1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

Tài liệu Pricing communication networks P4 doc

28 388 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 28
Dung lượng 321,04 KB

Nội dung

4 Network Constraints and Effective Bandwidths This chapter concerns the technological constraints under which networks operate. Just as a manufacturing facility produces goods by consuming input factors, so a communication network provides communications services by consuming factors such as labour and interconnection services, and by leasing equipment and simpler communications services. We wish to emphasize the importance of timescales in service provisioning. In the short run, a network’s size and capabilities for service provisioning are fixed. In the long run, the network can adapt its resources to the amounts of services it wishes to provide. For example, it might purchase and install more optical fibre links. The cost models of Chapter 7 use incremental cost to evaluate the costs of services and are based upon a consideration of network operation over long timescales. Innovations, such as electronic markets for bandwidth using auctions, are beginning to permit some short run changes in service provisioning through the buying and selling of resources. However, on short timescales of weeks or months, both the size of the network and its costs of operation must usually be taken as fixed. On short timescales, communications services resemble traditional digital goods, in that they have nearly zero marginal cost, but a very large common fixed cost. Prices can be used as a control to constrain the demand within the production capability of the network: that is, within the so-called technology set. If one does this, then the consumer demand and structure of the technology set determine prices. In this chapter we provide tools that are useful in describing the technology sets of networks that offer the services and service contracts described in Chapter 2. The exact specification of such a technology set is usually not possible. However, by assessing a service’s consumption of network resources by its effective bandwidth, we can make an accurate and tractable approximation to the technology set. More specifically, in Section 4.1 we define the idea of a technology set, or acceptance region. Section 4.2 describes the important notion of statistical multiplexing. Section 4.3 concerns call admission control. Section 4.4 introduces the idea of effective bandwidths, using an analogy of filling an elevator with boxes of different weights and volumes. We discuss justifications for effective bandwidths in terms of substitution and resource usage. The general theory of effective bandwidths is developed in Section 4.5. Effective band- width theory is applied to the pricing of transport service classes in Section 4.6. Here we Pricing Communication Networks: Economics, Technology and Modelling. Costas Courcoubetis and Richard Weber Copyright  2003 John Wiley & Sons, Ltd. ISBN: 0-470-85130-9 84 NETWORK CONSTRAINTS AND EFFECTIVE BANDWIDTHS summarize the large N asymptotic, the notion of an operating point, and interpretations of the parameters s and t that characterize the amount of statistical multiplexing that is possi- ble. This section is mathematically technical and may be skipped by reading the summary at the end. In Section 4.7 we work through examples. In Section 4.8 we describe how the acceptance region can be defined by multiple constraints. In Section 4.9 we discuss how various timescales of burstiness affect the effective bandwidth and the effects of traffic shap- ing. Some of the many subtleties in assigning effective bandwidths to traffic contracts are discussed in Section 4.10. Often, a useful approach is to compute the effective bandwidth of the worst type of traffic that a contract may produce. Some such upper bounds are com- puted in Section 4.11. The specific case of deterministic multiplexing, in which we require the network to lose no cells, is addressed in Section 4.12. Finally, Section 4.13 presents some extensions to the general network case, and Section 4.14 discusses issues of blocking. 4.1 The technology set In practice, a network provides only a finite number of different service types. Let x i denote the amount of service type i that is supplied, where this is one of k types, i D 1;:::;k. A key assumption in this chapter is that the vector quantity of services supplied, say x D .x 1 ;:::;x k /, is constrained to lie in a technology set, X. This set is defined by the provider, who must ensure that he has the resources he needs to provide the services he sells. It is implicit that each service has some associated performance guarantee and so requires some minimum amount of resources. Thus, x lies in X (which we write x 2 X) if and only if the network can fulfil the service contracts for the vector quantity of services x. Note that here we are concerned only with the constraints that are imposed by the network resources; we ignore constraints that might be imposed by factors such as the billing technology or marketing policy. Different models of market competition are naturally associated with different optimiza- tion problems. This is discussed fully in Chapter 6. In a monopoly market it is natural to consider the problem of maximizing the monopolist’s profit. In a market of perfect com- petition it is