cnit italian national consortium for telecommunicationsqos.pdf · italian national consortium for...

47
cnit 1 1 Control Techniques for Quality of Service Guarantees in Multiservice Telecommunication Networks Italian National Consortium for Telecommunications cnit Franco Davoli, Riccardo Minciardi Department of Communications, Computer and Systems Science, University of Genoa, Italy CNIT-University of Genoa Research Unit [email protected] , [email protected] cnit 2 Outline Control problems in Telecommunication Networks General aspects and common ground Problem areas in networking control Heterogeneous networking environments Timescales - control, management, planning

Upload: lykhuong

Post on 06-May-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

1

1

Control Techniques for Quality of ServiceGuarantees in Multiservice

Telecommunication Networks

Italian National Consortium for Telecommunicationscnit

Franco Davoli, Riccardo MinciardiDepartment of Communications, Computer and

Systems Science, University of Genoa, Italy

CNIT-University of Genoa Research [email protected], [email protected]

cnit

2

Outline

Control problems in TelecommunicationNetworks General aspects and common ground Problem areas in networking control Heterogeneous networking environments Timescales - control, management, planning

Page 2: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

2

cnit

3

Outline (cont’d)

Call Admission Control, Bandwidth Allocationand Routing, Congestion Control Admission policies Service separation - Decoupling low- and high-level

constraints Bandwidth allocation in ATM and IP terrestrial, mobile

wireless and satellite networks - Dynamic routing of flows Scheduling Pricing

cnit

4

Outline (cont’d)

Instances of control techniques in specificenvironments Access networks Mobile wireless networks and satellite networks Cross-layer approaches Approximation techniques and parametric

optimization

Page 3: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

3

cnit

5

Introduction

A large number of dynamic control and resourceallocation problems arise in almost all types ofcommunication networks.

Among others, some examples of the mostcommonly found ones are: Connection Admission Control (CAC) Bandwidth Allocation Congestion Control Routing Scheduling Power control in wireless networks

cnit

6

Introduction (cont’d)

Such problems are encountered in differentnetworking environments, cabled and wireless;basicallyTDM-based structures (circuit-switched telephone

networks; mobile radio networks, even in conjunctionwith CDMA; satellite networks)

ATM networksIP networks with DiffServ/IntServ paradigms, MPLSOptical networks (with MPλS, GMPLS)Wireless networks

The various structures may appear together (inparticular, IP-over-X)

Page 4: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

4

cnit

7

Introduction (cont’d)

Control problems appear at various architectural layers Physical and Data Link: dynamic power control and fade

countermeasures, bandwidth allocation among users and services,multiple access, …

Network: dynamic bandwidth allocation, routing, Call AdmissionControl, packet scheduling, …

Transport: elastic bandwidth allocation, congestion control, … Application: congestion control (e.g., TCP-friendly applications),

rate adaptation, pricing, …

Cross-layer approaches (i.e., exploiting information fromother layers for control purposes) are often advisable,especially at lower layers in noisy environments.

cnit

8

Purpose of the Course

To give an overview of some controlissues and techniques commonly usedin telecommunication networks

To show instances of their application indifferent networking environments

To point out possible open problemsand research areas

Page 5: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

5

cnit

9

Goals of control

The ultimate goal is to provide some level ofQuality of Service (QoS) to the entities (dataunits, connections, applications, end users)that are being considered, depending on thespecific layer or the “granularity” (or on thescope or “width”) they are looked upon.

According to ITU-T E800, QoS is interpretedasThe overall effect of performance-enabling

services that determine the degree of satisfactionof a service user.

From the viewpoint of the telecommunicationnetwork, QoS translates into the capability of thenetwork to guarantee a specific service level.

cnit

10

Quality of Service

Indeed, the term QoS has a number ofinterpretations, which range from the qualityperceived by the service user to a set of performance(in general, layer-specific) parameters that isnecessary to specify to obtain the desired level ofservice.

E.g., one may distinguish– Intrinsic QoS : directly provided by the network and described in

terms of objective indicators, like loss (of data units or connections)and transfer delay.

– Perceived QoS - P-QoS: as subjectively measured by the MeanOpinion Score (MOS).

– Assessed QoS : as referred to the user’s willingness to continueusing a service. Related to P-QoS, but also dependent from thepricing mechanism, the support guaranteed by the provider andother commercial and market aspects.

