Closed-form analysis of end-to-end network delay with Markov-modulated Poisson and fluid traffic

This paper develops a method for using traffic sources modelled as a Markov-modulated Poisson process (MMPP) and Markov-modulated fluid process (MMFP) in the framework of the bounded-variance network calculus, a novel stochastic network calculus framework for the approximated analysis of end-to-end network delay. The bounded-variance network calculus is an extension to multi-hop end-to-end paths of the Choe's and Shroff's Central-Limit-Theorem-based analysis of isolated network nodes. The input of the analysis is the statistical traffic envelope of sources, which is not available for generic MMPP and MMFP sources. The paper provides two statistical traffic envelopes, named two-moment and linear envelope, for general MMPP and MMFP sources, which can be used as an input of Central-Limit-Theorem-based frameworks for the analysis of network delay and, in turn, make it possible to use the rich collection of MMPP and MMFP models of voice, audio, data and video sources available in the literature. In this way, it is possible to avoid the computational complexity of traditional Markov analysis of end-to-end delay with MMPP and MMFP sources. With the linear envelope we can use simple analytical closed-form solutions for many important schedulers.

[1]  Paolo Giacomazzi Statistical Traffic Envelopes for Markov-Modulated Poisson Packet Sources , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[2]  Ness B. Shroff,et al.  A central-limit-theorem-based approach for analyzing queue behavior in high-speed networks , 1998, TNET.

[3]  Ward Whitt,et al.  Characterizing Superposition Arrival Processes in Packet Multiplexers for Voice and Data , 1986, IEEE J. Sel. Areas Commun..

[4]  Chengzhi Li,et al.  A Network Calculus With Effective Bandwidth , 2007, IEEE/ACM Transactions on Networking.

[5]  R. Adler An introduction to continuity, extrema, and related topics for general Gaussian processes , 1990 .

[6]  Dessislava A. Pachamanova,et al.  Modified Brady voice traffic model for WLAN and WMAN , 2007 .

[7]  Giacomo Verticale,et al.  Analytical Methods for Resource Allocation and Admission Control with Dual-Leaky-Bucket Regulated Traffic , 2007, 2007 IEEE International Conference on Communications.

[8]  V. V. Buldygin,et al.  Brunn-Minkowski inequality , 2000 .

[9]  Paolo Giacomazzi,et al.  Resource allocation and admission control for the provisioning of quality of service in networks of static priority schedulers , 2009, Comput. Networks.

[10]  Giacomo Verticale,et al.  Two different approaches for providing QoS in the Internet backbone , 2006, Comput. Commun..

[11]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[12]  MengChu Zhou,et al.  A model reduction method for traffic described by MMPP with unknown rate limit , 2006, IEEE Communications Letters.

[13]  Ward Whitt,et al.  Measurements and approximations to describe the offered traffic and predict the average workload in a single-server queue , 1989, Proc. IEEE.

[14]  Lauro Ortigoza-Guerrero,et al.  Call level performance analysis for multiservices wireless cellular networks with adaptive resource allocation strategies , 2005, IEEE Transactions on Vehicular Technology.

[15]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[16]  W. Whitt,et al.  The Queueing Network Analyzer , 1983, The Bell System Technical Journal.

[17]  Paolo Giacomazzi,et al.  Bounded-Variance Network Calculus: Computation of Tight Approximations of End-to-End Delay , 2008, 2008 IEEE International Conference on Communications.

[18]  C. Borell The Brunn-Minkowski inequality in Gauss space , 1975 .

[19]  P. Skelly,et al.  A histogram-based model for video traffic behavior in an ATM multiplexer , 1993, TNET.

[20]  Aarnout Brombacher,et al.  Probability... , 2009, Qual. Reliab. Eng. Int..

[21]  Minoru Akiyama Approximations for Bursty (and Smoothed) Arrival Queueing Delays Based on Generalized Peakedness , 2011 .

[22]  Edward W. Knightly Enforceable quality of service guarantees for bursty traffic streams , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[23]  P. Giacomazzi,et al.  Resource allocation and admission control in static priority schedulers with statistical guarantees , 2008, 2008 4th International Telecommunication Networking Workshop on QoS in Multiservice IP Networks.

[24]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[25]  Florin Ciucu,et al.  Scaling properties of statistical end-to-end bounds in the network calculus , 2006, IEEE Transactions on Information Theory.

[26]  Nicola Blefari-Melazzi,et al.  On the modeling of voice sources regulated by dual leaky buckets , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[27]  Edward W. Knightly,et al.  Inter-class resource sharing using statistical service envelopes , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[28]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[29]  Bo Friis Nielsen,et al.  A Markovian approach for modeling packet traffic with long-range dependence , 1998, IEEE J. Sel. Areas Commun..

[30]  Debasis Mitra,et al.  Randomized parallel communications on an extension of the omega network , 1987, JACM.