Performance bounds for feedforward queueing networks with upper-constrained inputs

https://doi.org/10.1016/j.peva.2007.01.003Get rights and content

Abstract

We propose a simple framework for analyzing feedforward queueing networks that have the following features: each customer belongs to a (customer) flow and the route that a customer follows in the network depends on the flow to which he belongs. The amount of traffic fed by a customer flow into the network is bounded by a deterministic subadditive function, which is called a subadditive envelope in this paper. Customers are served according to a FIFO discipline at each queue. We show that the boundary of the virtual-waiting-time distribution at each queue in such networks can be analytically derived, based on the information concerning subadditive envelopes of flows. By using the proposed analysis, we investigate how the envelope of a flow changes when it traverses a series of queues.

Introduction

Queueing networks are often used as mathematical tools for modeling computer networks, where queues represent buffers in switching nodes or routers and arcs between queues are communication links. Although queuing networks are generally difficult to analyze, there is a set of queueing networks that are analytically tractable. For example, Baskett, Chandy, Muntz, and Palacios found a set of multiclass queueing networks, known as BCMP networks, which have product-form equilibrium distributions under four types of service disciplines: last-in-first-out (LIFO), processor sharing (PS), infinite servers (IS), and first-in-first-out (FIFO) [1], [2]. Kelly found that general multiclass networks, known as Kelly networks, which connect a set of quasi-reversible queues under very general routing schemes, have product-form equilibrium distributions [3], [4], [5]. In these networks, customers arrive from outside according to a Poisson process. Each arriving customer is independently routed in a network. Each customer requires different service times at separate queues on his route and these service times are statistically independent from each other. A customer may visit the same queue several times and the network might be closed. The route of a customer in the network is stochastically determined on a hop-by-hop basis.

Most current telecommunication networks, including the Internet, are packet-switched networks, which might initially seem to be well suited to queueing network models. Current telecommunication networks are, however, quite different from BCMP or Kelly networks. For example, it has been reported that packet-arrival processes in the Internet are far from Poisson processes. The size of a packet is usually fixed during the transmission in the network, and thus the service times received by a given packet at separate queues are strongly correlated. A packet visits each queue at most once and the path followed by a packet in the network is uniquely determined according to its destination. Thus, it is natural to construct types of queueing networks that have features typical to the current telecommunication networks and to seek a mathematical framework for analyzing such networks.

In this paper, we propose a method for analyzing networks that have the following features:

  • (1)

    Feedforward network [2], [5]: A customer after his service at a queue goes only to a downstream queue.

  • (2)

    Flow of customers: Each customer belongs to a specific flow. The route followed by a customer in the network depends on the flow to which he belongs.

  • (3)

    Upper constrained input: The upper limit for the amount of traffic fed by a flow is governed by a deterministic subadditive function, which we refer to as a subadditive envelope. The arrival process or service-time distribution (job-size distribution) of customers is arbitrary besides this constraint.

  • (4)

    FIFO-service discipline with superadditive-service curve: Customers are served according to a first-in-first-out (FIFO) discipline at each queue. The lower limit for the amount of traffic served at a queue during a given interval is governed by a deterministic superadditive function.

These features correspond well to those of the Internet. For example, a flow of customers corresponds to an application flow established between end hosts. The amount of traffic fed by a host (flow) has a deterministic bound because end hosts are connected to the Internet via finite-bandwidth access lines. If the traffic from an end host is regulated by a leaky-bucket-based regulator, then the amount of traffic fed by the host is upper bounded by a subadditive deterministic function. The route of a packet in the Internet depends on the destination IP address (and thus the flow to which the packet belongs).

An important difference between traditional queueing networks and the above mentioned networks is in feature (4) (upper constrained input). In the traditional queueing networks, some stochastic models are used to describe the customer arrival processes and job size distributions. Meanwhile, feature (4) implies that the traffic is described only through the subadditive envelope. Since the subadditive envelope is the maximum amount of traffic fed by a flow within a given period, actual packet arrival processes or job-size distributions are not uniquely determined. Thus, most existing works concerning queueing networks with upper-constrained inputs are focused on deriving a limit to the waiting time at each queue.

In this paper, we show that, for networks having features (1)–(4), a bound of the complementary cumulative distribution function (CCDF) of the virtual-waiting time at each queue is analytically tractable. In particular, we show how to numerically evaluate a bound of the CCDF of the virtual-waiting time; based on the information concerning the subadditive envelopes of flows. The queueing networks we consider in this paper include the IntServ [6] and DiffServ [7] architectures, which have been proposed for quality-of-service management in the Internet, and thus we can analyze the queueing delay characteristics of IntServ- or DiffServ-based networks based on our proposal.

The analysis of queueing networks with upper-constrained inputs have been addressed by several authors [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19]. Cruz [11], [12] derived the worst-case delay bound for acyclic networks when the amount of traffic from each flow is leaky-bucket constrained. Parekh and Gallager [15], [16] extended Cruz’s results to cases where some scheduling algorithms are used at queues. Their results hold also for cyclic network topologies. Stiliadis [17] and Agrawal et al. [8] have derived the worst-case delay bound for general upper-constrained flows. They also introduced the service-curve concept for modeling various scheduling algorithms used in network nodes. Chang [9] and Toyoizumi [18] consider the worst-case delay bound when flows share buffers and bandwidth. These studies did not consider the delay distribution. Several works [10], [13], [14], [19] focused on a bound of virtual-waiting-time (or backlog) distribution at a single-stage queue where various upper-constrained flows are multiplexed. Most works, however, did not consider queueing networks. Vojnović and Boudec [20] studied a stochastic analysis of a queueing network with upper-constrained inputs, but they assumed that the subadditive envelope of a flow remains unchanged when traversing queues.

