A Flow Control Strategy for Connectionless Traffic over an ATM - - PowerPoint PPT Presentation

a flow control strategy for connectionless traffic over
SMART_READER_LITE
LIVE PREVIEW

A Flow Control Strategy for Connectionless Traffic over an ATM - - PowerPoint PPT Presentation

0 A Flow Control Strategy for Connectionless Traffic over an ATM Network Lorne G. Mason INRS-Telecommunications University of Quebec, Nuns Island, Quebec H3E 1H6 e-mail: lgmason@telusplanet.net Felisa J. V azquez-Abad Department of Computer


slide-1
SLIDE 1

A Flow Control Strategy for Connectionless Traffic over an ATM Network

Lorne G. Mason INRS-Telecommunications University of Quebec, Nuns Island, Quebec H3E 1H6 e-mail: lgmason@telusplanet.net Felisa J. V´ azquez-Abad Department of Computer Science and Operations Research University of Montreal, Montreal, Quebec H3C 3J7 e-mail: vazquez@iro.umontreal.ca and Bernard Kamt´ e INRS-Telecommunications University of Quebec, Nuns Island, Quebec H3E 1H6 e-mail: kampte@inrs-telecom.uquebec.ca Annual Research Conference Canadian Institute for Communications Research, Montebello, Quebec, August 1998.

slide-2
SLIDE 2

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 1

Network Architecture: Large Scale Network with Connectionless Servers

X X LAN LAN LAN LAN CLS X X X CLS X X CLS X CLS X X = LAN gateway = CLS on top of ATM switch = ATM switch Permanent VP ATM cells Physical Layer ATM Layer ATM switch Permanent VP ATM cells CLS on top of ATM switch Physical Layer ATM Layer CLS IP frames IP routing AAL (SAR) ATM cells ATM cells Permanent VP ATM cells Physical Layer ATM Layer ATM switch Permanent VP ATM cells UNI at dest. gateway Physical Layer AAL Layer ATM Layer IP frames gateway UNI at source Physical Layer AAL Layer ATM Layer IP frames

  • At the gateway of the source LAN, IP frames are segmented into cells.
  • CLS: IP frames are reassembled (AAL5) for IP routing and further (re)segmented for transmission.
  • The CLS network is a virtual network on top of the ATM network.
slide-3
SLIDE 3

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 2

CLS: Packet Forwarding (AAL5) and Cell Forwarding (AAL3/4) Connectionless Server: Located at the Gateways, the CLS are responsible for segmentation and routing of IP-frames within the ATM Network, called “Forwarding”. We shall consider two different Forwarding Techniques: packet forwarding, which uses the AAL5, and cell forwarding, which uses AAL3/4. AAL5

  • IP-frames are reassembled at the CLS, routed and (re)-segmented into cells for transmission by the ATM

network.

  • The packet ID is not required: only the first and the last cells of the IP-frame need to be known.
  • Since packet ID is not required, there is more room for information in cells from IP-frames.
  • Since segmentation and re-assembly are required, delays are introduced for IP-frames.

AAL3/4

  • Each cell has a packet ID identifying the IP-frame to which it belongs.
  • Reassembly and segmentation are not necessary at CLS, since cells are routed according to:

– Identification of the IP-frame to which they belong – If first cell from a given IP-frame, a route is chosen by the CLS and kept in memory. – Subsequent cells from the same IP-frame are identified and routed as the first cell.

  • Since packet ID is required, there is less room for information in cells from IP-frames.
  • Since cells are routed inmediately at the CLS without waiting for other cells from the same IP-frame,

end-to-end delays of IP-frames may be reduced.

slide-4
SLIDE 4

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 3

Network Access Structure: Packet Selective Window (PSW)

| | | | | | | | | |

yes

Wi = 0 To the link access queue

Reject no

no Wi = Wi - n Wi cells n cells Wi >= n VBR cells

yes

Accept Accept Wi >= 1 Wi = Wi-1 ABR & UBR packet (of length n) Wi = Wi+1 Wi > 0 Q > 0 Q: ABR/UBR cells waiting for permits 1 cell

yes

(conservative policy) Permit Arrival from Controllers

Picture Depicting LAN Gateway at node i. Wi: number of virtual permits at node i. Since real-time traffic is always accepted, Wi can be negative. Conservative: Upon arrival of a ABR/UBR packet with n cells, if 0 < Wi < n, then Wi cells are routed towards the link access queue at that node and n − Wi wait in queue for permits. Aggresive: Upon arrival of a ABR/UBR packet with n cells, if Wi > 0, all cells are accepted and routed towards the link access queue at that node. There is no queue to wait for permits, and Wi = Wi − n. Link Access Structure: VBR cells routed towards a link are placed at a finite capacity buffer with high priority, others are placed at an inifinite buffer queue.

