design issues of a back-pressure-based congestion control mechanism

12
Int. J. Electron. Commun. (AEÜ) 64 (2010) 717 – 728 www.elsevier.de/aeue Design issues of a back-pressure-based congestion control mechanism Richa Malhotra a, b , Michel Mandjes c, d, e , , 1 , Werner Scheinhardt f , g , Hans van den Berg b, h a Alcatel-Lucent, Capitool 5, 7521 PL, Enschede, The Netherlands b University of Twente, The Netherlands c Korteweg-de Vries Institute for Mathematics, University of Amsterdam, Plantage Muidergracht 24, 1018 TV, Amsterdam, The Netherlands d CWI, Amsterdam, The Netherlands e EURANDOM, Eindhoven, The Netherlands f University of Twente, Faculty of Electrical Engineering, Mathematics, and Computer Science, P.O. Box 217, 7500 AE Enschede, The Netherlands g CWI, Amsterdam, The Netherlands h TNO ICT, P.O. Box 5050, 2600 GB Delft, The Netherlands Received 2 July 2008; accepted 22 May 2009 Abstract Congestion control in packet-based networks is often realized by feedback protocols – in this paper we assess the per- formance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. Relying on our earlier results for feedback fluid queues, we derive explicit expressions for the key performance metrics, in terms of the model parameters, as well as the parameters agreed upon in the service level agreement. Numerical experiments are performed to evaluate the main trade-offs of this model (for instance the trade-off between the signaling frequency and the throughput). These can be used to generate design guidelines. The paper is concluded by an elementary, yet powerful, Markovian model that can be used as an approximative model in situations of large traffic aggregates feeding into the system; the trade-offs and guidelines identified for the feedback fluid model turn out to carry over to this more stylized model. 2009 Elsevier GmbH. All rights reserved. Keywords: Backpressure mechanisms; Fluid queues; Spectral expansion; Design issues 1. Introduction Over the past decades a broad variety of mechanisms has been proposed to control congestion in packet networks. Corresponding author at: Korteweg-de Vries Institute for Mathemat- ics, University of Amsterdam, Plantage Muidergracht 24, 1018 TV, Am- sterdam, The Netherlands. Tel.: +31 20 525 5164; fax: +31 20 525 5101. E-mail addresses: [email protected] (R. Malhotra), [email protected], [email protected] (M. Mandjes), [email protected] (W. Scheinhardt), [email protected] (H. van den Berg). 1 Part of this work was done while the author was at Stanford University, Stanford, CA 94305, USA. 1434-8411/$ - see front matter 2009 Elsevier GmbH. All rights reserved. doi:10.1016/j.aeue.2009.05.003 A well-known example is random early detection, as pro- posed in, e.g., [7,8], where incipient congestion is notified to the users by dropping packets (or by setting a bit in packet headers); when the queue size exceeds a preset threshold, each arriving packet is dropped (or marked) with a certain probability that depends on the buffer content and its evo- lution in the recent past; for more insights into this type of schemes, see, e.g., [9] and the early Ref. [18]. Similar feedback-based mechanisms have been pro- posed and standardized for congestion control in Ethernet metropolitan networks. The back-pressure scheme defined in IEEE 802.3x [11], is intended to provide flow con- trol on a hop-by-hop basis by allowing ports to turn off their upstream link neighbors for a period of time. For a

Upload: richa-malhotra

Post on 26-Jun-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

www.elsevier.de/aeue

Design issues of a back-pressure-based congestion control mechanism

Richa Malhotraa,b, Michel Mandjesc,d,e,∗,1, Werner Scheinhardtf,g, Hans van den Bergb,h

aAlcatel-Lucent, Capitool 5, 7521 PL, Enschede, The NetherlandsbUniversity of Twente, The NetherlandscKorteweg-de Vries Institute for Mathematics, University of Amsterdam, Plantage Muidergracht 24, 1018 TV, Amsterdam, The NetherlandsdCWI, Amsterdam, The NetherlandseEURANDOM, Eindhoven, The Netherlandsf University of Twente, Faculty of Electrical Engineering, Mathematics, and Computer Science, P.O. Box 217, 7500 AE Enschede, TheNetherlandsgCWI, Amsterdam, The NetherlandshTNO ICT, P.O. Box 5050, 2600 GB Delft, The Netherlands

Received 2 July 2008; accepted 22 May 2009

Abstract

Congestion control in packet-based networks is often realized by feedback protocols – in this paper we assess the per-formance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks.Relying on our earlier results for feedback fluid queues, we derive explicit expressions for the key performance metrics, interms of the model parameters, as well as the parameters agreed upon in the service level agreement. Numerical experimentsare performed to evaluate the main trade-offs of this model (for instance the trade-off between the signaling frequency andthe throughput). These can be used to generate design guidelines. The paper is concluded by an elementary, yet powerful,Markovian model that can be used as an approximative model in situations of large traffic aggregates feeding into the system;the trade-offs and guidelines identified for the feedback fluid model turn out to carry over to this more stylized model.� 2009 Elsevier GmbH. All rights reserved.

Keywords: Backpressure mechanisms; Fluid queues; Spectral expansion; Design issues

1. Introduction

Over the past decades a broad variety of mechanisms hasbeen proposed to control congestion in packet networks.

∗ Corresponding author at: Korteweg-de Vries Institute for Mathemat-ics, University of Amsterdam, Plantage Muidergracht 24, 1018 TV, Am-sterdam, The Netherlands. Tel.: +31205255164; fax: +31205255101.

E-mail addresses: [email protected] (R. Malhotra),[email protected], [email protected] (M. Mandjes),[email protected] (W. Scheinhardt), [email protected](H. van den Berg).

1 Part of this work was done while the author was at Stanford University,Stanford, CA 94305, USA.

1434-8411/$ - see front matter � 2009 Elsevier GmbH. All rights reserved.doi:10.1016/j.aeue.2009.05.003

A well-known example is random early detection, as pro-posed in, e.g., [7,8], where incipient congestion is notified tothe users by dropping packets (or by setting a bit in packetheaders); when the queue size exceeds a preset threshold,each arriving packet is dropped (or marked) with a certainprobability that depends on the buffer content and its evo-lution in the recent past; for more insights into this type ofschemes, see, e.g., [9] and the early Ref. [18].

