I 2 (t) R (t) R 1 (t) = R 0 (t) B 1 (t) R 2 (t) B b (t) = N f. C? I 1 (t) R b (t) N b. Acknowledgements

Size: px
Start display at page:

Download "I 2 (t) R (t) R 1 (t) = R 0 (t) B 1 (t) R 2 (t) B b (t) = N f. C? I 1 (t) R b (t) N b. Acknowledgements"

Transcription

1 Proc. 34th Allerton Conf. on Comm., Cont., & Comp., Monticello, IL, Oct., Service Guarantees for Window Flow Control 1 R. L. Cruz C. M. Okino Department of Electrical & Computer Engineering University of California, San Diego La Jolla, CA Abstract After presenting some new insight into the concept of \service curves," we derive a \service curve guarantee" for a window ow control protocol with cross-trac characterized by burstiness constraints. Our approach is convenient for studying the end-to-end behavior of hop-by-hop window ow control, and has an interesting relationship with a linear feedback system under the \min-plus" algebra. For ane burstiness constraints on the cross-trac, we nd that a window size proportional to the sum of the burstiness parameters of the cross-trac and the user bandwidth delay product is sucient to maximize guaranteed throughput. In addition, we nd that buers need not be as large as window sizes for lossless operation with large propagation delays. 1 System Model We will consider the two server system depicted in Figure 1, which models a window ow protocol. Trac from a source is generated according to a function of time R, called a rate function, such that R (t) is the instantaneous rate at which trac is being generated at time t. The trac from the source feeds a buer, called the rst buer. Trac departs the rst buer according to the rate function R 1. We assume that the system is empty at time. Let B 1 (t) denote the amount of trac held in the rst buer at time t. Thus B 1 (t) = R ()d? R 1 ()d : (1) A server, called the rst server, governs the rate R 1 at which trac departs the rst buer. The server has a transmission capacity of C bits/sec, so that R 1 (t) C for all t. In fact, the rst server handles other sources of trac, called \cross-trac," at time t at rate I 1 (t), where I 1 (t) C; thus R 1 (t) C? I 1 (t). Trac departs the rst buer at rate R 1 (t) and feeds a \network element", N f, which serves trac in a FIFO manner at rate R f (t). Recalling that the system is empty at time, the amount of trac held in N f at time t is thus B f (t) = R 1 ()d? R f ()d : () Network element N f feeds another buer, called the second buer. Trac departs the second buer according to the rate function R (t). The amount of trac held in the 1 This work was supported by the National Science Foundation under grants NCR and NCR , by the Army Research Oce under grant FRI DAAH , and by the Air Force Oce of Scientic Research under grant F

2 I 1 (t) I (t) R (t) B 1 (t) R 1 (t) C R 1 (t) N f f R (t) B (t) R (t) C R (t) I 1 (t) Acknowledgements I (t) R b (t) N b Figure 1: Two Servers in Tandem. second buer at time t is thus B (t) = R f ()d? R ()d : (3) A second server governs the rate R at which trac departs from the second buer. The second server also has a capacity of C bits/sec, and serves cross-trac from other sources at rate I (t) at time t, where I (t) C; thus R (t) C? I (t). Trac departing the rst buer is subject to \window ow control," whereby trac departing the rst buer may have to wait for acknowledgements from the the second server. More specically, as trac from the original source departs the second buer, acknowledgements are correspondingly generated by the second server and sent back to the rst server via a network element N b. The rate at which acknowledgements are generated at the second server at time t is R (t). The network element N b operates in a FIFO manner and serves acknowledgements at rate R b (t). Thus, the amount of acknowledgements in N b at time t is B b (t) = R ()d? R b ()d : (4) The window ow control protocol operates with respect to a positive parameter K, called the \window size." The rst server must insure that no more than K units of trac are unacknowledged. Thus, trac in the rst buer may have to wait for acknowledgements to arrive before being eligible for service at the rst server. The total amount of trac unacknowledged (sometimes known as the number of outstanding credits or tokens) at time t is denoted as T (t). Using the denitions above, it follows that T (t) = B f (t) + B (t) + B b (t) = R 1 ()d? R b ()d : (5) The rst server serves trac from the rst buer as fast as possible, but insures that T (t) K for all t. More specically, R 1 (t) = 8 >< >: C? I 1 (t), if B 1 (t) > and T (t) < K minfc? I 1 (t); R (t)g, if B 1 (t) = and T (t) < K minfc? I 1 (t); R b (t)g, if B 1 (t) > and T (t) = K minfc? I 1 (t); R (t); R b (t)g, if B 1 (t) = and T (t) = K : (6)

3 Similarly, the second server serves trac from the second buer as fast as possible: R (t) = ( C? I (t), if B (t) > minfc? I (t); R f (t)g, if B (t) = : The system evolution is completely determined by (1)-(7) and the functions R, I 1, I, R f, and R b. We characterize the network elements N f and N b by \service curves" S f and S b (dened below), respectively. Finally, we assume general \burstiness constraints" [1] on the cross-trac, i.e. we assume that there exist non-negative non-decreasing functions b cross i such that for i = 1; and all s t there holds 1.1 Discussion s (7) I i ()d b cross i (t? s) : (8) The model described above has a number of applications. For example, it may model a single hop within an ATM network that uses credit based ow control. The network element N f would model forward propagation delay in this case. It has been proposed that acknowledgements only be sent back periodically, rather than continuously, and so the network element N b could model a combination of backward propagation delay and jitter caused by accumulation of acknowledgements until a burst of acknowledgements is sent back. Another possible application is the situation in which end-to-end window ow control is applied across multiple hops. In this case, N f would model a combination of queueing and propagation delay suered in the forward path to the destination. Similarly, N b would model a combination of queueing and propagation delay in the backward path for acknowledgements returning to the rst server. Alternatively, the model could describe the ow of data across a protocol layer within a host, whereby processes that feed a buer enter a blocked state when the buer reaches capacity, and the processes provide bursty service due to multi-tasking within an operating system. More generally, the model is of interest in manufacturing networks where window ow control is induced naturally by limited storage space for parts being serviced by a sequence of machines, e.g. see [8]. The model described above is a generalization of a model previously proposed in [3], where N f and N b were not present (i.e. R f R 1 and R b R ), b cross i (x) = i + i x (ane burstiness constraints on cross-trac), and B 1 () = 1 (innite supply of packets at the source). For this special case, a lower bound on the throughput of the system, lim inf t!1 (1=t) R t R, was derived using a \Lyapunov function approach." Although this approach yielded tight results for two servers in tandem, it is dicult to generalize for more than two servers in tandem (see Figure 3) since nding an appropriate Lyapunov function is problematic. Instead, in [3], an aggregation and decomposition technique was used to recursively reduce the analysis of several servers in tandem to the two server case. In this paper, we use the concept of \service curves" [] to analyze the system described above. This allows us to easily extend the analysis for more than two servers in tandem, to incorporate \propagation" delays, and to consider general burstiness constraints on the cross-trac. 3

