conformant data is in principle not marked, but simply passed as best effort traffic (namely, normal IP traffic). 4 J 4 J > N J # "! > EJI 4 J N J H! " # $ % & '! " Figure 1.4: A Leaky Bucket Controller. The second part of the figure shows (in grey) the level of the bucket x(t) for a sample input, with r =0.4 kbits per time unit and b =1.5 kbits. The packet arriving at time t =8.6 is not conformant, and no fluid is added to the bucket. If b would be equal to 2 kbits, then all packets would be conformant.

16 Leaky Bucket Shaper Shaping Curve Shaping Curve Shaping curve σ for a leaky bucket greedy shaper with bucket size b and filling rate r: σ( ) = b + r

17 Leaky Bucket Shaper Shaping Curve ǵr σ( ) = b + r b

18 In Figure 21(a) a greedy shaper component ingoing event stream R(t) with a shaping cur Leaky Bucket Shaper the events are emitted on the component s ou Upper Bound for Output Curve: σ outgoing event stream R (t). (a) Δ σ R(t) t σ R (t) t α(δ Fig. 21: (a) A concrete greedy shaper, shaping a concrete e greedy shaper, shaping an abstract event stream.

19 Cascade Leaky Bucket Shaper Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

20 Cascade Leaky Bucket Shaper Shaping Curve of Cascade Leaky Bucket Shaper 0 Chapter 3. Abstract Components R(t) σ b 1, r 1 b 2, r 2 R (t) r 1 r 2 σ 3 b 1 b ig. 22: A greedy shaper that is implemented by a cascade of two leaky bucket stages and the resulting total shaping curve.

21 Cascade Leaky Bucket Shaper Shaping Curve Shaping curve σ for a cascade leaky bucket greedy shaper with bucket sizes b i and filling rates r i : σ( ) = min i {(b i) + r i }

22 Cascade Leaky Bucket Shaper Properties Greedy Shapers Come for Free Shaping by a greedy shaper does not increase delay or buffer requirements. The output event trace R = R σ

23 Brief Introduction Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

24 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ).

25 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = 4 + 3

26 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5

27 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)...

28 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +).

29 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = 4 3

30 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = (4 5) = (3 4) 5

31 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = (4 5) = (3 4) 5 (3 4) + 5 = (3 + 5) (4 + 5)...

32 Brief Introduction Brief Introduction fo Min-Plus Algebra Traditionally, we are used to work with (R, +, ) = (4 + 5) = (3 + 4) + 5 (3 + 4) 5 = (3 5) + (4 5)... In min-plus algebra, we use (R,, +). 3 4 = (4 5) = (3 4) 5 (3 4) + 5 = (3 + 5) (4 + 5)...

33 Brief Introduction A little Complex... Let f(t) be a real-valued function, Conventional integral: Min-plus integral: t 0 f(s)ds (1) inf {f(s)} (2) s R,0 s t

34 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3)

35 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3) if f(t) and g(t) are two functions that are zero for t < 0, (f g)(t) = t 0 f(t s)g(s)ds (4)

36 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3) if f(t) and g(t) are two functions that are zero for t < 0, in min-plus algebra: (f g)(t) = t 0 f(t s)g(s)ds (4) (f g)(t) = inf {f(t s) + g(s)} (5) 0 s t

37 Brief Introduction More Complex... Conventional convolutions: (f g)(t) = + f(t s)g(s)ds (3) if f(t) and g(t) are two functions that are zero for t < 0, in min-plus algebra: (f g)(t) = t 0 f(t s)g(s)ds (4) (f g)(t) = inf {f(t s) + g(s)} (5) 0 s t Min-plus deconvolutions: (f g)(t) = sup{f(t + µ) g(µ)} (6) µ>0

38 Some Examples Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

39 Some Examples Some Examples For an arrival curve R that α l (t s) R[s, t) α u (t s), t s 0,

40 Some Examples Some Examples For an arrival curve R that α l (t s) R[s, t) α u (t s), t s 0, Upper bound α u ( ) = sup{r( + µ) R(µ)} = R R (7) µ 0

41 Some Examples Some Examples For an arrival curve R that α l (t s) R[s, t) α u (t s), t s 0, Upper bound α u ( ) = sup{r( + µ) R(µ)} = R R (7) µ 0 Lower bound α l ( ) = inf {R( + µ) R(µ)} = R R (8) µ 0

