-
Allocation Schemes of Ressources with Downgrading
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert,
Guilherme Thompson
Abstract:
We consider a server with large capacity delivering video files encoded in various resolutions. We assume that the system is under saturation in the sense that the total demand exceeds the server capacity $C$. In such a case, requests may be rejected. For the policies considered in this paper, instead of rejecting a video request, it is downgraded. When the occupancy of the server is above some va…
▽ More
We consider a server with large capacity delivering video files encoded in various resolutions. We assume that the system is under saturation in the sense that the total demand exceeds the server capacity $C$. In such a case, requests may be rejected. For the policies considered in this paper, instead of rejecting a video request, it is downgraded. When the occupancy of the server is above some value $C_0{<}C$, the server delivers the video at a minimal bit rate. The quantity $C_0$ is the bit rate adaptation threshold. For these policies, request blocking is thus replaced by bit rate adaptation. Under the assumptions of Poisson request arrivals and exponential service times, we show that, by rescaling the system, a process associated to the occupancy of the server converges to some limiting process whose invariant distribution is computed by a Wiener-Hopf technique. This allows us to derive an asymptotic expression of the key performance measure of such a policy, the equilibrium probability that a request is transmitted without downgrading. Numerical applications of these results are presented.
△ Less
Submitted 27 February, 2017; v1 submitted 4 April, 2016;
originally announced April 2016.
-
Analysis of an offloading scheme for data centers in the framework of fog computing
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert,
Guilherme Thompson
Abstract:
In the context of fog computing, we consider a simple case when data centers are installed at the edge of the network and assume that if a request arrives at an overloaded data center, then it is forwarded to a neighboring data center with some probability. Data centers are assumed to have a large number of servers and that traffic at some of them is causing saturation. In this case the other data…
▽ More
In the context of fog computing, we consider a simple case when data centers are installed at the edge of the network and assume that if a request arrives at an overloaded data center, then it is forwarded to a neighboring data center with some probability. Data centers are assumed to have a large number of servers and that traffic at some of them is causing saturation. In this case the other data centers may help to cope with this saturation regime by accepting some of the rejected requests. Our aim is to qualitatively estimate the gain achieved via cooperation between neighboring data centers. After proving some convergence results, related to the scaling limits of loss systems, for the process describing the number of free servers at both data centers, we show that the performance of the system can be expressed in terms of the invariant distribution of a random walk in the quarter plane. By using and develo** existing results in the technical literature, explicit formulas for the blocking rates of such a system are derived.
△ Less
Submitted 2 June, 2016; v1 submitted 21 July, 2015;
originally announced July 2015.
-
Impatience in mobile networks and its application to data pricing
Authors:
Salah Eddine Elayoubi,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert,
Bruno Sericola
Abstract:
We consider in this paper an import Quality of Experience (QoE) indicator in mobile networks that is reneging of users due to impatience. We specifically consider a cell under heavy load conditions and compute the reneging probability by using a fluid limit analysis. By solving the fixed point equation, we obtain a new QoE perturbation metric quantifying the impact of reneging on the performance o…
▽ More
We consider in this paper an import Quality of Experience (QoE) indicator in mobile networks that is reneging of users due to impatience. We specifically consider a cell under heavy load conditions and compute the reneging probability by using a fluid limit analysis. By solving the fixed point equation, we obtain a new QoE perturbation metric quantifying the impact of reneging on the performance of the system. This metric is then used to devise a new pricing scheme accounting of reneging. We specifically propose several flavors of this pricing around the idea of having a flat rate for accessing the network and an elastic price related to the level of QoE perturbation induced by communications.
△ Less
Submitted 19 December, 2014; v1 submitted 8 November, 2014;
originally announced November 2014.
-
A versatile and accurate approximation for LRU cache performance
Authors:
Christine Fricker,
Philippe Robert,
James Roberts
Abstract:
In a 2002 paper, Che and co-authors proposed a simple approach for estimating the hit rates of a cache operating the least recently used (LRU) replacement policy. The approximation proves remarkably accurate and is applicable to quite general distributions of object popularity. This paper provides a mathematical explanation for the success of the approximation, notably in configurations where the…
▽ More
In a 2002 paper, Che and co-authors proposed a simple approach for estimating the hit rates of a cache operating the least recently used (LRU) replacement policy. The approximation proves remarkably accurate and is applicable to quite general distributions of object popularity. This paper provides a mathematical explanation for the success of the approximation, notably in configurations where the intuitive arguments of Che, et al clearly do not apply. The approximation is particularly useful in evaluating the performance of current proposals for an information centric network where other approaches fail due to the very large populations of cacheable objects to be taken into account and to their complex popularity law, resulting from the mix of different content types and the filtering effect induced by the lower layers in a cache hierarchy.
△ Less
Submitted 17 February, 2012;
originally announced February 2012.
-
Impact of traffic mix on caching performance in a content-centric network
Authors:
Christine Fricker,
Philippe Robert,
James Roberts,
Nada Sbihi
Abstract:
For a realistic traffic mix, we evaluate the hit rates attained in a two-layer cache hierarchy designed to reduce Internet bandwidth requirements. The model identifies four main types of content, web, file sharing, user generated content and video on demand, distinguished in terms of their traffic shares, their population and object sizes and their popularity distributions. Results demonstrate tha…
▽ More
For a realistic traffic mix, we evaluate the hit rates attained in a two-layer cache hierarchy designed to reduce Internet bandwidth requirements. The model identifies four main types of content, web, file sharing, user generated content and video on demand, distinguished in terms of their traffic shares, their population and object sizes and their popularity distributions. Results demonstrate that caching VoD in access routers offers a highly favorable bandwidth memory tradeoff but that the other types of content would likely be more efficiently handled in very large capacity storage devices in the core. Evaluations are based on a simple approximation for LRU cache performance that proves highly accurate in relevant configurations.
△ Less
Submitted 1 February, 2012;
originally announced February 2012.
-
Traffic Capacity of Large WDM Passive Optical Networks
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
James Roberts
Abstract:
As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The paper discusses performance models applicable to wavelength division multiplexing (WDM) EPONs and GPONs under the assumption that users access the fibre via optical network units equipped with tunable transmitters. The con…
▽ More
As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The paper discusses performance models applicable to wavelength division multiplexing (WDM) EPONs and GPONs under the assumption that users access the fibre via optical network units equipped with tunable transmitters. The considered stochastic models are based on multiserver polling systems for which explicit analytical results are not known. A large system asymptotic, mean-field approximation, is used to derive closed form solutions of these complex systems. Convergence of the mean field dynamics is proved in the case of a simple network configuration. Simulation results show that, for a realistic sized PON, the mean field approximation is accurate.
△ Less
Submitted 27 March, 2010; v1 submitted 11 February, 2010;
originally announced February 2010.
-
Upstream traffic capacity of a WDM EPON under online GATE-driven scheduling
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
James Roberts
Abstract:
Passive optical networks are increasingly used for access to the Internet and it is important to understand the performance of future long-reach, multi-channel variants. In this paper we discuss requirements on the dynamic bandwidth allocation (DBA) algorithm used to manage the upstream resource in a WDM EPON and propose a simple novel DBA algorithm that is considerably more efficient than class…
▽ More
Passive optical networks are increasingly used for access to the Internet and it is important to understand the performance of future long-reach, multi-channel variants. In this paper we discuss requirements on the dynamic bandwidth allocation (DBA) algorithm used to manage the upstream resource in a WDM EPON and propose a simple novel DBA algorithm that is considerably more efficient than classical approaches. We demonstrate that the algorithm emulates a multi-server polling system and derive capacity formulas that are valid for general traffic processes. We evaluate delay performance by simulation demonstrating the superiority of the proposed scheduler. The proposed scheduler offers considerable flexibility and is particularly efficient in long-reach access networks where propagation times are high.
△ Less
Submitted 11 February, 2010;
originally announced February 2010.
-
Analysis of a Bloom Filter Algorithm via the Supermarket Model
Authors:
Yousra Chabchoub,
Christine Fricker,
Hanene Mohamed
Abstract:
This paper deals with the problem of identifying elephants in the Internet Traffic. The aim is to analyze a new adaptive algorithm based on a Bloom Filter. This algorithm uses a so-called min-rule which can be described as in the supermarket model. This model consists of joining the shortest queue among d queues selected at random in a large number of m queues. In case of equality, one of the sh…
▽ More
This paper deals with the problem of identifying elephants in the Internet Traffic. The aim is to analyze a new adaptive algorithm based on a Bloom Filter. This algorithm uses a so-called min-rule which can be described as in the supermarket model. This model consists of joining the shortest queue among d queues selected at random in a large number of m queues. In case of equality, one of the shortest queues is chosen at random. An analysis of a simplified model gives an insight of the error generated by the algorithm on the estimation of the number of the elephants. The main conclusion is that, as m gets large, there is a deterministic limit for the empirical distribution of the filter counters. Limit theorems are proved and the limit is identified. It depends on key parameters. The condition for the algorithm to perform well is discussed. Theoretical results are validated by experiments on a traffic trace from France Telecom and by simulations.
△ Less
Submitted 12 March, 2009;
originally announced March 2009.
-
On the Statistical Characterization of Flows in Internet Traffic with Application to Sampling
Authors:
Yousra Chabchoub,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
A new method of estimating some statistical characteristics of TCP flows in the Internet is developed in this paper. For this purpose, a new set of random variables (referred to as observables) is defined. When dealing with sampled traffic, these observables can easily be computed from sampled data. By adopting a convenient mouse/elephant dichotomy also dependent on traffic, it is shown how thes…
▽ More
A new method of estimating some statistical characteristics of TCP flows in the Internet is developed in this paper. For this purpose, a new set of random variables (referred to as observables) is defined. When dealing with sampled traffic, these observables can easily be computed from sampled data. By adopting a convenient mouse/elephant dichotomy also dependent on traffic, it is shown how these variables give a reliable statistical representation of the number of packets transmitted by large flows during successive time intervals with an appropriate duration. A mathematical framework is developed to estimate the accuracy of the method. As an application, it is shown how one can estimate the number of large TCP flows when only sampled traffic is available. The algorithm proposed is tested against experimental data collected from different types of IP networks.
△ Less
Submitted 26 June, 2009; v1 submitted 10 February, 2009;
originally announced February 2009.
-
Adaptive algorithms for identifying large flows in IP traffic
Authors:
Youssef Azzana,
Yousra Chabchoub,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in IP traffic (a.k.a. elephants). Because of the large number of small flows, hash tables of these algorithms have to be regularly refreshed. Recognizing that the periodic erasure scheme usually used in the technical literature turns out to be quite inefficient when using real traffic traces over a l…
▽ More
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in IP traffic (a.k.a. elephants). Because of the large number of small flows, hash tables of these algorithms have to be regularly refreshed. Recognizing that the periodic erasure scheme usually used in the technical literature turns out to be quite inefficient when using real traffic traces over a long period of time, we introduce a simple adaptive scheme that closely follows the variations of traffic. When tested against real traffic traces, the proposed on-line algorithm performs well in the sense that the detection ratio of long flows by the algorithm over a long time period is quite high. Beyond the identification of elephants, this same class of algorithms is applied to the closely related problem of detection of anomalies in IP traffic, e.g., SYN flood due for instance to attacks. An algorithm for detecting SYN and volume flood anomalies in Internet traffic is designed. Experiments show that an anomaly is detected in less than one minute and the targeted destinations are identified at the same time.
△ Less
Submitted 20 June, 2009; v1 submitted 30 January, 2009;
originally announced January 2009.
-
An identification problem in an urn and ball model with heavy tailed distributions
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We consider in this paper an urn and ball problem with replacement, where balls are with different colors and are drawn uniformly from a unique urn. The numbers of balls with a given color are i.i.d. random variables with a heavy tailed probability distribution, for instance a Pareto or a Weibull distribution. We draw a small fraction $p\ll 1$ of the total number of balls. The basic problem addr…
▽ More
We consider in this paper an urn and ball problem with replacement, where balls are with different colors and are drawn uniformly from a unique urn. The numbers of balls with a given color are i.i.d. random variables with a heavy tailed probability distribution, for instance a Pareto or a Weibull distribution. We draw a small fraction $p\ll 1$ of the total number of balls. The basic problem addressed in this paper is to know to which extent we can infer the total number of colors and the distribution of the number of balls with a given color. By means of Le Cam's inequality and Chen-Stein method, bounds for the total variation norm between the distribution of the number of balls drawn with a given color and the Poisson distribution with the same mean are obtained. We then show that the distribution of the number of balls drawn with a given color has the same tail as that of the original number of balls. We finally establish explicit bounds between the two distributions when each ball is drawn with fixed probability $p$.
△ Less
Submitted 20 June, 2009; v1 submitted 13 December, 2008;
originally announced December 2008.
-
Inference of Flow Statistics via Packet Sampling in the Internet
Authors:
Yousra Chabchoub,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We show in this note that by deterministic packet sampling, the tail of the distribution of the original flow size can be obtained by rescaling that of the sampled flow size. To recover information on the flow size distribution lost through packet sampling, we propose some heuristics based on measurements from different backbone IP networks. These heuristic arguments allow us to recover the comp…
▽ More
We show in this note that by deterministic packet sampling, the tail of the distribution of the original flow size can be obtained by rescaling that of the sampled flow size. To recover information on the flow size distribution lost through packet sampling, we propose some heuristics based on measurements from different backbone IP networks. These heuristic arguments allow us to recover the complete flow size distribution.
