Talk Viewgraphs - People
Download
Report
Transcript Talk Viewgraphs - People
Ph.D. advisor:
Prof. Jean-Yves Le Boudec
EPFL, Lausanne, July 17, 2003
Outline
Part I
Equation-based Rate Control
Part II
Expedited Forwarding
Part III
Input-queued Switch
In the thesis, but not in the slides:
increase-decrease controls (Chapter 3)
fairness of bandwidth sharing
analysis and synthesis
2
Part I
Equation-based Rate Control
3
Problem
New transmission control protocols proposed
for some packet senders in the Internet
a design goal is to offer a better transport
for streaming sources, than offered by TCP
In today’s Internet, TCP is the most used
Axiom: transport protocols other than TCP,
should be TCP-friendly—another design goal
TCP-friendliness: Throughput <= TCP throughput
4
Problem (cont’d)
Equation-based rate control
a new set of transmission control protocols
An instance: TFRC, IETF proposed standard (Jan 2003)
Past studies of equation-based rate controls
mostly restricted to simulations
lack of a formal study
understanding needed before a wide-spread deployment
5
Problem (cont’d)
Equation-based rate control: basic control principles
given: a TCP throughput formula
p = loss-event rate
p estimated on-line
at an instant t, send rate set as
Problem: Is equation-based rate control TCP-friendly ?
(TCP throughput formula depends also on other factors,
e.g. an event-average of the round-trip time)
6
Where is the Problem ?
The estimators are updated at some special points in time
the send rate updated at the special instants
(sampling bias)
t = an arbitrary instant
Tn = the nth update of the estimators, a special instant
x->f(x) is non-linear, the estimators are non-fixed values
(non-linearity)
Other factors
7
send rate
Equation-based rate control:
the basic control law
n L
... Tn L
...
... Tn 3
n 3
n 2
n 1
Tn 2 Tn 1
Tn
...
Tn 1
Tn = instant of a loss-event
n = a loss-event interval
Additional control laws ignored in this slide
8
We first check: is the control conservative
We say a control is conservative iff
p = loss-event rate as seen by this protocol
Conservativeness is not the same as TCP-friendliness
We come back to TCP-friendliness later
9
When the basic control is conservative
Assume: the send rate is a stationary ergodic process
In practice:
the conditions are true, or almost
the result explains overly conservativeness
10
Sketch of the Proof
Palm inversion:
Throughput:
May make the control
conservative ? !
11
Sketch of the Proof (Cont’d)
1/f(1/x) is assumed to be convex, thus, it is above its tangents
take the tangent at 1/p
the “overshoot” bounded by a function of p and
12
When 1/f(1/x) is convex
Check some typical TCP throughput
formulae:
SQRT:
PFTK-standard
almost convex
PFTK-standard:
PFTK-simplified
convex
PFTK-simplified:
SQRT
convex
b = number of packets acknowledged by an ack
13
On Covariance of the Estimator and
the Next Loss-event Interval
Recall (C1)
= a “measure” how well
predicts
It holds:
if
is a bad predictor, that leads to conservativeness
if the loss-event intervals are independent, then (C1) holds
with equality
14
Claim
Assume: the estimator and the next sample of the loss-event
interval are negatively or slightly positive correlated
Consider a region where the loss-event interval estimator takes
its values
the more convex 1/f(1/x) is in this region
=> the more conservative
the more variable the is
=> the more conservative
15
Numerical example:
Is the basic control conservative ?
SQRT:
PFTK-simplified:
loss-event intervals: i.i.d., generalized exponential density
16
ns-2 and lab: Is TFRC conservative ?
ns-2
lab
PFTK-simplified
PFTK-standard
16
8
4
L=8
L=2
Setup: a RED link shared by TFRC and TCP connections
The same qualitative behavior as observed on the previous slide
17
We turn to check: is TFRC TCP-friendly
First check: is
Internet, LAN to LAN,
EPFL sender
negative or slightly positive
Internet, LAN to
a cable-modem at EPFL
Lab
18
Check is TFRC conservative
PFTK-standard
L=8
setup: equal number of TCP and
TFRC connections (1,2,4,6,8,10),
for the experiments (1,2,3,4,5,6)
mostly conservative
slight deviation, anyway
19
Check: is TFRC TCP-friendly
TCP-friendly ? - no, not always
although, it is mostly conservative !
20
Conservativeness does not
imply TCP-friendliness !
Breakdown TCP-friendliness into:
Does TCP conform to its formula ?
Does TFRC see no better loss-event rate than TCP ?
Does TFRC see no better average round-trip
times than TCP ?
Is TFRC conservative ?
If all conditions hold => TCP-friendliness
If the control is non-TCP-friendly,
then at least one condition must not hold
The breakdown is more than a set of sufficient conditions
- it tells us about the strength of individual factors
21
Check the factors separately !
Does TCP conform
to its formula ?
No
Does TFRC see no
better loss-event rate
than TCP ?
No
Does TFRC see no
better loss-event rate
than TCP ?