42 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ(9) σ R O t

43 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(8) O t

44 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(7) O t

45 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(6) O t

46 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R σ(5) O t

47 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(5 ) R R(4 + ) O t

48 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(4) R R(5) O t

49 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(3) R R(6) O t

50 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(3 ) R R(6 + ) O t

51 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(2) R R(7) O t

52 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(2 ) R R(7 + ) O t

53 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ σ(1) R R(8) O t

54 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R O t

55 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R O t

56 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 σ R O t

57 Proof R = R σ R (t) = (R σ)(t) = inf {R(s) + σ(t s)} (9) 0 s t t = 9 R O t

58 Bounds Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

59 ding Greedy Shapers a Bounds greedy shaper component is depicted that shapes an ream R(t) with a shaping curve σ. After being shaped, itted Bounds on the component s output, resulting in a shaped tream R (t). a) (b) 8 Δ σ Δ σ σ R (t) t α(δ) Δ GS α (Δ) Δ edy shaper, shaping a concrete event stream. (b) An abstract ping an abstract α u = event α u stream. σ α l = α l (σ σ) alysis of systems with greedy shapers within the MPA eed to introduce a new abstract component that models, as depicted in Figure 21(b). Here, an abstract event

60 Proof Outline 1 Background The Curves Drawback 2 Concrete Greedy Shapers Playout Buffer Leaky Bucket Shaper Cascade Leaky Bucket Shaper 3 Min-Plus Algebra Brief Introduction Some Examples 4 Abstract Greedy Shapers Bounds Proof

61 Proof α u Use properties: then: (f g) h = f (g h) (f g) g f (g g) α u = R R = (R σ) (R σ) = ((R σ) R) σ = ((σ R) R) σ (σ (R R)) σ = (σ α u ) σ = (α u σ) σ α u σ (10) (11)

62 Proof Proof of The Property 1 CHAPTER 3. BASIC MIN-PLUS AND MAX-PLUS CAL ((f g) h)(t) = sup{(f g)(t + u) h(u)} u 0 { } = sup sup {f(t + u + v) g(v)} h(u) u 0 v 0 { } = sup u 0 { sup f(t + v ) g(v u) } h(u) v u = { sup sup f(t + v ) { g(v u)+h(u) }} u 0 v u { = sup sup f(t + v ) { g(v u)+h(u) }} v 0 0 u v { = sup f(t + v { ) inf g(v u)+h(u) } } v 0 0 u v { = sup f(t + v ) (g h)(v ) } =(f (g h))(t). v 0

63 Proof Proof of The Property = sup 2 3) One computes that { = sup f(t + v { ) inf g(v u)+h(u) } } v 0 0 u v { f(t + v ) (g h)(v ) } =(f (g h))(t). v 0 ((f g) g)(t) = sup{(f g)(t + u) g(u)} u 0 = sup inf {f(t + u s)+g(s) g(u)} u 0 0 s t+u = sup inf u 0 u s t sup inf u 0 0 s t sup inf u 0 0 s t = inf 0 s t { f(t s )+g(s + u) g(u) } { f(t s )+g(s + u) g(u) } { } f(t s )+sup{g(s + v) g(v)} v 0 } {g(s + v) g(v)} { f(t s )+sup v 0 = inf { f(t s )+(g g)(s ) } =(f (g g))(t). 0 s t

64 Proof α l Use properties (proved in A.3): then: (f g) (h j) (f h) (g( )j) (12) α l = R R = (R σ) (R σ) (R R) (σ σ) α l (σ σ) (13)

65 Background ã g' PPT. ã Úy²g5NETWORK CALCULUS6 JEAN-YVES LE BOUDEC and PATRICK THIRAN. Ì SNg5Modular Performance Analysis and Interface-Based Design for Embedded Real-Time Systems63.1!.

Real-Time Calculus. LS 12, TU Dortmund

Real-Time Calculus. LS 12, TU Dortmund Real-Time Calculus Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 09, Dec., 2014 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 35 Arbitrary Deadlines The worst-case response time of τ i by only considering

More information

Network management and QoS provisioning - Network Calculus

Network management and QoS provisioning - Network Calculus Network Calculus Network calculus is a metodology to study in a deterministic approach theory of queues. First a linear modelization is needed: it means that, for example, a system like: ρ can be modelized

More information

Some properties of variable length packet shapers

Some properties of variable length packet shapers Some properties of variable length packet shapers Jean-Yves Le Boudec EPFL-DSC CH-1015 Lausanne, Switzerland EPFL-DSC esearch eport DSC/2000/037 20 Decembre 2000 Abstract The

