Close
About
FAQ
Home
Collections
Login
USC Login
Register
0
Selected
Invert selection
Deselect all
Deselect all
Click here to refresh results
Click here to refresh results
USC
/
Digital Library
/
University of Southern California Dissertations and Theses
/
00001.tif
(USC Thesis Other)
00001.tif
PDF
Download
Share
Open document
Flip pages
Contact Us
Contact Us
Copy asset link
Request this asset
Transcript (if available)
Content
APPROXIMATE PERFORMANCE MODELS OF MULTIMEDIA COMMUNICATIONS OVER FAST PACKET-SWITCHED NETWORKS by Stanley Shiouming Wang A Dissertation Presented to the FACULTY OF THE GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA In Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY (Computer Engineering) August 1994 Copyright 1994 Stanley Shiouming Wang UMI Number: DP22895 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is d ep en d en t upon th e quality of th e copy subm itted. In the unlikely event that the author did not sen d a com plete m anuscript and there are m issing pag es, th e se will be noted. Also, if m aterial had to be rem oved, a note will indicate the deletion. Published by P roQ uest LLC (2014). Copyright in the Dissertation held by the Author. Dissertation Publishing UMI D P22895 Microform Edition © P roQ uest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United S ta tes C ode P roQ uest LLC. 789 E ast Eisenhow er Parkway P.O. Box 1346 Ann Arbor, Ml 4 8 1 0 6 - 1346 UNIVERSITY OF SOUTHERN CALIFORNIA THE GRADUATE SCHOOL UNIVERSITY PARK LOS ANGELES, CALIFORNIA 90007 This dissertation, written by Stanley Shiouming Wang under the direction of hXs Dissertation Committee, and approved by all its members, has been presented to and accepted by The Graduate School, in partial fulfillment of re quirements for the degree of P h . P - C p S >44 VJ24V 3 ^ 2 0 3) 1.50 DOCTOR OF PHILOSOPHY c. Dean of Graduate Studies Date DISSERTATION COMMITTEE Chairperson To my parents and my wife, for their encouragement, faith and support. Acknowledgement A number of people have helped in making this possible. I would like to express my sincere appreciation to Professor John A. Silvester, my thesis advisor, for his support and guidance throughout the course of my study at USC. I would also like to thank my committee members, Professor Victor O. K. Li and, in particular, Professor Kenneth S. Alexander, for their valuable suggestions and comments. My special thanks to Professor Monte Ung for always being like a friend to me. Thanks from the bottom of my heart to my colleagues at USC, Dr. Syu-Je Wang, Dr. Authur Y. M. Lin, Dr. John S. Yang, Dr. Frank Y. S. Lin, Dr. Ram Krishnan, Nelson L. S. Fonseca, Te-Kai Liu, Gilberto Mayor, Ebrahim Ismail, Chang-Ann Fun, and Tien- Chien Yu for providing constant encouragement and discussions. Thanks also due to the administrative support and friendship from William Bates, Mary Zittercob, Lucille Stivers, Lita Arcana and Regina Morton which have made my stay at USC a much more pleasant one. Last but not least, my deepest gratitude to my parents, my wife, my sister, my brother, and the rest of my family for always standing by me through the long, often tedious process of getting a Ph.D. Table of Contents Dedication ii Acknowledgements H i List of Figures vii Abstract x Chapter 1 Introduction 1 1.1 Statistical multiplexing 2 1.2 Traffic characteristics and service requirements 3 1.3 Traffic control 5 1.4 Traffic models for voice sources 8 1.5 Traffic models for video sources 10 1.6 Traffic models for data sources 16 1.7 Traffic aggregation and approximate models 17 1.8 Contributions of the research 19 1.9 Outline of the dissertation 20 Chapter 2 Batch Arrival Markov Modulated Poisson Process 23 2.1 Definitions and related results 24 2.2 The BMMPP arrival stream 27 2.3 Queue length distribution for BMMPP/G/1 queues 32 2.4 Loss probability for BMMPP/G/1/K queues 35 2.5 Asymptote for the tail probabilities of queue length distribution 38 2.6 An algorithm for the expected delay of BMMPP/G/1 queues 40 2.7 Summary of the chapter 42 Chapter 3 Integrated Voice and Data Traffic 44 3.1 Model a voice/data ATM multiplexer 44 3.2 Improve the accuracy of the approximation 48 3.3 Add data traffic to the model 52 3.4 Numerical results 54 Chapter 4 Integrated Video, Voice, and Data Traffic 65 4.1 Superposition of the source models 65 4.2 Approximation using a two-state BMMPP 69 4.3 Numerical results 73 Chapter 5 Discrete-Time Models 81 5.1 Discrete-time batch Markovian arrival process (D-BMAP) 81 5.2 Performance studies of D-BMAP/D/1 queues 83 V 5.3 Traffic models 85 5.4 Voice and data integration 87 5.5 Video, voice and data integration 90 5.6 Numerical results for voice and data integration 93 5.7 Numerical examples for video, voice and data integration 101 5.8 Application to traffic control 112 Chapter 6 Conclusions and Future Research 115 6.1 Discussions and Conclusions 115 6.2 Self-similar nature of the traffic 119 6.3 Network traffic analysis 121 6.4 Priority systems 122 6.5 Admission control algorithm 123 Appendix A 125 Bibliography 128 List of Figures Fig. 1.1 B-ISDN traffic characteristics (source [20]). 4 Fig. 1.2 An ON-OFF process. 9 Fig. 1.3 The birth-death process for the number of voice sources in talkspurt. 9 Fig. 1.4 Cell arrival process for burst-mode transmission. 11 Fig. 1.5 Cell arrival process for uniform-mode transmission. 11 Fig. 1.6 A statistical multiplexer using pre-buffers. 12 Fig. 1.7 State transition diagram for Maglaris’ model. 14 Fig. 1.8 State transition diagram for Sen’s model. 15 Fig. 3.1 State mapping between the arrival process and the two-state MMPP for superposition of N voice sources. 47 Fig. 3.2 Expected delay vs. channel utilization for 20 voice calls and 20 data calls. 55 Fig. 3.3 Expected delay vs. channel utilization for 200 voice calls and 200 data calls. 56 Fig. 3.4 Expected system time vs. channel capacity for r = 0.9. 57 Fig. 3.5 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.6. 59 Fig. 3.6 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.7. 60 Fig. 3.7 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.8. 61 Fig. 3.8 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.9. 62 Fig. 3.9 Cell loss probabilities for 20 voice calls and 50 data calls with different system loads. 63 Fig. 4.1 The transition diagram for integrated video and voice traffic. 68 Fig. 4.2 State mapping between the arrival process and the two-state MMPP for integrated video and voice traffic. 70 Fig. 4.3 Expected system time vs. number of video sources for r=0.8. 74 Fig. 4.4 Expected system delay versus channel capacity for different system utilizations. 75 Fig. 4.5 Survivor function and its asymptote for 5 video calls, 100 voice calls and 100 data calls for different system loads. 77 Fig. 4.6 Cell loss probabilities for 5 video calls, 100 voice calls and 100 data call with different system loads. 78 Fig. 4.7 Cell loss probabilities for a system load of 0.8 and 100 voice calls and 100 data calls with different number of video calls. 79 Fig. 4.8 Tail probabilities versus loss probabilities for 5 video calls, 100 voice calls and 100 data calls (simulation results). 80 Fig. 5.1 Queue length distribution for different choices o f . 95 Fig. 5.2 Survivor function for different choices o f . 96 Fig. 5.3 Queue length distribution for 20 voice calls and 30 data calls. 97 Fig. 5.4 Survivor function for 20 voice calls and 30 data calls. 98 viii Fig. 5.5 Fig. 5.6 Fig. 5.7 Fig. 5.8 Fig. 5.9 Fig. 5.10 Fig. 5.11 Fig. 5.12 Fig. 5.13 Fig. 5.14 Fig. 5.15 Fig. 5.16 Average buffer occupancy versus different buffer sizes for voice and data integration. 99 Cell loss probability versus different buffer sizes for voice and data integration. 100 Queue length distribution for 1 video, 10 voice and 50 data calls. 104 Survivor function for 1 video, 10 voice and 50 data calls. 105 Average buffer occupancy versus different buffer sizes for 1 video, 10 voice and 50 data calls. 106 Cell loss probability versus different buffer sizes for 1 video, 10 voice and 50 data calls. 107 Average buffer occupancy versus different buffer sizes for 10 video, 1550 voice and 1380 data calls. 108 Cell loss probability versus different buffer sizes for 10 video, 1550 voice and 1380 data calls. 109 Average buffer occupancy versus different buffer sizes for a standard OC- 3 rate, 155.52 Mbps. 110 Cell loss probability versus different buffer sizes for a standard OC-3 rate, 155.52 Mbps. I l l Cell loss probability for different number of video calls with 500 data calls as a function of the number of voice sources. 113 Cell loss probability for different number of video calls with 600 voice calls as a function of the number of data sources. 114 Abstract Future fast packet-switched networks are expected to provide various types of services such as video, voice and data. Since different traffic sources have different statistical characteristics and quality-of-service requirements, they should be modeled explicitly. Existing performance models for fast packet-switched networks supporting multimedia applications, however, are either too complicated for real time traffic control or do not consider multiple traffic classes. In this dissertation, we present our results on developing approximate performance models that are well- suited for traffic control of this type of networks. We reduce the state space of a complex mixture of traffic sources to a two-state representation. We study the arrival process, the queue length distribution, and the delay and loss performance of a multiplexer using a two-state BMMPP/G/1 queueing system. We also study the asymptotic behavior of the queue length tail probabilities using the Z-transfer of the queue length distribution. We then extend out model to analyze the system in discrete-time domain with less computational complexity and a similar accuracy. We find that these approximate models provide very good delay and loss performance prediction while remaining simple and computationally fast. Since the complexity of the approximation is independent of the number of traffic types as well as sources in the system, the simplicity of the proposed models becomes much more significant as we consider a more complicated (with more traffic classes or sources) systems. Chapter 1 Introduction Since the Integrated Services Digital Network (ISDN) standard was adopted by the International Telegraph and Telephone Consultative Committee (CCITT) in 1984, the revolution in high-speed communications technologies has provided a tre mendous impetus for the introduction of new applications for networks, such as mul timedia applications. These increasing new demands for high-quality, high- bandwidth communications have triggered the development of new network services such as Broadband Integrated Services Digital Networks (B-ISDN) [26] and Switched Multi-megabit Data Service (SMDS) [4]. In this chapter, we reveal some of the challenges faced by these new services and outline our solutions to these chal lenging problems. 1 1.1 Statistical multiplexing Asynchronous Transfer Mode (ATM) is expected to be the underlying transport mechanism for B-ISDN [54], [70]. In ATM networks, the available transmission capacity is shared by statistically multiplexing fixed-length packets (called cells in ATM terminology) generated from all traffic sources. The statistical multiplexing gains, which result from offsetting short-term peaks of some traffic sources with below average bandwidth requirements from other sources, become more significant as the traffic sources become burstier. In fact, ATM networks are capable of support ing traffic sources whose aggregated peak data rate is well above the available sys tem bandwidth provided that the overall average bandwidth requirement does not exceed the system capacity. Furthermore, the effectiveness and economics of ATM as the basic network infrastructure largely depends on the ability to derive network efficiency via statistical multiplexing gains. Due to the statistical nature of the offered traffic, however, load may temporarily exceed the output capacity of the multiplexer resulting in a temporary overload. This can be accommodated by the provision of buffers at the expense of increased delay. The buffers will absorb excess traffic load until the instantaneous total bandwidth requirement drops below the output capacity again. Increasing buffer size alone, however, does not eliminate all potential problems. Severe congestion or even cell losses (due to buffer overflow or excessive delay) can result from excessively long overload duration. Thus, traffic offered to a statistical multiplexer should be well engineered in order balance statistical multiplexing gains and desired performance. 1.2 Traffic characteristics and service requirements Since one of the goals of B-ISDN is to support diverse services, the underlying transport network is expected to be operated in a heterogeneous environment and carry different types of traffic such as data, voice, image, and video, which present substantially different traffic characteristics and Quality O f Service (QOS) require ments. Examples of different traffic characteristics include: a constant data rate for Continuous Bit Rate (CBR) traffic; and high burstiness for Variable B it Rate (VBR) traffic. Examples of different QOS requirements include: loss sensitivity for data traffic: and a strict delay (jitter) bound for playback type of voice or video applica tions. Many key services in B-ISDN such as compressed video and file transfer are bursty in nature. Several measures of the burstiness of the traffic have been defined. Two simple measures are: the ratio of peak to mean arrival rate; and the coefficient of variation, defined to be the ratio of standard deviation to mean of the interarrival time. Recently, a more elaborate measure using the Hurst parameter [32] has been considered making use of the concept of self-similarity [44]. A queueing system see ing a bursty arrival process usually has much worse performance (such as average system time and loss probability) as compared to a queueing system with a non- bursty arrival process. Consequently, models that capture the correlated nature of the traffic instead of widely used renewal processes are essential for predicting the per formance of the emerging B-ISDN. Besides the different traffic characteristics and QOS requirements, different ser vices also require a wide range of bandwidths. Fig. 1.1 shows typical bandwidth requirements for different types of B-ISDN network services which range from a few Kbps to hundreds of Mbps. 10° 1 1 0 - ’ 3 a > c jj 10'2 O 10-3 10-2 10-1 10° 101 102 Channel Capacity (Mbps) Fig. 1.1 B-ISDN traffic characteristics (source [20]). Voice •m w i t m m ! 