epfl, lausanne, july 17, 2003
DESCRIPTION
Ph.D. advisor: Prof. Jean-Yves Le Boudec. EPFL, Lausanne, July 17, 2003. Outline. Part I Equation-based Rate Control Part II Expedited Forwarding Part III Input-queued Switch. In the thesis, but not in the slides: increase-decrease controls (Chapter 3) fairness of bandwidth sharing - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/1.jpg)
EPFL, Lausanne, July 17, 2003
Ph.D. advisor: Prof. Jean-Yves Le Boudec
![Page 2: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/2.jpg)
2
Outline
Part IEquation-based Rate
ControlPart II
Expedited ForwardingPart III
Input-queued Switch
In the thesis, but not in the slides: increase-decrease controls (Chapter 3)
fairness of bandwidth sharing analysis and synthesis
![Page 3: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/3.jpg)
3
Part IEquation-based Rate Control
![Page 4: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/4.jpg)
4
Problem
New transmission control protocols proposed for some packet senders in the Internet a design goal is to offer a better transport
for streaming sources, than offered by TCP
In today’s Internet, TCP is the most used Axiom: transport protocols other than TCP,
should be TCP-friendly—another design goal
TCP-friendliness: Throughput <= TCP throughput
![Page 5: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/5.jpg)
5
Problem (cont’d)
Equation-based rate control a new set of transmission control protocols An instance: TFRC, IETF proposed standard (Jan 2003)
Past studies of equation-based rate controls mostly restricted to simulations lack of a formal study understanding needed before a wide-spread deployment
![Page 6: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/6.jpg)
6
Problem (cont’d)
given: a TCP throughput formulap = loss-event rate
p estimated on-line
at an instant t, send rate set as
Problem: Is equation-based rate control TCP-friendly ?
Equation-based rate control: basic control principles
(TCP throughput formula depends also on other factors, e.g. an event-average of the round-trip time)
![Page 7: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/7.jpg)
7
Where is the Problem ?
The estimators are updated at some special points in time the send rate updated at the special instants
(sampling bias)
t = an arbitrary instantTn = the nth update of the estimators, a special instant
x->f(x) is non-linear, the estimators are non-fixed values
(non-linearity)
Other factors
![Page 8: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/8.jpg)
8
Ln 3n 2n1n
Equation-based rate control: the basic control law
...
nT1nT 3nT LnT
Additional control laws ignored in this slide
2nT ...... ...
send rate
1nT
nT = instant of a loss-event
= a loss-event intervaln
![Page 9: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/9.jpg)
9
We first check: is the control conservative
We say a control is conservative iff
p = loss-event rate as seen by this protocol
Conservativeness is not the same as TCP-friendliness We come back to TCP-friendliness later
![Page 10: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/10.jpg)
10
When the basic control is conservative
Assume: the send rate is a stationary ergodic process
In practice: the conditions are true, or almost the result explains overly conservativeness
![Page 11: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/11.jpg)
11
Sketch of the Proof
Palm inversion:
Throughput: May make the control conservative ? !
![Page 12: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/12.jpg)
12
Sketch of the Proof (Cont’d)
the “overshoot” bounded by a function of p and
1/f(1/x) is assumed to be convex, thus, it is above its tangents take the tangent at 1/p
![Page 13: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/13.jpg)
13
SQRT
PFTK-standard
PFTK-simplified
convex
convex
almost convex
When 1/f(1/x) is convex
b = number of packets acknowledged by an ack
SQRT:
PFTK-standard:
PFTK-simplified:
Check some typical TCP throughput formulae:
![Page 14: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/14.jpg)
14
On Covariance of the Estimator and the Next Loss-event Interval
Recall (C1)
It holds:
if is a bad predictor, that leads to conservativeness
if the loss-event intervals are independent, then (C1) holds with equality
= a “measure” how well predicts
![Page 15: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/15.jpg)
15
Claim
Assume: the estimator and the next sample of the loss-event interval are negatively or slightly positive correlated
Consider a region where the loss-event interval estimator takes its values
the more convex 1/f(1/x) is in this region => the more conservative
the more variable the is => the more conservative
![Page 16: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/16.jpg)
16
Numerical example: Is the basic control conservative ?
SQRT:
PFTK-simplified:
loss-event intervals: i.i.d., generalized exponential density
![Page 17: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/17.jpg)
17
ns-2 and lab: Is TFRC conservative ?