More information

NETWORK CALCULUS. A Theory of Deterministic Queuing Systems for the Internet JEAN-YVES LE BOUDEC PATRICK THIRAN

NETWORK CALCULUS. A Theory of Deterministic Queuing Systems for the Internet JEAN-YVES LE BOUDEC PATRICK THIRAN NETWORK CALCULUS A Theory of Deterministic Queuing Systems for the Internet JEAN-YVES LE BOUDEC PATRICK THIRAN Online Version of the Book Springer Verlag - LNCS 2050 Version April 26, 2012 2 A Annelies

More information

Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks

Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks Olivier Verscheure and Pascal Frossard Jean-Yves Le Boudec IBM Watson Research Center Swiss Federal Institute of Tech.

More information

Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping

Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping Ehsan Mohammadpour, Eleni Stai, Maaz Mohuiddin, Jean-Yves Le Boudec September 7 th 2018,

More information

Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes

Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes ICNS 03 : The Ninth International Conference on Networking and Services Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes Ulrich Klehmet Kai-Steffen Hielscher Computer Networks

More information

A Demand Response Calculus with Perfect Batteries

A Demand Response Calculus with Perfect Batteries A Demand Response Calculus with Perfect Batteries Dan-Cristian Tomozei Joint work with Jean-Yves Le Boudec CCW, Sedona AZ, 07/11/2012 Demand Response by Quantity = distribution network operator may interrupt

More information

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen Lecture Notes in Computer Science 2050 Edited by G. Goos, J. Hartmanis and J. van Leeuwen 3 Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Singapore Tokyo Jean-Yves Le Boudec Patrick

More information

Recent Progress on a Statistical Network Calculus

Recent Progress on a Statistical Network Calculus Recent Progress on a Statistical Network Calculus Jorg Liebeherr Deartment of Comuter Science University of Virginia Collaborators Almut Burchard Robert Boorstyn Chaiwat Oottamakorn Stehen Patek Chengzhi

More information

Cyclic Dependencies in Modular Performance Analysis

Cyclic Dependencies in Modular Performance Analysis Cyclic Dependencies in Modular Performance Analysis ABSTRACT Bengt Jonsson Dept. Information Technology Uppsala University Box 337, 751 05 Uppsala bengt@it.uu.se Lothar Thiele Computer Engineering and

More information

Temperature-Aware Analysis and Scheduling

Temperature-Aware Analysis and Scheduling Temperature-Aware Analysis and Scheduling Lothar Thiele, Pratyush Kumar Overview! Introduction! Power and Temperature Models! Analysis Real-time Analysis Worst-case Temperature Analysis! Scheduling Stop-and-go

More information

Worst Case Burstiness Increase due to FIFO Multiplexing

Worst Case Burstiness Increase due to FIFO Multiplexing Worst Case Burstiness Increase due to FIFO Multiplexing EPFL esearch eport IC/22/17 Vicent Cholvi DLSI Universitat Jaume I 1271 Castelló (Spain) vcholvi@lsi.uji.es Juan Echagüe DICC Universitat Jaume I

More information

Scaling Properties in the Stochastic Network Calculus

Scaling Properties in the Stochastic Network Calculus Scaling Properties in the Stochastic Network Calculus A Dissertation Presented to the faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements

More information

Modeling Fixed Priority Non-Preemptive Scheduling with Real-Time Calculus

Modeling Fixed Priority Non-Preemptive Scheduling with Real-Time Calculus Modeling Fixed Priority Non-Preemptive Scheduling with Real-Time Calculus Devesh B. Chokshi and Purandar Bhaduri Department of Computer Science and Engineering Indian Institute of Technology Guwahati,

More information

Stochastic Network Calculus

Stochastic Network Calculus Stochastic Network Calculus Assessing the Performance of the Future Internet Markus Fidler joint work with Amr Rizk Institute of Communications Technology Leibniz Universität Hannover April 22, 2010 c

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

A Network Calculus with Effective Bandwidth

A Network Calculus with Effective Bandwidth A Network Calculus with Effective Bandwidth Technical Report: University of Virginia, CS-2003-20, November 2003 Chengzhi Li Almut Burchard Jörg Liebeherr Department of Computer Science Department of Mathematics

More information

A Calculus for End-to-end Statistical Service Guarantees

A Calculus for End-to-end Statistical Service Guarantees A Calculus for End-to-end Statistical Service Guarantees Almut Burchard y Jörg Liebeherr Stephen Patek y Department of Mathematics Department of Computer Science Department of Systems and Information Engineering