No
when a few connections compete, none of the conditions hold
22
Concluding Remarks for Part I
under the conditions we identified,
equation-based rate control is conservative
when loss-event rate is large, it is overly conservative
different TCP throughput formulae may yield different bias
breakdown TCP-friendliness problem into sub-problems,
check the sub-problems separately !
the breakdown would reveal a cause of an observed
non-TCP-friendliness
an unknown cause may lead a protocol designer to an
improper adjustment of a protocol
TCP-friendliness is difficult to verify
we propose the concept of conservativeness
conservativeness is amenable to a formal verification
23
Part II
Expedited Forwarding
24
Problem
Expedited Forwarding (EF): a service of differentiated services Internet
- network of nodes
- each node offers service to the aggregate EF traffic, not per-EF-flow
EF per-hop-behavior: PSRG, Packet Scale Rate Guarantee with a rate r
and a latency e
EF flows: individually shaped at the network ingress
25
Problem
Obtain performance bounds to dimension EF networks
Assumption: EF flows stochastically independent at ingress
Step 1: Find probabilistic bounds on backlog, delay, and loss
for a single PSRG node, with stochastically independent EF
arrival processes, each constrained with an arrival curve
Step 2: Apply the results to a network of PSRG nodes
26
Packet Scale Rate Guarantee
with a rate r and a latency e
Relations among different node abstractions:
a property that holds for one of the node abstractions,
holds for a PSRG node
27
Assumptions
A1, A2, …, AI stochastically independent
Ai is constrained with an arrival curve
Ai is such that
There exists a finite
Note that an EF flow is allowed to be any stochastic process
as long as it obeys to the given set of the assumptions
s.t.
28
One Result: a Bound
on Probability of the Buffer Overflow
Assume:
fix:
all I
Then, for Q(t) (= number of bits in the node at an instant t),
29
A Method to Derive Bounds
Step 1: containment into a union of the “arrival overflow events”
(by def. of a service
curve and )
Step 2: use the union probability bound
Step 3: apply Hoeffding’s inequalities
key observation:
is a sum of I random variables
- independent, with bounded support, bounded means
- fits the assumptions by Hoeffding (1963)
Note: realizing that we can apply Hoeffding’s inequalities,
enabled us to obtain new performance bounds
30
Numerical example
31
Our Other Bounds that apply to a PSRG node
Bounds on probability of the buffer overflow
for identical and non-identical arrival curve constraints
in terms of some global knowledge about the arrival
curves (for leaky-bucket shapers)
Bounds on probability of the buffer overflow
as seen by bit and packet arrivals
Bounds on complementary cdf of a packet delay
Bounds on the arrival bit loss rate
32
Dimensioning an EF network
Given:
(= maximum number of hops an
EF flow can traverse)
(
= set of EF flows that traverse the node n)
Problem: obtain a bound on the e2e delay-jitter
Known result: for
, a bound on the e2e delay-jitter is
33
A dimensioning rule
Given, in addition:
Dimensioning rule: fix the buffer lengths such that qn=d’rn, all n
The e2e delay-jitter is bounded by h(d’+e)
(delay-from-backlog property of PSRG nodes)
34
Sketch of the Proof
Majorize by the fresh traffic:
bits of an EF flow i seen at the node n in (s,t]
bits of an EF flow i seen at the network ingress
(fresh traffic)
= (h-1)(d+e), a bound on the delay-jitter to any node in the network
Use one of our single-node bounds:
must be > 0, for the bound to be < 1
horizontal deviation between an arrival curve of the
aggregate EF arrival process to a node n,
an(t)=rn(at+b+a(h-1)(d+e))
and a service curve offered by the node n
bn(t)= rn(t-e)+
Combine the last two to retrieve the asserted d’
35
Numerical Example
Example networks
rn =
all n
36
Concluding Remarks for Part II
We obtained probabilistic bounds on
performance of a PSRG (r,e) node
Our bounds hold in probability
the bounds would be more optimistic,
than worst-case deterministic bounds
Our bounds are exact
Network of nodes: we showed probabilistic bounds for
a network of PSRG nodes
The bounds are still with a bound on the EF load,
likewise to some known worst-case deterministic bounds
With an additional global parameter, we obtained a bound
on the e2e delay-jitter that is more optimistic than a
known worst-case deterministic bound
37
Part III
Input-queued Switch
38
Problem
at any time slot, connectivity restricted to permutation matrices
Switch scheduling problem: schedule crossbar connectivity
with guarantees on the rate and latency
39
Problem (Cont’d)
Consider: decomposition-based schedulers
Given: M, a I x I doubly sub-stochastic rate-demand matrix
1) Decomposition: decompose M=[mij] into a sequence of
permutation matrices, s.t. for an input/output port pair ij,
intensity of the offered slots is at least mij
– Birkoff/von Neumann: a doubly stochastic matrix M
can be decomposed as
a permutation matrix
a positive real:
2) Schedule: schedule the permutation matrices
with objective to offer a ”smooth” schedule
40
Rate-Latency Service Curve
*
41
Scheduling Permutation Matrices
unique token assigned to a permutation matrix
scheduler by Chang et al can be seen as
Known result (Chang et al, 2000)
(= subset of permutation matrices
that schedule input/output port pair ij)
superposition of point processes on a line marked by the tokens
schedule permutation matrices as their tokens appear
Scheduler by Chang et al is for deterministic periodic individual token processes
Problem: can we have schedules with better bounds on the latency ?
42
Random Permutation
a rate k is an integer multiple of 1/L
L = frame-length
Scheduler:
schedule the permutation matrices in a frame,
according to a random permutation of the tokens
repeat the frame over time
compare with the worst-case deterministic latency
43
Numerical Example
worst-case deterministic
w.p. 0.99
44
Random-phase Periodic
token processes as with Chang et al, but for a token process chose a
random phase, independently of other token processes
By derandomization:
compare with Chang et al
45
Random-distortion Periodic
token processes as with Chang et al, but place each token uniformly
at random on the periods
By derandomization:
46
A Numerical Example
Chang et al
Random-distortion
periodic
Random-phase
periodic
rate-demand matrices drawn in a random manner
47
Concluding Remarks for Part III
We showed new bounds on the latency for a
decomposition-based input-queued switch scheduling
The bounds are in many cases better than
previously-known bound by Chang et al
To our knowledge, the approach is novel
conjunction of the superposition of the token processes
and probabilistic techniques may lead to new bounds
construction of practical algorithms
48