PFTK-simplified
Setup: a RED link shared by TFRC and TCP connections
L=2
48
16
The same qualitative behavior as observed on the previous slide
PFTK-standard
L=8
ns-2 lab
![Page 18: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/18.jpg)
18
First check: is negative or slightly positive
Internet, LAN to LAN, EPFL sender
Internet, LAN to a cable-modem at EPFL
Lab
We turn to check: is TFRC TCP-friendly
![Page 19: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/19.jpg)
19
Check is TFRC conservative
PFTK-standard L=8
setup: equal number of TCP and TFRC connections (1,2,4,6,8,10), for the experiments (1,2,3,4,5,6)
mostly conservative slight deviation, anyway
![Page 20: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/20.jpg)
20
Check: is TFRC TCP-friendly
TCP-friendly ? - no, not always although, it is mostly conservative !
![Page 21: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/21.jpg)
21
Conservativeness does not imply TCP-friendliness !
Breakdown TCP-friendliness into:
If all conditions hold => TCP-friendliness If the control is non-TCP-friendly,
then at least one condition must not hold The breakdown is more than a set of sufficient conditions
- it tells us about the strength of individual factors
Does TCP conform to its formula ? Does TFRC see no better loss-event rate than TCP ? Does TFRC see no better average round-trip
times than TCP ? Is TFRC conservative ?
![Page 22: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/22.jpg)
22
Check the factors separately !
when a few connections compete, none of the conditions hold
Does TCP conform to its formula ?
Does TFRC see no better loss-event rate
than TCP ?
Does TFRC see no better loss-event rate
than TCP ?
No No No
![Page 23: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/23.jpg)
23
Concluding Remarks for Part I
under the conditions we identified,equation-based rate control is conservative when loss-event rate is large, it is overly conservative different TCP throughput formulae may yield different
bias
breakdown TCP-friendliness problem into sub-problems, check the sub-problems separately ! the breakdown would reveal a cause of an observed
non-TCP-friendliness an unknown cause may lead a protocol designer to an
improper adjustment of a protocol
TCP-friendliness is difficult to verify we propose the concept of conservativeness conservativeness is amenable to a formal verification
![Page 24: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/24.jpg)
24
Part IIExpedited Forwarding
![Page 25: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/25.jpg)
25
Problem
Expedited Forwarding (EF): a service of differentiated services Internet- network of nodes- each node offers service to the aggregate EF traffic, not per-EF-flow
EF per-hop-behavior: PSRG, Packet Scale Rate Guarantee with a rate r and a latency e
EF flows: individually shaped at the network ingress
![Page 26: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/26.jpg)
26
Problem
Obtain performance bounds to dimension EF networks
Assumption: EF flows stochastically independent at ingress
Step 1: Find probabilistic bounds on backlog, delay, and loss for a single PSRG node, with stochastically independent EF arrival processes, each constrained with an arrival curve
Step 2: Apply the results to a network of PSRG nodes
![Page 27: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/27.jpg)
27
Packet Scale Rate Guarantee with a rate r and a latency e
Relations among different node abstractions:
a property that holds for one of the node abstractions, holds for a PSRG node
![Page 28: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/28.jpg)
28
Assumptions
Note that an EF flow is allowed to be any stochastic process as long as it obeys to the given set of the assumptions
A1, A2, …, AI stochastically independent
Ai is constrained with an arrival curve
Ai is such that
There exists a finite s.t.