More information

Worst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network

Worst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network DOI: 102298/CSIS101201033X Worst Case Performance Bounds for Multimedia Flows in os-enhanced TNPOSS Network Ke Xiong 1,2, Yu Zhang 1, Shenghui Wang 1, Zhifei Zhang 1, and Zhengding iu 1 1 School of Computer

More information

Worst case burstiness increase due to FIFO multiplexing

Worst case burstiness increase due to FIFO multiplexing Performance Evaluation 49 (2002) 491 506 Worst case burstiness increase due to FIFO multiplexing Vicent Cholvi a,, Juan Echagüe b, Jean-Yves Le Boudec c a Universitat Jaume I (DLSI), 12071 Castelló, Spain

More information

1 Introduction Future high speed digital networks aim to serve integrated trac, such as voice, video, fax, and so forth. To control interaction among

1 Introduction Future high speed digital networks aim to serve integrated trac, such as voice, video, fax, and so forth. To control interaction among On Deterministic Trac Regulation and Service Guarantees: A Systematic Approach by Filtering Cheng-Shang Chang Dept. of Electrical Engineering National Tsing Hua University Hsinchu 30043 Taiwan, R.O.C.

More information

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Technical Report: University of Virginia, S-2002-27 Jörg Liebeherr Stephen Patek Almut Burchard y y Department of Mathematics

More information

Bounded Delay for Weighted Round Robin with Burst Crediting

Bounded Delay for Weighted Round Robin with Burst Crediting Bounded Delay for Weighted Round Robin with Burst Crediting Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-0230-08 Telecommunications and Information Sciences Laboratory Department of

More information

The Burstiness Behavior of Regulated Flows in Networks

The Burstiness Behavior of Regulated Flows in Networks The Burstiness Behavior of Regulated Flows in Networks Yu Ying 1, Ravi Mazumdar 2, Catherine Rosenberg 2 and Fabrice Guillemin 3 1 Dept. of ECE, Purdue University, West Lafayette, IN, 47906, U.S.A. yingy@ecn.purdue.edu

More information

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning 1 Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Jörg Liebeherr, Department of omputer Science, University of Virginia Stephen D. Patek, Department of Systems and Information

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Embedded Systems 23 BF - ES

Embedded Systems 23 BF - ES Embedded Systems 23-1 - Measurement vs. Analysis REVIEW Probability Best Case Execution Time Unsafe: Execution Time Measurement Worst Case Execution Time Upper bound Execution Time typically huge variations

More information

1 Introduction Future high speed digital networks aim to provide integrated services, including voice, video, fax, and data. To control interaction am

1 Introduction Future high speed digital networks aim to provide integrated services, including voice, video, fax, and data. To control interaction am A Min-Plus System Theory for Constrained Trac Regulation and Dynamic Service Guarantees Cheng-Shang Chang, Rene L. Cruz y, Jean-Yves Le Boudec z, and Patrick Thiran x May 6, 1999 Abstract: By extending

More information

Solutions to COMP9334 Week 8 Sample Problems

Solutions to COMP9334 Week 8 Sample Problems Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

I 2 (t) R (t) R 1 (t) = R 0 (t) B 1 (t) R 2 (t) B b (t) = N f. C? I 1 (t) R b (t) N b. Acknowledgements

I 2 (t) R (t) R 1 (t) = R 0 (t) B 1 (t) R 2 (t) B b (t) = N f. C? I 1 (t) R b (t) N b. Acknowledgements Proc. 34th Allerton Conf. on Comm., Cont., & Comp., Monticello, IL, Oct., 1996 1 Service Guarantees for Window Flow Control 1 R. L. Cruz C. M. Okino Department of Electrical & Computer Engineering University

More information

in accordance with a window ow control protocol. Alternatively, the total volume of trac generated may in fact depend on the network feedback, as in a

in accordance with a window ow control protocol. Alternatively, the total volume of trac generated may in fact depend on the network feedback, as in a Proc. Allerton Conf. on Comm.,Control, and Comp., Monticello, IL. Sep t. 1998. 1 A Framework for Adaptive Service Guarantees Rajeev Agrawal ECE Department University of Wisconsin Madison, WI 53706-1691

More information

A Network Calculus with Effective Bandwidth

A Network Calculus with Effective Bandwidth A Network Calculus with Effective Bandwidth Chengzhi Li, Almut Burchard, Jörg Liebeherr Abstract This paper establishes a link between two principal tools for the analysis of network traffic, namely, effective