Page 6: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

6

cnit

11

Service Level Specification

QoS provisioning is often offered in terms ofobjective indicators, by using aService Level Specification - SLS.

The SLS is a set of performance indexes andof their required values that together definethe service offered to a given traffic.

The SLS is the technical part of anagreement, negotiated between service userand provider, relatively to the characteristicsof the service itself and to the associated setof metrics (Service Level Agreement - SLA).

cnit

12

Applications

Which applications need some form of QoS? All applications requiring a specified level of

“guarantee” from the network– Services for the transport of aggregate

information (bandwidth from providers, VPN) In the access network In the backbone network

– Videoconferencing, videotelephony– VoIP, Internet Telephony– Tele-medicine– Tele-education– Remote Control– Emergency (Disaster Recovery) applications– …

Page 7: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

7

cnit

13

Requests for QoS

Market requests Widespread diffusion of the Internet

Protocol Suite as a “universal” platform Need of mechanisms to provide quality

end-to-end QoS on IP networks andacross multiple domains.

cnit

14

ITU-T QoS Classes (for IP)

Traditional applications of best-effort IP networks5

Low loss (short transactions, streaming data flow)4Data transactions, interactive3

Data transactions, highly interactive2Real-time, delay jitter sensitive, interactive1

Real-time, delay jitter sensitive, highly interactive0

CharacteristicsQoSClass

ITU-T Y-1541

Page 8: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

8

cnit

15

QoS metrics (IP)

IPLR - IP Packet Loss Rate IPTD - IP Packet Transfer Delay IPDV - IP Packet Delay Variation IPER – IP Packet Error Rate Skew (average value of the delay

difference among packets belonging todifferent, mutually synchronized, media)

cnit

16

QoS metrics - Requirements

1 x 10-4Upper limitIPER

Un-specified

1 x 10-31 x 10-31 x 10-31 x 10-31 x 10-3Upper limit onpacket loss rate

IPLR

Un-specified

Un-specified

Un-specified

Un-specified

50 ms50 msUpper limit on1-10-3 quantile of

IPTD less minIPTD

IPDV

Un-specified

1 s400 ms100 ms400 ms100 msUpper limit onaverage IPTD

IPTD

Class 5Un-

specified

43210PerformanceParameter

QoS Classes

Page 9: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

9

cnit

17

QoS metrics - An example

cnit

18

QoS control

Functionalities and Tools

Identification of traffic flows Call Admission Control Traffic Engineering Scheduling (Service discipline) Flow and congestion control QoS Routing Resource Allocation

Page 10: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

10

cnit

19

QoS control - Time scales

A wide range of time scales, with orders of magnitude fromfew µs to minutes, hours and days. Accordingly, a set of(related) resource allocation and control problems, spanning• Network Control• Network Management• Network Planning

cnit

20

QoS mapping

Services offered by lower layers shouldprovide QoS mapping functions for thebenefit of higher layers

Implementing end-to-end guarantees (if at allpossible!) would imply cooperation amonglayers

However, care should be taken in cross-layerapproaches, in order not to disruptarchitectural principles that ensureinteroperabilty

Page 11: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

11

cnit

21

Transport technologies

Higher layers - IP

SONET/SDH(ATM)

TDM

Ethernet Other…

WDM

cnit

22

QoS control - Technologies

“Throwing bandwidth at the problem”ATMIP (IPv4 and IPv6)

DiffServ / IntServ

MPLS

Page 12: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

12

cnit

23

Technologies - ATM

octects

octects

Traffic Flow Identification

cnit

24

Technologies - ATM

Originated as QoS-oriented technology Statistical multiplexing with resource

reservation to guarantee service level Defined traffic parameters and

descriptors for QoS Too complex in terms of control plane,

signaling required, adaptation layers.