![Page 29: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/29.jpg)
29
One Result: a Bound on Probability of the Buffer Overflow
Then, for Q(t) (= number of bits in the node at an instant t),
Assume: all I fix:
![Page 30: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/30.jpg)
30
A Method to Derive BoundsStep 1: containment into a union of the “arrival overflow events”
(by def. of a service curve and )
Step 2: use the union probability boundStep 3: apply Hoeffding’s inequalities
key observation: is a sum of I random variables- independent, with bounded support, bounded means- fits the assumptions by Hoeffding (1963)
Note: realizing that we can apply Hoeffding’s inequalities, enabled us to obtain new performance bounds
![Page 31: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/31.jpg)
31
Numerical example
![Page 32: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/32.jpg)
32
Our Other Bounds that apply to a PSRG node
Bounds on probability of the buffer overflow for identical and non-identical arrival curve constraints in terms of some global knowledge about the arrival curves (for
leaky-bucket shapers)
Bounds on probability of the buffer overflow as seen by bit and packet arrivals
Bounds on complementary cdf of a packet delay
Bounds on the arrival bit loss rate
![Page 33: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/33.jpg)
33
Dimensioning an EF network
Known result: for , a bound on the e2e delay-jitter is
Given:
( = set of EF flows that traverse the node n)
(= maximum number of hops an EF flow can traverse)
Problem: obtain a bound on the e2e delay-jitter
![Page 34: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/34.jpg)
34
A dimensioning rule
Dimensioning rule: fix the buffer lengths such that qn=d’rn, all n
The e2e delay-jitter is bounded by h(d’+e)(delay-from-backlog property of PSRG nodes)
Given, in addition:
![Page 35: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/35.jpg)
35
Sketch of the Proof
Majorize by the fresh traffic:
bits of an EF flow i seen at the node n in (s,t] bits of an EF flow i seen at the network ingress(fresh traffic)
= (h-1)(d+e), a bound on the delay-jitter to any node in the network
Use one of our single-node bounds:
horizontal deviation between an arrival curve of the aggregate EF arrival process to a node n, an(t)=rn(at+b+a(h-1)(d+e))and a service curve offered by the node nbn(t)= rn(t-e)+
Combine the last two to retrieve the asserted d’
must be > 0, for the bound to be < 1
![Page 36: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/36.jpg)
36
Numerical Example
Example networks
rn = all n
![Page 37: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/37.jpg)
37
Concluding Remarks for Part II
We obtained probabilistic bounds on performance of a PSRG (r,e) node
Our bounds hold in probability the bounds would be more optimistic,
than worst-case deterministic bounds
Our bounds are exact
Network of nodes: we showed probabilistic bounds for a network of PSRG nodes The bounds are still with a bound on the EF load,
likewise to some known worst-case deterministic bounds With an additional global parameter, we obtained a
bound on the e2e delay-jitter that is more optimistic than a known worst-case deterministic bound
![Page 38: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/38.jpg)
38
Part IIIInput-queued Switch
![Page 39: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/39.jpg)
39
Problem
at any time slot, connectivity restricted to permutation matrices
Switch scheduling problem: schedule crossbar connectivity with guarantees on the rate and latency
![Page 40: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/40.jpg)
40
Problem (Cont’d)
Given: M, a I x I doubly sub-stochastic rate-demand matrix
1) Decomposition: decompose M=[mij] into a sequence of permutation matrices, s.t. for an input/output port pair ij, intensity of the offered slots is at least mij
– Birkoff/von Neumann: a doubly stochastic matrix M can be decomposed as
2) Schedule: schedule the permutation matrices with objective to offer a ”smooth” schedule
Consider: decomposition-based schedulers
a permutation matrix
a positive real:
![Page 41: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/41.jpg)
41
Rate-Latency Service Curve
*
![Page 42: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/42.jpg)
42
Scheduling Permutation Matrices unique token assigned to a permutation matrix scheduler by Chang et al can be seen as
superposition of point processes on a line marked by the tokens schedule permutation matrices as their tokens appear
Scheduler by Chang et al is for deterministic periodic individual token processes
Problem: can we have schedules with better bounds on the latency ?
Known result (Chang et al, 2000)
(= subset of permutation matrices
that schedule input/output port pair ij)
![Page 43: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/43.jpg)
43
Random Permutation a rate k is an integer multiple of 1/L L = frame-length
compare with the worst-case deterministic latency
Scheduler: schedule the permutation matrices in a frame,
according to a random permutation of the tokens repeat the frame over time
![Page 44: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/44.jpg)
44
Numerical Example
worst-case deterministic w.p. 0.99
![Page 45: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/45.jpg)
45
Random-phase Periodic token processes as with Chang et al, but for a token process chose a random phase,
independently of other token processes
compare with Chang et al
By derandomization:
![Page 46: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/46.jpg)
46
Random-distortion Periodic token processes as with Chang et al, but place each token uniformly at random on the
periods
By derandomization:
![Page 47: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/47.jpg)
47
A Numerical Example
Chang et al
Random-distortionperiodic
Random-phase periodic
rate-demand matrices drawn in a random manner
![Page 48: EPFL, Lausanne, July 17, 2003](https://reader035.vdocuments.us/reader035/viewer/2022062314/568145f5550346895db2fbd7/html5/thumbnails/48.jpg)
48
Concluding Remarks for Part III
We showed new bounds on the latency for a decomposition-based input-queued switch scheduling
The bounds are in many cases better than previously-known bound by Chang et al
To our knowledge, the approach is novel conjunction of the superposition of the token processes
and probabilistic techniques may lead to new bounds construction of practical algorithms