natural to consider problems of maximizing social welfare. In both cases, the problems are posed under the constraint x 2 X. Models of oligopoly concern competition amongst a small number of suppliers and lead to games in which the suppliers choose production and marketing strategies subject to the constraints of their technology sets. Let x be the vector of quantities of k supplied service types. A general problem we wish to solve is maximize x½0 f .x/; subject to g.x/ Ä 0 (4.1) The objective function f .x/ might be the supplier’s profit, or it might be social welfare. Here X Dfx : g.x/ Ä 0g, where the inequality is to be read as a vector inequality, expressing m constraints of the form g i .x/ Ä 0, i D 1;:::;m. It is natural that the technology set be defined in this way, in terms of resource constraints and constraints on guaranteed performance. We suppose that f .x/ is a concave function of x. This is mathematically convenient and reasonable in many circumstances. Without loss of generality, we assume that all the service types consume resources and hence that the technology set is bounded. Note that, for a synchronous network, the technology set is straightforward to define. This is because each service that is provided by the network requires a fixed amount of bandwidth throughout its life on each of the links that it transverses. Therefore, in what follows, we focus on services that are provided over asynchronous networks. In asynchronous networks STATISTICAL MULTIPLEXING 85 the links are analogous to conveyor belts with slots, and slots are allocated to services on demand (see the discussion in Section 2.1.4). We suppose that there is finite buffering at the head of each link, where cells can wait for slots in which to be transmitted. 4.2 Statistical multiplexing Let us consider a service contract with a QoS requirement that the traffic stream should suffer a maximum Cell Loss Probability (CLP). We use the term ‘cell loss’, instead of ‘information loss’ or ‘packet loss’, to make implicit a convenient, but not essential, assumption that information is broken into small cells of equal size. A service provider can guarantee CLP D 0 simply by ensuring that on every link the sum of the peak rates of all the connections carried on the link is less than the link’s capacity. In other words, for each network link he takes a constraint of the form k X iD1 x i h i Ä C (4.2) where x i is the number of connections of type i that use the link, h i is the maximum rate of cells that the service contract allows to service type i,andC is the capacity of the link. Although such a constraint makes sense for synchronous networks, in which connections are allocated fixed amounts of bandwidth during their lifetimes, equal to their peak rates h i , it may not make sense for asychronous networks, where connections are allocated bandwidth only when there is data to carry. If the service provider of such a network uses (4.2) to define the technology set he does not make efficient use of resources. He can do better by making use of statistical multiplexing, the idea of which is as follows. Typically, the rate of a traffic stream that uses service type i fluctuates between 0 and h i , with some mean, of say m i . At any given moment, the rates of some traffic streams will be near their peaks, others near their mean and others near 0 or small. If there are many traffic streams, then the law of averages states that the aggregate rate is very likely to be much less than P i x i h i ; indeed, it should be close to P i x i m i . If one is permitted an occasional lost cell, say CLP D 0:000001, then it should be possible to carry quantities of services substantially in excess of those defined by (4.2). Instead, we might hope for something like k X iD1 x i Þ i Ä C (4.3) where m i <Þ i < h i . The coefficient Þ i is called an effective bandwidth. Statistical multiplexing is possible when traffic sources are bursty and links carry many traffic streams. A model of a link is shown in Figure 4.1. A link can be unbuffered, or it can have an input buffer, to help it accommodate periods when cells arrive at a rate greater than the link bandwidth, C. Cells are lost when the buffer overflows. If we can tolerate some cell loss then the number of connections that can be carried can be substantially greater C = capacity (bandwidth) B = buffer size x 1 x k Figure 4.1 The Call Admission Control (CAC) problem. Given the state of the system in terms of the active traffic contracts and a history of load measurements, should a new traffic contract of type i be admitted? 