Page 13: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

13

cnit

25

Technologies - IP IntServ

Defines flows Signaling (RSVP) Guaranteed Service (GS)

– Reliable upper limit on source-destinationpacket delay

Controlled Load Service (CLS)– Comparable to best-effort in lightly loaded

network Hardly scalable

cnit

26

Technologies - IP IntServ - RSVP

RSVP protocol– Activates connection upon request by source host– Does not require message for resource release– Requires (periodic) refresh messages to inform nodes traversed by a

connection that the connection is still active (soft state)– Connection is released only if refresh message times out

Advantages– Bandwidth guarantees

Disadvantages– Upon ternimation of IP flow, bandwidth not immediately released– Part of bandwidth used by “keep alive” signaling

Page 14: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

14

cnit

27

Technologies - IP DiffServ

Use of DSCP (DiffServ Code Point) –ToS – 8 bit (6 DSCP+2) in IP header

Traffic aggregation Scalability

cnit

28

Technologies - IP DiffServ

Three priority classes– Expedited Forwarding (EF) characterized by configurable

minimum service rate, independently of other aggregateswithin router; oriented to low delay and loss services

– Assured Forwarding (AF) specified for four independentclasses (AF1, AF2, AF3, AF4), though the number couldbe higher. Within each class traffic is differentiated in 3categories (drop precedence)

– Best Effort (BE) with no performance guarantee and QoSlevel

Page 15: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

15

cnit

29

Technologies - IP DiffServ

Aggregate traffic handling

Control functionsMarkingClassificationRate control - Policing

Modular architecture:DiffServ domain (set of nodes)DiffServ region (set of contiguous domains)DiffServ network (set of regions)

Aggregate

Aggregate

cnit

30

Technologies - IP DiffServ

An example of DSCP assignment

Page 16: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

16

cnit

31

Technologies - IPv6

Version Traffic Class Flow Label

Payload Length Next Header Hop Limit

Source Address

Destination Address

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 11 2 3

cnit

32

Technologies - IPv6

Version Class Flow Label

Payload Length Next Header Hop Limit

Source Address

Destination Address

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 11 2 3

Page 17: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

17

cnit

33

Technologies - MPLS

Label Switching - Traffic engineering capabilities

IP ATMMPLS QoS handling

Control functionsSimpleUniversally widespread

C1

C3

C2IP

IP 5IP 10

IP

LER

LSR

LERLSRLSR

cnit

34

Technologies - MPLS

32-bits

Label MPLS

Label (20 bits) TTLSEXP

IP

– Label– Experimental– Stacking bit (indicates presence of more labels)– Time to live

IP on guaranteed performance network

Page 18: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

18

cnit

35

Technologies - MPLS

C1

C3

C2IP

IP 5IP 10

IP

LER

LSR

LERLSRLSR

– LER (Label Edge Router) at ingress applies Label to packet and sendsover correct LSP (Label Switched Path).

– LSRs (Label Switched Router) switch packet, swapping labels– Egress LER eliminates label and forwards packet with IP forwarding

procedure

cnit

36

Technologies - Flow ID

ATM

IPv4

IPv6

Version Type of Service Total Length

Identification Flags Fragment Offset

Source Address

Destination Address

IHL

Time To Live Protocol Header checksum

Options Padding

TCP/UDP Port - Sourcee TCP/UDP Port - Destination

Version Class Flow LabelPayload Length Next Header Hop Limit

Source Address

Destination Address

Page 19: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

19

cnit

37

QoS control functions

Traffic flow identificationCACRate control, traffic shaping and filteringBandwidth allocation

Scheduling (service discipline)Flow and congestion controlQoS Routing

cnit

38

QoS architectures - End-to-end example

Page 20: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

20

cnit

39

References

H.J. Chao, X. Guo, Quality of Service Control in High-Speed Networks,Wiley, New York, NY, 2002.

J. Walrand, P. Varaiya, High-Performance Communication Networks,2nd Ed., Morgan-Kaufmann, San Francisco, CA, 2000.

J. Kurose, K. Ross, Computer Networking, 3rd Ed., Addison-Wesley,Boston, MA, 2004.

cnit

40

Control of TDM, ATM and IP networks

Time Division Multiplexing (TDM) networks still form a broadclass of existing systems, for which control methods havebeen developed and applied over the years. They stillconstitute the basis of a large amount of “legacy” circuit-switched networks (i.e., the telephone network), of a largenumber of satellite systems, of second generation cellularsystems (and also appear in 3rd generation ones, inconjunction with CDMA).

There is also another motivation to study some of themethods that are applicable in this context. Actually, manyconcepts developed therein refer to the notion of a“connection”, implying the allocation of a resource of somekind (e.g., bandwidth) over a considerably “long” time scale(with respect to, e.g., a time slot) and can be applied indifferent settings, by somehow decoupling control problemsat widely different time scales.