1.3 Traffic control In traditional circuit-switched networks, user demand and performance is gener ally described in terms of call arrival rates, call holding times, and call blocking probability etc. Hence traffic control has been primarily focussed on the call-level. In packet-switched networks, on the other hand, packet-level traffic control has been the center of attention due to the vast interest in performance measures such as packet throughput, packet delay, and packet loss probabilities. In ATM networks, however, cells from different virtual-paths, each of which is a bundle of virtual cir cuits, are statistically multiplexed over high-speed channels. Thus, traffic control in these networks must deal with two different time scales:^ call level and cell level, and three different scopes: entry points, intermediate nodes (switches) and the entire network. The major function at the call level is to efficiently assign bandwidth to each connection in order to maximize the system utilization and at the same time reduce the probability of congestion (or recover from congestion when it occurs). The cell level traffic control deals with the actual handling of the cells at the ATM transport layer, e.g., buffering strategies, selective discarding, and traffic shaping. In what follows, “traffic control” refers to call level control at the entry points unless otherwise mentioned. Some researchers suggest the use of an extra burst level to deal with potential problems caused by highly bursty sources [31], [64], For B-ISDN, due to the heterogeneous (or multimedia) environment, the design of traffic control becomes one of the fundamental engineering challenges for effi cient network resource utilization. There is a tradeoff between efficient resource uti lization and the complexity of the traffic control algorithm for such networks. The challenge is to achieve high resource efficiency while maintaining simple control structures especially for large networks. Furthermore, since different traffic classes have diversified QOS requirements, the word “congestion,” which (in single traffic class networks) is usually defined independent of the service, is no longer absolute. In other words, the network may appear congested for some services while its per formance is still acceptable for others. Thus, congestion control for B-ISDN should be service dependent and may have different objectives for different traffic classes. Two types of congestion control schemes, reactive control and preventive con trol, are possible. In reactive control, congestion is alleviated after it is detected. Bae and Suda [1] and Woodruff and Kositpaiboon [82] point out some problems in using reactive control for high-speed networks. Simply speaking, as the propagation delay becomes the dominating factor (over queueing and processing delays) the inherent latency of reactive control schemes results in a large number of cells dropping out of the pipe before any control reaction can be activated. In contrast to reactive control, preventive control tries to prevent congestion from occurring by limiting the load in the system. This implies use of a two-phase control scheme: admission control accepts a new connection only if its traffic, after adding to existing traffic, does not lead to congestion; and traffic enforcement (often referred to as traffic policing, usage control or bandwidth management) makes sure that the declared resource requirements are not exceeded. Recently, admission control for ATM networks have received a lot of attention. The basic principle of admission control is to make a decision to either accept or deny a new connection request based on some information of current load. This information could be either an actual measurement of recent arrivals or simply a deduction from the declared traffic descriptors of existing connections. A conserva tive admission policy will allow relatively little traffic into the network and thus reduce the possibility of congestion and cell loss (in terms of buffers overflows). This conservative approach, however, would result in a lower system utilization and higher call blocking probability than a more aggressive one (i.e., one which accepts more calls). The challenge is to find the maximum number of connections that can be admitted to the system while maintaining an acceptable level of probability of cell loss. Discussion of the basic principles and different approaches for managing traffic in ATM networks can be found in [1], [25], [29], [30], [64], and [82]. Various admission control algorithms for ATM networks have been considered. For example, Murase et al. proposed an admission control procedure based on, so called, “individual virtual cell loss probability,” which is a function of the incoming call’s peak and mean rates [56], [57]. Ferrandiz and Lazar [18] ignore packet loss due to buffer overflow and use a Markov modulated point process to decide whether to admit new calls or not. More recently, Shim at el. [76] use the cell loss probability calculated from their three-state Markov model as the criterion for admission con trol. In order to achieve real-time control, current proposals either make use of a table driven call acceptance policy (which is restrictive in the number and mixes of calls that can be considered); or a fast algorithm to compute expected performance (which is typically a drastic over-simplification of the traffic characteristics). Devel opment of an analytical model that retains detailed characteristics of the various types of traffic yet is fast to compute is believed to be the first step towards a suc cessful implementation of any traffic control algorithm for the future networks. This is a key objective of this dissertation. In order to better understand the complexity in the modeling, we now review some of the key traffic models found in the literature. 1.4 Traffic models for voice sources Numerous studies that characterize packetized voice sources, e.g., [3], [8], [9], [27], [33], [46], [55], [77], [79], and [84], have been made among which Brady’s ON- OFF process [9] has been widely adopted as the model for the arrival process corre sponding to a single voice source. In the ON-OFF process model, the voice source alternates between exponentially distributed (or geometrically distributed if we use a discrete time scale) ON periods and exponentially distributed OFF periods. The ON periods correspond to talkspurts while the OFF periods represent silence durations. Packets are created with a constant interarrival time during the ON periods and no packets are generated during the OFF periods. The transition rates (or transition probabilities for discrete time case), from ON to OFF (a ) and from OFF to ON (p), are determined by the expected length of the talkspurts and the expected length of the silence durations (see Fig. 1.2). P ON OFF Fig. 1.2 An ON-OFF process. A superposition of N such ON-OFF processes forms a finite-state birth-death pro cess with the states representing the number of voice sources in talkspurt (in the ON- state) as shown in Fig. 1.3. No. (N-l)a. (N-2)a 2 a a p 2 p 3p (N-l) P A T p Fig. 1.3 The birth-death process for the number of voice sources in talkspurt. Yuan and Silvester [84] have successfully used the above model in their analysis to study a packet switched system by solving the system explicitly. Other models also include: an Interrupted Poisson Process (IPP)^ for an individual voice source and an (7V+l)-state Markov Modulated Poisson Process (MMPP) for the aggregation o i N IPP’s suggested in [33]; and a renewal (deterministic) process for each voice source and process for the superposition analyzed in [66]. 1.5 Traffic models for video sources Applications of digital video type, such as videotelephony, videoconferencing, and broadcast video, impose huge bandwidth requirements and are considered likely to be one of the major consumers of network bandwidth in the future. The amount of information in a coded video signal depends on the activity in the captured scene as well as the compression algorithm^ used. After compression, the resulting bit-rate may vary on a frame by frame basis, which is referred to as Variable-Bit-Rate (VBR) coding. Two types of correlations can be observed in the cell arrival stream gener ated by digital video applications: short-term correlation and long-term correlation. Short-term correlation corresponds to uniform activity levels and lasts for only a few hundred milliseconds. Long-term correlation corresponds to scene changes and may last for several seconds [75], [80]. ^ An IPP is identical to an ON-OFF process except that packet arrivals form a Poisson process (or a Bernoulli trial for discrete case) during the ON period instead of arriving constantly. * Presently, there are three major compression standards, namely JPEG [81], pX64 [49], and MPEG [43], 10 There are two possible transmission modes, burst mode (Fig. 1.4) and uniform mode (Fig. 1.5), that can be used to transmit the cells generated in each frame (typi cally 30 frames per second). In burst mode, (assuming that the codec is fast enough) video signals from the current frame are compressed while the cells from the previ ous frame are being sent. The new cells are transmitted at the beginning of the next frame at peak rate. In uniform mode, the cells generated in a frame are stored in a pre-buffer (see Fig. 1.6), pre-smoothed, and then transmitted at a uniform rate spread over the duration of the next frame. Burst No Cell iiiiiiiiim m m ii llllllllll lllllllllllllllllll llllllllllllllllillll II! 4— Frame i — ► 4— Frame i+1— »* —Frame i+2— » 4— Frame i+3— ► Fig. 1.4 Cell arrival process for burst-mode transmission. i i m i i m i i M i i m i 1 1 1 1 1 1 1 1 imiimmiiiiMMiiiiii 11111111111111II1 1 | < — Frame i — ► 4- -Fram e i+1— ► 4— Frame i+2 — ► 4— Frame i+3— ► Fig. 1.5 Cell arrival process for uniform-mode transmission. 11 Pre-buffer Source 1 Source 2 Common Buffer Channel Source n Fig. 1.6 A statistical multiplexer using pre-buffers. Several models for video sources have been proposed in the literature. In [42], Lazer et al. assume bursty-mode transmission and model a video source as a two- state random process. In their model, state one represents a burst while state two corresponds to an off period. Burst lengths are assumed to be independent variables uniformly distributed between pre-specified upper and lower bounds, and the con stant cycle time (one visit to both states) is set to be the frame duration. Maglaris et al. [53] use uniform-mode transmission and suggest a continuous time Markov chain to model video sources without sudden scene changes, e.g., videotelephony showing a person talking in front of the camera. In this model, the 12 output data rates from a codec are assumed to be a set of discrete levels evenly spaced between zero and the peak rate. Transitions are assumed to occur only between adjacent levels according to a birth-death Markov chain. The transition rates are determined by matching the model’s parameters with statistical measure ments of real traces. Fig. 1.7 shows the state transition diagram of Maglaris’ model where A is the quantization step and M + l is the number of quantization levels. Sen et al. [75] extend this model to include scene changes by means of a two-dimen sional Markov chain. As shown in Fig. 1.8, the possible data-rate levels are the lin ear combinations of two basic levels: a high rate A h, which represents scene changes (activity-level changes), and a low rate A h which represents a uniform activity level. Thus, a total of (M h+l)x(M k+ l) distinct data-rate levels are possible. As before, the system parameters, a, b, c, d, A h, M h, A h and M, are matched by real measurements. Lam et al. [40] propose a new model for cell streams generated by a coding scheme which considers both intra and inter-frame compression techniques such as MPEG. In their model, arrival rate fluctuations are smoothed out by providing a pre buffer similar to the one used in uniform-mode transmission. Unlike the uniform mode transmission, however, the smoothing is not done on a per-frame basis. Instead, they observe a repeating pattern (which typically last about 9 or 12 frames for MPEG) on the arrival rate generated by a codec and smooth the arrival rate over the duration of the repeating pattern. They also introduce an algorithm to reduce the excessive buffer delay due to this smoothing technique. The resulting model appears to be similar to Sen’s model except that in Sen’s model no inter-frame compression is assumed. Other models can also be found in the literature, for example: the autoregressive process discussed in [61] and the autoregressive moving average process presented in [23]. However, the analysis of a queueing model using these processes as the arrival process may not be tractable. Hence, these models are useful only for simula tion models and have little value in analytical methods. M a (M -l)a (M-2)a 2 a a b 2b 3b (M -l)b Mb Fig. 1.7 State transition diagram for Maglaris’ model. 14 Mia Jrt, 2 a • • mm (M,-2)a M r a • • • • • M,b Fig. 1.8 State transition diagram for Sen’ s model. 15 1.6 Traffic models for data sources The dominate traffic source for computer communication networks so far is believed to be still data traffic, which have been traditionally modeled by a renewal process. Among the commonly adopted renewal processes, Poisson process (or Ber noulli process for discrete-time systems) is by far the most widely used model due to its relative mathematical simplicity. Poisson processes enjoy some nice analytical characteristics such as the memoryless and independent arrival properties. Also, the superposition of independent Poisson processes and (probabilistic) decomposition of a Poisson process result in new Poisson processes whose parameters can be easily computed. All of these, in fact, greatly simplify the queueing (network) problems assuming Poisson arrival processes. It may be reasonable to model each individual data source as a Poisson process. It is also commonly argued that with a constant aggregate arrival rate and an increas ing number of independent sources, the overall arrival stream is expected to approach to a Poisson process. However, some recent research results (see [44], for example) have pointed out that the superposition of a large number of data sources may not always result in a Poisson process. In what is referred to as self-similar traf fic in [44], it was shown that the aggregate traffic from LAN’s does not form a Pois son process. In other words, by increasing the observation time scale, the aggregate traffic does not “smooth” out as it would for Poisson processes. 1.7 Traffic aggregation and approximate models As was pointed out, some of the source models discussed here are too complex except for driving a simulation. Others such as Maglaris’ and Sen’s models for video traffic may be analytically tractable but only for a small system (with a small number of sources). The composite model for more than one traffic class is, however, typi cally too complicated to be used in an analytical model while still maintaining a rea sonable computational complexity. For example, combining M aglaris’ model (for video traffic) with the model given by Fig. 1.3 (for voice traffic) would result in a two dimensional Markov chain where the state space is proportional to the product of the numbers of video sources and voice sources; while using Sen’s model would result in a similar three dimensional Markov chain. Failure to generate useful analytical results using one of the voice traffic models discussed above as the arrival process for systems serving voice sources has forced researchers to look for approximations. Two major approaches have been proposed before. The first approach uses a fluid flow approximation [12], [58], [79], which somewhat overlooks the randomness (or, in other words, the short-term variation) of the arrivals. The second approach carefully matches the process to a simpler one, e.g., the two-state MMPP used in [3], [27], and [58], and the renewal process used in [58]. Heffes and Lucantoni, in their one of the earliest work using the second approach [27], use the following parameter matching procedure for the two-state MMPP: i. the overall expected arrival rate; ii. the variance-to-mean ratio of the number of arrivals in some time interval; iii. the long-term variance-to-mean ratio of the number of arrivals; iv. the third moment of the number if arrivals in some time interval. Upon observing the strong role of the overload^ period in determining the perfor mance of the system, Nagarajan et ah, in their matching procedure [58], replace the last step above by “the variance o f the number o f arrivals in some time interval giv ing that the system is in overload state,” and display an improvement on predicting packet loss in a finite-buffered system. In [3], Baiocchi et al. attack the problem from a different angle. They use a theorem proved in [59] (theorem 2.3.1, p. 62) and present an “asymptotic matching procedure” which leads to more accurate results than those of [27]. In their procedure, they compute a parameter which controls the duration of an overload period and match the rest of the parameter set of a two-state MMPP by first-order statistic of arrivals. All these models work reasonably well for a low to moderate traffic load with a small number of voice sources. As the traffic load increases, however, the performance prediction obtained from these approxima tions starts to diverge from the actual performance. Furthermore, as the number of voice sources in the system increases, the computational complexity is still too high to be implemented as a real-time traffic control algorithm. Defined to be when the instantaneous bandwidth requirement exceeds the system capacity. 18 There are only a few studies dealing with the performance of systems with inte grated traffic (video, voice and data). Part of the reason is that video or voice traffic alone already makes the model so complex that any effort to integrate these two together usually makes the analysis intractable. In [83], Ye and Li use a Quasi-Birth- Death (QDB) process to analyze the queueing behavior of a multiplexer with multi- media input traffic. In [45], Li proposes a general solution technique using generat ing functions for the queueing analysis of multimedia multiserver systems. As in the approximations for voice systems, these models fail to resolve one of the most cru cial problems: the high computational complexity. 1.8 Contributions of the research Existing performance models for fast packet-switched networks supporting mul timedia applications are either too complicated for real-time traffic control or do not consider multiple traffic classes. Our objective is to develop approximate perfor mance models that are well-suited for real-time traffic control. Thus, simplicity, while retaining accuracy, is the main focus of the proposed models. The simplicity of the proposed approximation includes both the simplicity of the representation of complex traffic sources and the computational solution technique itself. For describ ing the approximate model, a set of simple traffic descriptors is preferred; while the solution to a desired performance measure should be computable in real-time. 19 We reduce the state space of the combined traffic model to represent the traffic as a two-state BMMPP and analyze an ATM multiplexer using a BMMPP/G/1 queue ing system. We study the arrival process, the queue length distribution, and the loss probability of the system using this approximate model. We also study the asymp totic behavior of the queue length tail distribution using the Z-transform of the queue length distribution. We then move on to analyze the system in discrete-time domain with less computational complexity and a similar accuracy. We find that these approximate models provide very good delay and loss perfor mance prediction while remaining simply and computationally fast. Since the com plexity of the approximate models is independent of the number of traffic types as well as sources in the system, the contributions of this research become much more significant as we consider more complicated (with more traffic classes as well as sources) systems. 