Results 1  10
of
221
Service Disciplines for Guaranteed Performance Service in PacketSwitching Networks
 Proceedings of the IEEE
, 1995
"... While today’s computer networks support only besteffort service, future packetswitching integratedservices networks will have to support realtime communication services that allow clients to transport information with performance guarantees expressed in terms of delay, delay jitter, throughput, ..."
Abstract

Cited by 592 (3 self)
 Add to MetaCart
While today’s computer networks support only besteffort service, future packetswitching integratedservices networks will have to support realtime communication services that allow clients to transport information with performance guarantees expressed in terms of delay, delay jitter, throughput, and loss rate. An important issue in providing guaranteed performance service is the choice of the packet service discipline at switching nodes. In this paper, we survey several service disciplines that are proposed in the literature to provide perconnection endtoend peqormance guarantees in packetswitching networks. We describe their mechanisms, their similarities and differences, and the performance guarantees they can provide. Various issues and tradeoffs in designing service disciplines for guaranteed performance service are discussed, and a general framework for studying and comparing these disciplines are presented. I.
Logarithmic Asymptotics For SteadyState Tail Probabilities In A SingleServer Queue
, 1993
"... We consider the standard singleserver queue with unlimited waiting space and the firstin firstout service discipline, but without any explicit independence conditions on the interarrival and service times. We find conditions for the steadystate waitingtime distribution to have smalltail asympt ..."
Abstract

Cited by 177 (15 self)
 Add to MetaCart
We consider the standard singleserver queue with unlimited waiting space and the firstin firstout service discipline, but without any explicit independence conditions on the interarrival and service times. We find conditions for the steadystate waitingtime distribution to have smalltail asymptotics of the form x  1 logP(W > x)  q * as x for q * > 0. We require only stationarity of the basic sequence of service times minus interarrival times and a Ga .. rtnerEllis condition for the cumulant generating function of the associated partial sums, i.e., n  1 log Ee qS n y(q) as n , plus regularity conditions on the decay rate function y. The asymptotic decay rate q * is the root of the equation y(q) = 0. This result in turn implies a corresponding asymptotic result for the steadystate workload in a queue with general nondecreasing input. This asymptotic result covers the case of multiple independent sources, so that it provides additional theoretical support for a concept of effective bandwidths for admission control in multiclass queues based on asymptotic decay rates.
Information Theory and Communication Networks: An Unconsummated Union
 IEEE Trans. Inform. Theory
, 1998
"... Information theory has not yet had a direct impact on networking, although there are similarities in concepts and methodologies that have consistently attracted the attention of researchers from both fields. In this paper, we review several topics that are related to communication networks and that ..."
Abstract

Cited by 156 (5 self)
 Add to MetaCart
(Show Context)
Information theory has not yet had a direct impact on networking, although there are similarities in concepts and methodologies that have consistently attracted the attention of researchers from both fields. In this paper, we review several topics that are related to communication networks and that have an information theoretic flavor, including multiaccess protocols, timing channels, effective bandwidth of bursty data sources, deterministic constraints on datastreams, queueing theory, and switching networks. Keywords Communication networks, multiaccess, effective bandwidth, switching I. INTRODUCTION Information theory is the conscience of the theory of communication; it has defined the "playing field" within which communication systems can be studied and understood. It has provided the spawning grounds for the fields of coding, compression, encryption, detection, and modulation and it has enabled the design and evaluation of systems whose performance is pushing the limits of wha...
Notes on Effective Bandwidths
, 1996
"... This paper presents a personal view of work to date on effective bandwidths, emphasising the unifying role of the concept: as a summary of the statistical characteristics of sources over different time and space scales; in bounds, limits and approximations for various models of multiplexing unde ..."
Abstract