4 Before analyzing the model above, we dene service curves and present some new interpretations relating to linear system theory. In Section 3, we present our main results on the two server system discussed in this section. In Section 4, we apply the results of Section 3 to the case of several servers in tandem. Service Curves Consider a system with entering and exiting trac described by the rate functions R in and R out. The amount of data stored in the system at time t is B(t) = R t (R in ()? R out ())d, where we assume B() =. Suppose S is a given non-negative function. To simplify the notation, assume without loss of generality that S(x) = for all x. Building upon the results in [9], the following denition was essentially proposed in [] { it is adapted here to the continuous time case. Denition 1. (Strict Service Curve Guarantee). A system is said to strictly guarantee the service curve S if for all t, there exists s t R with B(s) = and t s R out()d S(t? s). The adjective \strict" was not used in []. It is added here to dierentiate it from a slightly weaker service guarantee which we now introduce: Denition. (Service Curve Guarantee). A system is said to guarantee the service curve S if for all t, there exists s t such that R t R out()d? R s R in()d S(t? s). Note that if B(s) =, then R s R in()d = R s R out()d, so that a strict service curve guarantee implies a service curve guarantee. The converse is not necessarily true. In passing, we note that [1] a (; ) (\leaky bucket") regulator guarantees the service curve S reg (x) = + x, x >. Given two functions F and G dened on the non-negative reals, dene the convolution (over the \min-plus algebra") of F and G, written F G, as F G(x) = minff (x 1 ) + G(x ) : x 1 ; x ; x 1 + x = xg ; where the minimum is replaced by an inmum if necessary. It is easy to verify that the convolution operation is commutative and associative, and that it distributes over the minimum operation. It is straightforward to verify that the following is in fact equivalent to Denition. Alternative Denition. (Service Curve Guarantee). A system is said to guarantee the service curve S if for all t there holds R t R out()d S(t) R t R in()d. Dene the \impulse function" ^(x) = if x, and ^(x) = +1 if x >. Note that for any function F, F ^(x) = F (x). It is interesting to note then that a service curve is the impulse response of the network element, in some sense, under the min-plus algebra. In [], it is shown that if a system strictly guarantees a service curve, then bounds on delay, buer size, and burstiness of the output trac are easily derived, assuming burstiness constraints on the trac arriving to the system. It turns out that identical bounds hold if the service curve guarantee is not necessarily strict. The proofs are almost identical { see [1] for the discrete time case. For completeness, we include these results below. The virtual delay at time t, D(t), is dened as D(t) = minf : and + R out ()d R in ()dg : 4

5 Theorem A. [] Assume that R t s R in()d b(t? s) for all s t. Suppose a system guarantees a service curve of S (not necessarily strict). Then (a) (Buer Requirements) There holds for all t B(t) max f[b()? S()]+ g : (b) (Bound on Delay) There holds for all t D(t) maxfminf : and b() S( + )gg : (c) (Output Burstiness) For all s t there holds R t s R out()d b out (t? s), where b out (x) = maxfb(x + )? S()g : Theorem B. [] (Convolution Theorem) Consider trac owing through a system consisting of n subsystems in tandem, where the i th subsystem guarantees the service curve S i (not necessarily strict). Then the system as a whole guarantees the service curve S net = S 1 S S n. Given the analogy to linear ltering theory, it is natural to ask if there is a concept of a transform domain. Given a function F dened on the non-negative reals, dene the \concave conjugate" of F, \ F, as \ F () = inf fx? F (x)g ; : x:x Note that if F is concave, then \ [\ F ] = F. Similarly, dene the \convex conjugate" of F, [ F, as [ F () = sup fx? F (x)g ; ; x:x and note that [ [[ F ] = F if F is convex. It is straightforward to verify that for two functions F and G we have [ [F G]() = [ F () + [ G() ; which is the analogue of the convolution property for Fourier transforms. It is also interesting to study the mapping from b to b out in Theorem A, part (c). It is easy to verify that the function x is an eigenfunction of this mapping, in some sense. Furthermore it is not dicult to show that? \ [b out ]()? \ [b]() + [ [S]() : 3 Service Curve for Window Flow Control We return to the system illustrated in Figure 1. We will assume that network elements N f and N b guarantee service curves S f and S b respectively (not necessarily strict). 5

6 3.1 Service Curve for Window Flow Control We focus on nding a service curve for the rst buer and server. Given any t, let s = maxfs : s t and B (s) = g. From (7), it follows that R (s) = C? I (s) for s (s ; t), and therefore from (8) we have Since R, we have s R ()d C(t? s )? b cross (t? s ) : s R ()d [C(t? s )? b cross (t? s )] + : Noting that B (s ) =, it follows that the subsystem consisting of the second buer and second server strictly guarantees the service curve S, where S (x) = [Cx? b cross (x)] + : (9) Note, however, that the subsystem consisting of the rst buer and rst server does not necessarily guarantee the service curve ^S1 dened as ^S 1 (x) = [Cx? b cross 1 (x)] + ; (1) since the window ow control protocol may inhibit such a service guarantee. The next theorem identies a service curve that is guaranteed by the subsystem consisting of the rst buer and rst server. Before stating the theorem, we introduce some convenient notation. Given a function G, and a positive integer n, let G (n) be the n-fold convolution of G with itself, i.e. G (n) (x) = G G G(x) : {z } n In the case where n =, we dene G () (x) = ^(x). Theorem 1 (Service Curve for Window Flow Control) Suppose that the subsystem consisting of the second buer and second server guarantees the service curve S, and that network elements N f and N b guarantee the service curves S f and S b, respectively. Dene S loop (x) = ^S1 S f S S b (x). Then the subsystem consisting of the rst buer and rst server strictly guarantees the service curve S 1, where and Z + is the set of non-negative integers. S 1 (x) = min mz +f ^S1 S (m) loop(x) + mkg ; (11) Remark: It is interesting to note that that the service curve S 1 given in Theorem 1 is the \impulse response" of the linear feedback system depicted in Figure, under the \min-plus" algebra. To prove Theorem 1, we will use the lemma below. 6