1.9 Outline of the dissertation The rest of the dissertation is organized as follows. Chapter 2 defines an MMPP followed by the analysis of a single server queue where the arrival process is assumed to be an MMPP with batch arrivals (denoted BMMPP). We include the analysis of the arrival process of a BMMPP, the queue length distribution for BMMPP/G/1 queues, and the average delay and loss probability for BMMPP/G/1 /K 20 queues. For the queue length distribution, we emphasize determination of the tail probabilities for which we present an easy way to find asymptotic behavior using the Z-transform of the queue length distribution. We also include algorithms to calculate the average delay and loss probability for BMMPP/G/1 /K queues which are useful for real-time traffic control. These results are used in later chapters to predict the per formance of a multimedia communication system. In Chapter 3 we use a two-state BMMPP to specifically model the arrival pro cess of an ATM multiplexer loaded with voice and data sources. We also propose a new way to match the parameters which leads to a more accurate delay and loss per formance prediction and less computational complexity then previous work. We extend this approach in Chapter 4 to include video traffic without significant increase in the computational complexity of the model. In fact, the computational complexity of the proposed approximation is independent of the number of traffic sources. Simulation is used to verify the accuracy of this extended model. Since ATM is really a discrete time system, in Chapter 5 we modify our model to analyze the performance of a multimedia communication system in the discrete-time domain. ATM multiplexer performance based on Discrete-time Batch Markovian Arrival Process (D-BMAP) models is presented. As we found in the continuous time domain, the performance of an ATM multiplexer loaded with different types of 21 traffic can be approximated by reducing the arrival processes to a two-state D-BMAP. We provide extensive validation of these results and also present a couple of examples on how the proposed work can be used for real-time admission control. Finally, in Chapter 6 we discuss and summarize the results presented in this dis sertation and identify some directions for future research. 22 Chapter 2 Batch Arrival Markov Modulated Poisson Process In this chapter, we first define an MMPP. Some related analytical results are cited followed by a detail analysis of BMMPP/G/1 queues. Although part of the analysis presented in this chapter is a special case of the analysis for N /G /l queues presented in [60] and [67], the results, which are specifically derived for BMMPP/G/1 queues, are much simpler and more comprehensible. We include the analysis of the arrival process of a BMMPP, the queue length distribution for BMMPP/G/1 queues, and the average delay and loss probability for BMMPP/D/l/isf queues. For the queue length distribution, our emphasis is on the tail probabilities for which we present an easy way to find the asymptotic behavior using the Z-transform of the queue length distri bution. We also include algorithms for calculating the average delay and loss proba bility for a BMMPP/G/1/iC queueing system. 23 2.1 Definitions and related results Markov Modulated Poisson Process, a special case of the N eats’ versatile M ark ovian process [60] (called the N-process, which is equivalent to the Batch M ark ovian Arrival Process, BMAP, defined by Lucantoni in [50]), is a doubly stochastic Poisson process where the arrival rate is determined by the state (or phase) of a finite-state Markov chain. (If we explicitly model batch arrivals we have BMMPP.) For example, a two-state MMPP can be defined by four parameters: the transition rates from phase one to phase two and from phase two to phase one, and the arrival rates at phase one and phase two. In performance modeling, MMPP is of interest due to its analytical tractability and versatility in modeling correlated arrival processes. Some results related to Markov modulated queueing systems are available in the literature. Knessl and Mathkowsky [37] study the stationary distribution of the unfinished work for a two- state MMPP/G/1 queue. Prabhu and Zhu [63] complete a detailed analysis, including the waiting time, the idle time and the busy period, of an MMPP/G/1 queue. Recently, Zhu, in his work [86], includes some results on the arrival and departure processes for an MMPP/M/1 queue with bulk arrivals. Neuts [60] defines and analyzes the N-process which is used in [67] by Ramaswami to study N /G /l queues, a more general case of MMPP/G/1 queues, including the stationary queue length at departures and the waiting time distribution. Ramaswami’s results are later extended 24 by Blondia in [6] to a finite-buffered system. In the next two sections, we specialize Neuts’ and Ramaswami’s analysis for M/G/l queues to that of a single server queueing system in which the arrival process is a BMMPP and the service times are identically distributed random variables with an arbitrary probability distribution, i.e, a BMMPP/G/1 queueing system. In order to describe the system, the following notation is defined: m the number of phases of the underlying Markov chain; the steady state probability of the system being in phase i; h the arrival rate for the system in phase i; 8& ) Prob{hu\k size is k | the system is in phase i}; m the number of arrivals by time t with iST(0) = 0 (the arrival process); the phase of the arrival process at time t (the phase process); 0 Prob{N(t) = n, ®(t) = j | <5(0) = *}; transition rate from phase i to phase j with 1 rt j = 0, l s i s m (assuming stationary). We also introduce the following probability distributions: • given <5(0) = i and the system is empty at time t = 0, the conditional probability that the first arrived bulk, which occurs at some time t*zh, has a size of k and <5(f+ ) =j; 25 • o.';l j(h) given < E > (0 ) = i, the conditional probability that n customers arrive dur ing a service time t h and «t»(r+ ) = j; • given < E > (0 ) = i and the system is empty at time t = 0, the conditional probability that there are n customers left behind by the first departure, which occurs at some time t < s h , and < E > ( £ + ) = j; • S(h) the service time probability distribution, i.e., the probability that the service time t s h . It is then not difficult to see that: etj(h) = x)dx\ !>;&(*)], * * 1, * * 0 (2.1) < * ,"■ (* ) = J 0 Pij(n> *)dS(r), n * 0 ,h i> 0 (2.2) n + 1 P?.(A) = 2 ( e J. ® aft - * - 1) (A), n s 0 , ^ 0 (2.3) k = i where ® is a convolution operator. Throughout this chapter, T (s) represents the Laplace-Stieltjes Transform (LST) of a continuous probability distribution function f(t)\ and A (z) indicates the Z-trans- form of a discrete probability distribution function an. Boldfaced uppercase charac ters are reserved to denote matrices of the corresponding elements. For instance, R is 2 6 the matrix having rV j as the element in the ith row and the jth column. Vectors will be represented as rc = (jtls k2, itm) . For the vector g = (g v g2, gn) , Ag refers to the diagonal matrix having gt as the ith element on the main diagonal of the matrix, i.e., Ag = diag(gv g2, Remark. For the system described above, the system utilization is given by: = [ ji • A A , • ^ '( 1 ) • e] [-5 '(0 )]5 where e = (1, 1 ,..., 1) ' q 2.2 The BMMPP arrival stream In this section we derive the Z-transform for the number of arrivals during a time period, say [0, t], from a BMMPP. We first look at the differential-difference equa tions for the (Markov) random process {N(t), > 0} . The differential-differ ence equations can be written as: p = (Average Arrival Rate) • (Average Service Time) 27 2 Pik(n’ o • rkj - 2 Pi£n> o ■ rjk+ 2 ^ _ * ) • h -Pij(n> o • n - = 2 P ‘ * ( W ’ ^ * r k j + P i j ( n ’ 0 * r > i + 2 ‘ g f P ~ * ) ‘ N - P i £ n > o • 4=1 4=0 k * j Thus we have: tri d j f ^ n’ = 2 i^ n’ ^ ■ r* > -P ifp* *) ‘ h + 2 *) ■ ^ / n ■ *) * h (2-4) 4=1 4=0 m d = S i ’.iC 0. O ''! / (2-5) 4=1 for 1 s i j ' s m . (2.4) and (2.5) can be written in matrix form as: J^iP(n, f) - jP(«, f) • R - P ( n , t) ■ AX + ^ /*(&, f) • Ag(n - £) • AX (2.6) 4 = 0 = P ( 0 , i ) R (2.7) Applying Z-transform on both sides of (2.6), we obtain: 28 I h z , t) = <P(z, t) [X -A k + AX • 4y(z)] (2.8) Remark. co n ^ z ^ P(k, t) • Ag(n — k) • AX n = 0 k = 0 k = 0 = ^ z* • P(£, t) • AX ^ z" * • Ag(n - A :) -n = & = 2>(z,O -A X -40z) □ We then obtain the following closed-form expression^ for the Z-transform of the number of arrivals in t: <P(z,t) = e x p { t [1? - AX ( / - hsgiz)) ] } (2.9) with fP(z, 0) = I , where I is the identity matrix. Note that it can be proved that (2.9) is a special case of equation (7) of [60] (page 768). Remark. For a Poisson process, i.e., one in which R = 0, AX = X, and t exp(A() is defined to b e / + A t + A 2fi/21 + a ¥ / 3! + . is the identity matrix. , where A is a square matrix and / 29 £sg{z) = z , (2.9) becomes i( z , t) = X (1 z)^ which is a well known result. Also as derived in [27], for MMPP (i.e., no batch arrivals and hg(z) = z), (2.9) reduces to T (z,t) = e x p { f [ J ? - A X ( l - z ) ] } . □ To find the mean number of arrivals, we need to evaluate the derivative of (2.9) at z = 1. Let F(z) = R - A X . ( / - A^(z)) , we have the following: Z as 1 = 0 +F X z )t+ ^ [ F (z )F '(z ) + F'(z)F(z)] + | { i m i 2 F \z ) + F (z)F '(z)F(z) + F '(z) [F(z)] *} \z = 1 0 0 n-X tn = 1 i = 0 Since F '(z)\z= l = AX • and [F (z)]i\z = 1 = R l , we get: 0 0 0 n _ 1 tn z - 1 (2.10) 30 Remark. If AX • and/? are interchangeable (commutative) then: — < P (z, t) dz v ' R n - l f n - 1 = - Aj'CD 2 T ^ T ) ! 1 n = 1 V = t X k - t y ’(X )-e Rt □ Remark. Again, if we specialize (2.10) for a regular Poisson process, i.e., = 1, we will have !P'(z, if) |z _ x = Xf. Meanwhile, for an MMPP, we will get: 0 0 n— 1 tn 1 i = o or, ~ i Rt fp,(z»0L = 1 = *AX-e if AX and Z ? are interchangeable. □ 31 2.3 Queue length distribution for BMMPP/G/1 queues In order to analyze the queue length distribution, we assume that the system is work-conservative, i.e., the server is never idle as long as there are customers in the system. We also assume the system is stable, i.e., the system utilization (defined in section 2.1) p < 1, and is in steady state. We then define the following notation: • C„ the nth customer to enter the system; • 6„ the departure time of C„; • <b(«) the phase of the arrival process right after the departure time instant of C„, denoted 6„+; • x(n) the number of customers (including the server, if any) left behind by C„, at 6„+. One can easily see that {x(n), <D(«);n s * 0} forms a semi-Markov process, since {d>(«);n > 0} is a Markov chain and {x(n);n > 0} is a semi-Markov process. We then can use the Matrix-Geometric Technique [59] to analyze {x(n), <&(«);« a 0} . Let En(h) = [£«.(h)], &n(h) = [a£(/i)], and Bn(h) = [p£(/*)] • The transition probability matrix of the arrival process can be written as: 32 Q(h) = B 0(h) B ,(h) B 2(h) B 3(h) A 0(h) A ,01) A 2(h) A 3(h) 0 A 0 (h) A x(h) A 2(h) 0 0 A qQi) A xQi) (2.11) and, Q = Hm g(/i) = ’ *0 *1 b 2 *3 ■^o A 3 0 -^o ^X ^ 2 • o 0 ^ 1 • ♦ • (2.12) where A n = lim A„(/i); = lim B n(h) h — » ° o /j -» < x > n + X ^ +i and£;„ = lim E n(h ). k = 1 Let: • xni = lim prob {x(&) = n, < D (fc) = / } , l s i s / n , n = 0, 1, 2, ... k - » » • x„ = (xnl,x n2, ...,x „ m ), n = 0, 1, 2,..., i.e., the steady state joint probabil ity of the queue length and the phase of the BMMPP at departure instants. x n = x nl + xn2 + ... + x nm , n = 0, 1, 2, ..., i.e., the steady state queue length probability of the BMMPP at departure instants. 33 • X = ( x 0, Xu x 2, x 3, •••) It is then not difficult to see that X is the invariant probability vector of the matrix Q defined in (2.12), i.e., X Q = X . Thus, we have: £ + 1 xi = x 0B ; + ^ x k A i_k + v i = 0,1,2,... (2.13) J c = l By multiplying both sides of (2.13) and summing over all possible i, we have: i + i \ i i — 0 £ = 0 k = 1 < * > £ + 1 X(z) = * 0 ^ z B i + 2 ) 2 ! XkA ' 1 i - k + 1 £ = 0 £ = 0 k = 1 O O J i:(z) = *0^ z l ^j Ek+lA i_k+ Xk+i^i-k £ = o a = o k = 0 i = k k — 0 i = k zi:(z) = *o ^ z + J5t+1 ^ (2) + 2 z + ** + 1 -^(2) • Jfc = 0 /t = 0 zi:(z) = x0 [£(z) -2i0]ii(z) + [x(z)- xo]^(z) 34 Thus, we have the following closed-form expression for the Z-transform of x; (a more general expression for BMAP/G/1 queues is available from equation (3.2.6) of [67]): X (z ){ z l-k (z )1 = x 0 [ i ( z ) - r \A ( z ) (2.14) In [50], Lucantoni suggested an improvement of the computational algorithm originally presented in [67] by Ramaswami to calculate the A n’s and jB„’s. Using this algorithm, the simultaneous equations defined in (2.13) for the stationary queue length distribution are resolved by truncating the number of equations to a suffi ciently large value (where the truncation error is small enough to be ignored) and then by applying any numerical technique for solving systems of linear equations. Note that according to our experience for an error tolerance of 10'2 0 (which is assumed to be the case in all numerical examples presented in the later chapters where solving a BMMPP/D/l/oo system is required), around 190 A„’ s and B n’s have to be calculated. 2.4 Loss probability for BMMPP/G/1/K queues For a BMMPP/G/1 queue with a limited buffer size of, say, K, it can be readily - i A A A -A seen from (2.12) that X = ( x 0, Xi, x 2, ..., X/c_i) is the invariant probability vector of the following stochastic matrix: 35 Q B o B t B 2 • A 0 A j A 2 0 A 0 A x * * -2 2 B i i = K- 1 oo •• A k _2 ^ i = K—l ... A 1C- 3 2 = K- 2 0 0 0 i = 1 (2.15) Thus, we can solve X explicitly by using the facts that X Q - X and K-l \ x n • e = 1. Specifically, n = 0 X = £■ ( C ) .x-1 (2.16) where b = (0, 0, ..., 0, 1) and = g — / with all elements of its last column replaced by 1. Let: • lK be the loss probability for a system with a buffer size of K; • N a be the average number of customers that arrive between two consecu tive departures; • N f be the average number of customers that are lost between two consecu tive departures for a system with a buffer size of K. Making use of the queue length distribution at departure instants obtained in (2.16), it is not difficult to show that: 36 N„ = e jt n A n e n (2.17) JW f - K 2 ( n - K ) + B n_1e n \ + ^ + k ~ K^ +A*e n (2.18) 1 A = 1 where (x)+ is defined to be max{0, x}. Note that in (2.17) and (2.18), the first term counts the number of arrivals and number of losses for the situation where a cus tomer departs leaving an empty system; while the second term counts the corre sponding numbers for the situation where a customer departs with at least one customer in the system. To calculate the loss probability, we first point out that the random variables repre senting the number of customers arriving between consecutive departures are not independent (nor are the numbers of lost customers between consecutive depar tures). Thus, the Law o f Large Numbers cannot be directly applied to calculate the loss probability. By making use of the Law o f Large Numbers fo r M arkov Chains (Theorem 9.4 of [5]) however, we prove (see Appendix A) that the loss probability can be calculated by: ‘k = (2 -1 9 ) 37 2.5 Asymptote for the tail probabilities of queue length distribution Let y ’s be a set of variables for the queue length distribution at arbitrary time instants (with the same structure as x ’s defined in section 2.3). We specialize the Z-transform of the queue length distribution at any time instants for BMAP/G/1 queues (derived in [50]) to that for BMMPP/G/1 queues as: 9fz) = X (1 - z) XoD^l i>(z)A(z) [z / - k(zy\ 1[2)(z)]_1 (2.20) In (2.20), i>(z) = R - AX ( I - Ag(z)) is the Z-transform of D h k = 0 , 1, 2, ..., where D 0 = R - AX and D k = A X . • Ag(k) , k = 1, 2, 3, ...; X = X • Jt is the overall average arrival rate for the BMMPP; and, JZ(z) = f e clS(x) (see equa tion (13) of [50]) is the Z-transform for A„’s. Note that if the system has a constant service time, then A(z) = where T is the constant service time. Using (2.20) with the algorithm recently introduced by Choudhury and Lucan- toni [10], we can compute \xn, the nth moment of the queue length distribution, as follows (note that Re[x] denotes the real-part of a complex number jc): = — 1 ^ { ^ ( 0 + ( - l) " ^ .