Similar feedback-based mechanisms have been pro-posed and standardized for congestion control in Ethernetmetropolitan networks. The back-pressure scheme definedin IEEE 802.3x [11], is intended to provide flow con-trol on a hop-by-hop basis by allowing ports to turn offtheir upstream link neighbors for a period of time. For a

718 R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

full-duplex connection, this mechanism is based on a spe-cial frame called pause frame in which the pause periodis specified. The end-station (or router) receiving the pauseframe looks at the pause period, and does not transmit orattempt transmission for that amount of time. Alternatively,an ON/OFF pause message can be sent signaling the begin-ning and end of the transmission pause phase. Importantly,this congestion control method is usually implemented byusing two thresholds, viz. a high threshold to detect the on-set of a congestion period, and a low threshold to detect itsend. When the queue occupancy exceeds the high thresholdthe PauseOn message is sent and transmission is temporar-ily stopped; when the queue occupancy drops below the lowthreshold the PauseOff message is sent and consequentlytransmission is resumed.

There are hardly any performance evaluation studies avail-able on the above-described back-pressure mechanisms forEthernet congestion control. Previous works [13,15,17] pre-dominantly concentrated on the throughput gain which canbe achieved. Recently, however, we have been able to de-velop a rather detailed, and analytically tractable, model ofthe mechanism [14]. This model belongs to the class of fluidmodels.

The classical fluid model [3,12] is characterized by agenerator matrix Q governing a Markovian background pro-cess and a diagonal matrix R =diag{r1, . . . , rd}: if the back-ground process is in state i , traffic is generated at a constantrate ri � 0. It was shown that the steady-state buffer con-tent distribution obeys a system of linear differential equa-tions, and after imposing the proper additional constraintsthese can be solved from a system of linear equations. Froma methodological standpoint, an important contribution wasdue to Rogers [21], who succeeded to express the steady-state buffer content distribution in terms of the fundamentalWiener–Hopf factorization. Another key paper is by Ahnand Ramaswami [2], who explicitly exploit relations withquasi-birth–death processes. We also mention that a nice (re-cent) literature overview on Markov fluid queues is givenin, e.g., [6].

In the second half of the 1990s fluid models were devel-oped in which the source behavior was influenced by thebuffer content; see for instance [1,5,16,19]; while the bufferlevel is below a certain threshold the Q and R matrices aredifferent than above the threshold. In [10,22], Q and R de-pend even continuously on the buffer level. Importantly, inall these feedback fluid models (where ‘feedback’ relates tothe fact that the queue’s input process is determined in partby the content of the queue) the buffer content uniquely de-fines the probabilistic properties of the source. The modelanalyzed in [14] departs from this property. In fact the inputprocess has two ‘modes’. The first mode applies as long asthe upper threshold B1 has not been reached from below. Assoon as that happens, we switch to the second mode, untilthe lower threshold B2, smaller than B1, is hit from above,i.e., the buffer occupancy falls below B2. In this way thethreshold B1 is used to signal the onset of congestion, and

B2 to signal the end of congestion (the system mechanicsare further explained and graphically illustrated later in thispaper). In [14] the steady-state distribution of the buffer con-tent is expressed in terms of the solution of a system of lin-ear differential equations, which, after imposing the properboundary conditions, can be solved by standard techniquesfrom linear algebra.

In [14] it was mentioned that the model presented (andsolved) there could be relied on when configuring the highand low thresholds, thus addressing a pivotal design crite-rion for the Ethernet congestion avoidance scheme. We alsoremarked in [14] that the back-pressure scheme has the at-tractive property that the signaling overhead (in terms of thenumber of pause messages sent per unit time) is lower thanwhen using just one threshold (that detects both start and endof congestion periods), but we did not systematically quan-tify this effect. Also, the reduction of signaling overhead maybe at the expense of a loss in throughput, or degraded per-formance in terms of delay. The primary goal of the presentpaper is to demonstrate the effect of the thresholds, and toobtain insight into the trade-offs mentioned above. In orderto do so, we also derive analytic formulas for the perfor-mance metrics of interest. In a substantial part of the paperwe focus on the single-source model, that may be viewed asa benchmark model that provides useful insights. Later inthe paper we also introduce a model for the multiple-sourcecase that indicates that most of the effects observed in thesingle-source model carry over to considerably more generalsettings.

The organization of this paper is as follows. Section 2 de-scribes our fluid model, specializing to the situation of justone source feeding into the queue. It also recapitulates themain results from [14]. Then Section 3 presents derivationsof the main performance metrics considered in this paper:the throughput, the mean packet delay, signaling frequency,and the mean transmission time of a burst of packets. Herewe note that packet delays are of crucial interest for stream-ing applications; these generate traffic with an ‘intrinsicduration and rate (which is generally variable) whose timeintegrity must be preserved by the network’ [20] – think oftelephony, streaming video and audio.2 On the other hand,the transmission time, to be thought of as the time it takesfor bursts of packets (‘jobs’) to go through a node, is a mainperformance metric for elastic applications, such as email,file transfer, but also pictures or video sequences transferredfor local storage before viewing. Section 4 presents the nu-merical experiments that demonstrate how to evaluate thetrade-offs mentioned above, and presents a number of gen-eral guidelines. We also include in Section 5 a model andcorresponding numerical experiments that indicate that the

2 Evidently, for these applications jitter is important too, but jittercan be removed at the expense of additional delay, see, e.g., [23]. As arule of thumb, one could use the packet delay as a proxy for the ‘jittercompensation delay’.

R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728 719

main findings carry over to the situation in which there is asubstantial number of concurrent users. Section 6 concludes.

2. Model and preliminaries

In this section we describe the model of which we analyzea number of key performance metrics in Section 3, and whichwe numerically assess in Section 4.

To this end, we first define two input processes ormodes (indexed by ‘+’ and ‘−’), which are essentiallyMarkovian on–off processes; they are characterized by thematrix–vector pairs (Q+, r+) and (Q−, r−), respectively.The input process of the system alternates between thesetwo modes in a way described below.