Page 21: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

21

cnit

41

Control of TDM, ATM and IP networks (cont’d)

In general, multiservice networks are encountered,i.e., networks where multiple classes of services,possibly characterized by different transmissionspeeds or statistical characteristics of their sources,or by specific performance requirements, are present.However, some techniques may also make sense in asingle service environment (e.g., trunk reservation incircuit-switched networks).

The stochastic knapsack model and product form lossnetworks, which are a basis for the study ofmultiservice loss systems (see, e.g., the book byK.W. Ross), are useful tools in this context.

Many teletraffic engineering concepts developed herecarry over to MPLS.

cnit

42

Control of TDM, ATM and IP networks (cont’d)

As regards recalling some control techniques in theAsynchronous Transfer Mode (ATM), there is a similarmotivation. There is today a large basis of deployed ATMnetworks in the transport and access area, control techniques at“connection level” extend from the circuit-switched world to theATM environment, and some concepts may be further extendedto multiservice IP networks, which are the main focus of currentresearch activity.

Moreover, CAC and bandwidth allocation for guaranteedperformance (GP) flows (or a mix of them and best-efforttraffic) still are at the basis of current problem areas in thewireless environment.

Page 22: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

22

cnit

43

Control of TDM, ATM and IP Networks (cont’d)

Examples

cnit

44

Control of TDM, ATM and IP Networks (cont’d)

Examples

Page 23: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

23

cnit

45

Control of TDM and ATM Networks (cont’d)

Examples

(See, e.g., DVB-S and DVB-RCS Data Link Layer QoS classes)

cnit

46

Control of TDM, ATM and IP Networks (cont’d)

Examples

Similar structures in the access area also apply (withobvious modifications and interesting cross-layerinteractions arising) in wideband fixed wireless access (IEEE 802.16 and ETSI TR

102 003 standards, among others) in bandwidth allocation and admission control in the

interaction between base station and mobile terminals incellular radio networks (GSM, GPRS, UMTS)

in multiservice WLANs (based on IEEE 802.11, Bluetooth, …)

Page 24: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

24

cnit

47

Control of TDM and ATM Networks (cont’d)

Examples - Heterogeneity

cnit

48

Control of TDM and ATM Networks (cont’d)

Examples

Data-link / Physical Layer Integration of Guaranteed Performance (bandwidth) and best-effort traffic

Page 25: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

25

cnit

49

Control of TDM and ATM Networks (cont’d)

Examples

Hierarchical Admission Control and Bandwidth Allocation

cnit

50

Call-level Models, CAC and Routing

The stochastic knapsack model Blocking probability Call Admission Control Admission policies Optimal Complete Partitioning Knapsack models for ATM and IP Service Separation Routing Product Form Loss Networks

Page 26: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

26

cnit

51

The Stochastic Knapsack Model

Consider a pure loss queueing system, i.e., onewhere arriving objects are admitted (for the durationof their holding time) if there is room and blockedotherwise. A system of this kind where objects ofdifferent size ( ) arrive and departdynamically, according to some statisticaldistribution, is called a stochastic knapsack.

cnit

52

The Stochastic Knapsack Model (cont’d)

The knapsack admits an arriving class-k object if

otherwise, the object is blocked and lost. Let be the number of class-k objects in the

knapsack at time t. Moreover, assume Poissonarrivals and exponential holding times (the model canbe generalized). The stochastic process ,where , is an aperiodic andirreducible Markov chain over the (finite) state space

N being the set of non-negative integers.

Page 27: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

27

cnit

53

The Stochastic Knapsack Model (cont’d)

Let be the stationary distribution, and be the offered load of class k. Then

i.e., the equilibrium probabilities have a Product Form. It is worth noting that the PF Solution holds for general

distribution of the holding times (insensitivity property).

cnit

54

The Stochastic Knapsack Model (cont’d)

Blocking probability and throughput

Let be the set of non-blocking states for a class-k object.

Then the blocking probability of a class-k object is

The class-k throughput is

There are computational algorithms for an efficientcalculation of these quantities (see the book by K.W.Ross).

Page 28: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

28

cnit

55

The Generalized Stochastic Knapsack

In the basic knapsack model, λk(n)=λk, µk(n)=nkµk. In the moregeneral case of state-dependent arrival and departure rates,define

A necessary and sufficient condition for reversibility can begiven, which also characterizes the stationary distribution. Thelatter has not necessarily a PFS.

cnit

56

Call Admission Control (CAC)

Admission control can be exerted in the presence ofmultiple services, in order to improve resourceutilization, enforce some degree of fairness, ormaximize revenue.