slide-5
SLIDE 5

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 4

Network Performance Packet Classes:

  • VBR: Real-time video, voice, MMPP model, highest priority
  • ABR: Connection oriented data, Poisson process
  • UBR: Internet sources: connectionless data, Self Similar Process

We assume that VBR cells are subject to some access control, the traffic arriving in our model is already the accepted one. Thus, only IP frames and ABR data traffic are subject to our packet selective window. For a given window size W, the Product of Powers of class c is given by: P(W) =

  • (o,d)

λc

  • ,d

T c

  • ,d

λc

  • ,d :

Effective class c cell throughput from origin o to destination d T c

  • ,d :

End-to-end delay of class c cells with origin o and destination d. This performance measure considers the optimization compromise between reducing delays and increasing throughputs. Maximizing performance then gives a Pareto equilibrium solution. We consider the optimization problem of Maximizing the Product of Powers of UBR cells. Implementation Issues:

  • Realistic Trafic Models: Internet traffic shows self similar behaviour: the arrival process has statistical

properties that are very different from those of Poisson processes. We compare here the performance under Poisson and Self Similar UBR sources. We use sgen, a generator developped by Pedro Iv´ an S´ anchez.

  • Scalability: End-to-end delay and throughputs are global quantities that must be estimated along several

nodes in the network. Growth in network size may therefore produce a geometric increase in computational effort required for accurate estimation. We study a hierarchichal structure that addresses this problem.

slide-6
SLIDE 6

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 5

Self-Similar Traffic Call Xn the number of packet arrivals during the n-th unit of time. If the arrival process is a Poisson process then {Xn} are i.i.d. variables with Poisson distribution. In this case, the aggreagated process: X(m)

n

= Xnm+1 + . . . + X(n+1)m m has also i.i.d. components and satisfies v(m) = Var(X(m)

1

) = m−1Var(X1). Arrival processes where the correlation between Xn and Xn+l decreases fast as l increases are called short range dependent and also satisfy v(m) ≈ m−1 for large m. Internet traffic, however, does not seem to adjust to this behaviour. Due to long range correlations, the variance decreases slower. Defnition: A stationary process {Xn} is a Second Order Self Similar process with self-similarity (or Hurst) parameter H if the process {Y (m)} defined as: Y (m,H)

n

= Xnm+1 + . . . + X(n+1)m mH has the same finite dimensional distribution as {Xn}. In particular, it satisfies v(m) = m−2H−2Var(X1). Internet traffic is not actually a stationary self similar process, but statistical tests from real data support the hypothesis that it is asymptotically second order self-similar with a Hurst parameter of H ≈ 0.8, namely that: ∀l > 0, Y (m,H)

n L

= Y (m+l,H)

n

, and v(m) = m−2H−2σ, for large m. Remark: Poisson arrivals are asymptotically self-similar processes with H = 0.5. Larger values of H yield more “variability” or longer dependence, since v(m) decreases more slowly. Since for H ≈ 1, the aggregate process {X(m)

n

} L = {Xn}, in this case averaging does not decrease the variance and we cannot use the standard Central Limit Theorem to estimate means.

slide-7
SLIDE 7

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 6

Aggregate Process Visual Test: The plots show the processes {X(m)

n

} with increasing aggregation level m, on top for our Self-Similar data, and bottom for a Poisson process with the same mean value.

  • For Poisson arrivals the variability decreases noticeably as the aggregation level m grows,
  • The Self Similar traffic source presents a slower decreasing variance, with almost identical behaviour of

averaged processes, regardless of the level m of aggregation.

  • The visual test therefore supports the conjecture that H > 0.5 for our UBR generated data.