In more detail the generator matrices Q+ and Q− (whichare transition rate matrices of corresponding continuous-time Markov chains X+(·) and X−(·)) on the state space{1, 2}:

Q+ =(−p1 p1

p2 −p2

); Q− =

(−m1 m1

m2 −m2

).

Also, we introduce traffic rate vectors r+=(rp, 0)T and r−=(rm, 0)T, with rp > c and rm > c; these should be thought ofas rates at which traffic is generated, in that traffic flows intothe system at rate r �

i if a background process X �(·), governedby generator matrix Q�, is in state i (with � ∈ {+, −} andi ∈ {1, 2}). In other words, we identify the on-state withstate 1 (‘burst’), and the off-state with state 2 (‘silence’).The capacity of the buffer is assumed to be infinite (a similaranalysis can be done for the finite-buffer case, though).

In this paper we consider the model of [14], featuring thespecial case that the dimension of the underlying sourcesis 2. In this feedback fluid model, the input stream alter-nates between two ‘modes’ (also referred to as ‘phases’).In one mode the input process behaves like a Markov fluid

Time

B2hit from above

I(t) = −

I(t) = +

t

Buf

fer

Con

tent

B1

B2

Regime 1: (0, B2)

Regime 2: (B2, B1)

B1hit from below

W (t)

Regime 3: (B1, )∞

Fig. 1. Schematic illustration of different regimes for the buffer content W (t).

source with generator Q+ and traffic rate vector r+: whenthe background process is in state i ∈ {1, 2} at time t , trafficis generated at a constant rate r+

i , whereas the queue isdrained at a constant rate c. Similarly, in the other mode itbehaves like a Markov fluid source with generator Q− andtraffic rate vector r−.

The queueing process alternates between the two above-mentioned modes as follows. We first introduce the indicatorvariable process I (·), taking values in {+, −}, which givesthe current mode of operation of the input source. It is im-portant to note that whenever I (t) switches from one modeto another, the background process X (t) stays in the samestate; only its dynamics will from that time onwards behaveaccording to the other generator matrix. However, the rateat which the fluid buffer receives fluid does change instanta-neously from r+

i to r−i (or vice versa), when the background

process X (t) is in state i at the switching instant. Whichof the two modes is currently valid at some time t dependson the behavior of the content process W (t) relative to twothresholds, an upper threshold B1 and a lower threshold B2(smaller than B1). The first mode (‘+’) applies as long asW (t) has not reached the upper threshold B1 from below. Assoon as that happens, I (t) switches to the other mode (‘−’),until W (t) hits the lower threshold B2 from above, etc. Thequeueing dynamics are illustrated by Fig. 1.

It is not hard to verify that the equilibrium condition ofthis model is

m2

m1 + m2rm < c,

i.e., in the ‘−’-phase there should be a negative drift. We let

F�i (x) := P(I = �, X = i, W � x),

with x � 0, i ∈ {1, 2}, and � ∈ {+, −}, be the steady-statedistribution of the workload W , jointly with the state of thebackground process X ∈ {1, 2}, and the phase I ∈ {+, −}. In[14] we presented an algorithm to compute F�

i (·), as follows.

720 R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

Let z� (� ∈ {+, −}) be the non-zero eigenvalue of the matrixQ�(R� − cI )−1. It is easily verified that

z+ = p2

c− p1

rp − cand z− = m2

c− m1

rm − c.

Notice that z− < 0 because of the stability condition. Thenthe analysis in [14] entails that three regimes should be dis-tinguished, cf. Fig. 1. More precisely, there are constants��

j,i , ��j,i , ��j,i (with regime j ∈ {1, 2, 3}, state i ∈ {1, 2}, and

mode � ∈ {−, +}), such that

F−i (x) = 0, x � B2,

F−i (x) = �−

2,i + �−2,i ez−x + �−2,i x, B2 < x � B1,

F−i (x) = �−

3,i + �−3,i ez−x , x > B1,

also

F+i (x) = �+

1,i + �+1,i ez+x , x � B2,

F+i (x) = �+

2,i + �+2,i ez+x + �+2,i x, B2 < x � B1,

F+i (x) = F+

i (B1), x > B1.

In [14] a procedure is detailed that enables us to computethese 10 constants, by introducing 10 linear constraints tobe imposed on the parameters.

3. Performance metrics

In this section we derive (or recall) formulas for a numberof performance metrics.

Throughput. Note that traffic flows into the system at raterp (rm , respectively) when the phase is ‘+’ (‘−’, respec-tively) and the background process is in state 1; otherwisethis rate is 0. Realizing that the buffer capacity is infinite(and hence all input eventually leaves the queue), we thusfind the following formula, already given in [14], for thethroughput:

� = rp · F+1 (∞) + rm · F−

1 (∞),

throughput is expressed in terms of amount of traffic pertime unit, for instance Mbit/s.

Alternatively, observe that traffic always leaves at rate c,except when the buffer is empty (then it leaves at rate 0).Hence it is clear that the throughput can also be written as(realize that F+

1 (0) = 0)

� = c · P(W > 0) = c(1 − F+2 (0)). (1)

Packet delays. The delay D is defined as the delay expe-rienced by an arbitrary packet (in our model an infinitesi-mally small ‘fluid particle’), and is hence a ‘traffic-average’.This performance metric is particularly relevant for stream-ing traffic, as argued in the introduction, due to its inherent

time-integrity requirements. The distribution of D was givenin [14]:

P(D � t) = rp F+1 (tc) + rm F−

1 (tc)

rp F+1 (∞) + rm F−

1 (∞)

note that the denominator can be interpreted as the averageamount of fluid that arrives per unit of time, whereas thenumerator is the fraction thereof that corresponds to a delaysmaller than t . The mean delay (in time units, for instanceseconds) can be computed as

ED =∫ ∞

0P(D > t)dt

=∫ ∞

0

(1 − rp F+

1 (tc) + rm F−1 (tc)

rp F+1 (∞) + rm F−

1 (∞)

)dt .

