the timing capacity of single server queues with multiple
play

The Timing Capacity of Single-Server Queues with Multiple Flows Xin - PowerPoint PPT Presentation

The Timing Capacity of Single-Server Queues with Multiple Flows Xin Liu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana Champaign March 14, 2003 UIUC


  1. ✬ ✩ The Timing Capacity of Single-Server Queues with Multiple Flows Xin Liu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana Champaign March 14, 2003 ✫ ✪ UIUC

  2. ✌ ✍ ✍ ✍ ✍ ✍ ✍ ✍ ✍ ✍ ✍ ✌ ✍ ✌ ✌ ✌ ✌ ✌ ✌ ✌ ✌ ✌ ✌ ✍ ✍ ✏ ✎ ✏ ✏ ✏ ✏ ✏ ✏ ✏ ✎ ✎ ✎ ✍ ✎ ✎ ✎ ✎ ✎ ✎ ✎ ✎ ✎ ✎ ✌ ✌ ☞ ☛ ☛ ☛ ☛ ☛ ☛ ☞ ☛ ☛ ☛ ✏ ✏ ✏ ✏ ✏ ☛ ☛ ☛ ☞ ☞ ☞ ☞ ☛ ☞ ☞ ✏ ☞ ☞ ☛ ☞ ☞ ☞ ☞ ✫ ✬ • Information can be transmitted through the timing-intervals between messages/events ✒✁✒✁✒✁✒✁✒✁✒ ✑✁✑✁✑✁✑✁✑✁✑ ✠✁✠✁✠✁✠✁✠✁✠✁✠ ✡✁✡✁✡✁✡✁✡✁✡✁✡ Timing Channel 0 ✞✁✞✁✞✁✞✁✞✁✞✁✞ ✟✁✟✁✟✁✟✁✟✁✟✁✟ 1 ✓✁✓✁✓✁✓✁✓✁✓✁✓ ✔✁✔✁✔✁✔✁✔✁✔✁✔ 1 UIUC 0 1 ✝✁✝✁✝✁✝✁✝✁✝✁✝ ✆✁✆✁✆✁✆✁✆✁✆✁✆ 0 0 ☎✁☎✁☎✁☎✁☎✁☎✁☎ ✄✁✄✁✄✁✄✁✄✁✄✁✄ 1 1 ✂✁✂✁✂✁✂✁✂✁✂ �✁�✁�✁�✁�✁� ✪ ✩

  3. ✬ ✩ Distortion • Distortion of timing information • Queueing is a mechanism that naturally blurs the timing information ✫ ✪ UIUC 2

  4. ✬ ✩ Multiple Flows What is the sum timing capacity? ✫ ✪ UIUC 3

  5. ✬ ✩ Interference Flow • What is the timing capacity of a flow when there exists uncontrollable and undetectable cross traffic? ✫ ✪ UIUC 4

  6. ✬ ✩ An Exponential Server Queue • Interference flow: Poisson arrival with rate λ I • Service time distribution for all packets: i.i.d. exponentially distributed with mean 1 /µ D 1 D D 2 3 A 1 A 3 A 2 ✫ ✪ UIUC 5

  7. ✬ ✩ A Lower Bound on Capacity • Service discipline: FIFO • A lower bound on the timing capacity is � µ − λ I � C L ( λ 0 ) = λ 0 log , λ 0 where λ 0 + λ I ≤ µ . • Input process: Poisson with rate λ 0 . • Special case: λ I = 0 C ( λ 0 ) = λ 0 log µ . λ 0 ✫ ✪ UIUC 6

  8. ✬ ✩ Intuition D 1 D D 3 2 S S 3 S 2 1 A 1 A 2 A 3 • Randomness is caused by queue and service time • Effective service time is exponentially distributed with mean 1 / ( µ − λ I ). ✫ ✪ UIUC 7