1.2 1.4 1.6 1.8 2 2.2 2.4 50 100 150 200 250 300 350 400 450 500 S-S: Aggregation analysis, aggregation level 50 X^(50) 1.2 1.4 1.6 1.8 2 2.2 2.4 50 100 150 200 250 300 350 400 450 500 S-S: Aggregation analysis, aggregation level 100 X^(100) 1.2 1.4 1.6 1.8 2 2.2 2.4 50 100 150 200 250 300 350 400 450 500 S-S: Aggregation analysis, aggregation level 500 X^(500) 1.2 1.4 1.6 1.8 2 2.2 2.4 50 100 150 200 250 300 350 400 450 500 Poisson: Aggregation analysis, aggregation level 50 X^(50) 1.2 1.4 1.6 1.8 2 2.2 2.4 50 100 150 200 250 300 350 400 450 500 Poisson: Aggregation analysis, aggregation level 100 X^(100) 1.2 1.4 1.6 1.8 2 2.2 2.4 50 100 150 200 250 300 350 400 450 500 Poisson: Aggregation analysis, aggregation level 500 X^(500)

slide-8
SLIDE 8

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 7

Estimation of H: The variance aggregation test uses the data {Xn} to estimate v(m) for increasing m. For a sample of N = 250000 values, for example, v(50) is estimated using 5000 batches of size 50 each. For self-similar processes log[v(m)] = C + (2H − 2) log(m), for large m. The package sanal uses the least squares method to fit a straight line through the coresponding points from

  • ur data file. Below we show the results for our self-similar generated data and to the right, for the Poisson

process.

  • 3.2
  • 3
  • 2.8
  • 2.6
  • 2.4
  • 2.2
  • 2
  • 1.8

1 1.5 2 2.5 log10(variance) log10(aggregation level) Variance/Aggregation analysis on 24 points, H= 0.798045 Linear fit Variance/Aggregation points

  • 3
  • 2.5
  • 2
  • 1.5
  • 1
  • 0.5

1 1.5 2 2.5 log10(variance) log10(aggregation level) Variance/Aggregation analysis on 24 points, H= 0.511294 Linear fit Variance/Aggregation points

Estimated Hurst Parameter:

  • ˆ

H = 0.798 for Self-Similar Traffic

  • ˆ

H = 0.511 for Poisson Traffic

slide-9
SLIDE 9

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 8

Comparison, Model 1: Poisson vs Self-Similar

2000 2100 2200 2300 2400 2500 2600 2700 1.6 1.8 2 2.2 2.4 2.6 2.8 x 10

−4

Number of permits (W) Product of powers (nth root) Product of powers (AAL5, conservative): Poisson vs S−S

S−S Poisson

2000 2100 2200 2300 2400 2500 2600 2700 0.7 0.71 0.72 0.73 0.74 0.75 0.76 0.77 0.78 0.79 0.8 Number of permits (W) Blocking probability Blocking probability (AAL5, conservative): Poisson vs S−S

S−S Poisson

AAL5 under conservative PSW. Product of Powers (left), Blocking Probability (right)

2000 2100 2200 2300 2400 2500 2600 2700 1.8 2 2.2 2.4 2.6 2.8 3 x 10

−4

Number of permits (W) Product of powers (nth root) Product of powers (AAL3/4, agressive): Poisson vs S−S

S−S Poisson

2000 2100 2200 2300 2400 2500 2600 2700 0.7 0.71 0.72 0.73 0.74 0.75 0.76 0.77 0.78 0.79 Number of permits (W) Blocking probability Blocking probability (AAL3/4, agressive): Poisson vs S−S

S−S Poisson

AAL3/4 under aggresive PSW. Product of Powers (left), Blocking Probability (right) Remarks: Behaviour is similar, but performance is worst for Self-Similar traffic.

slide-10
SLIDE 10

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 9

Simulated Network, Model 1 The central controller is in charge of distributing the permits for access control (PWS). All trunks have the same length 17.7 Kms as well as the same capacity, of 150 Mbs. Therefore, the cell transmission time is δ = 3.37 × 10−7 secs, and the propagation delay is 6 × 10−5 seconds. All incoming packets have a geometrically distributed number of cells.

2 3 4 1 CLS Centralized controller

  • UBR traffic: Self-Similar (or Poisson) with rate

λ1 = 53, 000 packets per second, average num- ber of cells in packet is 20.

  • ABR traffic: Poisson with rate λ2 = 27, 000

packets per second, average number of cells in packet is 40.