( - 0 + 2 V R e f ' S } (2-21) 38 where • i - J — i • ^ is either 1 or 2 (the choice for ^ is explained in [10]) • rn = io -5 5/”? (for an accuracy up to 16-digit place) • f n = (n _ 1) (adaptively changed for fij and \x2, see [10] for details) • W n(z) = % e n ) We then apply two theorems introduced in [10] (page 18-20) by Choudhury and Lucantoni toy„’ s: Theorem 2.1 For some positive real constants a < 1 and C, if y no~n — > C as n — >°o,thenCrt = ^ [ l n ( l / o ) ] ” + X j / n\ — > C as n — * o° Theorem 2.2 For some positive real constants o < 1 and C, if y no~" — » C as n — » oo, then o n = e -» a as « to find some integer k , such that a„ and C„ are constants (up to a certain degree of accuracy), for all n 2* k . Thus, y n Ck°k , as n ^ 00 (2.22) 39 Let tn = P r {the queue length & n} = 2 ; = n y ;, i.e., the tail probabilities of the queue length distribution. From (2.22), we then get: K l 1 - o, n K as ft o o (2.23) 2.6 An algorithm for the expected delay of BMMPP/G/1 queues Even though the computational algorithm presented in section 2.3 has been shown to be numerically stable [50], its CPU-time and memory requirements can be very large. If we only interested in system delay however it can greatly simplify the computation since the computation of A n’s and B n’s are eliminated. We therefore present an algorithm to compute the expected delay for BMMPP/G/1 queue in this section. The theoretical basis for this algorithm can be found in [50], [51], and [52], and is not reiterated here. Remark. The first term of the last step in the algorithm computes the expected waiting time of a tagged customer due to customers already in the waiting queue upon its arrival; while the second term calculates the average delay due to customers that arrived in the same bulk as the tagged customer (assuming that the tagged cus tomer is equally likely to be at any position among all arrivals in the same bulk). 40 A lgorithm 2.1 Expected system delay for BMMPP/G/1 queueing systems i. Compute D k = AX • Ag(k) V A : a 1 with D 0 = R — AX, and 0 0 d = tt. J f c = o Compute d = ^ kDke , where e = (1, 1, 1) '; jt = i m. Starting from / / = e tc recursively solve (up to a certain precision) the 00 stochastic matrix H using (D (H ) = ^ D \<H k and * = o H = j*e^dJ^dx = ^ (j*g~8 T ^S’ (T) j ( / + ’ w h e re /is fc = o ■ 0 the identity matrix and 0 = m ax;(— ©(/Z); ;) ; tv. Compute h (using h H = h ) and yo = (1 — p) h where p is the system utilization; v. Compute V x = -5'(0)© '(1) and V 2 = *S"(0)!D'(1) + (5 '(0 ))2©"(1); -A A A A vi. Compute v x = V t e and v 2 = F2e; vii. Compute w = • v 2 ( 1 - p) [2 p + 2 ( y 0- n v j ( e n + D ) 1 vi + n v 2 ] ; vtti. Compute vv = - wvit - 3t + ^y 0 - ^ ^ i) ^ + jD) 1 (-±n — J'(0>7r© "(l)e ix. Compute w = - I jt/)0 v I w D 0 e + — V -/ L,„. 2 n d 41 2.7 Summary of the chapter M M PP/G/l queues have been widely studied in the literature (see the citations in section 2.1) and widely adopted in performance modeling. The reason that MMPP has received far more attentions than the more general BMAP does is because the nice properties it shares with the Poisson processes. First of all, given that the MMPP is in a specific phase, the process degenerated to an ordinary Poisson process which, of course, enjoy some well-known properties such as memory less property. Secondly, the superposition of M M PP’s simply results in another MMPP with the state space to be the convolution of the state spaces of the components. Similar to a superposition, a (probabilistic) decomposition of an MMPP results in several MM PP’s which have the same state space as the original MMPP. Lastly, in some cases, the MMPP can be easily decomposed into a number of ON-OFF processes which can then be used to characterize the MMPP using just a few parameters. Besides enjoying all the nice properties stated above, BMMPP provides another degree of freedom, the batch size, in performance modeling. In terms of modeling bursty traffic such as the ones expected for the emerging B-ISDN, BMMPP can create far more burstier traffic stream than MMPP can (by specifying the bulk size). Yet, only one [86] was found that analyzes BMMPP queueing systems with an expo nentially distributed service time. In sections 2.2 and 2.3, we analyzed the arrival process and the queue length distribution of a more general case, a BMMPP queueing system with an arbitrary service time distribution. We also specialized our results to some special cases, i.e., M ^ /G /l and MMPP/G/1 queues, whose corre sponding results are readily available in the literature. The results appear to be similar in their complexity with that of MMPP/G/1 queues but much simpler and more comprehensible than that for BMAP/G/1 queues derived in [60] and [67]. We use these results to compute the loss probability of a BMMPP/G/1/i£ queueing system. Specifically, by using the Law o f Large Number fo r Markov Chains (Theorem 9.4 of [5]), we prove that the loss probability of a BMMPP/G/1/K queueing system can be easily calculated. Using two other theorems recently intro duced by Choudhury and Lucantoni, we develop a very simple algorithm to find the asymptote of the queue length tail probabilities for a BMMPP/G/1 queue with an infinite buffer. We also include a computational algorithm to compute the expected system delay for a BMMPP/G/1 queue, which eliminates most of the computation in solving the system and can be useful in real-time traffic control. 43 C h a p te r 3 I n te g r a te d V oice a n d D a ta T ra ffic In this chapter, we study an ATM multiplexer loaded with voice and data sources. The cell arrival process from integrated voice and data sources is approxi mated by a two-state MMPP with batch arrivals. Our approximation makes use of a new matching technique which leads to more accurate prediction of delay and loss performance. In addition, the computation is less complex than previous similar models. The approximation is verified by simulation and comparisons are made to a different matching procedure proposed by Baiocchi et al. [3]. 3.1 Model a voice/data ATM multiplexer We consider an ATM multiplexer loaded with N independent voice sources each of which is modeled by an ON-OFF process with the following parameters: i. co, the constant arrival rate in the ON-state; 44 ii. a, the transition rate from the OFF-state to the ON-state; iii. p, the transition rate from the ON-state to the OFF-state. Let C denote the capacity (in cells per unit o f tim e excluding the average capac ity consum ed by data sources, if any) o f the m ultiplexer; L = |_C/co J be the m axi m um number o f active v o ic e sources w hich the m ultiplexer can support; Tt b e the expected tim e until the superposition process o f the N ON-OFF p rocesses visits state i-1 for the first tim e starting from state i; and nk be the steady state probability that k out o f the N vo ice sources are in the ON-state equal to: (3-x> To find T ■ , let us first observe that it satisfies the following recurrence relation: T i = fl} N . . l ) a .a (Ti+1 + T.)t l * i * N - l (3.2) ' + (AT-r)a + tp 1+1 ' with the boundary condition, TN = 1 / (-A T P) . Note that, in (3.2), the first term on the right-hand side gives the expected sojourn time in state i. The first part of the sec ond term on the right-hand side specifies the probability that the process will make a transition to state i+1 given that it is currently in state i, and the second part is due to that fact that the process must now go from i+1 to i and then from i to i-1. It can be easily proved, by successive substitution, for example, that TN i satisfies the fol- 45 lowing equation: Thus, TN_i has the following explicit closed-form expression: (3.3) Using (3.3), we can find the expected time until the system load drops below the sys tem capacity, TL + X, once the load exceeds the system limit, L. Our state reduction technique works as follows: referring to Fig. 3.1, the states of the superposition arrival process are divided into two disjoint subsets, the overload states, {L + 1, L + 2, N} , and the underload states, {0 ,1 , 2, . . L } . These two sets of states are mapped into the state-II (the overload-state) and the state-I (the underload-state) of a two-state MMPP respectively. 46 Overload Underload State State Fig. 3.1 State mapping between the arrival process and the two-state MMPP for superposition of N voice sources. In the above figure, Y i and Y 2 are the transition rates and Xx and are the cell arrival rates for state-I and state-II correspondingly. We then propose the following approach to match the parameters (note that, ii-iv are effectively the same as those used in [3]): t. y2 + 1 1 N - L - l 1 ( 3 ( S ) k = 0 L ii. \ = co 2 *( , where II„ = k = 0 N k = 0 N N - L — l - k iii. X2 = co ^ ky — j , where II0 = ^ k = L + 1 ° k=L +l 47 c o < j) — A .. / a \ iv. Y i = r , where < i > = N [ ) is the expected number of active 1 z X.2 -oo(J) \ a + p / r calls. As one might expect, the arrival stream from the superposed process is burstier than that from the corresponding two-state MMPP especially when the two-state MMPP is in its overload-state (when there are a relatively larger number of voice sources in talkspurt). This can be understood by observing the “smoothing” effect introduced by the reduced number of states in the approximate model, because when the two-state MMPP is in either one of its states the arrival process is just an ordi nary Poisson process rather than each source emitting cells at the peak rate while it is “ON” and none while it is “OFF.” Since, on the average, a longer queue is expected by a new arrival for a burstier arrival process due to a shorter interarrival time within the same burst, the approximation is expected to perform worse as the system load increases, i.e, the number of active sources and the burstiness of the arrival process increase. The same problem is also experienced in the asymptotic matching proce dure proposed in [3]. 3.2 Improve the accuracy of the approximation In order to improve the accuracy of our model, let us observe that if we overesti mate Tl+ i, we may, in fact, improve the model’ s accuracy. This is because the arrival rate in the overload-state is higher than that in the underload-state (see step ii and Hi 48 of the matching procedure on page 44). Although increasing the average overload time also causes an increase in the average underload time (see step tv of the match ing procedure on page 45), staying in the overload-state longer each visit would mean a higher burstiness (for the same overall arrival rate). Therefore, overestimat ing the average overload time, TL+ 1, will increase the burstiness of the two-state MMPP. Note also that (for the same number of voice calls) the number of states which are mapped into the overload-state of the two-state MMPP increases, i.e., L decreases, as the channel capacity decreases. This corresponds to the MMPP staying a longer time in the overload-state on the average. In addition, the longer the average overload time is the more severe the underestimation of the burstiness is. Thus, a higher overestimation for TL + 1 is needed to offset the increasingly severe underesti mation of the burstiness. One approach that overestimates TL + 1 is to replace (3.3) by its upper-bound and one upper-bound, which leads to very good results, is: (3.4) By applying Stirling’ s formula [22] to (3.4), we have: 49 f + 1 ° (^ ( P735^y5=*) (!)'" * t X ) 0 sk si 7 + 1 _ ^ { N l o g N - (N - k ) lo g ( H - k ) -*logfc + ( i - i ) l o g ( l ) } 1+1 m w c O ( j N ) e ' rJ N $ r y . A j osksi i+1 ^ /TniO{ ^ [_V log( V ) - | lo8( | ) ] + <--^»°g(f)> r-rr-m aTC 0 { j N ) e — 1 \ n ^ i- — i N b ( N . ^ O s k s i ^ 1 ' (3.5) The problem now reduces to determining which value of k that provides the largest exponent in (3.5). Let us replace k / N by x and rewrite the exponent of (3.5) as: i V ^ ( x - l ) l o g ( l - * ) -x lo g * + (^ -~ :c) log ( ^ ) ] C 3-6) After taking the derivative of (3.6) and equating to zero, we have: log (1 - x) - log* - log ( g ) = 0 (3.7) NR From (3.7), it can be easily verified that (3.6) is maximized at k = — — . Thus, we a + p conclude that if 50 k = i should be chosen to find the upper-bound for (3.3); otherwise, k = .JfQ... L a + p J should be used. Theorem 3.1 For any stable system, i.e., with a system utilization P = - < 1 N - L - 1 < ^ always holds. ^ C ( a + P) a + p J Proof. Assume the theorem is not true then for some a, p, and jV : N - L - 1 s a + p a + p - <L + 1 * N - ( 1 - - 2 - S a > \ a + p Aaco a + P f . / . a \~] ( a + p ) C > a L V a+p/J p > l which contradicts the assumption. Therefore, the theorem is true. Q Theorem 3.1 implies that for the systems of interest, (3.8) always holds for i = N - L - 1. The upper-bound that we found for TN_ , denoted TL + 1, is then given by: T - N - L ( N \ - * L lk . 1 « m M N - N L - r N ~ L ~ d ~ i + 1 5 Note that, in the extreme case, i.e., when L + 1 = N, TN is equal to TN. Further more, for the same number of voice calls, as the value of L + 1 decreases, i.e., the channel capacity decreases, the value of (TL + 1 — TL + 1) increases. This is precisely how we want TL + i to behave, as was pointed out at the end of previous section. We can now refine our matching procedure using the result of (3.9) to be the following: . = j _ = (L + p p fj N - L x L + 1 ii-iv. (as before). 3.3 Add data traffic to the model We have thus reduced the system description to a two-state MMPP to represent the arrival process from a number of voice sources. To include data sources into the model, let us assume that data sources generate data packets according to a Poisson process with rate p. The packet length (in number of cells) has an arbitrary probabil 52 ity mass function, Pk=Pr{data packet is comprised of k cells}. This is the same as saying that the data cell arrival process is a batch-arrival Poisson process with a ran dom batch size. If we combine the data sources with the two-state MMPP, we have a two-state MMPP with batch arrivals. The transition rates, and y2, are determined by the matching procedure. The arrival rates are + p and X2 + p for the under load-state and the overload-state respectively. The probability that a batch has a size of k cells is: (3.10) if the process is in the state-I; and: (3.11) if the process is in the state-II, where: 1, if k = 0 0, otherwise 53 3.4 Numerical results We model a voice/data A IM multiplexer as a continuous-time two-state BMMPP/D/1 queue and the results derived in Chapter 2 are applied to get various approximate performance figures. In these examples, each voice call is characterized by to = 1 /6 cells/msec (this corresponding to a 64 Kbps PCM coding with a speech activity detector and a standard 48-octet payload size), a = 1.538 and P = 2.778 (according to the conclusions drawn by [8]). The aggregated data packet arrival rate is assumed to be 20Nd/ 3 packets per second, where N d (an user-defined parameter) is the number of data calls. We assume that the packet size is geometri cally distributed with an average of 5 cells per packet. In all figures presented in this section, BMMPP-1 is the model suggested by [3] extended to include data sources. BMMPP-2 and BMMPP-3 are the models proposed by this research using equation (3.9) and equation (3.3) respectively. For Fig. 3.2 and Fig. 3.3, we fix the system load (by having a constant number of voice and data calls) and plot average system time versus channel utilization (by changing the channel capacity). 20 voice calls plus 20 data calls and 200 voice calls plus 200 data calls are assumed for Fig. 3.2 and Fig. 3.3 correspondingly. For Fig. 3.4, which shows the relationship between aver age system time and channel capacity, a constant system utilization of 0.9 and a fixed ratio of the number of voice and data calls of 3:5 are assumed. We see that BMMPP-2 which is based on the approximation method on a bound for the expected time in overload gives the best results. 54 Average System T im e (10‘3 sec) 10 BMMPP-2 BMMPP-1 BMMPP-3 Simulation 99% interval , 1 10 i ° - 0.4 10 0.5 0.6 0.7 0.8 0.9 1 Channel Utilization Fig. 3.2 Expected delay vs. channel utilization for 20 voice calls and 20 data calls. 55 Average System T im e ( 1 O '4 sec) 10' BMMPP-2 BMMPP-1 BMMPP-3 Simulation 99% interval , 1 10 10° * - 0.4 0.8 0.5 0.6 0.7 0.9 Channel Utilization Fig. 3.3 Expected delay vs. channel utilization for 200 voice calls and 200 data calls. 56 Average System T im e ( 1 O '4 sec) 10' BMMPP-2 BMMPP-1 — BMMPP-3 Simulation 99% interval s.* 10 10° , 1 102 ,0 10 10 Channel Capacity (Mbps) Fig. 3.4 Expected system time vs. channel capacity for p = 0.9. 