  9. ✬ ✩ Proof I ( A n ; D n ) h ( D n ) + h ( A n ) − h ( D n , A n ) = (1) h ( D n ) + h ( A n ) − h ( S n , A n ) = h ( D n ) − h ( S n | A n ) = h ( D n ) − h ( S n ) ≥ n � h ( D n ) − ≥ h ( S i ) i =1 n n � � � � log 1 1 (2) � � = + 1 − log + 1 λ 0 µ − λ I i =1 i =1 n log µ − λ I � = , λ 0 ✫ ✪ i =1 UIUC 8

  10. ✬ ✩ Number of Effective Interfering Packets • n i : number of effective interfering packets ∞ � P ( n i = k ) = π ( j ) p ( k | j ) j = k ∞ � = p ( k | k ) π ( k ) + p ( k | j ) π ( k ) j = k +1 ∞ (1 − ρ ) ρ k (1 − q 0 ) k + � (1 − ρ ) ρ j (1 − q 0 ) k q 0 = j = k +1 � k � � λ I � 1 − λ I = , k = 0 , 1 , 2 , · · · µ µ λ 0 q 0 = λ 0 + λ I : probability a packet belongs to flow 0 ✫ ✪ UIUC 9

  11. ✬ ✩ Effective Service Time • n i + 1: geometrically distributed with mean µ/ ( µ − λ I ) • Effective service time: sum of n i + 1 independent and exponentially distributed random variable is exponential with mean E ( S i ) = 1 1 µE ( n i + 1) = . µ − λ I ✫ ✪ UIUC 10

  12. ✬ ✩ Multiple Flows • N : number of flows • B = log N bits for address • Service times are i.i.d. exponentially distributed. ✫ ✪ UIUC 11

  13. ✬ ✩ A Lower Bound • The arrival process of each flow is an independent Poisson process with rate λ i , � λ i ≤ µ . • Consider all other flows as interference. ✫ ✪ UIUC 12

  14. ✬ ✩ A Lower Bound Cont’d • We have � µ − � j � = i λ j � � C ≥ λ i log . λ i i • Lower bound is maximized when all users have the same arrival rate. • Maximize over λ C ≥ ( B − 1 − log B ) µ. ✫ ✪ UIUC 13

  15. ✬ ✩ Theorem • Theorem: The timing capacity of the N flows satisfies ( B − 1 − log B ) µ ≤ C ≤ Bµ. • Upper bound holds because the overall information capacity cannot exceed Bµ for B ≥ 2 bits. ✫ ✪ UIUC 14

  16. ✬ ✩ The Upper Bound • X n : information sent through the packets I ( X n , D n ; X n , A n ) I ( D n ; X n , A n ) + I ( X n ; X n , A n | D n ) = (1) I ( D n ; A n ) + I ( X n ; X n ) = (2) ≤ µB, • (1): X n contains no additional information regarding D n other than that in A n . • (2): if B > 1 bit, the system capacity is µ B. ✫ ✪ UIUC 15

  17. ✬ ✩ Timing Capacity of Multiple Flows • The arrival process of each flow is an independent Poisson process with rate λ , Nλ ≤ µ . • The lower bound is asymptotically tight. • Timing capacity increases as the number of flows increases. ✫ ✪ UIUC 16

  18. ✬ ✩ A Single Flow • Each packet has B bits • All B bits are used to distinguish sub-flows; i.e. there are N = 2 B sub-flows ✫ ✪ UIUC 17

  19. ✬ ✩ Timing Capacity of A Single Flow • We have ( B − 1 − log B ) µ ≤ C T ≤ Bµ. • The timing capacity is close to the server capacity Bµ bits/sec • Without splitting, it is 0 . 5309 µ bits/sec • A large amount of information can be conveyed through timing. • When λ is small, the distortion caused by queueing delay is relatively small. ✫ ✪ UIUC 18

  20. ✬ ✩ Covert Information • Eavesdropper monitors the server, records packets in sequence ✫ ✪ UIUC 19

  21. ✬ ✩ Covert Information • Covert information C c : C c = C T − C E , – C T : information rate at the receiver – C E : information rate at the eavesdropper • Covert information: secrets that cannot be heard by the eavesdropper. ✫ ✪ UIUC 20