Optimal policies for the stochastic knapsack may beobtained, once defined the appropriate cost orrevenue function, by applying numerical methods forMDP’s.

However, the computational effort required by thesetechniques may be large, and considering someparticular types of policies (Coordinate Convex,Complete Sharing, Complete Partitioning, Threshold,Trunk Reservation, …) may restrict the search space.

Page 29: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

29

cnit

57

CAC (cont’d)

Admission policies

Consider a generalized stochastic knapsack, with statedependent arrival and departure rates, of the type

(note thatfor the pure loss system). Assume , which ensures the existenceof one ergodic class.

A (pure) admission policy is a mapping

Let be the set of recurrent states of thecontrolled Markov chain.(where is the vector of all 0’s, but for a 1 in the k-th position)

cnit

58

CAC (cont’d)

Admission policies

In general, when the knapsack is operated under theadmission policy f, the equilibrium probabilities πf(n)can be derived from the global balance equations

( ), whosesolution can become computationally expensive forlarge C and K.

Page 30: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

30

cnit

59

CAC (cont’d)

Admission policies

We consider the following policiesComplete sharing (CS):

(for which S(f)=S)

Trunk reservation:

which admits a class-k object iff at least tk resourceunits would remain after admission.

cnit

60

CAC (cont’d)

Admission policiesn2

n1

1

2

3

4

0 1

2

3 4

Trunk Reservation,C=4, K=2, b1= b2=1,

t1=0, t2=2

TR is not Coordinate Convex (CC). In CC policies, transitions always comein pairs.

Page 31: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

31

cnit

61

CAC (cont’d)

Admission policies

Note that all transitions in the diagram corresponding to acoordinate convex policy come in pairs. Coordinate convexpolicies are appealing, because they are characterized by aProduct Form stationary probability. Not all policies areCoordinate Convex (e.g., Trunk Reservation is not). CS iscoordinate convex (with associated set S) and so are thepolicies to be considered in the following.

Coordinate convex (CC): f is coordinate convex if∃ a coordinate convex set Ω⊆S s.t.

The set Ω is coordinate convex if

cnit

62

CAC (cont’d)

Admission policies

The equilibrium probabilities of a coordinate convexpolicy are given by

with

Page 32: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

32

cnit

63

CAC (cont’d)

Admission policiesComplete Partitioning (CP): given K positive integers C1,…,CK, s.t. C1+ … + CK≤ C, a class-k object is admitted whenthe knapsack is in state n iff

so that the knapsack is decomposed into K smaller ones,each dedicated to a single class. CP is coordinate convex,with associated “rectangular” set

Since the classes are separated and do not interact, thestationary distribution has a product form, with the marginaldistribution πk(n) given by that of a birth-death process withrates and µk(n), namely:

cnit

64

CAC (cont’d)

Admission policies

i.e., classes in Kj are assigned exclusively Cj resource units,and compete for them in complete sharing. CP and CS arespecial cases of partitioning.

Partitioning: given a partition K1,…,KL of K={1,…,K}(K1,…,KL are disjoint sets that cover all K), and L integersC1,…,CL, s.t. C1+…+CL≤C

Page 33: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

33

cnit

65

CAC (cont’d)

Admission policies

Threshold: given a set of positive integersC1,…,CK a threshold policy admits a class-kobject when in state n iff

(it is not required that the sum of the Cj’s be ≤C). The associated coordinate convex set is

cnit

66

CAC-Admission policies (cont’d)

Revenue optimization

Consider a revenue function r(n), associated with staten. The long-run average revenue associated withpolicy f is given by

Just to give some examples, if the system is a pure loss one (i.e.,µk(n)=nµk , ∀k) and a class-k object in the knapsack generatesrevenue at rate rk, then

: if rk=bk, R(f) is the long-run average utilization; if

rk=µk, R(f) is the long-run average throughput.

For a memory-sharing system (one server dedicated to each classand a common buffer), if rk is the revenue rate when the k-thserver is active, then

Page 34: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

34

cnit

67

CAC-Admission policies (cont’d)

Revenue optimization

In the case of the pure loss system, the optimal policy may varyfrom the case of complete sharing (for arrival rates approachingzero) to complete partitioning (for arrival rates approachinginfinity, where the resulting deterministic knapsack problem maybe solved by using Dynamic Programming; in this case, if k* isthe class with highest per unit revenue (rk/bk), and C/bk* is aninteger, then k* completely hogs the system).