57 Fig. 3.5 through Fig. 3.8 show the tail probabilities for different system utiliza tions. In these plots, the solid line represents the tail probabilities obtained by simu lating the exact model. The dashed lines are the tail probability and its asymptote for the proposed approximation (denoted BMMPP-2) obtained analytically as discussed in Chapter 2. The dot-dashed lines are the tail probability and its asymptote using the approximation model presented in [3] extended to allow batch arrivals (denoted BMMPP-1). Note that in Fig. 3.5 the dot-dashed lines overlap the dashed lines. As can be seen from these figures, both approximations perform well for a moderate system load, say 0.6 where the simulation, drops off at a buffer position > 160 because too few events were observed. With an increasing system load, however, the results from the approximation presented in [3] diverge from the simulation for large buffer positions, while the proposed model stays within a reasonably close range. Fig. 3.9 shows the cell loss probabilities for different system loads. Note that, in this figure, the dashed line and dot-dashed line overlay each other for p=0.6. Again, by comparing to the simulation results, we readily see that the proposed approximation method outperforms the one presented in [3] for all ranges of system loads. We use Fig. 3.10 to demonstrate that tail probabilities, which are generally used as an esti mation of loss probabilities (see, for example, [16] and [34]), fail to predict loss probabilities for heavily loaded systems. In this figure, dotted lines represent cell loss probabilities, while solid lines represent the tail probabilities (both obtained from simulation). As shown in this figure: using tail probabilities would overesti mate the loss probabilities as high as 14 times according to the simulation for a sys tem with a buffer size of 200 and a system load of 0.9. Even for a system load of only 0.7, the tail probabilities still overestimate the loss probabilities by a factor of 5. Queue Length T ail Probabilities Simulation BMMPP-1 BMMPP-2 -10 0 50 100 150 200 Buffer Position Fig. 3.5 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.6. 59 Queue Length T ail Probabilities 10 10 — Simulation •- BMMPP-1 - BMMPP-2 ■ 2 10 ■ 3 10 ■ 4 10 • 5 10 -6 Asymptotes 10 ■ 7 10 100 150 200 Buffer Position Fig. 3.6 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.7. 60 Queue Length T ail Probabilities 10 Simulation BMMPP-1 BMMPP-2 •2 10 - 3 Asymptotes 10 • 4 10 150 200 100 Buffer Position Fig. 3.7 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.8. 61 Queue Length T ail Probabilities 10 Simulation BMMPP-1 BMMPP-2 N . 1 10 Asymptotes v V X . ■ 2 10 100 150 200 Buffer Position Fig. 3.8 Survivor function and its asymptote for 20 voice calls and 50 data calls with a system utilization of 0.9. 62 Cell loss Probabilities 10 10 10 ' 10 10 - 3 10 - 5 10 -6 10 - 7 10 -8 10 - 9 10 -10 0 X l v V \ p=0.9 \ V ^ r - \ x . . '■-= '• x .. X s p=0.8 x X x x X X • • • - . . x X V X Simulation 95% Interval BMMPP-1 BMMPP-2 K p=0.7 \ \ \ \ x p=0.6 \ \ \ X 50 100 Buffer S ize 150 200 Fig. 3.9 Cell loss probabilities for 20 voice calls and 50 data calls with different system loads. 63 Probabilities 10 1 10 p=0.9 •2 10 ■ 3 p=0.8 10 •r ■ 4 10 • 5 p=0.7 10 Cell Loss 95% Interval Tail Prob. • 6 p=0.6 10 ■ 7 10 100 200 150 Buffer Position Fig. 3.10 Tail probabilities versus loss probabilities for 20 voice calls and 50 data calls (simulation results). 64 Chapter 4 Integrated Video, Voice, and Data Traffic In this chapter, we extend the approach used in Chapter 3 to approximate the superposition of video and voice sources by a two-state MMPP. Data traffic are included into the model in the same way as in the previous case. Since there is are similar approaches in the literature, no comparison is made. Instead, simulation is used to verify the accuracy of the extension of the approach. 4.1 Superposition of the source models We assume that the video sources are of the videotelephony type (showing a person talking in front of the camera without sudden movements) and use a contin uous-time M arkov chain to model the superposition of several video sources, as suggested by Maglaris etal. (Fig. 1.7). In this model, the output bit rate from a codec is assumed to fall into a set of discrete bit rate levels evenly spaced between zero and the peak rate. Transitions are assumed to occur between adjacent levels only, 65 according to a birth-death Markov chain. The transition rates are determined by matching the m odel’s parameters with the statistical characteristics of the traffic, as described in [53]. Combining it with the model for voice sources used in the previous chapter results in a two-dimensional continuous-time Markov chain. Fig. 4.1 shows the transition diagram for such a process, where N and M denote the number of voice sources and the number of discrete bit-rate levels for all video sources respectively. Let n- be the steady state probability of the process being in state (i, f). It can be verified that: < « > for 0 ss i * £ M and 0 s j ss N . Remarks. One can easily write down the set of global-balance equations for n-. But, let us assume that jt^’s also satisfy the following local-balance equations-. = ( N - j + l ) a j t . y_1; 1 ^ j ^ N , O^iszM . ibnt . = (M —i + 1) ani _ t y .; 1 s i s M , 0 s j s N i.e., 66 *ij - iN = [ f j ( g ) ^ 1 * j x N , 0 * i s M O s i s M . O s j s N (4.2) Since ^ ^ = 1, (4.2) implies: 00 7 = 0 i = 0 i G K D ' i r a o ' ; = 0 i = 0 , aN^/, a \ M 1 + p) ( 1 + 5) Hence we conclude that (4.1) is the closed-form expression for the steady-state distribution. Upon substitution, we can also verify that the rt-’s given by (4.1) satisfy the global-balance equations. Thus, the results are indeed correct. □ 67 M a (M -l)a (M -2)a 2a % 0 2b 3b • • • • ■ 1,0 (M -l)b M b O C L 0 0 . [\K I cCL (M -l)a (M-2)a M a 2b 3b C O . • • • • ? 2 - 2a (M -l)b M b Fig. 4.1 The transition diagram for integrated video and voice traffic. 68 4.2 Approximation using a two-state BMMPP To motivate the discussion of our extension to include video sources into the model, let us observe that the expected time that the system will stay in the overload state depends on two major factors: for the same number of traffic sources, (a) the heavier the system load is, the longer each visit to the overload state is; and, (b) the quicker the system can reduce its current load, the faster it will leave the overload state. Note that, in (3.9), ( N - L ) / (L + 1) is the ratio of the number of overload states to the number of underload states, which gives a measure of how heavy the system load is. The other term, 1/(3, is the expected time until an active source becomes idle, which is an indication of how soon the current system load will drop. We follow a similar procedure to the previous chapter. Namely (as demonstrated by Fig. 4.2): i. distinguish two disjoint sets of states from the arrival process, underload states and overload states (the cut-line in Fig. 4.2 represents the boundary between these two sets of states); ii. map these two sets of states to state-I and state-II of a two-state MMPP; iii. use a similar matching procedure to determine the parameter set for the two- state MMPP. 69 (M -l)a (M-2)a m - j ; o (M -l)b Underload States Overload States \ j M a \ ■ (M -l)a (M-2)a mm (M -l)b Overload State Underload State Fig. 4.2 State mapping between the arrival process and the two-state MMPP for integrated video and voice traffic. 70 We introduce the following new notation for the process in Fig. 4.2: • S a the set of underload states; • S a the set of overload states; • 0* the number of the underload states; • 0 O the number of the overload states; • Oi the number of voice sources which the system can support given that the video sources are currently in cell arrival rate level i. Note that o, must satisfy the following conditions: o ; = \_(C - rji) /ooj and - l s o ; s # (where oi = — 1 counts the situation where the video sources in bit-rate arrival rate level i alone overload the system). By adopting a similar idea to that used for voice sources, we propose: 0 ( M M \ < 4-3> u r '«= o ; = o >r as an estimate of the bound of the expected time the system stays in the overload- state. Referring to Fig. 4.2, we then propose the following matching procedure for the two-state MMPP as an approximation of the traffic due to integrated voice and video sources: 71 2 (a. + D / J (if-a,) (P + *) i = 0 M a. x x (n* + « /) ( ) 5 « , where I l u Hi. X2 X (K)i + wj) (rks. V A A o/ , where f l0 (oxj^ +T]())2) - X where < } > , = N — r and < J ) 2 = M — T 1 a + p T2 a + b As before, the first term of T provides an indication as to how heavy the system load is and the second term measures how quickly the current system load will drop. Note that the latter is the mean of a random variable that is the minimum of the following two exponentially distributed random variables: (a) the time that a voice source stays in the ON-state with mean of 1 /p and (b) the time a video mini-source stays in its ON-state with mean of 1/b. Note also that step (if) calculates the average cell arrival rate when the process is in an underload situation. Similarly, the third step finds the expected cell arrival rate when the process is in an overload period. The last step matches the average arrival rate of the two-state MMPP with that of the actual cell arrival process. Data traffic is introduced into the model by using the same approach as in the voice/data case. Namely, if we assume that data sources generate data packets according to a Poisson process with rate p and P k is the probability of a data packet 72 being size k (in number of cells), the overall traffic model can then be approximated as a two-state BMMPP with the following four parameters: Yi, Y 2> ^-i+m and The batch size probability mass functions (for different phases) are determined by (3.10) and (3.11). 4.3 Numerical results We use the same voice and data sources as in the previous chapter and use the same set of parameters for the video sources as used by [7] and [53], i.e., video sources are characterized by: an average bit rate of 3.9 Mbps, a peak bit rate of 10.58 Mbps, a standard deviation of the bit rate of 1.73 Mbps and a parameter for the auto correlation function of 3.9. The total number of discrete cell arrival rate levels for video sources is assumed to be 16 times the number of video sources (as suggested by [53]). In Fig. 4.3, we assume 100 voice sources and 100 data sources in the back ground and plot the relation between average system time and the number of video sources under a system utilization of 0.8 (varying the channel capacity). Our model is shown as curve BMMPP-2 and for comparison purposes we plot a curve BMMPP-1 using the minimum of 1/(3 and 1 /b rather then 1 /((3 + Z ? ) as the measure of how fast the current system load will drop. In Fig. 4.4, we keep the ratio of the number of video, voice and data calls fixed at 1:20:20 and show average system time versus channel capacity with different (constant) system utilizations (i.e., by varying the total traffic load). 73 Average System T im e (10'4 sec) 200 180 160 MMPP-1 MMPP-2 Simulation 95% interval 140 120 100 Number of Video Sources Fig. 4.3 Expected system time vs. number of video sources for p=0.8. 74 Average System T im e (sec) 10 BMMPP Simulation 95% interval • 1 10 •2 10 p=0.9 ,-3 10 x = 0.8 ,-4 10 p=0.7 ,-5 10 p=0.6 ,- 6 10' 80 90 30 60 70 0 10 20 40 50 Channel Capacity (Mbps) Fig. 4.4 Expected system delay versus channel capacity for different system utilizations. 75 Fig. 4.5 shows the approximation results on the tail probabilities and its asymp tote for different system loads (defined to be p = ^ + + ^ example, the numbers of video, voice and data sources are assumed to be 5, 100 and 100 respectively. The corresponding cell loss probabilities for different system loads obtained from both simulation and the proposed approximation are then presented in Fig. 4.6. We use Fig. 4.7 to demonstrate the impact of the number of video sources on the system’s overall cell loss probabilities. In this example, the system load is fixed at 0.8 and the number of voice and data sources is also fixed as 100 each. By varying the system capacity, we plot the cell loss probabilities for systems with 1, 5 and 10 video sources. Finally, Fig. 4.8 is used to show the difference between the tail probabilities and cell loss probabilities. We assume the same number of sources as in Fig. 4.5 and Fig. 4.6. This plot confirms again (as we concluded in the previous chapter) that using tail probabilities is not a good estimate of the corresponding cell loss probabilities, especially for heavy system loads. 76 Queue Length T ail Probabilities p=0.9 p=0.8 \ p=0.7 Simulation^ BMMPP A sym ptote. p=0.6 Buffer Position Fig. 4.5 Survivor function and its asymptote for 5 video calls, 100 voice calls and 100 data calls for different system loads. 77 Cell Loss Probabilities p=0.9 p=0.8 p=0.7 p=0.6 Simulation 95% Interval BMMPP p=0. -10 100 120 140 160 180 Buffer Size Fig. 4.6 Cell loss probabilities for 5 video calls, 100 voice calls and 100 data call with different system loads. 78 Cell Loss Probabilities 1 video ■ 2 X . video - 3 Simulation 95% Interval BMMPP 200 150 100 Buffer Size Fig. 4.7 Cell loss probabilities for a system load of 0.8 and 100 voice calls and 100 data calls with different number of video calls. 79 Probabilities p=0.9 p=0.8 p=0.7 i- p=0.6 T T Cell Loss ' 9 5 % Interval -------------- Tail Prob. j 200 150 100 Buffer Position Fig. 4.8 Tail probabilities versus loss probabilities for 5 video calls, 100 voice calls and 100 data calls (simulation results). SO Chapter 5 Discrete-Time Models The fixed cell size used in ATM networks naturally leads to the use of discrete time models for performance evaluation. In this chapter, we describe our work on estimating ATM multiplexer performance based on Discrete-time Batch Markovian Arrival Process (D-BMAP) models. In the continuous-time domain, the perfor mance of an ATM multiplexer loaded with different types of traffic has been approx imated by reducing the arrival processes to a two-state BMMPP and has been presented in the previous chapters. In this chapter we extended the approach to the discrete-time domain with accurate results and even faster computation. 5.1 Discrete-time batch Markovian arrival process (D-BMAP) D-BMAP, which was originally formulated by Blondia and Casals in [7], is the discrete-time analog of BMAP. It can be defined by a two-dimensional Markov chain, { (R k , J k), k - 1, 2, 3, ...} , where R k is the total number of arrivals by the 81 end of slot k and J k is the phase of the D-BMAP in slot k. The transition probability matrix of the Markov chain (for m phases) is given by: D, d 2 D3 ... 0 d 2 ... • © 0 D0 D\ .. i---- • • • where (D k) , 0 ^ i , j ^ m , k = 0, 1, 2 , , is the probability that there is a phase change from phase i to phase j accompanied by an arrival of size k. Note that we let the probability of bulk size being 0 be the probability of no arrival and normalize the bulk size probability mass function accordingly, i.e, the probability of a bulk arrival of some size is 1 for every phase. Thus, an m-state D-BMAP can be completely defined by: • pij the transition probability from phase i to phase j, l s i , j s w ; • q; (k) the conditional probability of bulk size being k, k = 0, 1, 2,..., given phase i, 1 ■ & i < , m . From the definition, we can easily see that: D k = A t , P (5.1) 82 where A q k = d ia g (q ^k ), q2(k), ..., q j k )) is a diagonal matrix and P = [ptj] (a matrix of which the (i, j)th element is Pij), and: 5.2 Performance studies of D-BMAP/D/1 queues We focus our attention on systems with a constant service time (corresponding to the constant transmission time of the fixed-size cells used in ATM networks) and consider a D-BMAP/D/1 queueing system with a finite buffer of size K. We observe the state of the system at the end of each time slot just before the cell in the server (if there is one) leaves the system. Then, the steady state joint probability distribution of the queue length (including the server) and the phase of the D-BMAP at the observed time instants can be obtained by solving the invariant probability vector (denoted X = { x 0, X\, ..., x k } > where the jth element of the vector Xi, O s js /w , is the steady state joint probability of phase j and a queue length of i) of the following matrix [7]: 0 0 (5.2) 83 D 0 D x d 2 d k _ i I Cf D 0 D \ d 2 ••• d k _ i i = K 0 0 R = 0 Do D x "• D k _ 2 i = o o 2 ®< 0 0 0 Do i = K- 1 0 0 2 ® - / = 1 (5.3) Note that, from (5.2), we know that: k- i 2 D‘ = D - 2 D‘ i = k i = 0 Thus, we can solve X directly using the facts that X R = X and ^ f = x x ie = 1 • Once X is found, the cell loss probability can be obtained systematically as follows: k < * > (5.4) i = 0 j = 1 where p is the traffic intensity (defined later); e is a column vector of all l ’s; and 8; s 1, if i = 0 0, otherwise 84 5.3 Traffic models We model a voice source by a discrete-time ON-OFF process in which the voice source alternates between geometrically distributed ON and OFF periods. Cells are generated with a constant arrival probability (instead of constant interarrival time) during the ON periods and no cells are generated during the OFF periods. In discrete time, this point process is called an Interrupted Bernoulli Process (IBP), which can be defined by three parameters: the transition probabilities from ON to OFF ((3) and from OFF to ON (a) and the constant arrival probability (co). To model the superposi tion of N independent voice sources, we further assume that during any time slot only one voice source can change its state (either from ON to OFF or from OFF to ON). This is a reasonable assumption, since the values of a and (3 are typically in the order of 10-5 (or less). For example: a channel capacity of 44.736 Mbps (standard DS-3 data rate) would set a and (3 to 1.46xl0~5 and 2.63xl0-5 respectively (for an average ON duration of 352 msec and an average OFF period of 650 msec [8]) and the higher the channel capacity is the smaller the values of a and (3 are. The super position of N such independent voice sources can be represented by an (7V+l)-state D-BMAP (which is the same as Fig. 1.3 except for transition probabilities between states instead of transition rates) where the states represent the number of voice sources in the ON state. The bulk size distribution is binomial with parameters k and co, denoted < B (k, co), for phase k, O ^ k ^ N . 85 We adopt the discrete-time version of the model originally proposed by Maglaris et al. (Fig. 1.7) to model video sources with uniform activity level. This model can be viewed as the superposition of M mini-sources each of which is an EBP with a cell arrival probability of, say, r| and transition probabilities of, say, a and b (see [53] for details). Thus, the expected number of cells arriving in a slot from all video sources can be fitted into M + 1 equal-distance discrete levels, 0, rj, 2rj,..., Mr\. As in our voice model, for level i, 0 < i < , M , the bulk size distribution is binomial with param eters i and r), (B(i, r |) . Transitions are assumed to take place only to adjacent levels where the transition probabilities are obtained by matching the statistical characteris tics of the process to that of the video sources. We assume that cell arrivals from aggregated data sources form a bulk arrival Bernoulli process with an arrival probability of p per time slot, i.e., the data bulk interarrival time is geometrically distributed with the same parameter. We assume that the size of a data bulk is a random variable with an arbitrary probability mass function where sk = P r {a data bulk is comprised of k cells} , k = 0 ,1 , 2, ..., and that it is non-trivial, i.e., sk > 0 for some k > 0 . Note that we have adjusted the bulk size distribution so that the event of no arrival is presented in the form of an arrival with bulk size 0, i.e., s0 = 1 — p . This facilitates integration with other traffic types. 86 which is upper bounded by: N - L 1 1 + 1 ~ L + 1 * p (5.7) Note that, as was pointed out in Chapter 3, ( N - L ) / (L + 1) measures the system load and 1/(3 measures how quickly the system load will drop. As we will show by examples, TL + i serves as a very good estimate for how long the system stays in overload. We approximate the superposed arrival process corresponding to iV voice source by a two-state D-BMAP using the following matching procedure: ii. q x(k) , where Uj = oo ^ k{^ with IIU = ^ n k k=o “ k =o iii. q2(k) — ‘ si^N , , where v 2 = to ^ ^ (n ~ ) N k = £ + 1 k = L + 1 co^-Dj / a \ iv. p. = p 0 where < b = N\ — — is the expected number of active 1 zv2-oi§ \ a + (3/ calls. 88 5.4 Voice and data integration Consider an ATM multiplexer loaded with N independent voice sources, which is modeled by the discrete-time birth-death process described in section 5.3. Let be the maximum number of active voice sources that the multiplexer can support (we assume that 1 < L < N exists; otherwise the system load is either too light to be interesting or too heavy to be considered); T; , I s i s N, be the expected time until the superposition arrival process visits state i — 1 for the first time starting from state i; and nk defined by: be the steady state probability that k out of the N voice sources are in the ON-state. We can draw on the continuous-time results (see Chapter 3) to find that the expected time until the system load drops below the system capacity (once the load exceeds the system capacity, L) to be: s = ^ • sk be the average number of cells in a data bulk; L = |_ (1 — p,3) /c o j (5.5) (5.6) 87 Note that the first step estimates the transition probability from state-II to state-I of the two-state D-BMAP using T[ + l , the estimated time that the arrival process stays in overload situation. Step ii) is set up in such a way that the average number of cell arrivals in underload states is equal to the expected number of cell arrivals in state-I. The way step iii) is set up for overload states is similar to that of step ii) for underload states. While the choice of binomial distribution is due to its simplicity; the choice of its parameters has little impact on the resulting model as long as the average number of cell arrivals matches that of the exact analytical model (as we will show later by examples). The last step matches the overall average cell arrival probability of the two-state D-BMAP, + u 2 p 1) / (p2 + p x) , with that of the original arrival process, c d < |) . Let us continue our discussion by pointing out that the integration of the voice sources modeled by the above two-state D-BMAP and the data sources modeled by a batch arrival Bernoulli process is clearly another two-state D-BMAP with: p ' i = P i , i = U 2 (5-8) q\(k) = ( s ® q i)(k),i = 1,2, k = 0,1,2,... (5.9) where 0 denotes convolution. Applying (5.8) and (5.9) to (5.1), we have the following for the two-state D-BMAP representing the integration of voice and data sources: 89 D k = q \ ( k ) ( l - Pl) q \(k )p x q'2(k)p2 q'2(k) ( 1 - p 2) , k = 0,1,2, (5.10) Also, the transition probability matrix for the phase process is given by: k = o 1 - P i Pi Pi 1 ~P2 (5.11) 5.5 Video, voice and data integration To include video traffic into the model, we combine the models for voice and video sources which results in a discrete-time two-dimensional Markov chain similar to Fig. 4.1 where the states represent the level of expected number of arrivals for all video sources and the number of active voice sources. Again, we have assumed that a state change for voice sources and a level change for video sources cannot occur in a single slot. (This is reasonable due to the fact that both a , (3 and a, b are very small.) As in continuous-time case, the steady-state distribution of this two-dimen sional Markov chain can be solved and found to be: 90 It can be verified that, in state ( i , j ) , the bulk size distribution is a multinomial (more precisely, a trinomial) distribution with the following two parameter sets: i, r| and j, 03 (recall that r| is the step size of the levels of expected number of arrivals We say a state (i,j) is overloaded if (r|i + ay) > 1 - p J ; otherwise, we say that it is underloaded. As in continuous-time case, let Su, S0 be the sets and 0„, Q 0 be the numbers of the underload states and overload states respectively; c r , 0 i <,M be the number of voice sources which the system can support given that the video sources are currently in level i; and F = m a x t ( o ; + i} be the largest possible number of active mini-sources among underload states. Note that o t - = [_(1 - p ,S - r |i) /o ) J and is constrained to -l^a-sJST (where o t - -1 counts the situation where the video sources in cell arrival rate level i alone overload the system). Following a similar approach to that used for voice, we propose to use the following T as an estimate for the time that the process stays in overload each visit: The matching procedure for the discrete-time two-state D-BMAP approximation is then given by: from all video sources and co is the probability of arrival of a single voice source). (5.13) 91 ( A t A t \ 2 ( O i + D / j (P+*> i = 0 i = 0 ' ii. q x(k) - , where v x = ^ (r]i + co/) ( with n « = y , (x,Jf<ESu iii. q2(k) -(B^N + M , , where u 2 = ^ (r\i + coj) ( J i ) with JTe*. ^ ” * y ( * s J (co^j +ri(j)2) - V j N a , . M a iv. Pl = p _ _ _ _ _ _ where ^ ^ and « j ) 2 H>2 - (o l> < ()1 + ri< t)2) 5 1 a + p 2 a + b As before, the first term of T provides an indication as to how heavy the system load is and the second term measures how quickly the current system load will drop. Note that, it is the mean of a random variable which is the minimum of two geomet rically distributed random variables, i.e., the time for an active voice source and video mini-source to switch state, with a parameter of (3 and b respectively. The setup for bulk size distribution is similar to that used in the integration of voice and data sources. The last step of the procedure matches the average cell arrival proba bility of the two-state D-BMAP, (vxp 2 + u ^ ) / (p2 + Px) , with that of the actual cell arrival process, o o (f» 1 + r\ c ( ) 2. Once P l, p 2, q x(k) and q2(k) have been determined, the integration of video, voice and data sources can be done as before using (5.8) and (5.9); andD^’s can be obtained using (5.10). 92 5.6 Numerical results for voice and data integration Our reference model for voice sources is characterized by a cell arrival rate of 1 /6 cells/msec (assume 64 Kbps PCM coding with speech activity detector and a standard 48-octet payload size per cell) and average ON and OFF durations of 352 msec and 650 msec respectively (as concluded by [8]). Aggregated data traffic is assumed to have a data bulk arrival probability of 20Nd/ 3 bulks/sec, where N d is the number of data calls. We assume that the data bulk size is geometrically distrib uted with an average of 5 cells/bulk (note that this has to be adjusted for the proba bility of bulk size being 0 before it can be applied to our model). We assume that the system has a total of 20 voice calls and 30 data calls. In Fig. 5.1 and Fig. 5.2, we show the impact of different choices of q ^k) , the distribution of bulk size that we use in the approximate model, on the queue length distribution and the corresponding survivor function with a buffer size of 200. In these figures, three different choices of q;(k) ’s have been used: (a) a constant bulk size, (b) a binomial distributed bulk size with the maximum number of active sources being one of the parameters (as in our matching procedure), and (c) a binomial distributed bulk size with the average number of active sources being one of the parameters. All of them, however, have the same expected bulk size of for state-I and v 2 for state-II. As pointed out before, the results show that the choice of < ?,(& ) has very little impact on the performance of the approximation (the curves for (b) 93 and (c) above overlap each other in the figures). Fig. 5.3 and Fig. 5.4 assume the buffer size is 100 and show the queue length distribution and the corresponding survivor function for the exact analytical model and the approximation with different traffic intensities (defined to be p = p,3 + ocxfq ). In Fig. 5.5, average buffer occupancy for different buffer sizes (in number of cells) are compared. Finally, the comparisons of cell loss probabilities for different buffer sizes (in number of cells) are presented in Fig. 5.6. Note that in Fig. 5.5 and Fig. 5.6, we show results for buffer sizes up to only 100 for the exact analyt ical model due to the complexity of the computation. As the results show, the rela tive error in predicting the average buffer occupancy is within 11% of its actual value and the asymptotic slope is about the same. On the prediction of cell loss prob ability, the relative error ranges from 11% for high system load (p = 0.9) to as much as 50% for medium system load (p = 0.6) and intermediate buffer sizes. As we consider larger (more realistic) buffer sizes, the agreement of the approximation with the exact model improves. This is readily apparent for p = 0.7 through p = 0.9 and we predict that it is also true for lower utilizations. We will prove this point by comparing results from the approximation with simulation results later in this chapter when we present an example which includes video, voice and data sources. 94 uueue Lengin rroDaoiiiiies 10' 10 -2 10 p=0.9 ,-3 10 p=0.8 > ■ 4 10 p=0.7 ,-5 10 ,-6 10 C o n sta n t^ Average Maximum > ■ 7 10 = 0.6 ,• 8 10 0 20 40 60 80 100 120 140 160 180 200 Buffer Position Fig. 5.1 Queue length distribution for different choices of q^k). 95 Queue Length T ail Probabilities 1 0 p=0.9 • 1 10 p=0.8 ■ 2 10 ,-3 10 p=0.7 ,-4 10 ,-5 10' p=0.6 ,• 6 10 C o n sta n t'' Average Maximum t - 7 10 ,-8 10 80 100 120 140 160 180 200 20 40 60 0 Buffer Position Fig. 5.2 Survivor function for different choices of q$ ) . 96 Queue Length Probabilities 10 10 p=0.95 - 2 10 ,- 3 10 - _ p=0.75 4 10 =0.65 ,- 5 10 N . - 6 Exact Analysis Approximation 10 ■ 7 10 ,-8 10 60 70 80 90 100 10 20 40 50 0 30 Buffer Position Fig. 5.3 Queue length distribution for 20 voice calls and 30 data calls. 97 Queue Length T ail Probabilities 10 • 1 p=0.95 10 p=0.85 • 2 10 \ 10 A 10 p=0.65 ,-5 10 p=0.55 ,-6 Exact Analysis Approximation 10 • 7 10 . • 8 10 60 70 80 90 100 0 10 20 30 40 50 Buffer Position Fig. 5.4 Survivor function for 20 voice calls and 30 data calls. 98 Average Buffer Occupancy 10 p=0.8 1 10 p = 0 . 6 0 10 Exact Analysis Approximation 1 10 0 20 60 100 40 80 120 140 160 Buffer S ize (Cells) Fig. 5.5 Average buffer occupancy versus different buffer sizes for voice and data integration. 99 Cell Loss Probability 10 1 10 p=0.9 ■ 2 10 = 0.8 ■ 3 10 - 4 =0.7 10 ■ 5 10 ■ 6 10 Exact Analysis Approximation p=0.6 • 7 10 ■ 8 10 160 100 120 140 Buffer Size (Cells) Fig. 5.6 Cell loss probability versus different buffer sizes for voice and data inte gration. 100 5.7 Numerical examples for video, voice and data integration We use the same voice and data source characteristics as in the previous exam ples and use the same set of parameters for the video sources as used in Chapter 4, i.e., video sources are characterized by: an average bit rate of 3.9 Mbps, a peak bit rate of 10.58 Mbps, a standard deviation of the bit rate of 1.73 Mbps and a parameter for the autocorrelation function of 3.9. The total number of levels for video sources is assumed to be 10 times the number of video sources (as suggested by [53]). We consider a system with 1 video source (otherwise, the size of the exact analytical model would be prohibitively large to be solved using a workstation), 10 voice sources and 50 data sources. In Fig. 5.7 and Fig. 5.8, we plot the queue length distribution and the corre sponding survivor function for the system with a buffer size of 23. Note that in Fig. 5.7, only 2 sets of curves, p = 0.9 and p = 0.6, are presented due to their closeness to each other. The average buffer occupancy and the cell loss probability for different buffer sizes are presented in Fig. 5.9 and Fig. 5.10 respectively. In these examples, the exact analytical model can be solved for only a limited buffer size. This is due to the large state space involved in the model. In Fig. 5.7 and Fig. 5.8, for example, the largest buffer size our SPARC-600^ can handle is 23, which has a state space of 2873 x 2873 and if programmed in MATLAB$ takes about 300 Mbytes of t SPARC is a trademark of SPARC International, Inc. * MATLAB is a registered trademark of The MathWorks, Inc. 101 memory. On the other hand, the approximate model, the state space of which is inde pendent of the number of traffic sources in the system, can be solved for a much larger buffer size (roughly up to a buffer size of well above 1000 running on the same workstation). In order to verify the accuracy of the approximation with an interesting buffer size, we have also include some simulation results in Fig. 5.9 and Fig. 5.10. In these figures, the solid line (representing the analytical results from the exact analysis) stops at a buffer size of 23 due to the reason stated above. Results for larger buffer sizes are presented using simulation results (dotted line). For the average buffer occupancy, a relative error from 7% for high system load to 24% for medium system load is recorded (again, the asymptotic slope matches). For the cell loss probability, even though a relative error of 21% is recorded for p=0.6 with small buffer sizes, the results are far more impressive for larger buffer sizes (as confirmed by simulation results). In order to verify the accuracy of the proposed approximation for more realistic situations, in Fig. 5.11 and Fig. 5.12, we present numerical results for a system with a large (fixed) number of sources under different system loads (10, 1550, and 1380 of video, voice, and data calls respectively are assumed for a channel capacity ranging from 100 Mbps up to 140 Mbps). Similarly, in Fig. 5.13 and Fig. 5.14, we assume a fixed OC-3 channel data rate (155.52 Mbps) with traffic loads from video, voice, and data sources roughly to be 40%, 40%, and 20% respectively. The results show very good agreement in predicting the average buffer size. Due to the large 102 state space (in the order of 10s) and low loss probability (in the range of 10'3 to 10‘1 2 ) involved in these examples, however, our simulation cannot create enough events to complete the curves for the loss probability in some cases (for example, the curves for p=0.75 and 0.8 in Fig. 5.12 and the curves for 12 and 13 video sources in Fig. 5.14). However, from the cases where the loss probability curves are completely drawn and from Fig. 5.10, we expect the agreement on predicting loss probability in these cases to be very good for larger buffer sizes. Another observation which can be made from Fig. 5.10 and Fig. 5.12 is that with a larger number of sources the statis tical multiplexing gains become much more significant, i.e., with the same system load, a larger traffic source population creates a significant lower loss probability (see curves for p=0.8 on Fig. 5.10 and Fig. 5.12, for example). The potential impli cation on this observation is that using a fast packet switching technique such as ATM technique on high-speed networks enables the networks to support traffic with an aggregate peak date rate that is much higher than the system capacity. For example, in Fig. 5.10 with p=0.8, the aggregate peak data rate is 184% of the system capacity; while in Fig. 5.12 with the same system load, the aggregate peak data rate is 169% of the system capacity. With the aggregate peak data rate to system capacity ratio roughly the same, the later case provides a much lower loss probability (and actually a smaller average buffer size as well). For the same buffer size of, say, 200, the loss probability of the later case is roughly 5 orders of magnitude lower than that of the first case. 103 Queue Length Probabilities Exact Analysis Approximation 1 p=0.9 •2 p=0.6 Buffer Position Fig. 5.7 Queue length distribution for 1 video, 10 voice and 50 data calls. 104 Queue Length T ail Probabilities 10 p=0.9 p=0.8 1 10 p=0.7 p=0.6 ■ 2 10 Exact Analysis Approximation •3 10 0 5 10 15 20 25 Buffer Position Fig. 5.8 Survivor function for 1 video, 10 voice and 50 data calls. 105 Average Buffer Occupancy 10 'I '- it a S '" p=0.8 ' ' p=0.7 •I- 1 10 p=0.6 10° Simulation ^ 95% Interval • Exact Analysis Approximation^ ■ 1 10 100 150 200 Buffer S ize (Cells) Fig. 5.9 Average buffer occupancy versus different buffer sizes for 1 video, 10 voice and 50 data calls. 106 Cell Loss Probability 10 Simulation 95% Interval Exact Analysis Approximation^ 1 p=0.9 '5-- “ i - L - - p=0.8 10 -■ - I - - I ^.p 5. ••= -2 5.„ ^ - 2 10 p=0.6 ■3 10 100 120 140 160 Buffer Size (Cells) Fig. 5.10 Cell loss probability versus different buffer sizes for 1 video, 10 voice and 50 data calls. 107 Average Buffer Occupancy 10 Simulation 95% Interval p=0.95 Approximation p=0.9 1 p=0.85 10 p=0.8 p=0.75 0 10 100 150 200 250 Buffer Size (Cells) Fig. 5.11 Average buffer occupancy versus different buffer sizes for 10 video, 1550 voice and 1380 data calls. 108 Cell Loss Probability p=0.95 p=0.85 ' i . p=0.8 Simulation 95% Interval Approximation p=0.75 -10 250 200 150 100 Buffer Size (Cells) Fig. 5.12 Cell loss probability versus different buffer sizes for 10 video, 1550 voice and 1380 data calls. 109 Average Buffer Occupancy 10 Simulation 95% Interval #video=15 Approximation #video=14 1 10 #video=13 #video=12 #video=11 #video=10 o 10 150 100 200 250 Buffer Size (Cells) Fig. 5.13 Average buffer occupancy versus different buffer sizes for a standard OC-3 rate, 155.52 Mbps. 110 Cell Loss Probability #video=15 #video=14 1. #video=13 Simulation 95% Interval -10 Approximation #video=12 -12 100 150 200 250 Buffer Size (Cells) Fig. 5.14 Cell loss probability versus different buffer sizes for a standard OC-3 rate, 155.52 Mbps. I l l 5.8 Application to traffic control Because of the fast computation of the proposed approximation, one of its poten tial applications is real-time traffic management such as admission control. Even though developing the details of such a Call Admission Control (CAC) algorithm is not within the scope of this research, the basic idea can be described as follows: given a specific number of each type of traffic, the corresponding performance figures (the cell loss probability, for example) can be calculated rather quickly. Depending on the QOS requirement of the connections (new connection as well as existing connections), a decision can then be made to either accept or reject another connection request. We could even adapt the model to measured traffic characteris tics of the current connections. In the following examples, we assume a fixed buffer size of 200 and a fixed channel capacity of 44.736 Mbps, i.e., standard DS-3 rate, and show (in Fig. 5.15) the trade-off between the number of voice sources and video sources that the system can support given a fixed number of data sources (500 data sources in this case) in the background. Similarly, Fig. 5.16 shows the trade-off between the number of data sources and video sources that the system can support given a certain number of voice sources (600 voice sources for this example) in the background. Using these figures, we can easily find, given a specific cell loss probability requirement, the maximum number of voice sources, for example, that the system can support with a certain number of video sources. 112 Cell Loss Probability #video= #video=4 #viddo=3 -10 -12 -14 . . . . . . . . I I _________ I __________I _________ I _________ I __________I _________ I _________ I __________I _________ 100 200 300 400 500 600 700 800 900 1000 Number of Voice Sources Fig. 5.15 Cell loss probability for different number of video calls with 500 data calls as a function of the number of voice sources. 113 Cell Loss Probability #video=5 #video=4 #video=3 -10 ____________ i ____________ i ____________ i ____________ i ____________ l____________ i ____________ 0 200 400 600 800 1000 1200 1400 Number of Data Sources Fig. 5.16 Cell loss probability for different number of video calls with 600 voice calls as a function of the number of data sources. 114 Chapter 6 Conclusions and Future Research In this dissertation, we present our research investigating the use of two-state batch M arkov modulated models as an approximation to represent a complex mixture of different traffic sources. We summarize our results for both continuous time and discrete-time domains in this chapter followed by some suggestions for the direction of future research. 6.1 Discussions and Conclusions We specialize part of the analysis for BMAP/G/1 queues presented in [60] and [67] to that for BMMPP/G/1 queues with much simpler and more comprehensible results which are also specialized to some well-know special cases such as MJxtyG/l and MMPP/G/1 queues. We present algorithms to find the tail probability of the queue length distribution, the asymptote for the tail probabilities of the queue length distribution, the expected system delay, and the loss probability. Using these results, 115 we study an ATM multiplexer with a complex combination of different sources by approximating the traffic as a two-state BMMPP. For systems loaded with voice and data sources, we use a two-state BMMPP and present a parameter matching procedure to model the integrated voice/data traffic. Note that for a similar model presented in [3], the solution of an (Ar-Z,)-dimentional eigen system is required in order to find the parameters for the MMPP. This requires a significant amount of computational effort especially when N — L is large, i.e., when the load of the system is heavy. Yet, as demonstrated by Fig. 3.2 through Fig. 3.4, the model fails to make a good delay estimation of the modeled system under medium to high system load. Fig. 3.6 through Fig. 3.9 also prove that the model works poorly to predict both loss probability and tail probabilities for these situa tions. Compared to the above mentioned model, the computational requirement of our approach is insignificant and is independent of the system size. More impor tantly, our model provides better delay and loss performance predictions (agrees with the simulation better) for a wide range of system loads (the improvement is more noticeable for higher system load). The approach is extended to cover video, voice and data sources in Chapter 4. Although we provide no comparison to other analytical models (since no similar work exists), simulation results show that the approximation has a very good delay prediction (see Fig. 4.3 and Fig. 4.4) and loss estimation (see Fig. 4.6 and Fig. 4.7) 116 even under heavy system loads. One can also use Sen’s model (Fig. 1.8) to model video sources with scene changes which results in a three-dimensional Markov chain for the integrated multimedia traffic. A similar approximation can then be used to analyze the performance of such systems. One contribution of this research is the reduction of the size of the state space. The model’s state space is reduced from (N + 1) to 2 for voice and data integration and from (M + T ) x (N + 1) to 2 for video, voice and data integration. For example, the system used in Fig. 4.6 has a state space of 90 x 100, which is prohibi tively large to be solved explicitly (inverting a (90 x 100 x 100 )-dimensional matrix would be required to solve the system with a buffer size of 100). Another contribu tion is that if only the probabilities of queue occupancy for large buffer positions are of interest, one can use the proposed algorithm to find the corresponding asymptotic values, using (2.23), instead of solving the system explicitly. This indeed provides a very good approximation as shown by Fig. 3.5 through Fig. 3.8 and Fig. 4.5. This research has also shown that (conclusion drawn from Fig. 3.10 and Fig. 4.8) in the environment under study one cannot directly estimate loss probability from the corresponding tail probability of an infinite queue. Due to the discrete-time nature of ATM networks, we have also developed a similar discrete-time model in Chapter 5 which also has good accuracy. The size of the model’s state space is reduced by a factor of 0 (M 2 • N 2) in our approximation. 117 As an example, consider a system with 20 voice calls, 2 video calls (represented by 21 different levels) and 20 buffer spaces. The exact model would have a state space of size of 9, 216 x 9, 216, where as in our approximation only 60 x 60 is needed. 3 3 The time complexity for solving the system drops by a factor of 0 (M • N ) . Consider a very small system which has only 1 video source, 10 voice sources and 10 buffer spaces, for example. It takes approximately 4.8x10 floating point opera tions to solve the exact system as compared to only about 1.6xl04 for the approxi mation. Thus, the complexity of the model is greatly reduced while, as our results have shown, a good accuracy is retained. The model performs better for high loads and in the case of moderate loads, it gives much better agreement for larger buffers (see Fig. 5.10, for example). One important feature about the proposed model is that we use a set of traffic descriptors which are readily available for each type of traffic, e.g., a , p and to for voice sources. Therefore, each type of traffic can be specified by a set of user defin able parameters. This is particular important, since traffic control (especially admis sion control) should be based on user-defined parameters instead of system- measured parameters. Thus, network users can be in control as well as responsible for the cost and quality of using the network. Also, several advantages of our approximations can be identified. First, as discussed above, much less computational overhead is involved. Second and more importantly, it provides very good perfor mance predictions. Third, a real-time traffic control algorithm can be developed 118 based on the results presented here. Another observation which can be made from this research is that the statistical multiplexing gains are much more significant when the systems capacity and the population of traffic sources are significantly larger. We have included a detailed discussion and examples of this observation in Chapter 5. 6.2 Self-similar nature of the traffic The renewal traffic models used in this research to represent data traffic are expected to work reasonably well for traffic generated by a collection of, say, distrib uted terminals. Since ATM multiplexers are likely to serve traffic forwarded by Local Area Networks (LAN’s) as well, it would be quite useful to understand and be able to model the distinct characteristics of this type of traffic. Recent studies of high-quality, high-resolution LAN traffic measurements [44] have revealed self-similar (or fractal) property with potentially important implica tions to the modeling and design of B-ISDN. From a packet arrival process point of view, the self-similar property exhibits structural similarities across a wide range of time scales, i.e, the duration of a burst is no longer well defined. In other words, renewal traffic models have a property that as the time scale increases the number of arrivals in each time unit tends to “smooth” out. Whereas in self-similar traffic 119 models, as the time scale increases the structure of the number of arrivals in each time unit is either indistinguishable or with a small distinction from that of a smaller time scale. On an attempt to construct a self-similar traffic model, one can aggregate many ON-OFF processes similar to the one shown in Fig. 1.2 with a significant probability of having an arbitrarily long duration of ON periods and OFF periods. (Note that the duration of an ON period and OFF period in an ON-OFF process is exponentially distributed for continuous-time case or geometrically distributed for discrete-time case.) This in fact creates a renewal reward process (with a reward of 0 and 1 for the OFF state and ON state respectively) with an infinite variance for the inter-renewal times (called heavy-tails in [44]). The questions remaining to be answered are how to match the proposed approxi mation in this research to the one described above and how well the resulting approximation performs. One thing can be observed from Fig. 4.6 and Fig. 4.7, though, is that using BMMPP as a traffic model can have a similar impact as a self similar traffic model does on the corresponding loss probability. That is the loss probability cannot be improved significantly by increasing buffer size alone (after a certain size), one of the implications of having a heavy-tail. 120 6.3 Network traffic analysis It is not yet clear how the burstiness of ATM network traffic propagates through the network. Even though some studies have suggested that the traffic tends to become smoother at it traverses the network (see [13] for an example), others have concluded that it is the other way around (see [21], [39] and the self-similar traffic discussed in the previous section for examples). Given any specific traffic model for an ATM network, it would be worthwhile to quantify the burstiness of the traffic as it propagates through the network. Some efforts have been made towards the analysis of the traffic in an ATM network. As part of the initial step, Saito in [73] and Takine el al. in [78] studied the output process of a BMAP/G/1 and D-BMAP/D/l/iC queue respectively. More specifically, Takine el al. in [78] proved that the output process of a D-BMAP/D/1/X' queue is also a D-BMAP. Fonseca and Silvester [19] used a two-state M arkov M odu lated Bernoulli Process (MMBP, a special case of two-state D-BMAP) to approxi mate the output process of a D-BMAP/D/1/X queue and introduce a framework for the queueing networks with Markov modulated traffic flow. Simply speaking, having a uniform representation for the network traffic (note that joining several D-BMAP’s or probabilistically splitting a D-BMAP simply results in another D-BMAP or other D-BMAP’s), the network traffic can be analyzed in a similar way as we did for a single node. However, the overall network model is extremely complicated and 121 approximations seem to be inevitable. Thus, it is desirable to have an independence assumption like the well-known Klenrock’ s Independence Assumption for conven tional packet switching networks [35]. 6.4 Priority systems We have only studied the overall performance of the system. In some cases, it may be required to estimate the corresponding performance figures for each type of traffic. Also it may be necessary to provide priority to some traffic over others due to QOS requirements. This priority could be in terms of service priority (non-FIFO service) for delay sensitive traffic such as real-time voice traffic, or in terms of space priority (at the waiting buffer) for loss sensitive traffic such as data traffic, or both for compressed video signals, for example. Even though M /G /l systems with service priorities have been well studied, there have been little work on BMAP/G/1 (or even BMMPP/G/1) queueing systems with multiple priorities. Nevertheless, some related work exists in the literature. In [28], Herrmann studied the loss probability of each traffic class (two traffic classes were considered) of a D-BMAP+D-MAP/D/1/AT queueing system without priorities. Bae et al. [2] examined a single server (with an exponentially distributed service time) loaded with several traffic classes each of which is modeled by an MMPP. They studied individual packet loss for each traffic stream under a (space) 122 priority discarding scheme. Kofman and Korezlioglu [38] extended the results presented by Bae et al. in [2] to that of BMAP/M/1 queues. It would be interesting to investigate BMAP/G/1 queues that provide both space and service priorities. A priority queueing system with a reduced state space as the ones proposed in this research to make the results well-suited for real-time implementation would also be very useful. 