The remainder of the paper is organized as follows. In Section 2, we set up our model of the network and specify notation. In Section 3, we derive the maximum waiting time and a bound of the CCDF of the virtual-waiting time for a single-stage queue, in which various upper-constrained flows are multiplexed together. We also show how the output process of each flow is upper-constrained, and derive the expression for the subadditive envelope of each individual output flow. In Section 4, we extend the results in Section 3 to cover general feedforward networks. In Section 5, we numerically show the tightness of the bound of the virtual-waiting-time CCDF. By using the proposed analysis, we also investigate how the envelope of a flow changes when it traverses a series of queues. Finally, Section 6 concludes with some remarks.

Section snippets

Feedforward networks with upper constrained inputs

We consider a feedforward network with N infinite-capacity queues and I flows of customers. There is a natural partial ordering among the queues [21] and queues are indexed by n=1,,N according to this ordering. The route followed by a customer in the network is determined by the flow to which he belongs. For example, the route followed by customers of flow i(i=1,,I) is always fixed at i1i2iN(i), where N(i) is the number of queues on a route followed by customers of flow i. That is,

Preliminary results for a single-stage queue

In this section, for later use, we derive a bound of the CCDF of the virtual-waiting time of a single-stage queue that is fed by various upper-constrained flows. We then prove that the output process of each upper-constrained flow is also upper-constrained and derive the expression for the subadditive envelope of the output process. Note that some of the results shown in this section (e.g. the maximum waiting time) have been reported in the literature; we simply summarize them to derive the

General feedforward networks

In this section, we apply the results of a single-stage queue to general feedforward networks. In this section, we let αi(t;k)(δi(t;k)) denote the subadditive envelope of the traffic amount of flow i arriving at (leaving from) queue k if the subadditive envelope exists.

Tightness of bounds (6) and (8)

First, we numerically evaluate the tightness of the bounds (6), (8) when a number of IP telephony sources coded by G.729 are multiplexed. The bit rate of G.729 coding is 8 kbps. In G.729 coding, a ten-byte frame is generated every 10 ms during a talkspurt while a two-byte frame is generated every 20 ms during a period of silence when the data compression is used during silent periods. Since an IP packet is constructed from two frames of G.729 with the IP/UDP/RTP header during a talkspurt, the

Concluding remarks

In this paper, we studied a feedforward queueing network with upper-constrained flows and derived the bound of the CCDF of the virtual-waiting time, which is expressed in terms of the subadditive envelopes of flows.

In recent years, the possibility of providing statistical performance guarantees to the Internet has been extensively investigated. Such performance guarantees will be expressed in terms of packet delay (waiting time at queues), bounds which are exceeded with a certain small

Shigeo Shioda received the B.S. degree in physics from Waseda University in 1986, the M.S. degree in physics from University of Tokyo in 1988, and the Ph.D. degree in teletraffic engineering from University of Tokyo, Tokyo, Japan, in 1998. In 1988 he joined NTT, where he was engaged in research on measurements, dimensioning and controls for ATM-based networks. Since March 2001, he has been an Associate Professor in the Department of Urban Environment and Systems, Chiba University. His research

References (27)

  • V. Cholvi et al.

    Worst case burstiness increase due to FIFO multiplexing

    Perform. Eval.

    (2002)
  • F. Baskett et al.

    Open, closed and mixed networks of queues with different classes of customers

    J. ACM

    (1975)
  • E. Gelenbe et al.

    Analysis and Synthesis of Computer Systems

    (1980)
  • F. Kelly

    Networks of queues

    Adv. Appl. Probab.

    (1976)
  • F. Kelly

    Reversibility and Stochastic Networks

    (1977)
  • H. Xhen et al.

    Fundamentals of Queueing Networks

    (2000)
  • R. Braden, D. Clark, S. Shenker, Integrated services in the Internet architecture: an overview, RFC...
  • S. Blake, et al. An architecture for differentiated service, RFC...
  • R. Agrawal et al.

    Performance bounds for flow control protocols

    IEEE/ACM Trans. Netw.

    (1999)
  • C. Chang

    Stability, queue length, and delay of deterministic and stochastic queueing networks

    IEEE Trans. Automat. Contr.

    (1994)
  • C. Chang, Y. Chiu, W. Song, On the performance of multiplexeing independent regulated inputs, in: ACM SIGMETRICS 2001,...
  • R. Cruz

    A calculus for network delay, part I: Network elements in isolation

    IEEE Trans. Inform. Theory

    (1991)
  • R. Cruz

    A calculus for network delay, part II: Network analysis

    IEEE Trans. Inform. Theory

    (1991)
  • Cited by (0)

    Shigeo Shioda received the B.S. degree in physics from Waseda University in 1986, the M.S. degree in physics from University of Tokyo in 1988, and the Ph.D. degree in teletraffic engineering from University of Tokyo, Tokyo, Japan, in 1998. In 1988 he joined NTT, where he was engaged in research on measurements, dimensioning and controls for ATM-based networks. Since March 2001, he has been an Associate Professor in the Department of Urban Environment and Systems, Chiba University. His research interest includes the Internet traffic modeling, measurement and performance analysis. He received Network System Research Award of IEICE in 2003 and Information Network Research Award of IEICE in 2004. Prof. Shioda is a member of the ACM, the IEEE, and the Operation Research Society of Japan.

    View full text