In general, the optimal policy is not coordinate convex (e.g., ifK=2, b1=b2=1 and r2>r1, a trunk reservation policy of the typef2(n)=1, f1(n)=1(C-n1-n2-t*), for some integer t*, is indeedoptimal).

Several interesting results exist for the characterization ofoptimal coordinate convex policies, especially in the cases of 2and 3 classes.

cnit

68

CAC-Admission policies (cont’d)

Optimal Complete Partitioning

If the revenue function is separable

then the optimal complete partitioning policy can be foundby applying DP. In fact, for any given C1,…CK,

where πk(n) is the distribution of a birth-death process,and the allocation problem is

Page 35: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

35

cnit

69

CAC-Admission policies (cont’d)

Optimal Complete Partitioning

Let hk(D) be the maximum revenue accrued by classes 1through k with D resource units available. Then we havethe following DP algorithm

and subsequent optimal allocation

cnit

70

CAC

Knapsack Models for ATM and IP

Consider a cell (or packet) multiplexer, whose basicelements are a finite buffer that stores cells (orvariable length packets) and a high-speed link withslotted timing. Virtual Channels (VC) connectionrequests (or flow requests in IP or MPLS), which weassume to be generated by bursty sources (individualor aggregate) of K different classes (services), withpeak-rates b1,…,bK, can be modeled, at theconnection level, exactly as circuit-switched calls.Therefore, the stochastic knapsack can modelconnection-level performance (of inelastic traffic).However, we need to distinguish the interaction withcell-level or packet-level performance, in order to,essentially, decouple two phenomena happening atwidely different (a few orders of magnitude) timescales.

Page 36: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

36

cnit

71

CAC

Knapsack Models for ATM and IP

Though ATM is becoming “less fashionable”, thereare a number of reasons to consider cell-multiplexingproblems and cell-level QoS: In some networking environments, IP packets need to be

fragmented at layer 2 into smaller, fixed-size data units. Thisis the case of time-division (or time-code-division)multiplexing in radio networks and DVB (Digital VideoBroadcasting)-IP standards in satellite networks.

Concepts originally developed in the ATM world to decouplecall- and cell-level problems, like the equivalent bandwidthone, also apply, with slight modifications, to variable lengthIP packets.

Since ATM (and DVB) are still widely applied in sometransport networks, the problem of QoS mapping betweenthe IP layer and such other techniques is a relevant one.

cnit

72

CAC (cont’d)

Knapsack Models for ATM and IP

At the cell level, the buffer needs to absorbe cell-scale and burst-scale congestion. The former iscaused by simultaneous (i.e., in the same time slot)multiple cell arrivals, and requires a small buffer; thelatter occurs when the aggregated cell arrival rate,generated by all active VCs (flows), is temporarilygreater than the link capacity, and may require alarge buffer to be kept below a given limit (which, onthe other hand, may introduce a large delay).

Cell-level Quality of Service (QoS) requirements areusually specified in terms of cell loss probability (orrate) and of the probability (or rate) of exceeding aspecified delay bound.

Page 37: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

37

cnit

73

CAC (cont’d)

Knapsack Models for ATM and IP

In another respect, one may be concerned with cell-scale models, based on the multiplexing of manysources (many-sources asymptotics) and with burst-scale models, based on buffering (large bufferasymptotics). These allow to determine the minimalbandwidth needed to satisfy given cell-loss (orpacket-loss) requirements.

Assume to be able to determine at least some subset(which may depend on the scheduling policy) of theset Λ of all allowable VC-profiles, i.e., of the K-tuplesn=[n1,…,nK], with nk representing the number ofconnected class-k VCs, which would satisfy cell-levelrequirements when permanently connected.

cnit

74

CAC- Knapsack Models for ATM (cont’d)

Peak-Rate Admission

Under peak-rate admission, a new class-k VC isadmitted iff

so that the state space (possible VC profiles) is

Cell-level requirements are obviously always satisfied. Optimal admission policies may be derived over this

set, e.g., in order to maximize link utilization(r(n)=b.n) or minimize blocking, and either linearprogramming or value iteration techniques can beused to find them.

Page 38: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

38

cnit

75

CAC- Knapsack Models for ATM (cont’d)

Statistical Multiplexing

Now we allow VC profiles s.t.