6.5 Admission control algorithm One can use the results presented in this research as the framework to develop an admission control algorithm for high-speed packet-switching networks. Using a set of user-defined parameters (the traffic descriptors) for each traffic class, different performance measures, such as loss probability and expected buffer occupancy, can be computed in real-time. These measures can be used in conjunction with other factors such as QOS requirements of the traffic as the basis for admission control. If the user characterization is not reliable, we could measure traffic characteristics to determine parameter for our model. Some details remaining to be worked out are: (a) how to describe (or estimate) the traffic descriptors? Are we holding the network subscribers responsible for spec ifying their traffic descriptors or the network providers for making different choices of traffic descriptor sets available? The point is that network subscribers may not 123 know exactly how to describe their traffic. On the other hand, limiting the choice of traffic descriptor sets may not satisfy all users, (b) How to specify the QOS require ments? Some QOS measures including loss probability, average delay, delay bound, and delay jitter, have been considered in the literature some of which are end-to-end performance measures. For example, the delay jitter distribution is expected to be highly depended on the flow and congestion control algorithm (such as the Virtual Clock proposed in [85]) used by the network. The algorithm must be able to compute (or provide) not only the QOS to be received by the new connection request, but also determine the performance impact on the existing connections, (c) What kind of interaction between different functionalities of the traffic control algorithm should be considered? For example, given that the system is using a specific flow and congestion control algorithm, how does the admission control algorithm adjust itself to react to a certain undesired network condition such as network congestion? Thus, it may be necessary to consider the consequences of the interactions with the lower- level traffic control algorithm such as flow and congestion control and packet discarding policy. In other words, the function of admission control may be different from that of the lower-level controls, but, at least in some respects, it depends on the lower-level controls as well. 124 A p p e n d ix A L o ss P ro b a b ility fo r B M M P P /D /1 /X q u e u e s In this appendix we assume that the system under study is stable (meaning that the average system load is less than the average system capacity, i.e., with probabil ity one the time between two occurrences of an empty system is less then infinite) and both the average arrival rate and average batch size are finite. We then prove that (under steady state) the loss probability can be obtained directly from the expected number of losses versus the expected number of arrivals between two consecutive departures. We use the following notation for the BMMPP/D/1/K system: • Qi is the queue length of the BMMPP/D/1/K queue right after the ith departure; • F; is the phase of the underlying Markov chain of the BMMPP right after the ith departure; • A t is the number of arrivals between the ith and the (i+l)th departures; 125 • L, is the number of losses between the ith and the (i+l)th departures. From the definitions above it can be clearly seen thatv4; depends only on F t and that the relations between these random variables are given by: Qux - [ a + A - i i - l ] * a n d i; = [ A - ( * - & ) ] 4 (A-l) where [ jc]+ is defined to be m ax{0, x}. Thus, if we let X i = (Qt, F^Af) and = (Q^F^Li ) , it can be readily seen that X i+ 1 depends only on X t and YiJ rl depends only on Yt and that both {Xt} and {y;} are irreducible, positive recurrent (since the system is assumed to be stable) Markov chains with some steady state dis tribution, say, nx and n Y respectively. If we let the function f{X; ) = A i and observe that E nJf(Xf)\ = E [Af\ < 00, by applying the Strong Law o f Large Numbers for Markov Chains (Theorem 9.4 of [5]) we get the following expression: - ^[aj (a.2) '; =i ' v t = i / 126 Similarly, we can prove that: ,!“ (si**) - ^ From (A.2) and (A.3), we conclude that the cell loss probability can be readily obtained using: lim n — * ■ oo \ = 1 / 2 L‘ i = 1 n 2 * (A-4) 127 Bibliography [1] J. J. Bae and T. Suda, “Survey of Traffic Control Schemes and Protocols in ATM Networks,” Proc. IEEE, pp. 170-189, Feb. 1991. [2] J. J. Bae et al., “Analysis of Individual Packet Loss in a Finite Buffer Queue with Heterogeneous Markov Modulated Arrival Process: A study of Traffic Burstiness and Priority Packet Discarding,” in Proc. IEEE INFOCOM ‘ 92, pp. 2C.1.1-2C.1.12, 1992. [3] A. Baiocchi et al., “Loss Performance Analysis of an ATM Multiplexer Loaded with High-Speed On-Off Processes,” IEEE J. Select. Areas Commun., vol. 9, pp. 388-393, Apr. 1991. [4] Bell Communications Research, “Generic System Requirements in Support of Switched Multi-megabit Data Service,” Technical Reference, TR-TSV-000772, Issue 1, May 1991. [5] R. N. Bhattacharya and E. C. Waymire, Stochastic Process with Applications, New York, NY: John Wiley & Sons, 1990. [6] C. Blondia, “The N /G /l Finite Capacity Queue,” Stochastic Models, vol. 5, no. 2, pp. 273-294, 1989. [7] C. Blondia and O. Casals, “Performance Analysis of Statistical Multiplexing of VBR Sources,” in Proc. IEEE INFOCOM ’92, pp. 6C.2.1-6C.2.11. [8] P. T. Brady, “A Statistical Analysis of On-Off pattern in 16 Conversations,” Bell Systems Technical Journal, pp. 73-91, Jan. 1968. 128 [9] P. T. Brady, “A Model for Generating On-Off Speech Patterns in Two-Way Conversation,” Bell Systems Technical Journal, pp. 2445-2472, Sep. 1969. [10] G. L. Choudhury and D. M. Lucantoni, “Numerical Computation of Large Number of Moments with Application to Asymptotic Analysis,” to appear in Operations Research. [11] I. Cidon et al., “Bandwidth Management and Congestion Control in plaNET,” IEEE Commun. Mag., vol. 29, pp. 54-64, Oct. 1991. [12] J. N. Daigle and J. D. Langford, “Models for Analysis of Packet Voice Communications Systems,” IEEE J. Select. Areas Commun., vol. 4, pp. 847- 855, Sep. 1986. [13] B. S. Davie and A. Desclouz, “The Effects of Bursty Traffic on ATM Switching Systems,” Technical Report, TM-ARH-016175, Bell Communications Research, Feb. 1990. [14] L. Dittmann et al., “Flow Enforcement Algorithms for ATM Networks,” IEEE J. Select. Areas Commun., vol. 9, pp. 343-350, Apr. 1991. [15] S. S. Dixit and P. Skelly, “Video Traffic Smoothing and ATM Multiplexer Performance,” in Proc. IEEE GLOBECOM ’91, pp. 8B3.1-8B3.4. [16] A. E. Eckberg, “The Single-Server Queue with Periodic Arrival Process and Deterministic Service Time,” IEEE Trans. Commun., vol. 27, pp. 556-562, Mar. 1979. [17] A. E. Eckberg et al., “Controlling Congestion in B-ISDN/ATM: Issues and Strategies,” IEEE Commun. Mag., vol. 29, pp. 64-70, Sep. 1991. [18] J. M. Ferrandiz and A. A. Lazar, “Admission Control for Real-Time Packet Sessions,” in Proc. IEEE INFOCOM ’91, pp. 6A.2.1-6A.2.7. [19] N. L. S. Fonseca and J. A. Silvester, “Modeling the Out Put Process of an ATM Multiplexer with Markov Modulated Arrivals,” in Proc. IEEE ICC ’94, pp. 721-725, 1994. [20] H. Gilbert et al., “Developing a Cohesive Traffic Managements Strategy for ATM Networks,” IEEE Commun. Mag., vol. 29, pp. 36-45, Oct. 1991. 129 [21] S. J. Golestani, “A Framing Strategy for Congestion Management,” IEEE J. Select. Areas Commun., vol. 9, pp. 1064-1077, Sep. 1991. [22] R. L. Graham, Concrete Mathematics: A Foundation fo r Computer Science, Menlo Park, CA: Addison-Wesley, 1989. [23] R. Grunenfelder et al., “Characterization of Video Codecs as Autoregressive Moving Average Processes and Related Queueing System Performance,” IEEE J. Select. Areas Commun., vol. 9, pp. 284-293, Apr. 1991. [24] R. Guerin et al., “Equivalent Capacity and Its Application to Bandwidth Allocation in High-Speed Networks,” IEEE J. Select. Areas Commun., vol. 9, pp. 968-981, Sep. 1991. [25] I. W. Habib and T. N. Saadawi, “Controlling Flow and Avoiding Congestion in Broadband Networks,” IEEE Commun. Mag., vol. 29, pp. 46-53, Oct. 1991. [26] R. Handel, “Evolution of ISDN Toward Broadband ISDN,” IEEE Network, vol. 3, pp. 7-13, Jan. 1989. [27] H. Heffes and D. M. Lucantoni, “A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance,” IEEEJ. Select. Areas Commun., vol. 4, pp. 856-868, Sep. 1986. [28] C. Herrmann, “Discrete-Time Models for Connection Admission Control (CAC) in ATM,” in Proc. 2nd Workshop on Performance M odeling and Evaluation o f ATM Networks, pp. 25.1-25.12, Jul. 1994. [29] D. Hong and T. Suda, “Congestion Control and Prevention in ATM Networks,” IEEE Network Mag., pp. 10-16, Jul. 1991. [30] D. Hong et at., “Survey of Techniques for Prevention and Control of Congestion in an ATM Network,” in Proc. ICC V I, pp. 6.5.1-6.5.7. [31] J. Y. Hui, “Resource Allocation for Broadband Networks,” IEEE J. Select. Areas Commun., vol. 6, pp. 1598-1608, Dec. 1988. [32] H. E. Hurst, “Long-Term Storage Capacity of Reservoirs,” Trans. Amer. Soc. Civil Engineers, vol. 116, pp.770-799, 1951. 130 [33] I. Ide, “Superposition of Interrupted Poisson Processes and Its Application to Packetized Voice Multiplexers,” in Proc. ITC ‘ 88, pp. 3.1B2. [34] I. Khan and V. O. K. Li, “Performance Analysis at an ATM Statistical Multiplexer Serving a Superposition of Bursty Traffic Sources,” in Proc. ISCA/ACM International Conference on Computer Communications and Networks, San Diego, June 1993, pp. 421-425. [35] L. Kleinrock, Queueing Systems, VolII: Computer Applications, John Wiley & Sons, New York, NY, 1976. [36] L. Kleinrock, “ISDN-The Path to Broadband Networks,” Proc. IEEE, vol. 79, pp. 112-117, Feb. 1991. [37] C. Knessl and B. J. Matkowsky, “A Markov Modulated M /G/l Queue I: Stationary Distribution,” Queueing Systems, vol. 1, pp. 355-374, 1987. [38] D. Kofman and H. Korezlioglu, “Loss Probabilities and Delay and Jitter Distributions in a Finite Buffer Queue with Heterogeneous Batch Markovian Arrival Processes,” in Proc. IEEE GLOBECOM ‘93, pp. 830-834, 1993. [39] R. Krishnan et al., “Jitter at an ATM Multiplexer in the Presence of Correlated Traffic,” Technical Report, CEng 94-14, EE-Systems, USC, Apr. 1994. [40] S. S. Lam et al., “An Algorithm for Lossless Smoothing of MPEG Video,” to appear in Proc. A C M SIGCOMM ‘94, 1994. [41] A. A. Lazar and G. Pacifici, “Control of Resources in Broadband Networks with Quality of Service Guarantees,” IEEE Commun. Mag., pp. 66-73, Oct. 1991. [42] A. A. Lazar et al., “Real-Time Traffic measurements on MAGNET II,” IEEE J. Select. Areas Commun., Vol. 8. pp. 467-483, Apr. 1990. [43] D. Le Gall, “MPEG: A Video Compress for Multimedia Applications,” Commun. ACM, vol. 34, pp. 46-58, Apr. 1991. [44] W. E. Leland et al., “On the Self-Similar Nature of Ethernet Traffic (Extended Version),” IEEE/ACM Trans. Networking, vol. 2, pp. 1-15, Feb. 1994. 131 [45] S.-Q. Li, “A General Solution Technique for Discrete Queueing Analysis of Multimedia Traffic on ATM,” IEEE Trans. Commun., vol. 39, pp. 1115-1132, Jul. 1991. [46] S.-Q. Li, “Study of Information Loss in Packet Voice Systems,” IEEE Trans. Commun., vol. 37, pp. 1192-1202, Nov. 1989. [47] M. Liebhold and E. M. Hoffert, “Toward an Open Environment for Digital Video,” Commun. ACM, vol. 34, pp. 103-112, Apr. 1991. [48] A. Y.-M. Lin and J. A. Silvester, “Priority Queueing Strategies and Buffer Allocation Protocols for Traffic Control at an ATM Integrated Broadband Switching System,” IEEE J. Select. Areas Commun., vol. 9, pp. 1524-1536, Dec. 1991. [49] M. L. Liou, “Overview of the pX64 kbps Video Coding Standard,” Commun. ACM, Apr. 1991. [50] D. M. Lucantoni, “New Results on the Single Server Queue with a Batch Markov Arrival Process,” Stochastic Models, vol. 7, no. 1, pp. 1-46, 1991. [51] D. M. Lucantoni, “The BMAP/G/1 Queue: A Tutorial,” in Models and Techniques for Performance Evaluation o f Computer and Communications Systems, Eds: L. Donatiello and R. Nelson, Springer Verlag, 1993. [52] D. M. Lucantoni and M. F. Neuts, “The Customer Delay in a Single Server Queue with a Batch Markovian Arrival Process,” submitted for publication. [53] B. Maglaris et al., “Performance Models of Statistical Multiplexing in Packet Video Communications,” IEEE Trans. Commun., vol. 36, pp. 834-844, Jul. 1988. [54] S. E. Minzer, “Broadband ISDN and Asynchronous Transfer Mode (ATM),” IEEE Commun. Mag., vol. 27, pp. 17-24, Sep. 1989. [55] B. Mukherjee, “Integrated Voice-Data Communications Over High-Speed Fiber Optic Networks,” Computer, pp. 49-58, Feb. 1991. [56] T. Murase et al., “A Call Admission Control Scheme for ATM Networks Using a Simple Quality Estimate,” IE EE J. Select. Areas Commun., vol. 9, pp. 1461- 1470, Dec. 1991. 132 [57] T. Murase et al., “A Call Admission Control for ATM Networks Based on Individual Multiplexed Traffic Characteristics,” in Proc. IEEE INFOCOM ’91, pp. 6.3.1-6.3.6 [58] R. Nagarajan et al., “Approximation Techniques for Computing Packet Loss in Finite-Buffered Voice Multiplexers,” IEEE J. Select. Areas Commun., vol. 9, pp. 368-377, Apr. 1991. [59] M. F. Neuts, Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach, Baltimore, MD: Johns Hopkins Univ. Press, 1981. [60] M. F. Neuts, “A Versatile Markovian Point Process,” J. Applied Prob., vol. 16, pp.764-779, Dec. 1979. [61] M. Nomura et al., “Basic Characteristics of Variable Rate Video Coding in ATM Environment,” IEEE J. Select. Areas Commun., vol. 7, pp. 752-760, Jun. 1989. [62] T. Okada et al., “Traffic Control in Asynchronous Transfer Mode,” IEEE Commun. Mag., vol. 29, pp. 58-62, Sep. 1991. [63] N. U. Prabhu and Y. Zhu, “Markov Modulated Queueing Systems,” Queueing Systems, vol. 5, pp. 215-246, 1989. [64] G. Ramamurthy and R. S. Dighe, “A Multidimensional Framework for Congestion Control in B-ISDN,” IEEE J. Select. Areas Commun., vol. 9, pp. 1440-1451, Dec. 1991. [65] G. Ramamurthy and R. S. Dighe, “Distributed Source Control: A Network Access Control for Integrated Broadband Packet Networks,” IEEE J. Select. Areas Commun., vol. 9, pp. 990-1002, Sep. 1991. [66] G. Ramamurthy and B. Sengupta, “Delay Analysis of a Packet Voice Multiplexer by the 2D,/D/1 Queue,” IEEE Trans. Commun., vol. 39, pp. 1107- 1114, Jul. 1991. [67] V. Ramaswami, “The N /G /l Queue and Its Detailed Analysis,” Adv. Appl. Prob., vol. 12, pp. 222-261, Mar. 1980. 133 [68] C. Rasmussen et al., “Source-Independent Call Acceptance Procedures in ATM Networks,” IEEE J. Select. Areas Commun., vol. 9, pp. 351-358, Apr. 1991. [69] E. P. Rathgeb, “Modeling and Performance Comparison of Policing Mechanisms for ATM Networks,” IEEE J. Select. Areas Commun., vol. 9, pp. 325-334, Apr. 1991. [70] K. R. Raymond nd E. A. Walvick, “Broadband, An Evolution,” in Proc. IEEE ICC V I, pp. 39.6.1-39.6.6. [71] J. W. Roberts, “Variable-Bit-Rate Traffic Control in B-ISDN,” IEEE Commun. Mag., vol. 29, pp. 50-56, Sep. 1991. [72] I. Rubin and T. Cheng, “Admission Control for Multi-Layer Management of High-Speed Packet-Switched Networks under Observation Noise,” in Proc. IEEE INFOCOM V I, pp. 6A.4.1-6A.4.9. [73] H. Saito, “The Departure Process of an N /G /l Queue,” Performance Evaluation, vol 11. pp. 241-251, 1990. [74] H. Saito and K. Shiomoto, “Dynamic Call Admission Control in ATM Networks,” IEEE J. Select. Areas Commun., vol. 9, pp. 982-989, Sep. 1991. [75] P. Sen et al., “Models for Packet Switching of Variable-Bit-Rate Video Sources,” IEEEJ. Select. Areas Commun., vol. 7, pp. 865-869, Jun. 1989. [76] C. Shim et al., “Modeling and Call Admission Control Algorithm of Variable Bit Rate Video in ATM Networks,” IEEE J. Select. Areas Commun., vol. 12, pp. 332-344, Feb. 1994. [77] K. Sriram and W. Whitt, “Characterizing Superposition Arrival Processes in Packet Multiplexers for Voice and Data,” IEEE J. Select. Areas Commun., vol. 4, pp. 833-846, Sep. 1986. [78] T. Takine et al., “Cell Loss and Output Process Analysis of Finite Buffer Discrete Time Queueing System with Correlated Arrivals,” in Proc. IEEE INFOCOM V3, pp. 1259-1268, 1993. 134 [79] R. C. F. Tucker, “Accurate Method for Analysis of a Packet-Speech Multiplexer with Limited Delay,” IEEE Trans. Commun., vol. 36, pp. 479-483, Apr. 1988. [80] W. Verbiest, “The Impact of the ATM Concept in Video Coding,” IEEE J. Select. Areas Commun., vol. 6, pp. 1623-1632, Dec. 1989. [81] G. K. Wallace, “The JPEG: A Video Compression Standard for Multimedia Applications,” Commun. ACM, vol. 34, pp. 46-58, Apr. 1991. [82] G. M. Woodruff and R. Kositpaiboon, “Multimedia Traffic Management Principles for Guaranteed ATM Network Performance,” IEEE J. Select. Areas Commun., vol. 8, pp. 437-446, Apr. 1990. [83] J. Ye and S.-Q. Li, “Analysis of Multimedia Traffic Queues with Finite Buffer and Overload Control-Part 1: Algorithm,” in Proc. IEEE INFOCOM ‘91, pp. 12c.3.1-12c.3.11. [84] C. Yuan and J. A. Silvester, “Queueing Analysis of Delay Constrained Voice Traffic in a Packet Switching System,” IEEE J. Select. Areas Commun., vol. 7, pp. 729-738, Jun. 1989. [85] L. Zhang, “Virtual Clock: A New Traffic Control Algorithm for Packet- Switched Networks,” AC M Trans. Computer Systems, vol. 9, no. 2, pp. 101- 124, May 1991. [86] Y. Zhu, “A Markov Modulated M/M/1 Queue with Group Arrival,” Queueing Systems, vol. 8, pp. 255-264, Apr. 1991. 135
Linked assets
University of Southern California Dissertations and Theses
Conceptually similar
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
PDF
00001.tif
Asset Metadata
Core Title
00001.tif
Tag
OAI-PMH Harvest
Permanent Link (DOI)
https://doi.org/10.25549/usctheses-oUC11255799
Unique identifier
UC11255799
Legacy Identifier
DP22895