More information

Modeling Buffers with Data Refresh Semantics in Automotive Architectures

Modeling Buffers with Data Refresh Semantics in Automotive Architectures Modeling Buffers with Data Refresh Semantics in Automotive Architectures Linh T.X. Phan 1 Reinhard Schneider 2 Samarjit Chakraborty 2 Insup Lee 1 1 Department of Computer and Information Science, University

More information

Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic

Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic Delay Bounds for Networks with Heavy-Tailed and Self-Similar Traffic Jörg Liebeherr, Almut Burchard, Florin Ciucu Abstract 1 arxiv:0911.3856v1 [cs.ni] 19 Nov 2009 We provide upper bounds on the end-to-end

More information

On the Impact of Link Scheduling on End-to-End Delays in Large Networks

On the Impact of Link Scheduling on End-to-End Delays in Large Networks 1 On the Impact of Link Scheduling on End-to-End Delays in Large Networks Jörg Liebeherr, Yashar Ghiassi-Farrokhfal, Almut Burchard Abstract We seek to provide an analytical answer whether the impact of

More information

Cyclic Dependencies in Modular Performance Analysis

Cyclic Dependencies in Modular Performance Analysis Cyclic Dependencies in Modular Performance Analysis ABSTRACT Bengt Jonsson Dept. Information Technology Uppsala University Sweden bengt@it.uu.se Lothar Thiele Computer Engineering and Networks Lab. ETH

More information

Modeling Buffers With Data Refresh Semantics in Automotive Architectures

Modeling Buffers With Data Refresh Semantics in Automotive Architectures University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science 10-2010 Modeling Buffers With Data Refresh Semantics in Automotive Architectures Linh

More information

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers

Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Strong Performance Guarantees for Asynchronous Buffered Crossbar Schedulers Jonathan Turner Washington University jon.turner@wustl.edu January 30, 2008 Abstract Crossbar-based switches are commonly used

More information

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,

More information

Modeling Buffers with Data Refresh Semantics in Automotive Architectures

Modeling Buffers with Data Refresh Semantics in Automotive Architectures Modeling Buffers with Data Refresh Semantics in Automotive Architectures Linh T.X. Phan Reinhard Schneider Samarjit Chakraborty Insup Lee Department of Computer and Information Science, University of Pennsylvania,

More information

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract

More information

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Quiz 1 EE 549 Wednesday, Feb. 27, 2008 UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops

More information

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic

Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by Self-similar Traffic Èíôîðìàöèîííûå ïðîöåññû, Òîì 5, 1, 2005, ñòð. 4046. c 2004 D'Apice, Manzo. INFORMATION THEORY AND INFORMATION PROCESSING Asymptotic Delay Distribution and Burst Size Impact on a Network Node Driven by

More information

Exact emulation of a priority queue with a switch and delay lines

Exact emulation of a priority queue with a switch and delay lines ueueing Syst (006) 53:115 15 DOI 10.1007/s11134-006-6669-x Exact emulation of a priority queue with a switch and delay lines A. D. Sarwate V. Anantharam Received: 30 October 004 / Revised: 13 December

More information

Exact emulation of a priority queue with a switch and delay lines

Exact emulation of a priority queue with a switch and delay lines Exact emulation of a priority queue with a switch and delay lines A. D. Sarwate (asarwate@eecs.berkeley.edu) and V. Anantharam (ananth@eecs.berkeley.edu) Department of Electrical Engineering and Computer

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. Quality of Service Guarantees for FIFO Queues with Constrained Inputs

UNIVERSITY OF CALIFORNIA, SAN DIEGO. Quality of Service Guarantees for FIFO Queues with Constrained Inputs UNIVERSITY OF ALIFORNIA, SAN DIEGO Quality of Service Guarantees for FIFO Queues with onstrained Inputs A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy

More information

Network Calculus Analysis of Feedback Systems with Random Service. Alireza Shekaramiz

Network Calculus Analysis of Feedback Systems with Random Service. Alireza Shekaramiz Network Calculus Analysis of Feedback Systems with Random Service by Alireza Shekaramiz A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department

More information

5 Lecture 5: Fluid Models

5 Lecture 5: Fluid Models 5 Lecture 5: Fluid Models Stability of fluid and stochastic processing networks Stability analysis of some fluid models Optimization of fluid networks. Separated continuous linear programming 5.1 Stability

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Exact Worst-case Delay for FIFO-multiplexing Tandems