  22. ✬ ✩ Two Flows I ( A n , B m ; N n + m , D n + m ) h ( A n , B m ) + h ( N n + m , D n + m ) = − h ( A n , B m , N n + m , D n + m ) h ( A n , B m ) + h ( N n + m , D n + m ) − h ( A n , B m , D n + m ) ≤ h ( A n , B m ) + h ( N n + m , D n + m ) − h ( A n , B m , S n + m ) = h ( N n + m , D n + m ) − h ( S n + m ) = h ( D n + m ) − h ( S n + m ) + H ( N n + m ) . ≤ ✫ ✪ UIUC 21

  23. ✬ ✩ Covert Information Cont’d • I ( A n , B m ; N n + m ) = H ( N n + m ) – FIFO – Eavesdropper located at the input of server. • Covert information C c = C T − C E λ 1 + λ 2 h ( D n + m ) − h ( S n + m ) � � ≤ , n + m which is the covert information of a single flow with rate λ 1 + λ 2 . ✫ ✪ UIUC 22

  24. ✬ ✩ Location of the Eavesdropper ✫ ✪ UIUC 23

  25. ✬ ✩ A Special Case ✫ ✪ UIUC 24

  26. ✬ ✩ Service Disciplines • First come first serve: covert information rate cannot be larger than that of a single flow. • Random service discipline: covert information rate is larger than that of a single flow. – Intuition: timing information reduces randomness introduced by the service discipline. – Implementation: each packet randomly picks a diffserv class in its header. ✫ ✪ UIUC 25

  27. ✬ ✩ Service Disciplines Cont’d I ( A n , B m ; N n + m , D n + m ) h ( A n , B m ) + h ( N n + m , D n + m ) − h ( A n , B m , N n + m , D n + m ) = h ( A n , B m ) + h ( N n + m , D n + m ) − h ( A n , B m , S n + m , N n + m ) = h ( A n , B m ) + h ( N n + m , D n + m ) − h ( A n , B m , S n + m ) = h ( N n + m , D n + m ) − h ( S n + m ) = h ( D n + m ) − h ( S n + m ) + h ( N n + m ) . = ✫ ✪ UIUC 26

  28. ✬ ✩ Random Service Discipline Total information: I ( A n , B m ; N n + m , D n + m ) h ( D n + m ) − h ( S n + m ) + h ( N n + m ) − h ( N n + m | A n , B m , S n + m ) = Eavesdropper: I ( N n + m ; A n , B m ) = h ( N n + m ) − h ( N n + m | A n , B m ) . Covert information: h ( D n + m ) − h ( S n + m )+ h ( N n + m | A n , B m ) − h ( N n + m | A n , B m , S n + m ) . ✫ ✪ UIUC 27

  29. ✬ ✩ Random Service Discipline Cont’d • h ( D n + m ) − h ( S n + m ) is maximized when the input is Poisson. • h ( N n + m | A n , B m ) − h ( N n + m | A n , B m , S n + m ) is positive because N n + m is not independent of S n + m conditioned on ( A n , B m ). ✫ ✪ UIUC 28

  30. ✬ ✩ Discrete-Time Case • N = 2 B : number of flows • Geometric service time with mean 1 /µ : µ ( B − 1) − µ log( B − 1) ≤ C ≤ µB + 1 • Deterministic service time (one packet/slot): ( B − 1) − log( B − 1) ≤ C ≤ B + 1 ✫ ✪ UIUC 29

  31. ✬ ✩ General Case • General service-time distribution: 1 + Bµ 2 E ( S 2 ) B − 1 � � �� µ B − log ≤ C ≤ Bµ + 1 , B 2 where E ( S 2 ) is the second moment of the service-time • Queueing statistics of a general server queue is unknown. • Basic idea: use waiting time + service time as an upper bound for the effective service time. • Good approximation for small λ . ✫ ✪ UIUC 30

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend