-
On Optimal Server Allocation for Moldable Jobs with Concave Speed-Up
Authors:
Samira Ghanbarian,
Arpan Mukhopadhyay,
Ravi R. Mazumdar,
Fabrice M. Guillemin
Abstract:
A large proportion of jobs submitted to modern computing clusters and data centers are parallelizable and capable of running on a flexible number of computing cores or servers. Although allocating more servers to such a job results in a higher speed-up in the job's execution, it reduces the number of servers available to other jobs, which in the worst case, can result in an incoming job not findin…
▽ More
A large proportion of jobs submitted to modern computing clusters and data centers are parallelizable and capable of running on a flexible number of computing cores or servers. Although allocating more servers to such a job results in a higher speed-up in the job's execution, it reduces the number of servers available to other jobs, which in the worst case, can result in an incoming job not finding any available server to run immediately upon arrival. Hence, a key question to address is: how to optimally allocate servers to jobs such that (i) the average execution time across jobs is minimized and (ii) almost all jobs find at least one server immediately upon arrival. To address this question, we consider a system with $n$ servers, where jobs are parallelizable up to $d^{(n)}$ servers and the speed-up function of jobs is concave and increasing. Jobs not finding any available servers upon entry are blocked and lost. We propose a simple server allocation scheme that achieves the minimum average execution time of accepted jobs while ensuring that the blocking probability of jobs vanishes as the system becomes large ($n \to \infty$). This result is established for various traffic conditions as well as for heterogeneous workloads. To prove our result, we employ Stein's method which also yields non-asymptotic bounds on the blocking probability and the mean execution time. Furthermore, our simulations show that the performance of the scheme is insensitive to the distribution of job execution times.
△ Less
Submitted 15 April, 2024;
originally announced June 2024.
-
On the Performance of Large Loss Systems with Adaptive Multiserver Jobs
Authors:
Samira Ghanbarian,
Arpan Mukhopadhyay,
Fabrice M. Guillemin,
Ravi R. Mazumdar
Abstract:
In this paper, we study systems where each job or request can be split into a flexible number of sub-jobs up to a maximum limit. The number of sub-jobs a job is split into depends on the number of available servers found upon its arrival. All sub-jobs of a job are then processed in parallel at different servers leading to a linear speed-up of the job. We refer to such jobs as {\em adaptive multi-s…
▽ More
In this paper, we study systems where each job or request can be split into a flexible number of sub-jobs up to a maximum limit. The number of sub-jobs a job is split into depends on the number of available servers found upon its arrival. All sub-jobs of a job are then processed in parallel at different servers leading to a linear speed-up of the job. We refer to such jobs as {\em adaptive multi-server jobs}. We study the problem of optimal assignment of such jobs when each server can process at most one sub-job at any given instant and there is no waiting room in the system.
We assume that, upon arrival, a job can only access a randomly sampled subset of $k(n)$ servers from a total of $n$ servers, and the number of sub-jobs is determined based on the number of idle servers within the sampled subset. We analyze the steady-state performance of the system when system load varies according to $λ(n) =1 - βn^{-α}$ for $α\in [0,1)$, and $β\geq 0$. Our interest is to find how large the subset $k(n)$ should be in order to have zero blocking and maximum speed-up in the limit as $n \to \infty$. We first characterize the system's performance when the jobs have access to the full system, i.e., $k(n)=n$. In this setting, we show that the blocking probability approaches to zero at the rate $O(1/\sqrt{n})$ and the mean response time of accepted jobs approaches to its minimum achievable value at rate $O(1/n)$. We then consider the case where the jobs only have access to subset of servers, i.e., $k(n) < n$. We show that as long as $k(n)=ω(n^α)$, the same asymptotic performance can be achieved as in the case with full system access. In particular, for $k(n)=Θ(n^α\log n)$, we show that both the blocking probability and the mean response time approach to their desired limits at rate $O(n^{-(1-α)/2})$.
△ Less
Submitted 31 August, 2023;
originally announced September 2023.
-
DRL-based Slice Placement under Realistic Network Load Conditions
Authors:
José Jurandir Alves Esteves,
Amina Boubendir,
Fabrice Guillemin,
Pierre Sens
Abstract:
We propose to demonstrate a network slice placement optimization solution based on Deep Reinforcement Learning (DRL), referred to as Heuristically-controlled DRL, which uses a heuristic to control the DRL algorithm convergence. The solution is adapted to realistic networks with large scale and under non-stationary traffic conditions (namely, the network load). We demonstrate the applicability of t…
▽ More
We propose to demonstrate a network slice placement optimization solution based on Deep Reinforcement Learning (DRL), referred to as Heuristically-controlled DRL, which uses a heuristic to control the DRL algorithm convergence. The solution is adapted to realistic networks with large scale and under non-stationary traffic conditions (namely, the network load). We demonstrate the applicability of the proposed solution and its higher and stable performance over a non-controlled DRL-based solution. Demonstration scenarios include full online learning with multiple volatile network slice placement request arrivals.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
On the Robustness of Controlled Deep Reinforcement Learning for Slice Placement
Authors:
Jose Jurandir Alves Esteves,
Amina Boubendir,
Fabrice Guillemin,
Pierre Sens
Abstract:
The evaluation of the impact of using Machine Learning in the management of softwarized networks is considered in multiple research works. Beyond that, we propose to evaluate the robustness of online learning for optimal network slice placement. A major assumption to this study is to consider that slice request arrivals are non-stationary. In this context, we simulate unpredictable network load va…
▽ More
The evaluation of the impact of using Machine Learning in the management of softwarized networks is considered in multiple research works. Beyond that, we propose to evaluate the robustness of online learning for optimal network slice placement. A major assumption to this study is to consider that slice request arrivals are non-stationary. In this context, we simulate unpredictable network load variations and compare two Deep Reinforcement Learning (DRL) algorithms: a pure DRL-based algorithm and a heuristically controlled DRL as a hybrid DRL-heuristic algorithm, to assess the impact of these unpredictable changes of traffic load on the algorithms performance. We conduct extensive simulations of a large-scale operator infrastructure. The evaluation results show that the proposed hybrid DRL-heuristic approach is more robust and reliable in case of unpredictable network load changes than pure DRL as it reduces the performance degradation. These results are follow-ups for a series of recent research we have performed showing that the proposed hybrid DRL-heuristic approach is efficient and more adapted to real network scenarios than pure DRL.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
DRL-based Slice Placement Under Non-Stationary Conditions
Authors:
Jose Jurandir Alves Esteves,
Amina Boubendir,
Fabrice Guillemin,
Pierre Sens
Abstract:
We consider online learning for optimal network slice placement under the assumption that slice requests arrive according to a non-stationary Poisson process. We propose a framework based on Deep Reinforcement Learning (DRL) combined with a heuristic to design algorithms. We specifically design two pure-DRL algorithms and two families of hybrid DRL-heuristic algorithms. To validate their performan…
▽ More
We consider online learning for optimal network slice placement under the assumption that slice requests arrive according to a non-stationary Poisson process. We propose a framework based on Deep Reinforcement Learning (DRL) combined with a heuristic to design algorithms. We specifically design two pure-DRL algorithms and two families of hybrid DRL-heuristic algorithms. To validate their performance, we perform extensive simulations in the context of a large-scale operator infrastructure. The evaluation results show that the proposed hybrid DRL-heuristic algorithms require three orders of magnitude of learning episodes less than pure-DRL to achieve convergence. This result indicates that the proposed hybrid DRL-heuristic approach is more reliable than pure-DRL in a real non-stationary network scenario.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
Controlled Deep Reinforcement Learning for Optimized Slice Placement
Authors:
Jose Jurandir Alves Esteves,
Amina Boubendir,
Fabrice Guillemin,
Pierre Sens
Abstract:
We present a hybrid ML-heuristic approach that we name "Heuristically Assisted Deep Reinforcement Learning (HA-DRL)" to solve the problem of Network Slice Placement Optimization. The proposed approach leverages recent works on Deep Reinforcement Learning (DRL) for slice placement and Virtual Network Embedding (VNE) and uses a heuristic function to optimize the exploration of the action space by gi…
▽ More
We present a hybrid ML-heuristic approach that we name "Heuristically Assisted Deep Reinforcement Learning (HA-DRL)" to solve the problem of Network Slice Placement Optimization. The proposed approach leverages recent works on Deep Reinforcement Learning (DRL) for slice placement and Virtual Network Embedding (VNE) and uses a heuristic function to optimize the exploration of the action space by giving priority to reliable actions indicated by an efficient heuristic algorithm. The evaluation results show that the proposed HA-DRL algorithm can accelerate the learning of an efficient slice placement policy improving slice acceptance ratio when compared with state-of-the-art approaches that are based only on reinforcement learning.
△ Less
Submitted 3 August, 2021;
originally announced August 2021.
-
A Heuristically Assisted Deep Reinforcement Learning Approach for Network Slice Placement
Authors:
Jose Jurandir Alves Esteves,
Amina Boubendir,
Fabrice Guillemin,
Pierre Sens
Abstract:
Network Slice placement with the problem of allocation of resources from a virtualized substrate network is an optimization problem which can be formulated as a multiobjective Integer Linear Programming (ILP) problem. However, to cope with the complexity of such a continuous task and seeking for optimality and automation, the use of Machine Learning (ML) techniques appear as a promising approach.…
▽ More
Network Slice placement with the problem of allocation of resources from a virtualized substrate network is an optimization problem which can be formulated as a multiobjective Integer Linear Programming (ILP) problem. However, to cope with the complexity of such a continuous task and seeking for optimality and automation, the use of Machine Learning (ML) techniques appear as a promising approach. We introduce a hybrid placement solution based on Deep Reinforcement Learning (DRL) and a dedicated optimization heuristic based on the Power of Two Choices principle. The DRL algorithm uses the so-called Asynchronous Advantage Actor Critic (A3C) algorithm for fast learning, and Graph Convolutional Networks (GCN) to automate feature extraction from the physical substrate network. The proposed Heuristically-Assisted DRL (HA-DRL) allows to accelerate the learning process and gain in resource usage when compared against other state-of-the-art approaches as the evaluation results evidence.
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Asymptotic analysis of the sojourn time of a batch in an $M^{[X]}/M/1$ Processor Sharing Queue
Authors:
Fabrice Guillemin,
Alain Simonian,
Ridha Nasri,
Veronica Quintuna Rodriguez
Abstract:
In this paper, we exploit results obtained in an earlier study for the Laplace transform of the sojourn time $Ω$ of an entire batch in the $M^{[X]}/M/1$ Processor Sharing (PS) queue in order to derive the asymptotic behavior of the complementary probability distribution function of this random variable, namely the behavior of $P(Ω>x)$ when $x$ tends to infinity. We precisely show that up to a mult…
▽ More
In this paper, we exploit results obtained in an earlier study for the Laplace transform of the sojourn time $Ω$ of an entire batch in the $M^{[X]}/M/1$ Processor Sharing (PS) queue in order to derive the asymptotic behavior of the complementary probability distribution function of this random variable, namely the behavior of $P(Ω>x)$ when $x$ tends to infinity. We precisely show that up to a multiplying factor, the behavior of $P(Ω>x)$ for large $x$ is of the same order of magnitude as $P(ω>x)$, where $ω$ is the sojourn time of an arbitrary job is the system. From a practical point of view, this means that if a system has to be dimensioned to guarantee processing time for jobs then the system can also guarantee processing times for entire batches by introducing a marginal amount of processing capacity.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
Cloud-RAN functional split for an efficient fronthaul network
Authors:
Veronica Quintuna Rodriguez,
Fabrice Guillemin,
Alexandre Ferrieux,
Laurent Thomas
Abstract:
The evolution of telecommunication network towards cloud-native environments enables flexible centralization of the base band processing of radio signals. There is however a trade-off between the centralization benefits and the fronthaul cost for carrying the radio data between distributed antennas and data processing centers, which host the virtual RAN functions. In this paper, we present a speci…
▽ More
The evolution of telecommunication network towards cloud-native environments enables flexible centralization of the base band processing of radio signals. There is however a trade-off between the centralization benefits and the fronthaul cost for carrying the radio data between distributed antennas and data processing centers, which host the virtual RAN functions. In this paper, we present a specific split solution for an efficient fronthaul, which enables reducing the consumed bandwidth while being compliant with advanced cooperative radio technologies (interference reduction and data rate improvements). The proposed split has been implemented on the basis of Open Air Interface code and shows important gains in the required fronthaul bandwidth as well as significant latency reduction in the processing of radio frames. \\ \textbf{Publisher:} IEEE \\ \textbf{ISBN:}978-1-7281-3130-6
△ Less
Submitted 11 January, 2021;
originally announced January 2021.
-
Cloud-RAN Factory: Instantiating virtualized mobile networks with ONAP
Authors:
Veronica Quintuna Rodriguez,
Romuald Corbel,
Fabrice Guillemin,
Alexandre Ferrieux
Abstract:
In this demo, we exhibit the negotiation based on the TM Forum framework (Customer Facing Service and Resource Facing Service) and the deployment of a fully virtualized end-to-end mobile network (including a RAN desegregated into Remote Unit, Distributed Unit and Centralized Unit) by using ONAP, an open-source network automation platform. The various components of mobile network are containerized…
▽ More
In this demo, we exhibit the negotiation based on the TM Forum framework (Customer Facing Service and Resource Facing Service) and the deployment of a fully virtualized end-to-end mobile network (including a RAN desegregated into Remote Unit, Distributed Unit and Centralized Unit) by using ONAP, an open-source network automation platform. The various components of mobile network are containerized and deployed by ONAP on top of Kubernetes. The demo is the first illustration of an end-to-end mobile network, which is fully virtualized up to the remote unit, whose architecture is compatible with the Open-RAN framework, and which implements a PHY layer on the basis of 3GPP 7.3 functional split in Open Air Interface code.
△ Less
Submitted 5 November, 2020;
originally announced November 2020.
-
Edge-enabled Optimized Network Slicing in Large Scale Networks
Authors:
Jose Jurandir Alves Esteves,
Amina Boubendir,
Fabice Guillemin,
Pierre Sens
Abstract:
In this demo paper, we consider the network slice placement optimization problem and give some insights into a fast heuristic algorithm tailored to placement in large scale networks. We consider an online optimization scenario with multiple and volatile network slice request arrivals and we showcase the applicability of the proposed Edge-enabled network slice placement solution through a Proof-of-…
▽ More
In this demo paper, we consider the network slice placement optimization problem and give some insights into a fast heuristic algorithm tailored to placement in large scale networks. We consider an online optimization scenario with multiple and volatile network slice request arrivals and we showcase the applicability of the proposed Edge-enabled network slice placement solution through a Proof-of-Concept illustrated by large scale networks scenarios.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
Heuristic for Edge-enabled Network Slicing Optimization using the Power of Two Choices
Authors:
Jose Jurandir Alves Esteves,
Amina Boubendir,
Fabrice Guillemin,
Pierre Sens
Abstract:
We propose an online heuristic algorithm for the problem of network slice placement optimization. The solution is adapted to support placement on large scale networks and integrates Edge-specific and URLLC constraints. We rely on an approach called the Power of Two Choices to build the heuristic. The evaluation results show the good performance of the heuristic that solves the problem in few secon…
▽ More
We propose an online heuristic algorithm for the problem of network slice placement optimization. The solution is adapted to support placement on large scale networks and integrates Edge-specific and URLLC constraints. We rely on an approach called the Power of Two Choices to build the heuristic. The evaluation results show the good performance of the heuristic that solves the problem in few seconds under a large scale scenario. The heuristic also improves the acceptance ratio of network slice placement requests when compared against a deterministic online Integer Linear Programming (ILP) solution.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
A baseline Model for the Relationships between Network Operators and Tower Companies
Authors:
Fabrice Guillemin,
Veronica Quintuna Rodriguez
Abstract:
The introduction of virtualization techniques in radio cellular networks allows the emergence of a business based on the outsourcing of towers hosting antennas and operated by the so-called Tower Companies (TowerCos). In this paper, we develop a baseline business model for studying the potential relationships between network operators and TowerCos. It turns out that the gain in operational costs a…
▽ More
The introduction of virtualization techniques in radio cellular networks allows the emergence of a business based on the outsourcing of towers hosting antennas and operated by the so-called Tower Companies (TowerCos). In this paper, we develop a baseline business model for studying the potential relationships between network operators and TowerCos. It turns out that the gain in operational costs achieved when network operators outsource the management of towers can be gracefully utilized to reduce prices so as to attract more customers. The price drop has however to be carefully realized so as not to break the market share between operators and to preserve competition. To prove this claim, we adopt in a first step a centralized optimization formulation. In a second step, we develop a game theoretic framework.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
On the sojourn time of a batch in the $M^{[X]}/M/1$ Processor Sharing Queue
Authors:
Fabrice Guillemin,
Alain Simonian,
Ridha Nasri,
Veronica Quintuna Rodriguez
Abstract:
In this paper, we analyze the sojourn of an entire batch in a processor sharing $M^{[X]}/M/1$ processor queue, where geometrically distributed batches arrive according to a Poisson process and jobs require exponential service times. By conditioning on the number of jobs in the systems and the number of jobs in a tagged batch, we establish recurrence relations between conditional sojourn times, whi…
▽ More
In this paper, we analyze the sojourn of an entire batch in a processor sharing $M^{[X]}/M/1$ processor queue, where geometrically distributed batches arrive according to a Poisson process and jobs require exponential service times. By conditioning on the number of jobs in the systems and the number of jobs in a tagged batch, we establish recurrence relations between conditional sojourn times, which subsequently allow us to derive a partial differential equation for an associated bivariate generating function. This equation involves an unknown generating function, whose coefficients can be computed by solving an infinite lower triangular linear system. Once this unknown function is determined, we compute the Laplace transform and the mean value of the sojourn time of a batch in the system.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
White Paper on Crowdsourced Network and QoE Measurements -- Definitions, Use Cases and Challenges
Authors:
Tobias Hoßfeld,
Stefan Wunderer,
André Beyer,
Andrew Hall,
Anika Schwind,
Christian Gassner,
Fabrice Guillemin,
Florian Wamser,
Krzysztof Wascinski,
Matthias Hirth,
Michael Seufert,
Pedro Casas,
Phuoc Tran-Gia,
Werner Robitza,
Wojciech Wascinski,
Zied Ben Houidi
Abstract:
This white paper is the outcome of the Würzburg seminar on "Crowdsourced Network and QoE Measurements" which took place from 25-26 September 2019 in Würzburg, Germany. International experts were invited from industry and academia. They are well known in their communities, having different backgrounds in crowdsourcing, mobile networks, network measurements, network performance, Quality of Service (…
▽ More
This white paper is the outcome of the Würzburg seminar on "Crowdsourced Network and QoE Measurements" which took place from 25-26 September 2019 in Würzburg, Germany. International experts were invited from industry and academia. They are well known in their communities, having different backgrounds in crowdsourcing, mobile networks, network measurements, network performance, Quality of Service (QoS), and Quality of Experience (QoE). The discussions in the seminar focused on how crowdsourcing will support vendors, operators, and regulators to determine the Quality of Experience in new 5G networks that enable various new applications and network architectures. As a result of the discussions, the need for a white paper manifested, with the goal of providing a scientific discussion of the terms "crowdsourced network measurements" and "crowdsourced QoE measurements", describing relevant use cases for such crowdsourced data, and its underlying challenges. During the seminar, those main topics were identified, intensively discussed in break-out groups, and brought back into the plenum several times. The outcome of the seminar is this white paper at hand which is - to our knowledge - the first one covering the topic of crowdsourced network and QoE measurements.
△ Less
Submitted 25 May, 2020;
originally announced June 2020.
-
Contribution to the design and the implementation of a Cloud Radio Access Network
Authors:
Veronica Quintuna Rodriguez,
Fabrice Guillemin
Abstract:
This dissertation paper presents the main contributions to the design and the implementation of a Cloud-RAN solution. We concretely address the two main challenges of Cloud-RAN systems: real-time processing of radio signals and reduced fronthaul capacity. We propose a multi-threading model to achieve latency reduction of critical RAN functions as well as an adapted functional split for optimizing…
▽ More
This dissertation paper presents the main contributions to the design and the implementation of a Cloud-RAN solution. We concretely address the two main challenges of Cloud-RAN systems: real-time processing of radio signals and reduced fronthaul capacity. We propose a multi-threading model to achieve latency reduction of critical RAN functions as well as an adapted functional split for optimizing the transmission of radio signals. We model the performance of the proposed solution by means of stochastic service systems which reflect the behavior of high performance computing architectures based on parallel processing and yield dimensioning rules for the required computing capacity. Finally, we validate the accuracy of the theoretical proposals by a Cloud-RAN testbed implemented on the basis of open source solutions, namely Open Air Interface (OAI).
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
An inversion formula with hypergeometric polynomials and application to singular integral operators
Authors:
R. Nasri,
A. Simonian,
F. Guillemin
Abstract:
Given parameters $x \notin \mathbb{R}^- \cup \{1\}$ and $ν$, $\mathrm{Re}(ν) < 0$, and the space $\mathscr{H}_0$ of entire functions in $\mathbb{C}$ vanishing at $0$, we consider the family of operators $\mathfrak{L} = c_0 \cdot δ\circ \mathfrak{M}$ with constant $c_0 = ν(1-ν)x/(1-x)$, $δ= z \, \mathrm{d}/\mathrm{d}z$ and integral operator $\mathfrak{M}$ defined by…
▽ More
Given parameters $x \notin \mathbb{R}^- \cup \{1\}$ and $ν$, $\mathrm{Re}(ν) < 0$, and the space $\mathscr{H}_0$ of entire functions in $\mathbb{C}$ vanishing at $0$, we consider the family of operators $\mathfrak{L} = c_0 \cdot δ\circ \mathfrak{M}$ with constant $c_0 = ν(1-ν)x/(1-x)$, $δ= z \, \mathrm{d}/\mathrm{d}z$ and integral operator $\mathfrak{M}$ defined by $$ \mathfrak{M}f(z) = \int_0^1 e^{- \frac{z}{x}t^{-ν}(1-(1-x)t)} \, f \left ( \frac{z}{x} \, t^{-ν}(1-t) \right ) \, \frac{\mathrm{d}t}{t}, \qquad z \in \mathbb{C}, $$ for all $f \in \mathscr{H}_0$. Inverting $\mathfrak{L}$ or $\mathfrak{M}$ proves equivalent to solve a singular Volterra equation of the first kind.
The inversion of operator $\mathfrak{L}$ on $\mathscr{H}_0$ leads us to derive a new class of linear inversion formulas $T = A(x,ν) \cdot S \Leftrightarrow S = B(x,ν) \cdot T$ between sequences $S = (S_n)_{n \in \mathbb{N}^*}$ and $T = (T_n)_{n \in \mathbb{N}^*}$, where the infinite lower-triangular matrix $A(x,ν)$ and its inverse $B(x,ν)$ involve Hypergeometric polynomials $F(\cdot)$, namely $$
\left\{
\begin{array}{ll}
A_{n,k}(x,ν) = \displaystyle (-1)^k\binom{n}{k}F(k-n,-nν;-n;x),
B_{n,k}(x,ν) = \displaystyle (-1)^k\binom{n}{k}F(k-n,kν;k;x)
\end{array} \right. $$ for $1 \leqslant k \leqslant n$. Functional relations between the ordinary (resp. exponential) generating functions of the related sequences $S$ and $T$ are also given. These relations finally enable us to derive the integral representation $$ \mathfrak{L}^{-1}f(z) = \frac{1-x}{2iπx} \, e^{z} \int_{(0+)}^1 \frac{e^{-xtz}}{t(1-t)} \, f \left ( xz \, (-t)^ν(1-t)^{1-ν} \right ) \, \mathrm{d}t, \quad z \in \mathbb{C}, $$ for the inverse $\mathfrak{L}^{-1}$ of operator $\mathfrak{L}$ on $\mathscr{H}_0$, where the integration contour encircles the point 0.
△ Less
Submitted 19 September, 2019;
originally announced September 2019.
-
Automating the deployment of 5G Network Slices with ONAP
Authors:
Veronica Quintuna Rodriguez,
Fabrice Guillemin,
Amina Boubendir
Abstract:
Open Network Automation Platform (ONAP) is a carrier grade platform for automatically deploying and managing Virtualized Network Functions. In this paper, we address the deployment of network slices in order to come up with a model that is compatible with ONAP. We analyze various types of network slice ontology presented in the framework of 5G standardization bodies and we propose an ONAP-compatib…
▽ More
Open Network Automation Platform (ONAP) is a carrier grade platform for automatically deploying and managing Virtualized Network Functions. In this paper, we address the deployment of network slices in order to come up with a model that is compatible with ONAP. We analyze various types of network slice ontology presented in the framework of 5G standardization bodies and we propose an ONAP-compatible model on the basis of which we illustrate the design, onboarding, instantiation and distribution of a network slice. We concretely define and deploy a network slice implementing a private and customized mobile core network. The achieved results not only make true NFV and 5G promises, notably those referring to on-demand networks, service customization and time-to-market acceleration, but they open the door to the deployment of private tailored cloud-native 5G networks.
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
Higher aggregation of gNodeBs in Cloud-RAN architectures via parallel computing
Authors:
Veronica Quintuna Rodriguez,
Fabrice Guillemin
Abstract:
In this paper, we address the virtualization and the centralization of real-time network functions, notably in the framework of Cloud RAN (C-RAN). We thoroughly analyze the required fronthaul capacity for the deployment of the proposed C-RAN architecture. We are specifically interested in the performance of the software based channel coding function. We develop a dynamic multi-threading approach t…
▽ More
In this paper, we address the virtualization and the centralization of real-time network functions, notably in the framework of Cloud RAN (C-RAN). We thoroughly analyze the required fronthaul capacity for the deployment of the proposed C-RAN architecture. We are specifically interested in the performance of the software based channel coding function. We develop a dynamic multi-threading approach to achieve parallel computing on a multi-core platform. Measurements from an OAI-based testbed show important gains in terms of latency; this enables the increase of the distance between the radio elements and the virtualized RAN functions and thus a higher aggregation of gNodeBs in edge data centers, referred to as Central Offices (COs).
△ Less
Submitted 11 April, 2019;
originally announced May 2019.
-
Inversion formula with hypergeometric polynomials and its application to an integral equation
Authors:
Ridha Nasri,
Alain Simonian,
Fabrice Guillemin
Abstract:
For any complex parameters $x$ and $ν$, we provide a new class of linear inversion formulas $T = A(x,ν) \cdot S \Leftrightarrow S = B(x,ν) \cdot T$ between sequences $S = (S_n)_{n \in \mathbb{N}^*}$ and $T = (T_n)_{n \in \mathbb{N}^*}$, where the infinite lower-triangular matrix $A(x,ν)$ and its inverse $B(x,ν)$ involve Hypergeometric polynomials $F(\cdot)$, namely…
▽ More
For any complex parameters $x$ and $ν$, we provide a new class of linear inversion formulas $T = A(x,ν) \cdot S \Leftrightarrow S = B(x,ν) \cdot T$ between sequences $S = (S_n)_{n \in \mathbb{N}^*}$ and $T = (T_n)_{n \in \mathbb{N}^*}$, where the infinite lower-triangular matrix $A(x,ν)$ and its inverse $B(x,ν)$ involve Hypergeometric polynomials $F(\cdot)$, namely $$
\left\{
\begin{array}{ll}
A_{n,k}(x,ν) = \displaystyle (-1)^k\binom{n}{k}F(k-n,-nν;-n;x),
\\
B_{n,k}(x,ν) = \displaystyle (-1)^k\binom{n}{k}F(k-n,kν;k;x)
\end{array} \right. $$ for $1 \leqslant k \leqslant n$. Functional relations between the ordinary (resp. exponential) generating functions of the related sequences $S$ and $T$ are also given.
These new inversion formulas have been initially motivated by the resolution of an integral equation recently appeared in the field of Queuing Theory; we apply them to the full resolution of this integral equation. Finally, matrices involving generalized Laguerre polynomials polynomials are discussed as specific cases of our general inversion scheme.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
On the sojourn of an arbitrary customer in an $M/M/1$ Processor Sharing Queue
Authors:
Fabrice Guillemin,
Veronica Quintuna Rodriguez
Abstract:
In this paper, we consider the number of both arrivals and departures seen by a tagged customer while in service in a classical $M/M/1$ processor sharing queue. By exploiting the underlying orthogonal structure of this queuing system revealed in an earlier study, we compute the distributions of these two quantities and prove that they are equal in distribution. We moreover derive the asymptotic be…
▽ More
In this paper, we consider the number of both arrivals and departures seen by a tagged customer while in service in a classical $M/M/1$ processor sharing queue. By exploiting the underlying orthogonal structure of this queuing system revealed in an earlier study, we compute the distributions of these two quantities and prove that they are equal in distribution. We moreover derive the asymptotic behavior of this common distribution. The knowledge of the number of departures seen by a tagged customer allows us to test the validity of an approximation, which consists of assuming that the tagged customer is randomly served among those customers in the residual busy period of the queue following the arrival of the tagged customer. A numerical evidence shows that this approximation is reasonable for moderate values of the number of departures, given that the asymptotic behaviors of the distributions are very different even if the exponential decay rates are equal.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
A Processor-Sharing model for the Performance of Virtualized Network Functions
Authors:
Fabrice Guillemin,
Veronica Quintuna Rodriguez,
Alain Simonian
Abstract:
The parallel execution of requests in a Cloud Computing platform, as for Virtualized Network Functions, is modeled by an $M^{[X]}/M/1$ Processor-Sharing (PS) system, where each request is seen as a batch of unit jobs. The performance of such paralleled system can then be measured by the quantiles of the batch sojourn time distribution. In this paper, we address the evaluation of this distribution…
▽ More
The parallel execution of requests in a Cloud Computing platform, as for Virtualized Network Functions, is modeled by an $M^{[X]}/M/1$ Processor-Sharing (PS) system, where each request is seen as a batch of unit jobs. The performance of such paralleled system can then be measured by the quantiles of the batch sojourn time distribution. In this paper, we address the evaluation of this distribution for the $M^{[X]}/M/1$-PS queue with batch arrivals and geometrically distributed batch size. General results on the residual busy period (after a tagged batch arrival time) and the number of unit jobs served during this residual busy period are first derived. This enables us to provide an approximation for the distribution tail of the batch sojourn time whose accuracy is confirmed by simulation.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
Analysis of a trunk reservation policy in the framework of fog computing
Authors:
Fabrice Guillemin,
Guilherme Thompson
Abstract:
We analyze in this paper a system composed of two data centers with limited capacity in terms of servers. When one request for a single server is blocked at the first data center, this request is forwarded to the second one. To protect the single server requests originally assigned to the second data center, a trunk reservation policy is introduced (i.e., a redirected request is accepted only if t…
▽ More
We analyze in this paper a system composed of two data centers with limited capacity in terms of servers. When one request for a single server is blocked at the first data center, this request is forwarded to the second one. To protect the single server requests originally assigned to the second data center, a trunk reservation policy is introduced (i.e., a redirected request is accepted only if there is a sufficient number of free servers at the second data center). After rescaling the system by assuming that there are many servers in both data centers and high request arrival rates, we are led to analyze a random walk in the quarter plane, which has the particularity of having non constant reflecting conditions on one boundary of the quarter plane. Contrary to usual reflected random walks, to compute the stationary distribution of the presented random walk, we have to determine three unknown functions, one polynomial and two infinite generating functions. We show that the coefficients of the polynomial are solutions to a linear system. After solving this linear system, we are able to compute the two other unknown functions and the blocking probabilities at both data centers. Numerical experiments are eventually performed to estimate the gain achieved by the trunk reservation policy.
△ Less
Submitted 13 April, 2016;
originally announced April 2016.
-
Allocation Schemes of Ressources with Downgrading
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert,
Guilherme Thompson
Abstract:
We consider a server with large capacity delivering video files encoded in various resolutions. We assume that the system is under saturation in the sense that the total demand exceeds the server capacity $C$. In such a case, requests may be rejected. For the policies considered in this paper, instead of rejecting a video request, it is downgraded. When the occupancy of the server is above some va…
▽ More
We consider a server with large capacity delivering video files encoded in various resolutions. We assume that the system is under saturation in the sense that the total demand exceeds the server capacity $C$. In such a case, requests may be rejected. For the policies considered in this paper, instead of rejecting a video request, it is downgraded. When the occupancy of the server is above some value $C_0{<}C$, the server delivers the video at a minimal bit rate. The quantity $C_0$ is the bit rate adaptation threshold. For these policies, request blocking is thus replaced by bit rate adaptation. Under the assumptions of Poisson request arrivals and exponential service times, we show that, by rescaling the system, a process associated to the occupancy of the server converges to some limiting process whose invariant distribution is computed by a Wiener-Hopf technique. This allows us to derive an asymptotic expression of the key performance measure of such a policy, the equilibrium probability that a request is transmitted without downgrading. Numerical applications of these results are presented.
△ Less
Submitted 27 February, 2017; v1 submitted 4 April, 2016;
originally announced April 2016.
-
Analysis of an offloading scheme for data centers in the framework of fog computing
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert,
Guilherme Thompson
Abstract:
In the context of fog computing, we consider a simple case when data centers are installed at the edge of the network and assume that if a request arrives at an overloaded data center, then it is forwarded to a neighboring data center with some probability. Data centers are assumed to have a large number of servers and that traffic at some of them is causing saturation. In this case the other data…
▽ More
In the context of fog computing, we consider a simple case when data centers are installed at the edge of the network and assume that if a request arrives at an overloaded data center, then it is forwarded to a neighboring data center with some probability. Data centers are assumed to have a large number of servers and that traffic at some of them is causing saturation. In this case the other data centers may help to cope with this saturation regime by accepting some of the rejected requests. Our aim is to qualitatively estimate the gain achieved via cooperation between neighboring data centers. After proving some convergence results, related to the scaling limits of loss systems, for the process describing the number of free servers at both data centers, we show that the performance of the system can be expressed in terms of the invariant distribution of a random walk in the quarter plane. By using and develo** existing results in the technical literature, explicit formulas for the blocking rates of such a system are derived.
△ Less
Submitted 2 June, 2016; v1 submitted 21 July, 2015;
originally announced July 2015.
-
Impatience in mobile networks and its application to data pricing
Authors:
Salah Eddine Elayoubi,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert,
Bruno Sericola
Abstract:
We consider in this paper an import Quality of Experience (QoE) indicator in mobile networks that is reneging of users due to impatience. We specifically consider a cell under heavy load conditions and compute the reneging probability by using a fluid limit analysis. By solving the fixed point equation, we obtain a new QoE perturbation metric quantifying the impact of reneging on the performance o…
▽ More
We consider in this paper an import Quality of Experience (QoE) indicator in mobile networks that is reneging of users due to impatience. We specifically consider a cell under heavy load conditions and compute the reneging probability by using a fluid limit analysis. By solving the fixed point equation, we obtain a new QoE perturbation metric quantifying the impact of reneging on the performance of the system. This metric is then used to devise a new pricing scheme accounting of reneging. We specifically propose several flavors of this pricing around the idea of having a flat rate for accessing the network and an elastic price related to the level of QoE perturbation induced by communications.
△ Less
Submitted 19 December, 2014; v1 submitted 8 November, 2014;
originally announced November 2014.
-
Analysis of a non-work conserving Generalized Processor Sharing queue
Authors:
Fabrice Guillemin
Abstract:
We consider in this paper a non work-conserving Generalized Processor Sharing (GPS) system composed of two queues with Poisson arrivals and exponential service times. Using general results due to Fayolle \emph{et al}, we first establish the stability condition for this system. We then determine the functional equation satisfied by the generating function of the numbers of jobs in both queues and t…
▽ More
We consider in this paper a non work-conserving Generalized Processor Sharing (GPS) system composed of two queues with Poisson arrivals and exponential service times. Using general results due to Fayolle \emph{et al}, we first establish the stability condition for this system. We then determine the functional equation satisfied by the generating function of the numbers of jobs in both queues and the associated Riemann-Hilbert problem. We prove the existence and the uniqueness of the solution. This allows us to completely characterize the system, in particular to compute the empty queue probability. We finally derive the tail asymptotics of the number of jobs in one queue.
△ Less
Submitted 15 May, 2013;
originally announced May 2013.
-
Stationary analysis of the "Shortest Queue First" service policy: the asymmetric case
Authors:
Fabrice Guillemin,
Alain Simonian
Abstract:
As a follow-up to a recent paper considering two symmetric queues, the \textit{Shortest Queue First} service discipline is presently analysed for two general asymmetric queues. Using the results previously established and assuming exponentially distributed service times, the bivariate Laplace transform of workloads in each queue is shown to depend on the solution $\mathbf{M}$ to a two-dimensional…
▽ More
As a follow-up to a recent paper considering two symmetric queues, the \textit{Shortest Queue First} service discipline is presently analysed for two general asymmetric queues. Using the results previously established and assuming exponentially distributed service times, the bivariate Laplace transform of workloads in each queue is shown to depend on the solution $\mathbf{M}$ to a two-dimensional functional equation $$ \mathbf{M} = Q_1 \cdot \mathbf{M}\circ h_1 + Q_2 \cdot \mathbf{M}\circ h_2 + \mathbf{L} $$ with given matrices $Q_1$, $Q_2$ and vector $\mathbf{L}$ and where functions $h_1$ and $h_2$ are defined each on some rational curve; solution $\mathbf{M}$ can then represented by a series expansion involving the semi-group $< h_1, h_2 >$ generated by these two functions. The empty queue probabilities along with the tail behaviour of the workload distribution at each queue are characterised.
△ Less
Submitted 15 May, 2013;
originally announced May 2013.
-
Stationary analysis of the Shortest Queue First service policy
Authors:
Fabrice Guillemin,
Alain Simonian
Abstract:
We analyze the so-called Shortest Queue First (SQF) queueing discipline whereby a unique server addresses queues in parallel by serving at any time that queue with the smallest workload. Considering a stationary system composed of two parallel queues and assuming Poisson arrivals and general service time distributions, we first establish the functional equations satisfied by the Laplace transforms…
▽ More
We analyze the so-called Shortest Queue First (SQF) queueing discipline whereby a unique server addresses queues in parallel by serving at any time that queue with the smallest workload. Considering a stationary system composed of two parallel queues and assuming Poisson arrivals and general service time distributions, we first establish the functional equations satisfied by the Laplace transforms of the workloads in each queue. We further specialize these equations to the so-called "symmetric case", with same arrival rates and identical exponential service time distributions at each queue; we then obtain a functional equation $$ M(z) = q(z) \cdot M \circ h(z) + L(z) $$ for unknown function $M$, where given functions $q$, $L$ and $h$ are related to one branch of a cubic polynomial equation. We study the analyticity domain of function $M$ and express it by a series expansion involving all iterates of function $h$. This allows us to determine empty queue probabilities along with the tail of the workload distribution in each queue. This tail appears to be identical to that of the Head-of-Line preemptive priority system, which is the key feature desired for the SQF discipline.
△ Less
Submitted 15 May, 2013;
originally announced May 2013.
-
On the Statistical Characterization of Flows in Internet Traffic with Application to Sampling
Authors:
Yousra Chabchoub,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
A new method of estimating some statistical characteristics of TCP flows in the Internet is developed in this paper. For this purpose, a new set of random variables (referred to as observables) is defined. When dealing with sampled traffic, these observables can easily be computed from sampled data. By adopting a convenient mouse/elephant dichotomy also dependent on traffic, it is shown how thes…
▽ More
A new method of estimating some statistical characteristics of TCP flows in the Internet is developed in this paper. For this purpose, a new set of random variables (referred to as observables) is defined. When dealing with sampled traffic, these observables can easily be computed from sampled data. By adopting a convenient mouse/elephant dichotomy also dependent on traffic, it is shown how these variables give a reliable statistical representation of the number of packets transmitted by large flows during successive time intervals with an appropriate duration. A mathematical framework is developed to estimate the accuracy of the method. As an application, it is shown how one can estimate the number of large TCP flows when only sampled traffic is available. The algorithm proposed is tested against experimental data collected from different types of IP networks.
△ Less
Submitted 26 June, 2009; v1 submitted 10 February, 2009;
originally announced February 2009.
-
Adaptive algorithms for identifying large flows in IP traffic
Authors:
Youssef Azzana,
Yousra Chabchoub,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in IP traffic (a.k.a. elephants). Because of the large number of small flows, hash tables of these algorithms have to be regularly refreshed. Recognizing that the periodic erasure scheme usually used in the technical literature turns out to be quite inefficient when using real traffic traces over a l…
▽ More
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in IP traffic (a.k.a. elephants). Because of the large number of small flows, hash tables of these algorithms have to be regularly refreshed. Recognizing that the periodic erasure scheme usually used in the technical literature turns out to be quite inefficient when using real traffic traces over a long period of time, we introduce a simple adaptive scheme that closely follows the variations of traffic. When tested against real traffic traces, the proposed on-line algorithm performs well in the sense that the detection ratio of long flows by the algorithm over a long time period is quite high. Beyond the identification of elephants, this same class of algorithms is applied to the closely related problem of detection of anomalies in IP traffic, e.g., SYN flood due for instance to attacks. An algorithm for detecting SYN and volume flood anomalies in Internet traffic is designed. Experiments show that an anomaly is detected in less than one minute and the targeted destinations are identified at the same time.
△ Less
Submitted 20 June, 2009; v1 submitted 30 January, 2009;
originally announced January 2009.
-
An identification problem in an urn and ball model with heavy tailed distributions
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We consider in this paper an urn and ball problem with replacement, where balls are with different colors and are drawn uniformly from a unique urn. The numbers of balls with a given color are i.i.d. random variables with a heavy tailed probability distribution, for instance a Pareto or a Weibull distribution. We draw a small fraction $p\ll 1$ of the total number of balls. The basic problem addr…
▽ More
We consider in this paper an urn and ball problem with replacement, where balls are with different colors and are drawn uniformly from a unique urn. The numbers of balls with a given color are i.i.d. random variables with a heavy tailed probability distribution, for instance a Pareto or a Weibull distribution. We draw a small fraction $p\ll 1$ of the total number of balls. The basic problem addressed in this paper is to know to which extent we can infer the total number of colors and the distribution of the number of balls with a given color. By means of Le Cam's inequality and Chen-Stein method, bounds for the total variation norm between the distribution of the number of balls drawn with a given color and the Poisson distribution with the same mean are obtained. We then show that the distribution of the number of balls drawn with a given color has the same tail as that of the original number of balls. We finally establish explicit bounds between the two distributions when each ball is drawn with fixed probability $p$.
△ Less
Submitted 20 June, 2009; v1 submitted 13 December, 2008;
originally announced December 2008.
-
Inference of Flow Statistics via Packet Sampling in the Internet
Authors:
Yousra Chabchoub,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We show in this note that by deterministic packet sampling, the tail of the distribution of the original flow size can be obtained by rescaling that of the sampled flow size. To recover information on the flow size distribution lost through packet sampling, we propose some heuristics based on measurements from different backbone IP networks. These heuristic arguments allow us to recover the comp…
▽ More
We show in this note that by deterministic packet sampling, the tail of the distribution of the original flow size can be obtained by rescaling that of the sampled flow size. To recover information on the flow size distribution lost through packet sampling, we propose some heuristics based on measurements from different backbone IP networks. These heuristic arguments allow us to recover the complete flow size distribution.
△ Less
Submitted 13 December, 2008;
originally announced December 2008.
-
Perturbation analysis of an M/M/1 queue in a diffusion random environment
Authors:
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We study in this paper an $M/M/1$ queue whose server rate depends upon the state of an independent Ornstein-Uhlenbeck diffusion process $(X(t))$ so that its value at time $t$ is $μφ(X(t))$, where $φ(x)$ is some bounded function and $μ>0$. We first establish the differential system for the conditional probability density functions of the couple $(L(t),X(t))$ in the stationary regime, where…
▽ More
We study in this paper an $M/M/1$ queue whose server rate depends upon the state of an independent Ornstein-Uhlenbeck diffusion process $(X(t))$ so that its value at time $t$ is $μφ(X(t))$, where $φ(x)$ is some bounded function and $μ>0$. We first establish the differential system for the conditional probability density functions of the couple $(L(t),X(t))$ in the stationary regime, where $L(t)$ is the number of customers in the system at time $t$. By assuming that $φ(x)$ is defined by $φ(x) = 1-\varepsilon ((x\wedge a/\varepsilon)\vee(-b/\varepsilon))$ for some positive real numbers $a$, $b$ and $\varepsilon$, we show that the above differential system has a unique solution under some condition on $a$ and $b$. We then show that this solution is close, in some appropriate sense, to the solution to the differential system obtained when $φ$ is replaced with $Φ(x)=1-\varepsilon x$ for sufficiently small $\varepsilon$. We finally perform a perturbation analysis of this latter solution for small $\varepsilon$. This allows us to check at the first order the validity of the so-called reduced service rate approximation, stating that everything happens as if the server rate were constant and equal to $μ(1-\eps\E(X(t)))$.
△ Less
Submitted 13 December, 2008;
originally announced December 2008.
-
A Queueing System for Modeling a File Sharing Principle
Authors:
Florian Simatos,
Philippe Robert,
Fabrice Guillemin
Abstract:
We investigate in this paper the performance of a simple file sharing principle. For this purpose, we consider a system composed of N peers becoming active at exponential random times; the system is initiated with only one server offering the desired file and the other peers after becoming active try to download it. Once the file has been downloaded by a peer, this one immediately becomes a serv…
▽ More
We investigate in this paper the performance of a simple file sharing principle. For this purpose, we consider a system composed of N peers becoming active at exponential random times; the system is initiated with only one server offering the desired file and the other peers after becoming active try to download it. Once the file has been downloaded by a peer, this one immediately becomes a server. To investigate the transient behavior of this file sharing system, we study the instant when the system shifts from a congested state where all servers available are saturated by incoming demands to a state where a growing number of servers are idle. In spite of its apparent simplicity, this queueing model (with a random number of servers) turns out to be quite difficult to analyze. A formulation in terms of an urn and ball model is proposed and corresponding scaling results are derived. These asymptotic results are then compared against simulations.
△ Less
Submitted 11 March, 2008;
originally announced March 2008.
-
Analysis of Steiner subtrees of Random Trees for Traceroute Algorithms
Authors:
Fabrice Guillemin,
Philippe Robert
Abstract:
We consider in this paper the problem of discovering, via a traceroute algorithm, the topology of a network, whose graph is spanned by an infinite branching process. A subset of nodes is selected according to some criterion. As a measure of efficiency of the algorithm, the Steiner distance of the selected nodes, i.e. the size of the spanning sub-tree of these nodes, is investigated. For the sele…
▽ More
We consider in this paper the problem of discovering, via a traceroute algorithm, the topology of a network, whose graph is spanned by an infinite branching process. A subset of nodes is selected according to some criterion. As a measure of efficiency of the algorithm, the Steiner distance of the selected nodes, i.e. the size of the spanning sub-tree of these nodes, is investigated. For the selection of nodes, two criteria are considered: A node is randomly selected with a probability, which is either independent of the depth of the node (uniform model) or else in the depth biased model, is exponentially decaying with respect to its depth. The limiting behavior the size of the discovered subtree is investigated for both models.
△ Less
Submitted 6 June, 2008; v1 submitted 27 February, 2007;
originally announced February 2007.
-
Integration of streaming services and TCP data transmission in the Internet
Authors:
Nelson Antunes,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian p…
▽ More
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian process (X(t)). Under the assumption that data transfers are exponentially distributed, arrive according to a Poisson process, and share the available bandwidth according to the ideal processor sharing discipline, we derive the mean bit rate of a data transfer as a power series expansion in \eps. Since the system can be described by means of an M/M/1 queue with a time-varying server rate, which depends upon the parameter \eps and process (X(t)), the key issue is to compute an expansion of the area swept under the occupation process of this queue in a busy period. We obtain closed formulas for the power series expansion in \eps of the mean bit rate, which allow us to verify the validity of the so-called reduced service rate at the first order. The second order term yields more insight into the negative impact of the variability of streaming flows.
△ Less
Submitted 6 January, 2006;
originally announced January 2006.
-
Perturbation Analysis of a Variable M/M/1 Queue: A Probabilistic Approach
Authors:
Nelson Antunes,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute t…
▽ More
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute the two first terms of the power series expansion in \eps of the mean value of the busy period duration. This allows us to study the validity of the Reduced Service Rate (RSR) approximation, which consists in comparing the perturbed M/M/1 queue with the M/M/1 queue where the service rate is constant and equal to the mean value of the perturbation. For the first term of the expansion, the two systems are equivalent. For the second term, the situation is more complex and it is shown that the correlations of the environment process (X(t)) play a key role.
△ Less
Submitted 6 January, 2006;
originally announced January 2006.