7 Σ ^ S 1 S f S K* S b Figure : Window Flow Control as a Linear Feedback System. Lemma 1 For any xed t, under the hypothesis of Theorem 1, there exists a nite sequence of intervals (u n+1 ; t n ); (t n ; u n ); ; (u 1 ; t ), with t = t, such that B 1 (u n+1 ) = and: i u i+1 R 1 ()d ^S1 (t i? u i+1 ) 8i = ; ::; n (1) t i+1 R 1 ()d S f S S b (u i+1? t i+1 ) + K 8i = ; ::; n? 1 : (13) Furthermore, the lengths of these intervals satisfy the constraints: t i? u i+1 ; i = ; ::; n (14) u i+1? t i+1 K=C ; i = ; ::; n? 1 : (15) Proof of Lemma 1: Fix t and set t = t. We dene u i+1 in terms of t i : u i+1 = maxfmaxfs : s t i ; B 1 (s) = g; maxfu : u t i ; T (u) = Kgg : (16) Note that T (s) < K and B 1 (s) > 8s (u i+1 ; t i ) and hence using (6) and (8) we have i i R 1 ()d = C(t i? u i+1 )? I 1 ()d u i+1 u i+1 C(t i? u i+1 )? b cross 1 (t i? u i+1 ) : Remembering that R t i u i+1 R 1 ()d, and using the denition in (1), this implies i u i+1 R 1 ()d ^S1 (t i? u i+1 ) ; which proves (1). If B 1 (u i+1 ) = then set n = i. Otherwise, if B 1 (u i+1 ) >, then note that T (u i+1 ) = K. In this case, we will dene t i+1 in terms of u i+1 as follows. By the convolution theorem (Theorem B), the system consisting of the series cascade of N f, the second buer and second server, and N b guarantees a service curve of S f S S b (x). Thus, there exists t i+1 u i+1 such that R b ()d? i+1 R 1 ()d S f S S b (u i+1? t i+1 ) : (17) 7

8 Using equations (5) and (17), we get K = T (u i+1 ) = R 1 ()d? R b ()d R 1 ()d? S f S S b (u i+1? t i+1 )? i+1 R 1 ()d : (18) This proves (13). By construction, we have t i? u i+1, which is (14). Since service curves are nonnegative and R 1 is bounded above by C, we get from (18) K t i+1 R 1 ()d C(u i+1? t i+1 ) ; (19) which implies (15). By construction, t i+1 u i+. Hence by adding the non-negative quantity C(t i+1? u i+ ) to the right side of (19), we get u i+1? u i+ K=C >. Thus, since the system is completely empty at time and t is nite, the recursion must end in a nite number of iterations, i.e. B 1 (u i+1 ) = for some nite i. Thus, the construction results in a nite sequence of intervals as claimed in the lemma. } Proof of Theorem 1 : Fix any t >. Invoking Lemma 1, we have u n+1 R 1 ()d = nx i= nx i= i u i+1 R 1 ()d + ^S 1 (t i? u i+1 ) + = ^S1 (t n? u n+1 ) + ^S1 (t n? u n+1 ) + n?1 X i= n?1 X i= n?1 X i= n?1 X i= t i+1 ^S1 S (n) loop (t? u n+1) + nk S 1 (t? u n+1 ) : R 1 ()d fs f S S b (u i+1? t i+1 ) + Kg f ^S1 (t i? u i+1 ) + S f S S b (u i+1? t i+1 ) + Kg fs loop (t i? t i+1 ) + Kg Noting that B 1 (u n+1 ) =, this completes the proof. } Suppose that the delay in network element N f is upper bounded by f, and that the delay in N b is upper bounded by b. This would happen if N f and N b represent propagation delay. In this case, it is easy to show that for d = f or d = b, network element N d guarantees the service curve S d, where S d (x) = ^(x? d ). We use this fact in the next corollary, which considers ane burstiness constraints on the cross-trac. Corollary 1 Suppose b cross 1 (x) = a + a x, b cross (x) = b + b x, and the delay through N f and N b are bounded by f and b, respectively. Dene = f + b + [ a =(C? a )] + [ b =(C? b )], and = maxf a ; b g. Then the system consisting of the rst buer and rst server strictly guarantees a service curve of S1 (x) where S 1 (x) = min mz + Qm 1 (x) ; () 8

9 and for m 1: Q 1(x) = (C? a )(x? a ) + = ^S1 (x) ; (1) C? a Q m 1 (x) = (C? )(x? m? a C? a ) + + mk : () The next corollary assesses the impact of the window size K. Dene ( (C? K )(f + b ) + a + C?a C? = b b, if a > b (C? )( f + b ) + C? b C? a a + b, otherwise. Corollary Suppose b cross 1 (x) = a + a x and b cross (x) = b + b x, and the delay through N f and N b is upper bounded by f and b respectively. Then the system consisting of the rst buer and rst server strictly guarantees a service curve of S1 (x), where if K K then ( Q S 1 (x) = 1(x) = ^S1 (x), if a > b (4) minfq 1(x); Q 1 1(x)g, otherwise, and if K < K then lim inf x!1 S 1 (x) x (3) = K : (5) Remark: Corollary implies that a window size equal to the sum of the burstiness of the cross-trac at the rst server ( a ), the burstiness of the cross-trac at the second server ( b ), and the user bandwidth delay product ((C? )( f + b )) is sucient to guarantee the maximum guaranteed throughput of C?. 3. Buer Requirements for Window Flow Control If the input stream R is characterized by a burstiness constraint, an upper bound on B 1 (t) can be derived from Theorem A and Theorem 1. An obvious upper bound for B (t) is the window size K, which can be achieved if the delay through network elements N f and N b is allowed to be zero. However, it is sometimes possible to derive an upper bound on B (t) which is smaller than the window size K, even under no assumptions on R. To illustrate this, we now consider the case where N f and N B represent constant delays of f and b, respectively. We will derive an upper bound on B (t) using two facts. First, note that in this case we have Thus, T (t? f ) =?f R 1 ()d??(f + b ) R ()d K : B (t) =?f fk + = K? R 1 ()d??(f + b ) t?( f + b ) R ()d R ()dg? R ()d R ()d : (6) 9

10 Second, in this case, the time elapsed from the time a piece of trac leaves the rst server until the acknowledgement for it returns to the rst server is at least f + b. Thus, for any s and t such that t? s f + b we have s R 1 ()d K : (7) Since R 1 is bounded above by the capacity of the server C, from (7) it follows that for any s and t such that t? s f + b we have Both inequalities (6) and (7) are due to [6]. s R 1 ()d minfc(t? s); Kg : (8) Theorem Suppose that N f and N b represent constant delays f and b, respectively, and that the cross-trac I at the second server satises the burstiness constraint (8). Then the amount of trac B (t) in the second buer satises where B (t) maxfb 1 ; B g ; (9) B 1 = max x:x f + b fminfcx; Kg? [Cx? b cross (x)] + g B = K? [C( f + b )? b cross ( f + b )] + : Proof Fix t and dene u = maxfs : s t; B (s) = g. If t? u > f + b then B (s) > for all s (t? f? b ; t) and hence R ()d t? f? b = C( f + b )? I ()d t? f? b Thus, in this case it follows from (6) that B (t) B. If t? u f + b then using (8) it follows that B (t) = u?f R f ()d? [C( f + b )? b cross ( f + b )] + : (3) R ()d u = R 1 ()d? [C? I ()]d u? f u minfc(t? u); Kg? [C(t? u)? b cross (t? u)] + B 1 : } As an example, suppose that b cross (x) = b + b x, and b =(C? b ) K=C f + b. In this case Theorem yields that B (t) b + b (K=C) : 1