Exact Worst-case Delay for FIFO-multiplexing Tandems Exact Worst-case Delay for FIFO-multiplexing Tandems Anne Bouillard Department of Informatics ENS/INRIA, France 45 Rue d Ulm, 75230 Paris CEDEX 05 Anne.Bouillard@ens.fr Giovanni Stea Department of Information

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Notes on uniform convergence

Notes on uniform convergence Notes on uniform convergence Erik Wahlén erik.wahlen@math.lu.se January 17, 2012 1 Numerical sequences We begin by recalling some properties of numerical sequences. By a numerical sequence we simply mean

More information

Timing Analysis of AVB Traffic in TSN Networks using Network Calculus

Timing Analysis of AVB Traffic in TSN Networks using Network Calculus Timing Analysis of AVB Traffic in TSN Networks using Network Calculus Luxi Zao, Paul Pop Tecnical University of Denmark Zong Zeng, Qiao Li Beiang University Outline Introduction System Model Arcitecture

More information

Cool Shapers: Shaping Real-Time Tasks for Improved Thermal Guarantees

Cool Shapers: Shaping Real-Time Tasks for Improved Thermal Guarantees Cool Shapers: Shaping Real-Time Tasks for Improved Thermal Guarantees Pratyush Kumar and Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zürich {pratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Design of IP networks with Quality of Service

Design of IP networks with Quality of Service Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. Pag. 1 Design of IP networks with Quality of Service 1 Course of Multimedia Internet (Sub-course Reti Internet

More information

Cyber Physical Power Systems Power in Communications

Cyber Physical Power Systems Power in Communications 1 Cyber Physical Power Systems Power in Communications Information and Communications Tech. Power Supply 2 ICT systems represent a noticeable (about 5 % of total t demand d in U.S.) fast increasing load.

More information

Effective Bandwidth for Traffic Engineering

Effective Bandwidth for Traffic Engineering Brigham Young University BYU ScholarsArchive All Faculty Publications 2-5- Effective Bandwidth for Traffic Engineering Mark J. Clement clement@cs.byu.edu Rob Kunz See next page for additional authors Follow

More information

Mixed Stochastic and Event Flows

Mixed Stochastic and Event Flows Simulation Mixed and Event Flows Modeling for Simulation Dynamics Robert G. Cole 1, George Riley 2, Derya Cansever 3 and William Yurcick 4 1 Johns Hopkins University 2 Georgia Institue of Technology 3

More information

Delay Bounds in Communication Networks with Heavy-Tailed and Self-Similar Traffic

Delay Bounds in Communication Networks with Heavy-Tailed and Self-Similar Traffic Delay Bounds in Communication Networks with Heavy-Tailed and Self-Similar Traffic Jörg Liebeherr, Almut Burchard, Florin Ciucu 1 Abstract Traffic with self-similar and heavy-tailed characteristics has

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

Exact Worst-case Delay in FIFO-multiplexing Feed-forward Networks

Exact Worst-case Delay in FIFO-multiplexing Feed-forward Networks Exact Worst-case Delay in FIFO-multiplexing Feed-forward Networks Anne Bouillard and Giovanni Stea May 28, 2014 Abstract In this paper we compute the actual worst-case end-to-end delay for a flow in a

More information

UNCERTAINTY FUNCTIONAL DIFFERENTIAL EQUATIONS FOR FINANCE

UNCERTAINTY FUNCTIONAL DIFFERENTIAL EQUATIONS FOR FINANCE Surveys in Mathematics and its Applications ISSN 1842-6298 (electronic), 1843-7265 (print) Volume 5 (2010), 275 284 UNCERTAINTY FUNCTIONAL DIFFERENTIAL EQUATIONS FOR FINANCE Iuliana Carmen Bărbăcioru Abstract.

More information

Stochastic Optimization for Undergraduate Computer Science Students

Stochastic Optimization for Undergraduate Computer Science Students Stochastic Optimization for Undergraduate Computer Science Students Professor Joongheon Kim School of Computer Science and Engineering, Chung-Ang University, Seoul, Republic of Korea 1 Reference 2 Outline

More information

Math 3313: Differential Equations Laplace transforms

Math 3313: Differential Equations Laplace transforms Math 3313: Differential Equations Laplace transforms Thomas W. Carr Department of Mathematics Southern Methodist University Dallas, TX Outline Introduction Inverse Laplace transform Solving ODEs with Laplace