Cited by 150 (4 self)
 Add to MetaCart
This paper presents a personal view of work to date on effective bandwidths, emphasising the unifying role of the concept: as a summary of the statistical characteristics of sources over different time and space scales; in bounds, limits and approximations for various models of multiplexing under quality of service constraints; and as the basis for simple and robust tariffing and connection acceptance control mechanisms for poorly characterized traffic. The framework assumes only stationarity of sources, and illustrative examples include periodic streams, fractional Brownian input, policed and shaped sources, and deterministic multiplexing.
Large Deviations, the Shape of the Loss Curve, and Economies of Scale in Large Multiplexers
, 1995
"... We analyse the queue Q L at a multiplexer with L inputs. We obtain a large deviation result, namely that under very general conditions lim L!1 L \Gamma1 log P[Q L ? Lb] = \GammaI (b) provided the offered load is held constant, where the shape function I is expressed in terms of the cumulant ..."
Abstract

Cited by 143 (21 self)
 Add to MetaCart
We analyse the queue Q L at a multiplexer with L inputs. We obtain a large deviation result, namely that under very general conditions lim L!1 L \Gamma1 log P[Q L ? Lb] = \GammaI (b) provided the offered load is held constant, where the shape function I is expressed in terms of the cumulant generating functions of the input traffic. This provides an improvement on the usual effective bandwidth approximation P[Q L ? b] e \Gammaffib , replacing it with P[Q L ? b] e \GammaLI(b=L) . The difference I(b) \Gamma ffi b determines the economies of scale which are to be obtained in large multiplexers. If the limit = \Gamma lim t!1 t t (ffi) exists (here t is the finite time cumulant of the workload process) then lim b!1 (I(b) \Gamma ffi b) = . We apply this idea to a number of examples of arrivals processes: heterogeneous superpositions, Gaussian processes, Markovian additive processes and Poisson processes. We obtain expressions for in these cases. is zero for independent arrivals, but positive for arrivals with positive correlations. Thus economies of scale are obtainable for highly bursty traffic expected in ATM multiplexing.
Admission Control for Statistical QoS: Theory and Practice
, 1999
"... In networks that support Quality of Service (QoS), an admission control algorithm determines whether or not a new traffic flow can be admitted to the network such that all users will receive their required performance. Such an algorithm is a key component of future multiservice networks as it deter ..."
Abstract

Cited by 123 (13 self)
 Add to MetaCart
In networks that support Quality of Service (QoS), an admission control algorithm determines whether or not a new traffic flow can be admitted to the network such that all users will receive their required performance. Such an algorithm is a key component of future multiservice networks as it determines the extent to which network resources are utilized and whether the promised QoS parameters are actually delivered. Our goals in this paper are threefold. First, we describe and classify a broad set of proposed admission control algorithms. Second, we evaluate the accuracy of these algorithms via experiments using both onoff sources and long traces of compressed video; we compare the admissible regions and QoS parameters predicted by our implementations of the algorithms with those obtained from tracedriven simulations. Finally, we identify the key aspects of an admission control algorithm necessary for achieving a high degree of accuracy and hence a high statistical multiplexing gain...
Statistical Analysis of the Generalized Processor Sharing Scheduling Discipline
, 1995
"... In this paper, we develop bounds on the individual session backlog and delay distribution under the Generalized Processor Sharing (GPS) scheduling discipline . This work is motivated by, and is an extension of, Parekh and Gallager 's deterministic study of the GPS scheduling discipline with lea ..."
Abstract

Cited by 99 (6 self)
 Add to MetaCart
In this paper, we develop bounds on the individual session backlog and delay distribution under the Generalized Processor Sharing (GPS) scheduling discipline . This work is motivated by, and is an extension of, Parekh and Gallager 's deterministic study of the GPS scheduling discipline with leakybucket token controlled sessions [15], [16]. Using the exponentially bounded burstiness (E.B.B.) process model introduced in [18] as a source traffic characterization, we establish results that extend the deterministic study of GPS: for a single GPS server in isolation, we present statistical bounds on the distributions of backlog and delay for each session. In the network setting, we show that networks belonging to a broad class of GPS assignments, the socalled Consistent Relative Session Treatment (CRST) GPS assignments, are stable in a stochastic sense. In particular, we establish simple bounds on the distribution of backlog and delay for each session in a Rate Proportional Processor Sharin...
TCP Over Wireless with Link Level Error Control: Analysis and Design Methodology
 IEEE/ACM TRANSACTIONS ON NETWORKING
, 1996
"... The anticipated emergence of mobile computing depends on the ability to support data applications over heterogeneous networks comprising both wireless and wireline links. Standard data applications on current wireline networks are based on TCP/IP. However TCP performs poorly over lossy wireless li ..."
Abstract