Signaling frequency. The signaling frequency is defined asthe expected number of phase transitions per unit time, andis a measure for the signaling overhead. With f �

i (x) :=dF�

i (x)/dx , we first observe that the expected number ofupcrossings per unit time through level x is, reasoning as in,e.g., [4,22],

f +1 (x)(rp − c) + f −

1 (x)(rm − c). (2)

The first (second) term in (2) reflects the number of up-crossings while in the ‘+’-phase (‘−’-phase); realize thatthe densities f +

1 (x) and f −1 (x) relate to the fraction of time

the buffer level is at level x , and multiplying them with theright traffic rates gives the desired frequency. Likewise theexpected number of downcrossings per unit time is given by

f +2 (x+)c + f −

2 (x+)c. (3)

As an aside we mention that, as argued in [4,22], expres-sions (2) and (3) should match, since for any level the meannumber of upcrossings per unit time equals the mean num-ber of downcrossings per unit time.

Relying on the above reasoning it follows that the ex-pected number of phase-transitions per unit time (in s−1 orHz) equals

� := f +1 (B1)(rp − c) + f −

2 (B2)c

= 2 f +1 (B1)(rp − c)

= 2 f −2 (B2)c,

here the f +1 (B1)(rp − c) term corresponds to the number of

upcrossings per unit of time through B1 while in (to be un-derstood as ‘coming from’) the ‘+’-phase, and the f −

2 (B2)cterm to the number of downcrossings per unit of time throughB2 while in (i.e., coming from) the ‘−’-phase. It is furthernoted the last two equalities are due to the fact that the num-ber of upcrossings per unit time through B1 while in the‘+’-mode should match the number of downcrossings perunit time through B2 while in the ‘−’-mode.

R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728 721

Transmission and sojourn time. The next performancemetric, T, is the transmission time of a burst, i.e., the timeit takes to put the entire burst into the buffer. Let fT (·) bethe density of T. Consider the event {T = x}. We list threeuseful properties:

• A first observation is that if x > B1/(rp − c), the systemmust have been in the ‘−’-phase during at least part ofthe transmission time (as the buffer content grows at raterp − c while in the ‘+’-phase).

• A second observation is the following. Suppose the elasticjob enters the system when there is y in the buffer. If x islarger than (B1 − y)/(rp −c) and the phase is ‘+’, then thephase shifts from ‘+’ to ‘−’ during the transmission time.

• A third observation is that if the phase is ‘−’ upon arrival,the phase remains ‘−’ during the entire transmission time.

It leads to the following expression, with f �(·) the density ofthe buffer content seen by an arriving job, intersected withbeing in the �-phase, � ∈ {+, −}:

fT (x) =∫ max{B1−(rp−c)x,0}

0p1 e−p1x f +(y)dy

+∫ B1

max{B1−(rp−c)x,0}exp

(−p1

B1 − y

rp − c

)m1

× exp

(−m1

(x − B1 − y

rp − c

))f +(y)dy

+∫ ∞

B2

m1 e−m1x f −(y)dy, (4)

the first term corresponds to the situation in which thequeue was in the ‘+’-phase at the arrival epoch of the burst,and remains in the ‘+’-phase during the transmission time,whereas in the second term the queue makes a transitionto the ‘−’-phase during the transmission time; in the thirdterm the queue was in the ‘−’-phase at the arrival epochof the burst, and remains (automatically) in the ‘−’-phaseduring the transmission time. From the density, the meantransmission time ET can be computed.

It now remains to identify f +(y) and f −(y). As a burstenters while the source is in the off-state, i.e., X = 2, andtaking into account the different rates at which the sourcecan transmit when switching on

f +(y) = f +2 (y)p2∫∞

0 ( f +2 (x)p2 + f −

2 (x)m2)dx,

f −(y) = f −2 (y)m2∫∞

0 ( f +2 (x)p2 + f −

2 (x)m2)dx.

The numerator of f +(y) is to be interpreted as the rate atwhich the source turns on while the phase is ‘+’ and thebuffer is y, whereas the denominator is the rate at which thesource turns on, irrespective of the phase and buffer content;

the expression for f −(y) can be interpreted likewise. Wenow see how the formulas change when we do not considerthe time it takes before the burst is stored in the buffer, butinstead the time before the entire burst has left the queue,which we will refer to as the sojourn time S. This randomvariable is most easily expressed in terms of its Laplacetransform. We have to distinguish between the same threecases as in (4). Regarding the first term, observe that if theinitial buffer level is y and the on-time is x , the entire bursthas left the queue after

S = x + y + (rp − c)x

c= y

c+ rpx

c

units of time. Regarding the second term, the amount oftraffic in the buffer at the end of the transmission time is

B1 + (rm − c)

(x − B1 − y

rp − c

)

and hence the sojourn time is

S = x + 1

c

(B1 + (rm − c)

(x − B1 − y

rp − c

))

= rm x

c+ rp − rm

rp − c

B1

c+ rm − c

rp − c

y

c.

Regarding the third term, then the sojourn time is

S = x + y + (rm − c)x

c= y

c+ rm x

c.

We thus obtain

Ee−�S=∫ ∞

0

∫ max{B1−(rp−c)x,0}

0p1 e−p1x f +(y)

× exp(−�

( y

c+ rpx

c

))dy dx

+∫ ∞

0

∫ B1

max{B1−(rp−c)x,0}exp

(−p1

B1−y

rp−c

)m1

× exp

(−m1

(x − B1 − y

rp − c

))f +(y)

× exp

(−�

(rm x

c+rp−rm

rp−c

B1

c+rm − c

rp−c

y

c

))dy dx

+∫ ∞

0

∫ ∞

B2

m1 e−m1x f −(y) exp(− �

(y

c+rm x

c

))dy dx .

By differentiating, inserting � := 0, and multiplying with−1, we obtain ES. The formulas do not provide much addi-tional insight, and we have decided to omit them here.