More information

Section 4.4 The Fundamental Theorem of Calculus

Section 4.4 The Fundamental Theorem of Calculus Section 4.4 The Fundamental Theorem of Calculus The First Fundamental Theorem of Calculus If f is continuous on the interval [a,b] and F is any function that satisfies F '() = f() throughout this interval

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

20.6. Transfer Functions. Introduction. Prerequisites. Learning Outcomes

20.6. Transfer Functions. Introduction. Prerequisites. Learning Outcomes Transfer Functions 2.6 Introduction In this Section we introduce the concept of a transfer function and then use this to obtain a Laplace transform model of a linear engineering system. (A linear engineering

More information

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an Modeling RED with Two Traffic Classes P. Kuusela and J. T. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P. O. Box 3000, FIN-005 HUT, Finland Email: fpirkko.kuusela,

More information

On Integration-by-parts and the Itô Formula for Backwards Itô Integral

On Integration-by-parts and the Itô Formula for Backwards Itô Integral 11 On Integration-by-parts and the Itô Formula for... On Integration-by-parts and the Itô Formula for Backwards Itô Integral Jayrold P. Arcede a, Emmanuel A. Cabral b a Caraga State University, Ampayon,

More information

Homework 1 - SOLUTION

Homework 1 - SOLUTION Homework - SOLUTION Problem M/M/ Queue ) Use the fact above to express π k, k > 0, as a function of π 0. π k = ( ) k λ π 0 µ 2) Using λ < µ and the fact that all π k s sum to, compute π 0 (as a function

More information

EE/ME/AE324: Dynamical Systems. Chapter 7: Transform Solutions of Linear Models

EE/ME/AE324: Dynamical Systems. Chapter 7: Transform Solutions of Linear Models EE/ME/AE324: Dynamical Systems Chapter 7: Transform Solutions of Linear Models The Laplace Transform Converts systems or signals from the real time domain, e.g., functions of the real variable t, to the

More information

On the Resource/Performance Tradeoff in Large Scale Queueing Systems

On the Resource/Performance Tradeoff in Large Scale Queueing Systems On the Resource/Performance Tradeoff in Large Scale Queueing Systems David Gamarnik MIT Joint work with Patrick Eschenfeldt, John Tsitsiklis and Martin Zubeldia (MIT) High level comments High level comments

More information

Service curves in Network Calculus: dos and don ts

Service curves in Network Calculus: dos and don ts INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Service curves in Network Calculus: dos and don ts Anne Bouillard, Laurent Jouhet, Eric Thierry N 7094 Novembre 2009 apport de recherche

More information

Co-design of control and platform with dropped signals

Co-design of control and platform with dropped signals Co-design of control and platform with dropped signals he MI Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher

More information

DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING EXAMINATIONS 2010

DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING EXAMINATIONS 2010 [E2.5] IMPERIAL COLLEGE LONDON DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING EXAMINATIONS 2010 EEE/ISE PART II MEng. BEng and ACGI SIGNALS AND LINEAR SYSTEMS Time allowed: 2:00 hours There are FOUR

More information

Stochastic-Process Limits

Stochastic-Process Limits Ward Whitt Stochastic-Process Limits An Introduction to Stochastic-Process Limits and Their Application to Queues With 68 Illustrations Springer Contents Preface vii 1 Experiencing Statistical Regularity

More information

Revisiting GPC and AND Connector in Real-Time Calculus

Revisiting GPC and AND Connector in Real-Time Calculus Revisiting GPC and AND Connector in Real-Time Calculus Yue Tang 1, Nan Guan 1, Weichen Liu 2, Linh Thi Xuan Phan 3, Wang Yi 4 1 The Hong Kong Polytechnic University, Hong Kong 2 Chongqing University, China

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

A Concise Course on Stochastic Partial Differential Equations

A Concise Course on Stochastic Partial Differential Equations A Concise Course on Stochastic Partial Differential Equations Michael Röckner Reference: C. Prevot, M. Röckner: Springer LN in Math. 1905, Berlin (2007) And see the references therein for the original

More information

I forgot to mention last time: in the Ito formula for two standard processes, putting

I forgot to mention last time: in the Ito formula for two standard processes, putting I forgot to mention last time: in the Ito formula for two standard processes, putting dx t = a t dt + b t db t dy t = α t dt + β t db t, and taking f(x, y = xy, one has f x = y, f y = x, and f xx = f yy

More information

IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug

IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug. 1995. Quality of Service Guarantees in Virtual Circuit Switched Networks

More information

Vector Functions & Space Curves MATH 2110Q

Vector Functions & Space Curves MATH 2110Q Vector Functions & Space Curves Vector Functions & Space Curves Vector Functions Definition A vector function or vector-valued function is a function that takes real numbers as inputs and gives vectors

More information

An Algebraic Approach to Network Coding

An Algebraic Approach to Network Coding An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively

More information

Elementary properties of functions with one-sided limits

Elementary properties of functions with one-sided limits Elementary properties of functions with one-sided limits Jason Swanson July, 11 1 Definition and basic properties Let (X, d) be a metric space. A function f : R X is said to have one-sided limits if, for

More information

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1 A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems

More information

Real-World Testing of On-Path Support

Real-World Testing of On-Path Support Real-World Testing of On-Path Support Kishan Shenoi, Chip Webb, Josh Karnes Ixia This material is for informational purposes only and subject to change without notice. It describes Ixia s present plans

More information

Sequential Circuits Sequential circuits combinational circuits state gate delay

Sequential Circuits Sequential circuits combinational circuits state gate delay Sequential Circuits Sequential circuits are those with memory, also called feedback. In this, they differ from combinational circuits, which have no memory. The stable output of a combinational circuit

More information

Laplace Transforms and use in Automatic Control

Laplace Transforms and use in Automatic Control Laplace Transforms and use in Automatic Control P.S. Gandhi Mechanical Engineering IIT Bombay Acknowledgements: P.Santosh Krishna, SYSCON Recap Fourier series Fourier transform: aperiodic Convolution integral

More information

MATHEMATICAL MODELING OF CONTROL SYSTEMS

MATHEMATICAL MODELING OF CONTROL SYSTEMS 1 MATHEMATICAL MODELING OF CONTROL SYSTEMS Sep-14 Dr. Mohammed Morsy Outline Introduction Transfer function and impulse response function Laplace Transform Review Automatic control systems Signal Flow

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

Online Packet Buffering

Online Packet Buffering Online Packet Buffering Dissertation zur Erlangung des Doktorgrades der Fakultät für Angewandte Wissenschaften der Albert-Ludwigs-Universität Freiburg im Breisgau Markus Schmidt Freiburg im Breisgau Februar

More information

A model for a network of conveyor belts with discontinuous speed and capacity

A model for a network of conveyor belts with discontinuous speed and capacity A model for a network of conveyor belts with discontinuous speed and capacity Adriano FESTA Seminario di Modellistica differenziale Numerica - 6.03.2018 work in collaboration with M. Pfirsching, S. Goettlich

More information

Traffic Engineering in a Multipoint-to-Point Network

Traffic Engineering in a Multipoint-to-Point Network 1 Traffic Engineering in a Multioint-to-Point Network Guillaume Urvoy-Keller, Gérard Hébuterne, and Yves Dallery Abstract The need to guarantee Quality of Service (QoS) to multimedia alications leads to

More information

INF2270 Spring Philipp Häfliger. Lecture 8: Superscalar CPUs, Course Summary/Repetition (1/2)

INF2270 Spring Philipp Häfliger. Lecture 8: Superscalar CPUs, Course Summary/Repetition (1/2) INF2270 Spring 2010 Philipp Häfliger Summary/Repetition (1/2) content From Scalar to Superscalar Lecture Summary and Brief Repetition Binary numbers Boolean Algebra Combinational Logic Circuits Encoder/Decoder

More information

EDF Feasibility and Hardware Accelerators

EDF Feasibility and Hardware Accelerators EDF Feasibility and Hardware Accelerators Andrew Morton University of Waterloo, Waterloo, Canada, arrmorton@uwaterloo.ca Wayne M. Loucks University of Waterloo, Waterloo, Canada, wmloucks@pads.uwaterloo.ca

More information

Worst-case delay control in multigroup overlay networks. Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia. Article (peer-reviewed)

Worst-case delay control in multigroup overlay networks. Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia. Article (peer-reviewed) Title Author(s) Worst-case delay control in multigroup overlay networks Tu, Wanqing; Sreenan, Cormac J.; Jia, Weijia Publication date 2007-0 Original citation Type of publication Link to publisher's version

More information

CHAPTER 4 DIFFERENTIAL VECTOR CALCULUS

CHAPTER 4 DIFFERENTIAL VECTOR CALCULUS CHAPTER 4 DIFFERENTIAL VECTOR CALCULUS 4.1 Vector Functions 4.2 Calculus of Vector Functions 4.3 Tangents REVIEW: Vectors Scalar a quantity only with its magnitude Example: temperature, speed, mass, volume

More information