  • VBR traffic: MMPP with parameters r1 =

r2 = 6.7 × 10−5 secs, λ3(1) = 403, 500, λ3(2) = cells per second.

slide-11
SLIDE 11

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 10

Comparison, Model 1: Conservative vs Aggresive, Self-Similar Traffic

2000 2100 2200 2300 2400 2500 2600 2700 1.65 1.7 1.75 1.8 1.85 1.9 1.95 2 2.05 x 10

−4

Number of permits (W) Product of powers (nth root) Product of powers (S−S, AAL5): agr. vs cons.

agr. cons.

2000 2100 2200 2300 2400 2500 2600 2700 0.73 0.74 0.75 0.76 0.77 0.78 0.79 0.8 0.81 Number of permits (W) Blocking probability Blocking probability (S−S, AAL5): agr. vs cons.

agr. cons.

  • AAL5. Product of Powers (left), Blocking Probability (right)

2000 2100 2200 2300 2400 2500 2600 2700 1.75 1.8 1.85 1.9 1.95 2 2.05 2.1 x 10

−4

Number of permits (W) Product of powers (nth root) Product of powers (S−S, AAL3/4): agr. vs cons.

agr. cons.

2000 2100 2200 2300 2400 2500 2600 2700 0.73 0.74 0.75 0.76 0.77 0.78 0.79 0.8 0.81 Number of permits (W) Blocking probability Blocking probability (S−S, AAL3/4): agr. vs cons.

agr. cons.

AAL3/4. Product of Powers (left), Blocking Probability (right) Remarks: The Product of Powers is higher under Aggresive PSW. Poisson traffic has similar behaviour.

slide-12
SLIDE 12

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 11

Comparison, Model 1: AAL3/4 vs AAL5, Self-Similar Traffic

2000 2100 2200 2300 2400 2500 2600 2700 1.75 1.8 1.85 1.9 1.95 2 2.05 2.1 x 10

−4

Number of permits (W) Product of powers (nth root) Product of powers (S−S, agressive): AAL3/4 vs AAL5

AAL3/4 AAL5

2000 2100 2200 2300 2400 2500 2600 2700 0.73 0.74 0.75 0.76 0.77 0.78 0.79 0.8 0.81 Number of permits (W) Blocking probability Blocking probability (S−S, agressive): AAL3/4 vs AAL5

AAL3/4 AAL5

Aggresive PSW. Product of Powers (left), Blocking Probability (right)

2000 2100 2200 2300 2400 2500 2600 2700 1.65 1.7 1.75 1.8 1.85 1.9 1.95 2 2.05 x 10

−4

Number of permits (W) Product of powers (nth root) Product of powers (S−S, conservative): AAL3/4 vs AAL5

AAL3/4 AAL5

2000 2100 2200 2300 2400 2500 2600 2700 0.73 0.74 0.75 0.76 0.77 0.78 0.79 0.8 0.81 Number of permits (W) Blocking probability Blocking probability (S−S, conservative): AAL3/4 vs AAL5

AAL3/4 AAL5

Conservative PSW. Product of Powers (left), Blocking Probability (right) Remarks: Behaviour is similar, but AAL3/4 outperforms AAL5. Similarly for Poisson traffic.

slide-13
SLIDE 13

Lorne G. Mason, Felisa J. V´ azquez-Abad and Bernard Kamt´ e 12

Scalability: Window Management and Estimation by Zones

4 CLS 5 CLS 1 2 3 7 8 6 Controller A Controller B Gateway A Gateway B

  • Network Topology: divided by zones.
  • Gateways: entry points to zones, with CLS.
  • Window Size: there are WA permits circulating

in zone A and WB in zone B.

  • Decentral Controllers: they gather permits

from the local destimations as well as from cells exiting the zone. These latter are sent by the Gateways to the local controller. Let PA =

  • ∈A,d

λo,d To,d , so that the global product of powers is PAPB. Call G(A) and G(B) the Gateways at the respective zones. The following result allows us to use local estimation to produce a scalable control. Theorem 1 The best approximation to the product of powers PA using only one statistics from Zone B and all local information from Zone A is given by: ˆ P(A) =

  • {o∈A,d∈A}

λo,d To,d

  • ∈A,d∈A

λo,d To,G(A) + T(G(A),G(B)) + ˆ TB , where ˆ TB = 1 NB

  • d∈B

TG(B),d is the arithmetic mean delay in Zone B, Nb being the total number of origin-destination pairs in Zone B. Hierachical Estimation: Each zone estimates the local delays and all throughputs. Gateways gather this information to pass the arithmetic mean zone delay to other Gateways. The global Product of Powers can thus be estimated with minimal information exchange at the controllers.