The transmission time and sojourn time are specificallymeaningful in the case of elastic traffic. Then we let the sizeof the elastic job (in, say, bits) be exponentially distributedwith mean �−1, and choose p1 = �rp and m1 = �rm . Inthis situation, the amount of traffic to be sent has a fixeddistribution (viz. exponentially with mean �−1). The mean

722 R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

sojourn time reads

ES = 1

c

∫ ∞

0y( f +(y) + f −(y))dy + 1

�c,

where the first term represents the mean amount of timeneeded to serve all traffic the tagged job sees in the queueupon arrival, and the second term the time needed to servethe tagged job itself.

Multi-dimensional sources. The above results can be ex-tended to sources with dimension higher than 2 (and hencealso to the situation of multiple sources), as the model of[14] presents the steady-state distribution for any dimensionof the underlying Markov fluid source; in fact, the formu-las for the throughput and the (packet-)delay distributionwere already given in [14]. The formula for the signalingfrequency follows along the same lines as sketched above,by an upcrossings/downcrossings argument, where all statesshould be taken into account in which B1 can be reachedfrom below while being in the ‘+’-phase, as well as all statesin which B2 can be reached from above while being in the‘−’-phase.

4. Numerical experiments

In this section we describe a number of experiments, thatassess the impact of the model parameters on the perfor-mance. Four key metrics are considered, viz. (i) through-put, (ii) signaling frequency, (iii) expected (packet) delay(streaming traffic), and (iv) expected transmission time (elas-tic traffic). We then indicate how our model can be used inthe design of the back-pressure system, or, more specifically,when selecting suitable values for the thresholds. The lastpart of the section addresses an alternative model that canbe used in case of larger aggregates feeding into the queue.

4.1. Experiments

Experiment I: Effect of the thresholds – streaming traffic.In this first experiment we study the effect of the thresholdson the performance in case of streaming traffic. In [15] wefound (for a considerably more stylized model) that, for agiven value of the upper threshold B1, the throughput wasmaximized by choosing the lower threshold B2 as closely aspossible to B1. What we did not address in [15] is to whatextent this affects the signaling frequency, packet delays,and transmission times.

In this example we chose the following parameters, withc = 10 (say in Mbit/s):

Q+ = Q− =(−1 1

1 −1

),

r+ =(

25

0

); r− =

(15

0

),

the entries of the transition rate matrices are, say, in s−1 andthe traffic rates in Mbit/s. Remark that this situation is typicalfor a streaming user: when there is low (high, respectively)congestion, it is allowed to transmit at a high (low) rate, butthe generator matrices, i.e., Q+ and Q−, are not affected bythe level of congestion. In other words: a sample-path of theprocess consists of a sequence of on- and off-times. The re-sults are presented in Fig. 2 for various values of B2 (remarkthat the analysis is not restricted to integer values of B2!). Itis noted that the mean buffer content and the mean packetdelay can be easily translated in one another, noticing that(due to Little’s formula) the mean buffer content equals theproduct of the throughput and the mean packet delay. Thismotivates why we have chosen to show just the throughputand the mean packet delay, and to leave out the mean buffercontent; the reader can compute the mean buffer content eas-ily. We mention that in all our experiments the mean buffercontent showed the same qualitative behavior as the meanpacket delay.

Consider the situation of a fixed value of B1, and comparethe situations of (A) B2 < B1 and (B) B2 = B1. From thegraphs we will see that, compared to situation (B), under(A) the throughput, signaling frequency, and mean packetdelay are lower. In other words: there is a trade-off betweenthroughput on one hand, and signaling frequency and meanpacket delay on the other hand.

These trends can be explained as follows. First observethat epochs at which the buffer content is B1 and the phasejumps from ‘+’ to ‘−’ are regeneration epochs, in that theprocess probabilistically starts all over. Let time 0 be sucha regeneration epoch, and let WA(t) be the workload pro-cess in situation (A), and WB(t) the workload in situation(B). Then it is seen that WA(t) � WB(t) sample-path-wise,and hence P(WA = 0) � P(WB = 0), and hence, accordingto (1), the throughput is indeed lower under (A) than under(B). Likewise, it can be argued that regeneration cycles lastshorter under (B), and as there are two signals per regen-eration period, the signaling frequency under (A) is lowerthan under (B). With a similar argumentation, it also fol-lows that the mean packet delay is lower under (A) thanunder (B).

Experiment II: Effect of the transmission rate – streamingtraffic. In this experiment we study the effect of the peakrate rp on the performance. In the service level agreement,typically the rp will be specified. The effect of having ahigher rp is the following. Observe that regeneration periodsbecome shorter when rp increases, and hence the signalingrate increases. Also (on a sample-path basis) the workloadprocess increases in rp, leading to a higher throughput andmean packet delay. Hence, we see a similar effect as in Ex-periment I. Doubling the peak rate rp, though, does clearlynot lead to doubling the throughput. Remark that it may, atfirst glance, be slightly counterintuitive that the performancein term of packet delay degrades when increasing rp, butthis effect is due to the fact that the buffer content increases.In the numerical experiment, we use the parameters of

R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728 723

0 10 20 308

8.5

9

9.5Throughput

B2

B1 = 5

B1 = 10

B1 = 15

B1 = 20

B1 = 25

0 10 20 300.1

0.2

0.3

0.4

0.5

Signaling Frequency

B2

0 10 20 30

0.2

0.25

Expected Delay

B2

Fig. 2. Effect of thresholds on streaming traffic (throughput in Mbit/s, the signalling frequency in s−1, and the expected delay in s).

20 30 40 508.5

9

9.5

10

Throughput

rp

20 30 40 500.1

0.12

0.14

0.16

0.18

Signaling Frequency

rp

20 30 40 50

0.22

0.24

0.26

0.28

Expected Delay

rp

Fig. 3. Effect of transmission rate r p on streaming traffic; B1 = 25 and B2 = 10 (throughput in Mbit/s, the signalling frequency in s−1,and the expected delay in s).

Experiment I (except that we vary the value of rp). Wechose B1 = 25 and B2 = 10; the graphs are shown in Fig. 3.

We also include a related experiment here, where both rp

and rm are multiplied by � (but � is such that the stabilitycondition remains fulfilled). Now the ‘+’-phase lasts shorter,while the ‘−’-phase lasts longer. Hence it can be argued thatboth the delay and throughput increase when rp and rm grow,but it is not a priori clear what happens with the signalingfrequency. The results are presented in Fig. 4; it is seen thatthe signaling frequency shows non-monotone behavior in �.

Notice that the above insights are of interest for the user.The rp is the fastest rate he can transmit at, whereas the rm

can be regarded as some minimally guaranteed transmissionrate. These are rates that are agreed upon in the service levelagreement. Clearly, the higher the transmission rates, themore the customer will be charged. The figures may guidethe user in choosing his rp and rm , taking into account thistrade-off.

Experiment III: Effect of the thresholds – elastic traffic. Inthis third experiment we study the effect of the thresholdson the performance for the case of elastic traffic. We wonderif, in order to maximize the throughput, just as in the caseof streaming traffic, it is again optimal to choose B2 = B1;

we are also interested in the impact of the choice of thethresholds on the other performance metrics.

In this example we chose the following parameters, withc = 10:

Q+ =(−1 1

1 −1

); Q− =

(− 35

35

1 −1

),

r+ =(

25

0

); r− =

(15

0

).

Remark that this situation is typical for an elastic user: whenthere is low (high, respectively) congestion, it is allowed totransmit at a high (low) rate, but the generator matrices, i.e.,Q+ and Q−, are now adapted too in order to reflect the factthat the burst lasts longer when the transmission rate is re-duced. A sample-path of the process is now a sequence ofjob sizes (i.e., measured in volume, in, say, bits – hence nottime) and off-times (measured in time, to be interpreted as‘read-times’). In this example the job sizes have an exponen-tial distribution with mean 1/� = rm/m1 = rp/p1 = 25; andthe read-times have an exponential distribution with mean1. The numerical outcome is presented in Fig. 5.

724 R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

0.5 1 1.5

8

8.5

9

9.5

10

Throughput

α0.5 1 1.5

0

0.05

0.1

0.15

0.2

Signaling Frequency

α0.5 1 1.5

0

0.5

1

1.5

Expected Delay

α

Fig. 4. Effect of multiplying r p and rm by factor � (� is such that the stability condition is satisfied); B1 = 25 and B2 = 10 (throughputin Mbit/s, the signalling frequency in s−1, and the expected delay in s).

0 5 10 15 20 259.4

9.5

9.6

9.7

9.8

9.9

Throughput

B2

B1 = 5

B1 = 10

B1 = 15

B1 = 20

0 5 10 15 20 250.02

0.04

0.06

0.08

0.1

0.12Signaling Frequency

B2

0 5 10 15 20 256

6.5

7

7.5

8Expected Sojourn Time

B2

B1 = 25

Fig. 5. Effect of thresholds on elastic traffic (throughput in Mbit/s, the signalling frequency in s−1, and the expected delay in s).

Consider again the situation of a fixed value of B1, andcompare the situations of (A) B2 < B1 and (B) B2 = B1.Under (A) regeneration cycles are longer than under (B),and hence the signaling frequency is lower. We have notfound, however, a sound argumentation that reveals inwhich situation the throughput and packet delay are higher.Intuitively one would think that under (B) throughput ishigher, which is confirmed by the graphs. The expectedsojourn time ES turns out to have non-monotone behaviorin this parameter setting; varying B2 has clearly impact onthe buffer content seen by an arriving job, but in a ratherunpredictable way.

We mention that in this experiment the parameters arechosen such that the ‘mean drift’ while being in the ‘+’-phase is positive, which implies that the upper threshold B1will be reached in a relatively short time (roughly equal toB1 − B2 divided by this mean drift). The case of a negative‘mean drift’ while being in the ‘+’-phase is less interesting,as it can then be argued that the process will be in the ‘+’-phase most of the time, and the queue roughly behaves as anon-feedback queue with generator Q+ and traffic rates r+.

In other words: in this case the value of B1 has hardly anyimpact on the throughput.

Experiment IV: Effect of the transmission rate – elastictraffic. When rp increases (with � held constant, i.e., p1 in-creases as well), regeneration cycles become shorter, andhence the signaling frequency increases. As could be intu-itively expected also the throughput and expected sojourntime increase, but again we lack a solid argumentation; seeFig. 6.

4.2. Design issues

Above we saw that there is a trade-off between the sig-naling frequency and the throughput, and it is the networkprovider’s task to balance these, according to his (subjective)preference. We here sketch how such a decision is facilitatedby our model. Figs. 7 and 8 depict the trade-off betweenthe throughput � and the time between two subsequent sig-nals � := 1/�, for a given B1 by varying B2 ∈ [0, B1]; itprovides us with a (decreasing) function � = g(�) (see the

R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728 725

0 20 40 609.5

9.6

9.7

9.8

9.9

Throughput

rp

0 20 40 60

0.04

0.045

0.05

Signaling Frequency

rp

0 20 40 607

7.2

7.4

7.6

7.8

Expected Sojourn Time

rp

Fig. 6. Effect of varying r p and p1 while keeping their ratio fixed at r p/ p1 = 25 (throughput in Mbit/s, the signalling frequency in s−1,and the expected delay in s).

2 4 6 8 108.9

9

9.1

9.2

9.3

9.4

Th

rou

gh

pu

t (�

)

0 5 10 15 20 2517

18

19

20

21

22

231.75� +0.35�

2� +0.005�

1.5� +�

Time between signals (�)

f (�,

�)

B2

Fig. 7. Trade-off between throughput � (in Mbit/s) and time between signals � (streaming traffic, in s).

0 10 20 309.66

9.68

9.7

9.72

9.74

9.76

9.78

Th

rou

gh

pu

t (�

)

0 5 10 15 20 25

15

20

25

30

35

40

451.75� +0.35�

2� +0.005�1.5� +�

Time between signals (ψ)

f (�,

�)

B2

Fig. 8. Trade-off between throughput � (in Mbit/s) and time between signals � (elastic traffic, in s).

left panels in Figs. 7 and 8). The provider having objectivefunction f (�, �), increasing in both � and �, is faced withthe following optimization problem:

max�,�

f (�, �) under � = g(�).