However, the admission region S(f) under policy fmust be s.t. S(f) ⊆ Λ, i.e., cell-level requirements aresatisfied.

There are several possibilities. Optimizing over theset of all allowable VC-profiles (i.e., setting S=Λ)seems appealing, but Λ may be very difficult, if notimpossible, to determine. As multiplexing acrossservices with widely different cell-level requirementsor statistical characteristics of the sources yields littlegain in most cases, Service Separation may be aviable alternative.

cnit

76

CAC- Knapsack Models for ATM and IP flows (cont’d)

Service Separation

Under Service Separation, statistical multiplexingtakes place among VCs of the same class (service),but not across different classes, which are assignedbandwidth partitions, by means of some schedulingalgorithm (e.g., Weighted Round-Robin, GPS, orother). Each class (service) has a dedicated buffer,served by the scheduler. IP DiffServ classes arebased on a similar concept.

1

K-1

K

Page 39: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

39

cnit

77

CAC- Knapsack Models for ATM and IP flows (cont’d)

Service Separation

Let βk(n) be the minimum capacity that is required tosatisfy cell-level QoS requirements for n permanentclass-k VCs multiplexed in a buffer of given capacityQ. This service-k capacity function depends on asingle type of homogeneous sources, and may befairly easier to determine, by analytical models orsimulation, than a similar quantity when multipleservices are involved.

If the k-th service can be assigned an effectivebandwidth , then the admissionpolicy could be the same as the peak-rate one, with substituting bk.

cnit

78

CAC- Service Separation (cont’d)

Static Partitions

Let C1,…,CK, with C1+…+CK=C be a partition of thecapacity. Under Service Separation with StaticPartitions, an arriving class-k VC is admitted iff

The maximum number of class-k VCs in the system isgiven by

and the class-k blocking probability is given by theErlang-B loss formula.

Page 40: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

40

cnit

79

CAC- Service Separation (cont’d)

Dynamic Partitions

The scheduling weights are now proportional to β1(n1),…,βK(nK), so that they are changing, but on amuch longer time scale w.r.t. the cell dynamics. Anarriving class-k VC is admitted iff

The admission region is

cnit

80

CAC- Service Separation (cont’d)

Admission Regions

n1

n2

All allowable VCs

Service Separation with Dynamic Partitions

Equivalent Bandwidth

Peak Rate

Page 41: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

41

cnit

81

CAC- Service Separation (cont’d)

Admission Regions

n1

n2

n1

n2

Superimposed admission control boundary

Superimposed admission control boundary(Static Partitions)

cnit

82

CAC- Service Separation (cont’d)

Strategy Parametrization If a functional form of the admission strategies has been fixed (e.g.,

Threshold or Complete Partitioning), in some instances it might be morepractical to determine the optimal parameter set by means of somemathematical programming procedure. In order to avoid integerprogramming, and to possibly use gradient methods, the problem can betransformed into an equivalent continuous parameter one.

A recent interesting procedure is the one introduced by Gokbayrak andCassandras, where at each descent (or ascent) step, the problem istransformed into an equivalent continuous one and back to discrete, byalways keeping the parameter values feasible (and thus applicable on-line).

Further simplification can be achieved by decomposing the problemhierarchically, and applying fixed “local” admission policies (based on a partof the state); the parameters characterizing the latter are chosen by acentral controller, playing the role of a coordinator in the hierarchicalscheme, by minimizing an overall cost function.

Page 42: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

42

cnit

83

CAC- Service Separation (cont’d)

A Hierarchical Control Example

cnit

84

Routing

The issue of routing is a complex one, as it involves modelingthe whole network. There are different approaches in circuit-and packet-switched networks.

In multiservice networks, the problem is complicated by theneed to guarantee different QoS levels (QoS-aware routing).Multicast is another important aspect.

As regards routing at the “flow” or “connection” level of inelasticflows (as in circuit-switched networks), there is a vast literatureon adaptive and dynamic routing in this setting, which has beenextended to ATM and can be the basis for QoS routing andbandwidth allocation in an MPLS environment, among others.

Under fixed routing, the network at the connection level is aProduct Form Loss Networks. Blocking probabilities can becalculated efficiently by suitable approximations.