11 R (t) B 1 (t) I 1 (t) R 1 (t) C R 1 (t) N 1 f B (t) I (t) R (t) C R (t) I n-1 (t) R n-1 (t) C R n-1 (t) f N n-1 B n (t) I n (t) R n (t) C R n (t) I 1 (t) N 1 b I (t) I n-1 (t) b N n-1 I n (t) Figure 3: Several Servers in Tandem. As claimed, the upper bound above may be considerably smaller than the window size K. Smaller upper bounds on B (t) can be obtained if R 1 is more strongly regulated. One way to achieve this is to assume a lower bound on the cross-trac at the rst server. In this case, if there is insucient cross-trac at the rst server to achieve this, the rst server could \pretend" there is additional cross-trac. Perhaps a better approach is to have the rst server directly control the burstiness of R 1. This is a topic for future research. 4 Several Servers in Tandem We now investigate the several server case as shown in Figure 3 where we have n cascaded buer-server pairs. The model is analogous to the two server case and precise denitions are omitted here for brevity. In order to analyze this multiserver system, we may apply Theorem 1 recursively as follows. Given a burstiness constraint for the cross-trac at the n th server, a service curve S n strictly guaranteed by the n th buer-server pair is implied, analogous to (9). Theorem 1 then implies that a service curve S n?1 is strictly guaranteed by the (n? 1) th buer-server pair. This process is repeated until a strict service curve guarantee of S j is derived for the j th buer-server pair for all j. The end-to-end service curve for the entire system is then (S 1 S S n ) (S f 1 S f Sn)(x) f by Theorem B. The following corollary follows by using this method. Corollary 3 Consider the tandem conguration of n buer-server pairs as illustrated in Figure 3, where network elements N f j and Nj b have maximum delays f j and j b, respectively. Suppose b cross i (x) = i + i x for all i = 1; ::; n, where = 1 = = ::: = n. If K j j + j+1 + (C? )( j b + j f ) 8j = 1; ::n? 1; then the system consisting of the j th buer and the j th server strictly guarantees a service curve of S j (x) = [? j + (C? )x] + 8 j = 1; :::; n : Furthermore, the entire system guarantees a service curve of S total (x) = (C? )(x? P n j? P n?1 j=1 C? j=1 j f ) +. If R is such that R t s R ()d + (t? s) for all s t, where C?, then the total end-to-end delay is bounded above by D total, where P n j= D total = n?1 j X C? + j f : (31) j=1 11

12 The results in Corollary 3 improve previously reported bounds, where we showed that P n?1 j=1 K j = O(n ) was sucient for a guaranteed throughput of C? [3] and for a maximum total end-to-end delay bounded by O(n ) [4]. References [1] R. Cruz, \A Calculus for Network Delay, Part I: Network Elements in Isolation," IEEE Transactions on Information Theory, Vol. 37, No. 1, Jan [] R. Cruz, \Quality of service guarantees in virtual circuit switched networks," IEEE Journal on Selected Areas in Communications, Vol. 13, No. 6, Aug [3] R. Cruz, \Guaranteed throughput for window ow control in a multi-tasking environment," Proceedings of the 1991 Conference on Information Sciences and Systems, John Hopkins University, March [4] R. Cruz, `Tandem queues with nite buers in a multi-tasking environment: performance guarantees via rate control," Proceedings of the 199 Conference on Information Sciences and Systems, Princeton University, March 199. [5] E. L. Hahne, \Round robin scheduling for fair ow control in data communications networks," IEEE JSAC, vol. 9, no. 7, Sept. 1991, pp [6] S. Khorsandi and A. Leon-Garcia, "Robust non-probabilistic bounds for delay and throughput in credit-based ow control," Proceedings IEEE INFOCOM '96, vol., pp [7] H. T. Kung, T. Blackwell, and A. Chapman, \Credit update protocol for ow controlled ATM networks: statistical multiplexing and adaptive credit allocation," Proceedings of SIGCOMM'94, pp [8] S. M. Meerkov and F. Top, \Analysis and synthesis of asymptotically reliable serial production lines," Technical Report CGR-4, Dept. of EECS, University of Michigan, Nov [9] A. K. Parekh and R. G. Gallager, \A generalized processor sharring approach to ow control in integrated services networks: the single node case," IEEE/ACM Trans. Networking," vol. 1, no. 3, June 1993, pp [1] H. Sariowan, \A service-curve approach to performance guarantees in integratedservice networks," Ph.D. thesis, Dept. of Electrical & Computer Engineering, UCSD, June

IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug

IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug IEEE Journal of Selected Areas in Communication, special issue on Advances in the Fundamentals of Networking ( vol. 13, no. 6 ), Aug. 1995. Quality of Service Guarantees in Virtual Circuit Switched Networks

More information

in accordance with a window ow control protocol. Alternatively, the total volume of trac generated may in fact depend on the network feedback, as in a

in accordance with a window ow control protocol. Alternatively, the total volume of trac generated may in fact depend on the network feedback, as in a Proc. Allerton Conf. on Comm.,Control, and Comp., Monticello, IL. Sep t. 1998. 1 A Framework for Adaptive Service Guarantees Rajeev Agrawal ECE Department University of Wisconsin Madison, WI 53706-1691

More information

1 Introduction Future high speed digital networks aim to serve integrated trac, such as voice, video, fax, and so forth. To control interaction among

1 Introduction Future high speed digital networks aim to serve integrated trac, such as voice, video, fax, and so forth. To control interaction among On Deterministic Trac Regulation and Service Guarantees: A Systematic Approach by Filtering Cheng-Shang Chang Dept. of Electrical Engineering National Tsing Hua University Hsinchu 30043 Taiwan, R.O.C.

More information

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse

Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse Any Work-conserving Policy Stabilizes the Ring with Spatial Reuse L. assiulas y Dept. of Electrical Engineering Polytechnic University Brooklyn, NY 20 leandros@olympos.poly.edu L. Georgiadis IBM. J. Watson

More information

[4] T. I. Seidman, \\First Come First Serve" is Unstable!," tech. rep., University of Maryland Baltimore County, 1993.

[4] T. I. Seidman, \\First Come First Serve is Unstable!, tech. rep., University of Maryland Baltimore County, 1993. [2] C. J. Chase and P. J. Ramadge, \On real-time scheduling policies for exible manufacturing systems," IEEE Trans. Automat. Control, vol. AC-37, pp. 491{496, April 1992. [3] S. H. Lu and P. R. Kumar,

More information

This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication.

This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. RC 20649 (91385) 12/5/96 Computer Science/Mathematics 41 pages IBM Research Report Performance Bounds for Guaranteed and Adaptive Services Rajeev Agrawal Department of Electrical and Computer Engineering

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

1 Introduction Future high speed digital networks aim to provide integrated services, including voice, video, fax, and data. To control interaction am

1 Introduction Future high speed digital networks aim to provide integrated services, including voice, video, fax, and data. To control interaction am A Min-Plus System Theory for Constrained Trac Regulation and Dynamic Service Guarantees Cheng-Shang Chang, Rene L. Cruz y, Jean-Yves Le Boudec z, and Patrick Thiran x May 6, 1999 Abstract: By extending

More information

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1

A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1 A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems

More information

A Calculus for End-to-end Statistical Service Guarantees

A Calculus for End-to-end Statistical Service Guarantees A Calculus for End-to-end Statistical Service Guarantees Almut Burchard y Jörg Liebeherr Stephen Patek y Department of Mathematics Department of Computer Science Department of Systems and Information Engineering

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin

Multiplicative Multifractal Modeling of. Long-Range-Dependent (LRD) Trac in. Computer Communications Networks. Jianbo Gao and Izhak Rubin Multiplicative Multifractal Modeling of Long-Range-Dependent (LRD) Trac in Computer Communications Networks Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles

More information

Carry-Over Round Robin: A Simple Cell Scheduling Mechanism. for ATM Networks. Abstract

Carry-Over Round Robin: A Simple Cell Scheduling Mechanism. for ATM Networks. Abstract Carry-Over Round Robin: A Simple Cell Scheduling Mechanism for ATM Networks Debanjan Saha y Sarit Mukherjee z Satish K. Tripathi x Abstract We propose a simple cell scheduling mechanism for ATM networks.

More information

Introduction This paper is motivated by the question of whether a predictor of future packet arrivals could improve switch performance. This is a two-

Introduction This paper is motivated by the question of whether a predictor of future packet arrivals could improve switch performance. This is a two- Future Information in Input Queueing Timothy X Brown Electrical & Computer Engineering timxb@colorado.edu Hal Gabow Computer Science hal@cs.colorado.edu University of Colorado Boulder, CO 80309-0425 Abstract

More information

Some properties of variable length packet shapers

Some properties of variable length packet shapers Some properties of variable length packet shapers Jean-Yves Le Boudec EPFL-DSC CH-1015 Lausanne, Switzerland EPFL-DSC esearch eport DSC/2000/037 20 Decembre 2000 Abstract The

More information

Switched Systems: Mixing Logic with Differential Equations

Switched Systems: Mixing Logic with Differential Equations research supported by NSF Switched Systems: Mixing Logic with Differential Equations João P. Hespanha Center for Control Dynamical Systems and Computation Outline Logic-based switched systems framework

More information

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County revision2: 9/4/'93 `First Come, First Served' can be unstable! Thomas I. Seidman Department of Mathematics and Statistics University of Maryland Baltimore County Baltimore, MD 21228, USA e-mail: hseidman@math.umbc.edui

More information

Convergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel

Convergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel Convergence Complexity of Optimistic Rate Based Flow Control Algorithms Yehuda Afek y Yishay Mansour z Zvi Ostfeld x Computer Science Department, Tel-Aviv University, Israel 69978. December 12, 1997 Abstract

More information

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara.

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara. Controlo 00 5 th Portuguese Conference on Automatic Control University of Aveiro,, September 5-7, 5 00 Switched Systems: Mixing Logic with Differential Equations João P. Hespanha University of California

More information

Online Companion for. Decentralized Adaptive Flow Control of High Speed Connectionless Data Networks

Online Companion for. Decentralized Adaptive Flow Control of High Speed Connectionless Data Networks Online Companion for Decentralized Adaptive Flow Control of High Speed Connectionless Data Networks Operations Research Vol 47, No 6 November-December 1999 Felisa J Vásquez-Abad Départment d informatique

More information

Performance Bounds in Feed-Forward Networks under Blind Multiplexing

Performance Bounds in Feed-Forward Networks under Blind Multiplexing Performance Bounds in Feed-Forward Networks under Blind Multiplexing Jens B. Schmitt, Frank A. Zdarsky, and Ivan Martinovic disco Distributed Computer Systems Lab University of Kaiserslautern, Germany

More information

Fast Evaluation of Ensemble Transients of Large IP Networks. University of Maryland, College Park CS-TR May 11, 1998.

Fast Evaluation of Ensemble Transients of Large IP Networks. University of Maryland, College Park CS-TR May 11, 1998. Fast Evaluation of Ensemble Transients of Large IP Networks Catalin T. Popescu cpopescu@cs.umd.edu A. Udaya Shankar shankar@cs.umd.edu Department of Computer Science University of Maryland, College Park

More information

Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente

Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Cente Stability, Queue Length and Delay of Deterministic and Stochastic Queueing Networks Cheng-Shang Chang IBM Research Division T.J. Watson Research Center P.O. Box 704 Yorktown Heights, NY 10598 cschang@watson.ibm.com

More information

Quiz 1 EE 549 Wednesday, Feb. 27, 2008

Quiz 1 EE 549 Wednesday, Feb. 27, 2008 UNIVERSITY OF SOUTHERN CALIFORNIA, SPRING 2008 1 Quiz 1 EE 549 Wednesday, Feb. 27, 2008 INSTRUCTIONS This quiz lasts for 85 minutes. This quiz is closed book and closed notes. No Calculators or laptops

More information

Queue level Time [s]

Queue level Time [s] KYBERNETIKA VOLUME 37 (21), NUMBER 3, PAGES 355 { 365 STATISTICAL{LEARNING CONTROL OF MULTIPLE{DELAY SYSTEMS WITH APPLICATIONS TO ATM NETWORKS C. T. Abdallah 1, M. Ariola 2 and V. Koltchinskii 3 Congestion

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

A Proof of the EOQ Formula Using Quasi-Variational. Inequalities. March 19, Abstract

A Proof of the EOQ Formula Using Quasi-Variational. Inequalities. March 19, Abstract A Proof of the EOQ Formula Using Quasi-Variational Inequalities Dir Beyer y and Suresh P. Sethi z March, 8 Abstract In this paper, we use quasi-variational inequalities to provide a rigorous proof of the

More information

Stochastic Network Calculus

Stochastic Network Calculus Stochastic Network Calculus Assessing the Performance of the Future Internet Markus Fidler joint work with Amr Rizk Institute of Communications Technology Leibniz Universität Hannover April 22, 2010 c

More information

N.G.Bean, D.A.Green and P.G.Taylor. University of Adelaide. Adelaide. Abstract. process of an MMPP/M/1 queue is not a MAP unless the queue is a

N.G.Bean, D.A.Green and P.G.Taylor. University of Adelaide. Adelaide. Abstract. process of an MMPP/M/1 queue is not a MAP unless the queue is a WHEN IS A MAP POISSON N.G.Bean, D.A.Green and P.G.Taylor Department of Applied Mathematics University of Adelaide Adelaide 55 Abstract In a recent paper, Olivier and Walrand (994) claimed that the departure

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers

Inequality Comparisons and Traffic Smoothing in Multi-Stage ATM Multiplexers IEEE Proceedings of the International Conference on Communications, 2000 Inequality Comparisons and raffic Smoothing in Multi-Stage AM Multiplexers Michael J. Neely MI -- LIDS mjneely@mit.edu Abstract

More information

TUNABLE LEAST SERVED FIRST A New Scheduling Algorithm with Tunable Fairness

TUNABLE LEAST SERVED FIRST A New Scheduling Algorithm with Tunable Fairness TUNABLE LEAST SERVED FIRST A New Scheduling Algorithm with Tunable Fairness Pablo Serrano, David Larrabeiti, and Ángel León Universidad Carlos III de Madrid Departamento de Ingeniería Telemática Av. Universidad

More information

On the Impact of Link Scheduling on End-to-End Delays in Large Networks

On the Impact of Link Scheduling on End-to-End Delays in Large Networks 1 On the Impact of Link Scheduling on End-to-End Delays in Large Networks Jörg Liebeherr, Yashar Ghiassi-Farrokhfal, Almut Burchard Abstract We seek to provide an analytical answer whether the impact of

More information

[A + 1 ] + (1 ) v: : (b) Show: the derivative of T at v = v 0 < 0 is: = (v 0 ) (1 ) ; [A + 1 ]

[A + 1 ] + (1 ) v: : (b) Show: the derivative of T at v = v 0 < 0 is: = (v 0 ) (1 ) ; [A + 1 ] Homework #2 Economics 4- Due Wednesday, October 5 Christiano. This question is designed to illustrate Blackwell's Theorem, Theorem 3.3 on page 54 of S-L. That theorem represents a set of conditions that

More information

A Network Calculus with Effective Bandwidth

A Network Calculus with Effective Bandwidth A Network Calculus with Effective Bandwidth Technical Report: University of Virginia, CS-2003-20, November 2003 Chengzhi Li Almut Burchard Jörg Liebeherr Department of Computer Science Department of Mathematics

More information

Statistical Analysis of Delay Bound Violations at an Earliest Deadline First (EDF) Scheduler Vijay Sivaraman Department of Computer Science, 3820 Boel

Statistical Analysis of Delay Bound Violations at an Earliest Deadline First (EDF) Scheduler Vijay Sivaraman Department of Computer Science, 3820 Boel Statistical Analysis of Delay Bound Violations at an Earliest Deadline First (EDF) Scheduler Vijay Sivaraman Department of Computer Science, 3820 Boelter Hall, UCLA, Los Angeles, CA 90095, U.S.A. (Email:

More information

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes

Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes ICNS 03 : The Ninth International Conference on Networking and Services Different Scenarios of Concatenation at Aggregate Scheduling of Multiple Nodes Ulrich Klehmet Kai-Steffen Hielscher Computer Networks

More information

The Burstiness Behavior of Regulated Flows in Networks

The Burstiness Behavior of Regulated Flows in Networks The Burstiness Behavior of Regulated Flows in Networks Yu Ying 1, Ravi Mazumdar 2, Catherine Rosenberg 2 and Fabrice Guillemin 3 1 Dept. of ECE, Purdue University, West Lafayette, IN, 47906, U.S.A. yingy@ecn.purdue.edu

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks

Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks Optimal Media Streaming in a Rate-Distortion Sense For Guaranteed Service Networks Olivier Verscheure and Pascal Frossard Jean-Yves Le Boudec IBM Watson Research Center Swiss Federal Institute of Tech.

More information

Bounded Delay for Weighted Round Robin with Burst Crediting

Bounded Delay for Weighted Round Robin with Burst Crediting Bounded Delay for Weighted Round Robin with Burst Crediting Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-0230-08 Telecommunications and Information Sciences Laboratory Department of

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Contents 1 Introduction 3 2 Continuous time rate based control Network and Queue Models The Rate Control M

Contents 1 Introduction 3 2 Continuous time rate based control Network and Queue Models The Rate Control M SP-EPRCA: an ATM Rate Based Congestion Control Scheme based on a Smith Predictor D. Cavendish, S. Mascolo, M. Gerla dirceu@cs.ucla.edu, mascolo@poliba.it, gerla@cs.ucla.edu Abstract This report presents

More information

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable

October 7, :8 WSPC/WS-IJWMIP paper. Polynomial functions are renable International Journal of Wavelets, Multiresolution and Information Processing c World Scientic Publishing Company Polynomial functions are renable Henning Thielemann Institut für Informatik Martin-Luther-Universität

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

to provide continuous buered playback ofavariable-rate output schedule. The

to provide continuous buered playback ofavariable-rate output schedule. The The Minimum Reservation Rate Problem in Digital Audio/Video Systems (Extended Abstract) David P. Anderson Nimrod Megiddo y Moni Naor z April 1993 Abstract. The \Minimum Reservation Rate Problem" arises

More information

Node-Based Distributed Optimal Control of Wireless Networks

Node-Based Distributed Optimal Control of Wireless Networks Node-Based Distributed Optimal Control of Wireless Networks Yufang Xi and Edmund M. Yeh Department of Electrical Engineering Yale University New Haven CT 06520 USA Email: {yufang.xi edmund.yeh}@yale.edu

More information

2 optimal prices the link is either underloaded or critically loaded; it is never overloaded. For the social welfare maximization problem we show that

2 optimal prices the link is either underloaded or critically loaded; it is never overloaded. For the social welfare maximization problem we show that 1 Pricing in a Large Single Link Loss System Costas A. Courcoubetis a and Martin I. Reiman b a ICS-FORTH and University of Crete Heraklion, Crete, Greece courcou@csi.forth.gr b Bell Labs, Lucent Technologies

More information

The Uniformity Principle: A New Tool for. Probabilistic Robustness Analysis. B. R. Barmish and C. M. Lagoa. further discussion.