△ Less
Submitted 13 December, 2008;
originally announced December 2008.
-
Perturbation analysis of an M/M/1 queue in a diffusion random environment
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We study in this paper an $M/M/1$ queue whose server rate depends upon the state of an independent Ornstein-Uhlenbeck diffusion process $(X(t))$ so that its value at time $t$ is $μφ(X(t))$, where $φ(x)$ is some bounded function and $μ>0$. We first establish the differential system for the conditional probability density functions of the couple $(L(t),X(t))$ in the stationary regime, where…
▽ More
We study in this paper an $M/M/1$ queue whose server rate depends upon the state of an independent Ornstein-Uhlenbeck diffusion process $(X(t))$ so that its value at time $t$ is $μφ(X(t))$, where $φ(x)$ is some bounded function and $μ>0$. We first establish the differential system for the conditional probability density functions of the couple $(L(t),X(t))$ in the stationary regime, where $L(t)$ is the number of customers in the system at time $t$. By assuming that $φ(x)$ is defined by $φ(x) = 1-\varepsilon ((x\wedge a/\varepsilon)\vee(-b/\varepsilon))$ for some positive real numbers $a$, $b$ and $\varepsilon$, we show that the above differential system has a unique solution under some condition on $a$ and $b$. We then show that this solution is close, in some appropriate sense, to the solution to the differential system obtained when $φ$ is replaced with $Φ(x)=1-\varepsilon x$ for sufficiently small $\varepsilon$. We finally perform a perturbation analysis of this latter solution for small $\varepsilon$. This allows us to check at the first order the validity of the so-called reduced service rate approximation, stating that everything happens as if the server rate were constant and equal to $μ(1-\eps\E(X(t)))$.
△ Less
Submitted 13 December, 2008;
originally announced December 2008.
-
Integration of streaming services and TCP data transmission in the Internet
Authors:
Nelson Antunes,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian p…
▽ More
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian process (X(t)). Under the assumption that data transfers are exponentially distributed, arrive according to a Poisson process, and share the available bandwidth according to the ideal processor sharing discipline, we derive the mean bit rate of a data transfer as a power series expansion in \eps. Since the system can be described by means of an M/M/1 queue with a time-varying server rate, which depends upon the parameter \eps and process (X(t)), the key issue is to compute an expansion of the area swept under the occupation process of this queue in a busy period. We obtain closed formulas for the power series expansion in \eps of the mean bit rate, which allow us to verify the validity of the so-called reduced service rate at the first order. The second order term yields more insight into the negative impact of the variability of streaming flows.
△ Less
Submitted 6 January, 2006;
originally announced January 2006.
-
Perturbation Analysis of a Variable M/M/1 Queue: A Probabilistic Approach
Authors:
Nelson Antunes,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute t…
▽ More
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute the two first terms of the power series expansion in \eps of the mean value of the busy period duration. This allows us to study the validity of the Reduced Service Rate (RSR) approximation, which consists in comparing the perturbed M/M/1 queue with the M/M/1 queue where the service rate is constant and equal to the mean value of the perturbation. For the first term of the expansion, the two systems are equivalent. For the second term, the situation is more complex and it is shown that the correlations of the environment process (X(t)) play a key role.
△ Less
Submitted 6 January, 2006;
originally announced January 2006.
-
Analysis of loss networks with routing
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
Danielle Tibi
Abstract:
This paper analyzes stochastic networks consisting of finite capacity nodes with different classes of requests which move according to some routing policy. The Markov processes describing these networks do not, in general, have reversibility properties, so the explicit expression of their invariant distribution is not known. Kelly's limiting regime is considered: the arrival rates of calls as we…
▽ More
This paper analyzes stochastic networks consisting of finite capacity nodes with different classes of requests which move according to some routing policy. The Markov processes describing these networks do not, in general, have reversibility properties, so the explicit expression of their invariant distribution is not known. Kelly's limiting regime is considered: the arrival rates of calls as well as the capacities of the nodes are proportional to a factor going to infinity. It is proved that, in limit, the associated rescaled Markov process converges to a deterministic dynamical system with a unique equilibrium point characterized by a nonstandard fixed point equation.
△ Less
Submitted 14 February, 2007; v1 submitted 22 December, 2005;
originally announced December 2005.