Cited by 85 (1 self)
 Add to MetaCart
(Show Context)
The anticipated emergence of mobile computing depends on the ability to support data applications over heterogeneous networks comprising both wireless and wireline links. Standard data applications on current wireline networks are based on TCP/IP. However TCP performs poorly over lossy wireless links subject to deep fades and other impairments may be unsatisfactory. One approach to this problem is to use suitable link level error recovery mechanism that can "hide" the fluctuations of the wireless medium from TCP. In this paper, we provide an analytical framework for quantifying the performance of TCP operating over wireless link (with retransmission based link level error recovery) as a function of the wireless channel characteristics, the size of the wirelesswireline interface buffer, and the bandwidthdelay product of the connection. While our design methodology is of general applicability, we demonstrate it for the specific case of a Rayleigh fading link, since Rayleigh fading is one of the typical (and dominant) impairments of the wireless medium. The numerical results obtained for specific values of system parameters also indicate that link level error recovery on the wireless link is an effective method of achieving reasonable throughputs with TCP over an endtoend path consisting of both wireline and wireless links. We provide an asymptotic argument to explain qualitatively the feasibility of employing retransmission based link level error recovery.
On Deterministic Traffic Regulation and Service Guarantees: A Systematic Approach by Filtering
 IEEE Transactions on Information Theory
, 1997
"... In this paper, we develop a filtering theory for deterministic traffic regulation and service guarantees under the (min; +)algebra. We show that traffic regulators that generate fupper constrained outputs can be implemented optimally by a linear time invariant filter with the impulse response f ..."
Abstract

Cited by 84 (4 self)
 Add to MetaCart
(Show Context)
In this paper, we develop a filtering theory for deterministic traffic regulation and service guarantees under the (min; +)algebra. We show that traffic regulators that generate fupper constrained outputs can be implemented optimally by a linear time invariant filter with the impulse response f under the (min; +)algebra, where f is the subadditive closure defined in the paper. Analogous to the classical filtering theory, there is an associate calculus, including feedback, concatenation, "filter bank summation" and performance bounds. The calculus is also applicable to the recently developed concept of service curves that can be used for deriving deterministic service guarantees. Our filtering approach not only yields easier proofs for more general results than those in the literature, but also allows us to design traffic regulators via systematic methods such as concatenation, filter bank summation, linear system realization, and FIRIIR realization. We illustrate the use of ...
Statistical service assurances for traffic scheduling algorithms
 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS. SPECIAL ISSUE ON INTERNET QOS
, 2000
"... Network services for the most demanding advanced networked applications which require absolute, perflow service assurances can be deterministic or statistical. By exploiting statistical properties of traffic, statistical assurances can extract more capacity from a network than deterministic assura ..."
Abstract

Cited by 81 (18 self)
 Add to MetaCart
(Show Context)
Network services for the most demanding advanced networked applications which require absolute, perflow service assurances can be deterministic or statistical. By exploiting statistical properties of traffic, statistical assurances can extract more capacity from a network than deterministic assurances. In this work we consider statistical service assurances for traffic scheduling algorithms. We present functions, socalled effective envelopes, which are, with high certainty, upper bounds of multiplexed traffic. Effective envelopes can be used to obtain bounds on the amount of traffic on a link that can be provisioned with statistical service assurances. We show that our bounds can be applied to a variety of packet scheduling algorithms. In fact, one can reuse existing admission control functions for scheduling algorithms with deterministic assurances. We present numerical examples which compare the number of ows with statistical assurances that can be admitted with our effective envelope approach to those achieved with existing methods.