The Uniformity Principle: A New Tool for. Probabilistic Robustness Analysis. B. R. Barmish and C. M. Lagoa. further discussion. The Uniformity Principle A New Tool for Probabilistic Robustness Analysis B. R. Barmish and C. M. Lagoa Department of Electrical and Computer Engineering University of Wisconsin-Madison, Madison, WI 53706

More information

Worst Case Burstiness Increase due to FIFO Multiplexing

Worst Case Burstiness Increase due to FIFO Multiplexing Worst Case Burstiness Increase due to FIFO Multiplexing EPFL esearch eport IC/22/17 Vicent Cholvi DLSI Universitat Jaume I 1271 Castelló (Spain) vcholvi@lsi.uji.es Juan Echagüe DICC Universitat Jaume I

More information

1 More concise proof of part (a) of the monotone convergence theorem.

1 More concise proof of part (a) of the monotone convergence theorem. Math 0450 Honors intro to analysis Spring, 009 More concise proof of part (a) of the monotone convergence theorem. Theorem If (x n ) is a monotone and bounded sequence, then lim (x n ) exists. Proof. (a)

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping

Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping Latency and Backlog Bounds in Time- Sensitive Networking with Credit Based Shapers and Asynchronous Traffic Shaping Ehsan Mohammadpour, Eleni Stai, Maaz Mohuiddin, Jean-Yves Le Boudec September 7 th 2018,

More information

In: Proc. BENELEARN-98, 8th Belgian-Dutch Conference on Machine Learning, pp 9-46, 998 Linear Quadratic Regulation using Reinforcement Learning Stephan ten Hagen? and Ben Krose Department of Mathematics,

More information

The best expert versus the smartest algorithm

The best expert versus the smartest algorithm Theoretical Computer Science 34 004 361 380 www.elsevier.com/locate/tcs The best expert versus the smartest algorithm Peter Chen a, Guoli Ding b; a Department of Computer Science, Louisiana State University,

More information

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

Background Concrete Greedy Shapers Min-Plus Algebra Abstract Greedy Shapers Acknowledgment. Greedy Shaper

Background Concrete Greedy Shapers Min-Plus Algebra Abstract Greedy Shapers Acknowledgment. Greedy Shaper Greedy Shaper Modular Performance Analysis and Interface-Based Design for Embedded Real-Time Systems: Section 3.1 od Reading Group on Real-Time Calculus Outline 1 Background The Curves Drawback 2 Concrete

More information

REMARKS ON THE TIME-OPTIMAL CONTROL OF A CLASS OF HAMILTONIAN SYSTEMS. Eduardo D. Sontag. SYCON - Rutgers Center for Systems and Control

REMARKS ON THE TIME-OPTIMAL CONTROL OF A CLASS OF HAMILTONIAN SYSTEMS. Eduardo D. Sontag. SYCON - Rutgers Center for Systems and Control REMARKS ON THE TIME-OPTIMAL CONTROL OF A CLASS OF HAMILTONIAN SYSTEMS Eduardo D. Sontag SYCON - Rutgers Center for Systems and Control Department of Mathematics, Rutgers University, New Brunswick, NJ 08903

More information

Greedy weighted matching for scheduling the input-queued switch

Greedy weighted matching for scheduling the input-queued switch Greedy weighted matching for scheduling the input-queued switch Andrew Brzezinski and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {brzezin,modiano}@mit.edu

More information

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling

Technion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Master of Arts In Mathematics

Master of Arts In Mathematics ESTIMATING THE FRACTAL DIMENSION OF SETS DETERMINED BY NONERGODIC PARAMETERS A thesis submitted to the faculty of San Francisco State University In partial fulllment of The Requirements for The Degree

More information

SUM x. 2x y x. x y x/2. (i)

SUM x. 2x y x. x y x/2. (i) Approximate Majorization and Fair Online Load Balancing Ashish Goel Adam Meyerson y Serge Plotkin z July 7, 2000 Abstract This paper relates the notion of fairness in online routing and load balancing

More information

The Entropy of Cell Streams as a. Trac Descriptor in ATM Networks

The Entropy of Cell Streams as a. Trac Descriptor in ATM Networks 1 The Entropy of Cell Streams as a Trac Descriptor in ATM Networks N. T. Plotkin SRI International 333 Ravenswood Avenue Menlo Park, CA 94025, USA ninatp@erg.sri.com and C. Roche Laboratoire MASI Universite

More information

IP Packet Level vbns Trac. fjbgao, vwani,

IP Packet Level vbns Trac.   fjbgao, vwani, IP Packet Level vbns Trac Analysis and Modeling Jianbo Gao a,vwani P. Roychowdhury a, Ronn Ritke b, and Izhak Rubin a a Electrical Engineering Department, University of California, Los Angeles, Los Angeles,

More information

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,

More information

Queue Proportional Scheduling in Gaussian Broadcast Channels

Queue Proportional Scheduling in Gaussian Broadcast Channels Queue Proportional Scheduling in Gaussian Broadcast Channels Kibeom Seong Dept. of Electrical Engineering Stanford University Stanford, CA 9435 USA Email: kseong@stanford.edu Ravi Narasimhan Dept. of Electrical

More information

M 2 M 3. Robot M (O)

M 2 M 3. Robot M (O) R O M A TRE DIA Universita degli Studi di Roma Tre Dipartimento di Informatica e Automazione Via della Vasca Navale, 79 { 00146 Roma, Italy Part Sequencing in Three Machine No-Wait Robotic Cells Alessandro

More information

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks

A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks A Queueing System with Queue Length Dependent Service Times, with Applications to Cell Discarding in ATM Networks by Doo Il Choi, Charles Knessl and Charles Tier University of Illinois at Chicago 85 South

More information

2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree

2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree THERE IS NO PLUS-CAPPING DEGREE Rodney G. Downey Steffen Lempp Department of Mathematics, Victoria University of Wellington, Wellington, New Zealand downey@math.vuw.ac.nz Department of Mathematics, University

More information

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general Interleaving Schemes for Multidimensional Cluster Errors Mario Blaum IBM Research Division 650 Harry Road San Jose, CA 9510, USA blaum@almaden.ibm.com Jehoshua Bruck California Institute of Technology

More information

Submitted to IEEE Transactions on Computers, June Evaluating Dynamic Failure Probability for Streams with. (m; k)-firm Deadlines

Submitted to IEEE Transactions on Computers, June Evaluating Dynamic Failure Probability for Streams with. (m; k)-firm Deadlines Submitted to IEEE Transactions on Computers, June 1994 Evaluating Dynamic Failure Probability for Streams with (m; k)-firm Deadlines Moncef Hamdaoui and Parameswaran Ramanathan Department of Electrical

More information

Competitive Management of Non-Preemptive Queues with Multiple Values

Competitive Management of Non-Preemptive Queues with Multiple Values Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem

More information

Garrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f

Garrett: `Bernstein's analytic continuation of complex powers' 2 Let f be a polynomial in x 1 ; : : : ; x n with real coecients. For complex s, let f 1 Bernstein's analytic continuation of complex powers c1995, Paul Garrett, garrettmath.umn.edu version January 27, 1998 Analytic continuation of distributions Statement of the theorems on analytic continuation

More information

Delay bounds (Simon S. Lam) 1

Delay bounds (Simon S. Lam) 1 1 Pacet Scheduling: End-to-End E d Delay Bounds Delay bounds (Simon S. Lam) 1 2 Reerences Delay Guarantee o Virtual Cloc server Georey G. Xie and Simon S. Lam, Delay Guarantee o Virtual Cloc Server, IEEE/ACM

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Sensitivity Analysis for Discrete-Time Randomized Service Priority Queues

Sensitivity Analysis for Discrete-Time Randomized Service Priority Queues Sensitivity Analysis for Discrete-Time Randomized Service Priority Queues George Kesidis 1, Takis Konstantopoulos 2, Michael Zazanis 3 1. Elec. & Comp. Eng. Dept, University of Waterloo, Waterloo, ON,

More information

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS Shruti Sharma and Demos Teneketzis Department of Electrical Engineering and Computer Science University of

More information

g(.) 1/ N 1/ N Decision Decision Device u u u u CP

g(.) 1/ N 1/ N Decision Decision Device u u u u CP Distributed Weak Signal Detection and Asymptotic Relative Eciency in Dependent Noise Hakan Delic Signal and Image Processing Laboratory (BUSI) Department of Electrical and Electronics Engineering Bogazici

More information

LEBESGUE INTEGRATION. Introduction

LEBESGUE INTEGRATION. Introduction LEBESGUE INTEGATION EYE SJAMAA Supplementary notes Math 414, Spring 25 Introduction The following heuristic argument is at the basis of the denition of the Lebesgue integral. This argument will be imprecise,

More information

58 Appendix 1 fundamental inconsistent equation (1) can be obtained as a linear combination of the two equations in (2). This clearly implies that the

58 Appendix 1 fundamental inconsistent equation (1) can be obtained as a linear combination of the two equations in (2). This clearly implies that the Appendix PRELIMINARIES 1. THEOREMS OF ALTERNATIVES FOR SYSTEMS OF LINEAR CONSTRAINTS Here we consider systems of linear constraints, consisting of equations or inequalities or both. A feasible solution

More information

Stochastic dominance with imprecise information

Stochastic dominance with imprecise information Stochastic dominance with imprecise information Ignacio Montes, Enrique Miranda, Susana Montes University of Oviedo, Dep. of Statistics and Operations Research. Abstract Stochastic dominance, which is

More information

CPU Scheduling Exercises

CPU Scheduling Exercises CPU Scheduling Exercises NOTE: All time in these exercises are in msec. Processes P 1, P 2, P 3 arrive at the same time, but enter the job queue in the order presented in the table. Time quantum = 3 msec

More information

Worst-Case Efficiency Analysis of Queueing Disciplines

Worst-Case Efficiency Analysis of Queueing Disciplines Worst-Case Efficiency Analysis of Queueing Disciplines Damon Mosk-Aoyama and Tim Roughgarden Department of Computer Science, Stanford University, 353 Serra Mall, Stanford, CA 94305 Introduction Consider

More information

In Proceedings of the 13th U.K. Workshop on Performance Engineering of Computer. and Telecommunication Systems (UKPEW'97), July 1997, Ilkley, U.K.

In Proceedings of the 13th U.K. Workshop on Performance Engineering of Computer. and Telecommunication Systems (UKPEW'97), July 1997, Ilkley, U.K. In Proceedings of the 13th U.K. Workshop on Performance Engineering of Computer and Telecommunication Systems (UKPEW'97), July 1997, Ilkley, U.K. Investigation of Cell Scale and Burst Scale Eects on the

More information

Stochastic Dynamic Programming. Jesus Fernandez-Villaverde University of Pennsylvania

Stochastic Dynamic Programming. Jesus Fernandez-Villaverde University of Pennsylvania Stochastic Dynamic Programming Jesus Fernande-Villaverde University of Pennsylvania 1 Introducing Uncertainty in Dynamic Programming Stochastic dynamic programming presents a very exible framework to handle

More information

Window Flow Control Systems with Random Service

Window Flow Control Systems with Random Service Window Flow Control Systems with Random Service Alireza Shekaramiz Joint work with Prof. Jörg Liebeherr and Prof. Almut Burchard April 6, 2016 1 / 20 Content 1 Introduction 2 Related work 3 State-of-the-art

More information

ON STATISTICAL INFERENCE UNDER ASYMMETRIC LOSS. Abstract. We introduce a wide class of asymmetric loss functions and show how to obtain

ON STATISTICAL INFERENCE UNDER ASYMMETRIC LOSS. Abstract. We introduce a wide class of asymmetric loss functions and show how to obtain ON STATISTICAL INFERENCE UNDER ASYMMETRIC LOSS FUNCTIONS Michael Baron Received: Abstract We introduce a wide class of asymmetric loss functions and show how to obtain asymmetric-type optimal decision

More information

Trac of an ATM-SMX in the NCIH. Tung Ouyang and Arne A. Nilsson. Center for Advanced Computing and Communication

Trac of an ATM-SMX in the NCIH. Tung Ouyang and Arne A. Nilsson. Center for Advanced Computing and Communication Departure Process for Periodic Real-Time Trac of an ATM-SMX in the NCIH Tung Ouyang and Arne A. Nilsson Center for Advanced Computing and Communication Department of Electrical and Computer Engineering

More information

a cell is represented by a triple of non-negative integers). The next state of a cell is determined by the present states of the right part of the lef

a cell is represented by a triple of non-negative integers). The next state of a cell is determined by the present states of the right part of the lef MFCS'98 Satellite Workshop on Cellular Automata August 25, 27, 1998, Brno, Czech Republic Number-Conserving Reversible Cellular Automata and Their Computation-Universality Kenichi MORITA, and Katsunobu

More information

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks

An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks An Admission Control Mechanism for Providing Service Differentiation in Optical Burst-Switching Networks Igor M. Moraes, Daniel de O. Cunha, Marco D. D. Bicudo, Rafael P. Laufer, and Otto Carlos M. B.

More information

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Technical Report: University of Virginia, S-2002-27 Jörg Liebeherr Stephen Patek Almut Burchard y y Department of Mathematics

More information

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues

Equivalent Models and Analysis for Multi-Stage Tree Networks of Deterministic Service Time Queues Proceedings of the 38th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2000. Equivalent Models and Analysis for Multi-Stage ree Networks of Deterministic Service ime Queues Michael

More information