86 NETWORK CONSTRAINTS AND EFFECTIVE BANDWIDTHS than the number that can be carried if we require no cell loss. If there is just a single type of source then x peak D C=h 1 and x stat. D C=Þ 1 would be the number of streams that could be carried without and with statistical multiplexing, respectively. Let us define the statistical multiplexing gain for this case as SMG D x stat. x peak D h 1 Þ 1 Clearly, it depends upon the CLP. In Example 4.1, the statistical multiplexing gain is a factor of almost 5. The special case of requiring CLP D 0 is usually referred to as deterministic multiplexing. Example 4.1 (Statistical multiplexing) Consider a discrete-time model of an unbuffered link that can carry 950 cells per epoch. There are x identical sources. In each epoch each source produces between 0 and five cells; suppose the number is independently distributed as a binomial random variable B.5; 0:2/. Thus, h D 5andx peak D 950=5 D 190. The mean number of cells that one source produces is m D 5 ð 0:2 D 1, and the number of cells that 900 sources produce is approximately normal with mean 900 and variance 0:2 ð 0:8 ð 900. From this we calculate that the probability that 900 sources should produce more than 950 cells in a slot is about 0.0000155. Thus for a CLP of 1:55 ð 10 5 , we can take x stat. D 900 and there is a statistical multiplexing gain of 900=190 D 4:74. This gain increases as the capacity of the link increases. For example, if C is multiplied tenfold, to 9500, then 9317 sources can be multiplexed with the same CLP of 0.0000155. The SMG is now 9317=1900 D 4:90. As C tends to infinity the SMG tends to h=m D 5. As we will see in Section 4.12, some multiplexing gain is possible even if we require CLP D 0. For example, if sources are policed by leaky buckets and links are buffered, then it is possible to carry more connections than would be allowed under the peak rate constraint of (4.2). 4.3 Accepting calls Consider a network comprising only a single link. Suppose that contracts specify exact traffic types and that there are x i contracts of type i , with i D 1;:::;k. Suppose that the only contract obligation is the QoS constraint CLP Ä p,forsay p D 10 8 . The technology set A, which we also call the acceptance region, is that set of x D .x 1 ;:::;x k / corresponding to quantities of traffic types that it is possible to carry simultaneously without violating this QoS constraint (see Figure 4.2). Note that the technology set is defined implicitly by the QoS constraint. Later we show how to make explicit approximations of it. As explained in Sections 2.2.3 and 3.1.5, Call Admission Control (CAC) is a mechanism that ensures that x remains in A. It does this by rejecting calls for new service connections through the network that would take the load of active calls outside A. Thus the acceptance region and CAC are intimately related. In practice, however, it is hard to know A precisely and so we must be conservative. In implementing a particular decision rule for CAC, we keep the load x within a region, say A 0 , that lies inside the true acceptance region, A.For instance, a possible rule CAC rule is to accept a call only so long as (4.2) remains satisfied; this would correspond to taking A 0 as the triangular region near the origin in Figure 4.2. This rule is very conservative. The QoS constraint is easily satisfied, but the network carries fewer calls and obtains less revenue than it would using a more sophisticated CAC. This AN ELEVATOR ANALOGY 87 CAC based on peak cell rate x 2 x 1 0,0 acceptable P(overflow) ≤ p not acceptable P(overflow) ≥ p P(overflow) = p A Figure 4.2 The acceptance region problem. Here there are k D 2 traffic types and x i sources of in types i. We are interested in knowing for what .x 1 ; x 2 / is CLP Ä p,forsay p D 10 8 .The triangular region close to the origin is the acceptance region defined by x 1 h 1 C x 2 h 2 Ä C,which uses the peak cell rates and does not take advantage of the statistical multiplexing. rule is an example of a static CAC, since it is based only on the traffic contract parameters of calls, in this case h 1 ;:::;h k . In contrast, we say that a CAC is dynamic when it is based both on contract parameters and on-line measurements of the present traffic load. It is desirable that the decision rule for CAC should be simple and that it should keep x within a region that is near as possible to the whole of A, and so there be efficient use of thenetwork.Whenwedefine A 0 in terms of a CAC rule we can call A 0 the ‘acceptance region’ of that CAC; otherwise acceptance region means A, the exact technology set where the QoS constraints are met. Suppose that as new connections are admitted and old ones terminate the mix of traffic remains near a point Nx on the boundary of A. We call Nx the operating point . We will shortly see that the acceptance region can be well approximated at Nx by one or more constraints like (4.3), and this constant Þ i can be computed off-line as a function of Nx, the source traffic statistics, the capacity, buffer size and QoS required. If a network has many links, connected in an arbitrary topology, then call admission is performed on a per route basis. A route specifies an end-to-end path in the network. A service contract is admitted over that route only if it can be admitted by each link of the route. This may look like a simple extension of the single link case. However, the traffic that is generated by a contract of a certain type is accurately characterized by the traffic contract parameters only at the entrance point of the network. Once this traffic travels inside the network, its shape changes because of interactions with traffic streams that share the same links. In general, traffic streams modelled by stochastic processes are characterized by many parameters. However, for call acceptance purposes, we seek a single parameter characterization, namely the Þ i in constraint (4.3). We call Þ i an effective bandwidth since it characterizes the resource consumption of a traffic stream of type i in a particular multiplexing context. In the next sections we show how to derive effective bandwidths. We consider their application to networks in Section 4.13. Finally, in Section 4.14, we suppose that a CAC is based on (4.3). What then is the call blocking probability? We discuss blocking in Section 9.3.3. 