Having identified the optimally achievable pair (��, ��), wecan now reconstruct what the corresponding value B�

2 was.Clearly, a similar procedure can be set up with both B1 andB2 being decision variables.

In Figs. 7–8 we graphically illustrate how to identify theoptimum for the objective function f (�, �) = 1� + 2�.

726 R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

Fig. 7 uses the parameters of Experiment I, whereas Fig. 8uses the parameters of Experiment III; B1 is chosen equalto 25. The left panels show the trade-off between � and �,whereas the right panels show the value of the objective func-tion (for several choices of 1 and 2) as a function of B2.The right panel of Figs. 7–8 shows that in some of these ex-amples it turns out that the objective function is maximizedby choosing B2 as small as possible (which underscoresthe use of having two different thresholds rather than one).Evidently, this result is specific for the performance mea-sures (� and �) and the objective function chosen; otherchoices may lead to a structurally different outcome (seethe curves in Figs. 7–8 in which B2 should be chosen closeto 25).

5. A model for higher aggregation levels

The experiments in the previous section involved a singlesource, but the main findings carry over to the situation withmultiple sources. This can be validated in detail by redoingthe numerical computations, but we here take an alternativeapproach. This approach is simpler, and somewhat less pre-cise, but still capable of capturing the main trends.

Instead of having both a fluid content process (recordedby W (t)) and one or multiple sources (recorded by X (t)), wemodel the buffer content (resulting from the ensemble of allsources) by a birth–death-like process: during the ‘+’-phasethe buffer content behaves as an M/M/1 queue with arrivalrate + and departure rate �+, whereas during the ‘−’-phaseit behaves as an M/M/1 queue with arrival rate − (of trafficquanta of size, say, 1) and departure rate �−. Thus, the rateof change of the buffer is no longer determined by vectorsr− and r+ and generator matrices Q− and Q+ as before,but simply by birth-and-death parameters +, �+, −, �−.What remains the same as before, is that these depend on thecurrent mode (that is, ‘+’ or ‘−’), just as r and Q did before.To analyze a given situation, we can tune the +, �+, −,�− (satisfying the equilibrium condition − < �−), so thatthey roughly match the first and second order characteristicsof the buffer dynamics. For this model we verify whetherthe trends, as observed in Section 4.1, still apply.

Let �+ be the duration of the ‘+’-phase, and �− the du-ration of the ‘−’-phase. It is immediate (for instance fromWald’s theorem) that

E�− = B1 − B2

�− − − .

The computation of E�+ is standard, but a bit more tedious.With ai denote the mean time until B1 is reached, startingin i ∈ {0, . . . , B1 − 1}, it is evident that

(+ + �+)ai = +ai+1 + �+ai−1 + 1 (5)

for i =1, . . . , B1−1; also +a0 =+a1+1 and aB1 =0. Withbi =ai+1−ai , Eq. (5) can be rewritten as +bi =�+bi−1−1,where b0 = −1/+. It is then easy to verify that

bi = − (�+)i

(+)i+1 −(

1 −(

�+

+

)i)/(

1 − �+

+

)

= 1

+ − �+

((1

�+

)i+1

− 1

),

with �+ := +/�+, and realizing that −ai =bi +· · ·+bB1−1(use aB1 = 0),

E�+ = aB2 = −B1−1∑j=B2

b j

= B1 − B2

+ − �+ − 1

+1

1 − �+(�+)B2−B1 − 1

(�+)B2 − (�+)B2−1

if + > �+, then this may be (roughly) approximated by(B1 − B2)/(+ − �+) (as could be expected), whereas if+ < �+, then it roughly equals

1

�+1

(1 − �+)2

(1

�+

)B1

.

The signaling frequency equals �=2/(E�++E�−), by virtueof ‘renewal reward’. As is easily verified, the mean time percycle spent in state 0 is

E�+0 = (�+)B1−B2 − 1

(�+)B1 − (�+)B1−1 ,

so that the throughput is given by

� = E�+ − E�+0

E�+ + E�−1

�+ + E�−

E�+ + E�−1

�− .

The thresholds B1 and B2 can be optimally selected by fol-lowing a scheme similar to the one sketched in Section 4.2.In Fig. 9 we consider an example that again focuses on thetrade-off between the throughput � and the time betweentwo consecutive signals �. We see the same type of behav-ior as in the single-source case. The input parameters are+ = 7, �+ = 5, − = 4, �− = 5, so that there is a positivedrift during the ‘+’-phase. The thresholds are B1 = 25 andB2 = 10.

6. Concluding remarks

This paper addressed a methodology for resolving designissues in back-pressure-based control mechanisms. Relyingon a feedback fluid model [14], we derived closed formexpressions (in terms of the solution of certain eigensystems,and additionally a system of linear equations) for a number

R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728 727

0.185 0.19 0.195 0.2 0.2050

5

10

15

20

Thro

ughput (θ

)

0 5 10 15 20 250

5

10

15

20

f (�,

�)

1.75� +0.35�

20� +0.05�

1.5� +�

Time between signals (�) B2

Fig. 9. Trade-off between throughput � (in Mbit/s) and time between signals � (in s) for higher traffic aggregation model.

of key performance metrics. It enables us to investigate indetail the trade-offs involved – for instance the trade-offbetween throughput and the signaling overhead – and thusfacilitates a proper selection of the protocol’s design param-eters (such as the values of the thresholds). It also sheds lighton the effect of changing the transmission rates. We alsopresented a more stylized model, that is particularly usefulwhen the input consists of a substantially larger aggregateof users.

References

[1] Adan I, van Doorn E, Resing J, Scheinhardt W. Analysisof a single server queue interacting with a fluid reservoir.Queueing Systems 1998;29:313–36.

[2] Ahn S, Ramaswami V. Steady state analysis of finite fluidflow models using finite QBDs. Queueing Systems 2005;49:223–59.

[3] Anick D, Mitra D, Sondhi M. Stochastic theory of a data-handling system with multiple sources. Bell System TechnicalJournal 1982;61:1871–94.