Page 43: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

43

cnit

85

Routing (cont’d)

Product Form Loss Networks

We consider approximations to compute blocking in a PFLN. Consider a network composed by J links, where link j has

capacity Cj bandwidth units (bu). There are K traffic classes,where class k has arrival rate λk, average connection duration 1/µk, bandwidth unit requirement bk, and a route Rk⊆{1,…,J}. Aclass k call is admitted only if bk bu’s are availble on each linkalong the (predefined) route. Blocked calls are lost. Arrivals arePoisson and independent, holding times may be general(invariant property) and are independent. Let ρk=λk/µk,K={1,…,K}, the set of classes that uselink j, and n=[n1,…,nK]. The state space is

cnit

86

Routing (cont’d)

Product Form Loss Networks

The set of states where a class-k call is admitted is

As with the stochastic knapsack:

Page 44: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

44

cnit

87

Product Form Loss Networks (cont’d)

Product Bound

Suppose to have only single-service calls, i.e., bk=1,k∈K. Let

be the Erlang loss probability for a system with loadρ and C bu’s, and let

be the total offered load to link j, irrespective ofblocking on other links. The following bound holds:

cnit

88

Product Form Loss Networks (cont’d)

Reduced Load Approximation

From the Product Bound

Replace the ρk’s with ρktk(j), where tk(j) is the probability that atleast one bu is available in each link in Rk-{j}; the approximateprobability Lj that link j is full is given by

By assuming independence of blocking from link to link (whichis a further approximation),

Page 45: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

45

cnit

89

Product Form Loss Networks (cont’d)

Erlang Fixed Point

Then, one has a Fixed Point Equation in L1,…,LJ of the form

The class-k blocking probability can then be approximated(again assuming independence) as

The fixed point equations can be written in compact form as

having defined

cnit

90

Product Form Loss Networks (cont’d)

Erlang Fixed Point

Under fixed routing, there exists a unique solution L*to the fixed point equation.

The solution can be found numerically in a number ofways, the most straightforward of which is repeatedsubstitutions

n being the stopping stage. Since, in general, T is nota contraction mapping, convergence is notguaranteed, though the iterates can be shown to getcloser and closer to L*.

The resulting approximate probability that a class-kcall is blocked does not exceed the product bound.

Page 46: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

46

cnit

91

Routing Flows (cont’d)

Dynamic Routing

The previous approximation was developed to computeblocking probabilities under fixed routing.

A task of network control is to decide dynamically on routing anincoming flow at “connection” (or Service Level Agreement) set-up.

There are a number of techniques developed for telephonenetworks and actually applied, starting during the 80’s, which gounder the name of dynamic routing.

They usually attempt to establish a connection on a direct (one-hop, either physical or virtual) route between a source-destination pair (or edge devices, in the multiservice Internetterminology), if any, and choose an alternative route thattraverses one or more switches (mostly one, i.e., a two-linkalternative), if the direct path is unavailable.

cnit

92

Routing Flows (cont’d)

Dynamic Routing

There are a number of techniques to decide upon thealternative path, some of which can depend on the state (full orpartial) of the network at the time of decision.

In general, dynamic routing destroys the Product Form Solution,but useful approximations can still be derived to calculateblocking probabilities.

Trunk reservation is almost always used, in order to limitexcessive alternative routing during overload and because it hasdemonstrated a simple means to avoid network instabilities,reflected in convergence of the Erlang fixed point equation todifferent values.

Truly dynamic routing of data units, based on real-timedecentralized state information (in a team setting) is achallenging problem, which can be somehow efficientlyaddressed by means of neural parametric approximators.

Page 47: cnit Italian National Consortium for TelecommunicationsQoS.pdf · Italian National Consortium for Telecommunications Franco Davoli, ... streaming data flow) 3 Data transactions

cnit

47

cnit

93

References

K.W. Ross, Multiservice Loss Models for Broadband TelecommunicationNetworks, Springer-Verlag, London, 1995.

H.J. Chao, X. Guo, Quality of Service Control in High-Speed Networks,Wiley, New York, NY, 2002.

J. Walrand, P. Varaiya, High-Performance Communication Networks,2nd Ed., Morgan-Kaufmann, San Francisco, CA, 2000.

D.P. Bertsekas, R. Gallager, Data Networks, 2nd Ed., Prentice Hall,Englewood Cliffs, NJ, 1992.

A. Girard, Routing and Dimensioning in Circuit-Switched Networks,Addison-Wesley, Reading, MA, 1990.