[4] Boxma O, Kaspi H, Kella O, Perry D. On/off storage systemswith state dependent input, output and switching rates.Probability in the Engineering and Informational Sciences2005;19:1–12.

[5] Da Silva Soares A, Latouche G. A matrix-analytic approachto fluid queues with feedback control. International Journalof Simulation: Systems, Science & Technology 2005;6:4–12.

[6] Da Silva Soares A, Latouche G. Matrix-analytic methodsfor fluid queues with finite buffers. Performance Evaluation2006;63:295–314.

[7] Floyd S. TCP and explicit congestion notification. ACMComputer Communication Review 1994;24:10–23.

[8] Floyd S, Jacobson V. Congestion gateways for packet net-works. IEEE/ACM Transactions on Networking 1993;1:397–413.

[9] Gibbens R, Kelly F. Resource pricing and the evolution ofcongestion control. Automatica 1999;35:1969–85.

[10] Gribaudo M, Telek M. Stationary analysis of fluid leveldependent bounded fluid models. Performance Evaluation2007;65:241–61.

[11] IEEE Standard 802.3. Carrier sense multiple access withcollision detection (CSMA/CD) access method and physicallayer specification, Annex 31B, 1998 ed., 1998.

[12] Kosten L. Stochastic theory of a data handling systemswith groups of multiple sources. In: Rudin H, Bux W,editors. Performance of computer communication systems.Amsterdam, The Netherlands: Elsevier; 1984. p. 321–31.

[13] Malhotra R, van Haalen R, de Man R, van Everdingen M.Managing SLAs for metropolitan Ethernet networks. BellLabs Technical Journal 2002;8:83–95.

[14] Malhotra R, Mandjes MRH, Scheinhardt WRW, van denBerg JL. A feedback fluid queue with two congestion controlthresholds. Mathematical Methods in Operations Research,in press, doi:10.1007/s00186-008-0235-8.

[15] Malhotra R, van Haalen R, Mandjes M, Núñez-Queija R.Modeling the interaction of IEEE 802.3x hop-by-hop flowcontrol and TCP end-to-end flow control. In: Proceedings ofthe next generation internet networks, 2005. p. 260–7.

[16] Mandjes M, Mitra D, Scheinhardt W. Models of networkaccess using feedback fluid queues. Queueing Systems2003;44:365–98.

[17] Noureddine F, Tobagi W. Selective back-pressure in switchedEthernet LANs. In: Global telecommunications conference,vol. 2, 1999. p. 1256–63.

[18] Ramakrishnan K, Jain R. A binary feedback schemefor congestion avoidance in computer networks. ACMTransactions on Computer Systems 1990;8:158–81.

[19] Ramanan K, Weiss A. Sharing bandwidth in ATM. In:Proceedings of the Allerton conference, 1997. p. 732–40.

[20] Roberts J. Engineering for quality of service. In: ShaluS, editor. Self-similar network traffic and performanceevaluation. Chichester, UK: Wiley-Interscience; 2000. p. 401–20 [chapter 16].

[21] Rogers L. Fluid models in queueing theory and Wiener–Hopffactorization of Markov chains. Annals of Applied Probability1994;4:390–413.

[22] Scheinhardt W, van Foreest N, Mandjes M. Continuousfeedback fluid queues. Operations Research Letters2005;33:551–9.

728 R. Malhotra et al. / Int. J. Electron. Commun. (AEÜ) 64 (2010) 717–728

[23] van der Wal K, Mandjes M, Bastiaansen H. Delayperformance analysis of the new internet services withguaranteed QoS. Proceedings of the IEEE 1997;85:1947–57.

Richa Malhotra received her B.Sc.in Mathematics (Honors, 1997) fromI.I.T. Kharagpur, India, and her M.Sc.(Distinction, 1999) and Ph.D. (2008)from the University of Twente, TheNetherlands. From 1999 till 2009 sheworked as a member of technical staffat Bell Labs, Lucent Technologies andlater Alcatel-Lucent. She specializesin protocol design and analysis for

wireless as well as wireline communication networks. She is cur-rently working as a network specialist at SURFnet which is theDutch NREN (national research and education network).

Michel Mandjes received M.Sc. (inboth mathematics and econometrics)and Ph.D. degrees from the Vrije Uni-versiteit Amsterdam (VU), The Nether-lands. After having worked as a mem-ber of technical staff at KPN Research(Leidschendam, The Netherlands) andBell Laboratories/Lucent Technologies(Murray Hill NJ, USA), as a part-time full professor at the University of

Twente, and as a department head at the Centre for Mathemat-ics and Computer Science (CWI), Amsterdam, he is now a fullprofessor at the University of Amsterdam, The Netherlands. Hisresearch interests include stochastic processes and queues, largedeviations techniques, Gaussian traffic models, traffic managementand control in IP networks, and pricing in multi-service networks.

Werner Scheinhardt received both anM.Sc. degree and a Ph.D. degree in Ap-plied Mathematics from the Universityof Twente, The Netherlands, in 1994and 1998, respectively. After holdinga postdoctoral position at EindhovenUniversity of Technology, The Nether-lands, he returned to the Universityof Twente in 2000 to be an assistantprofessor. He also holds a part-time

position at the Centre for Mathematics and Computer Science(CWI) in Amsterdam. His research interests are in the field ofstochastic processes, with applications to the performance analysisof computer and communications networks.

Hans van den Berg received the M.Sc.and Ph.D. degrees in mathematics(stochastic operations research) fromthe University of Utrecht, The Nether-lands, in 1986 and 1990, respectively.From 1986, he worked at the Centrefor Mathematics and Computer Science(CWI), Amsterdam. In 1990, he joinedKPN Research (now TNO Informationand Communication Technology, since

January 2003). He is particularly working on performance analysis,traffic management and QoS provisioning for wired and wirelessmulti-service communication networks (ATM, IP, UMTS, WLAN,ad hoc networks). Currently, he is a senior research member andleader of the QoS group within TNO ICT, Delft, The Netherlands.Since July 2003 Hans van den Berg has a part-time position asfull professor within the Faculty of Electrical Engineering, Math-ematics and Computer Science at the University of Twente.