4.4 An elevator analogy To introduce some ideas about effective bandwidths we present a small analogy. Suppose an elevator (or lift) can hold a number of boxes, provided their total volume is no greater than V and their total weight is no greater than W .Therearek types of boxes. Boxes of type i have volume v i and weight w i .Letv D .v 1 ;:::;v k / and w D .w 1 ;:::;w k /. Suppose .v i ;w i / D .2; 5/ and .v j ;w j / D .4; 10/. Clearly the elevator can equally well 88 NETWORK CONSTRAINTS AND EFFECTIVE BANDWIDTHS carry two boxes of type i as one box of type j,since.4; 10/ D 2 ð .2; 5/. But what should one say when there is no integer n such that .v i ;w i / D n ð .v j ;w j /? This is the question posed in Figure 4.3. It depends upon whether the elevator is full because of volume or because of weight. Suppose that boxes arrive randomly and we place them in the elevator until no more fit. Let x i denote the number of boxes of type i. If at this point the maximum volume constraint is active, then k X iD1 x i v i D V ; k X iD1 x i w i < W and the effective usage is the volume of the box. At such a point we could substitute one small set of boxes for another small set of boxes provided their total volumes are the same. We suppose these sets are small enough that we are in no danger of violating the maximum weight constraint. We then say that a box of type i has effective bandwidth v i .Thisis shown in the left of Figure 4.4. Alternatively, the elevator might fill at a point where the maximum weight constraint is active. Perhaps this is usually what happens in the afternoon, when heavier boxes arrive. Then, again, k X iD1 x i v i < V ; k X iD1 x i w i D W and the effective usage is the weight of the box. We then say the effective bandwidth is w i . In what sense is w i , i = n × W,V ? w i , i w j , j Figure 4.3 The elevator can carry a total weight of at most W and volume at most V . A box of type i has weight w i and volume v i . A box of type i has n times the relative effective usage of a box of type j if we are indifferent between packing 1 box of type i or n boxes of type j . ∑ i w i = W, ∑ i i < V∑ i w i < W, ∑ i i = V Figure 4.4 At the left the elevator is full because the volume of the boxes is V . The effective resource usage of a box of type i is v i . At the right the elevator is full because the weight of the boxes equals W . The effective resource usage of a box of type i is w i . AN ELEVATOR ANALOGY 89 Thus, the relative effective usage of a box depends on whether the maximum volume or maximum weight constraint is active. We might write these simultaneously as k X iD1 x i Þ i Ä C Ł and define Þ.:::/D .Þ 1 .:::/;:::;Þ k .:::// and C Ł .:::/ as functions of x, v, w, V and W . If these variables are such that the maximum volume constraint is active then Þ D v and C Ł D V . But if they are such that the maximum weight constraint is active, then Þ D w and C Ł D W .Thatis, .Þ; C Ł / D ( .v; V / .w; W / as P i x i v i D V ; P i x i w i < W P i x i v i < V ; P i x i w i D W At the point of the intersection of the two constraints, both effective bandwidths (volume and weight) are relevant, but not all substitutions are possible. The key point is that the effective bandwidths depend upon known parameters of the box types, .v i ;w i /, and on the capacities, V; W . They also depend on the operating point x, since if we are given the values of x for a full elevator we can determine which constraint is active. There are various ways this operating point might be reached. It could be, as we have imagined so far, that we simply fill the elevator with boxes as they arrive. Which of the two constraints becomes active depends upon the rates at which the different types of box arrive. This might depend on the time of the day. Alternatively, we might accept and reject offered boxes so as to fill the elevator in a particular way. Alternatively, we might charge boxes for use of the elevator. The more we charge the boxes of type i, the smaller will be their rate of arrival. Imagine that there are k agents, one associated with each box type. Agent i obtains benefit u i .x i / when the elevator carries x i boxes of type i . Suppose we wish to steer the operating point to maximize the sum of these utilities, i.e. to maximize f D P i u i .x i /.Let Nx be the point on the boundary of A that does this. Assuming that each u i is a concave function, one can show that if only the maximum volume constraint is active at Nx then there exists a scalar ½ such that u 0 i . Nx i / D ½v i for all i . If only the maximum weight constraint is active then there exists some scalar ¼ such that u 0 i . Nx i / D ¼w i for all i. If both constraints are active, then there are ½ and ¼ such that u 0 i . Nx i / D ½v i C ¼w i for all i. Let p i D ½v i , D ¼w i or D ½v i C ¼w i , in line with the three possibilities described above. Then the point Nx,atwhich f is maximized within A, can be characterized as the solution to k problems, the ith of which is to maximize [u i .x i /  p i x i ] over x i . Note that these k problems decouple and can be solved in a decentralized fashion. The ith problem is to be solved by agent i. He seeks to maximize his net benefit, given that the price per box of type i is p i . Thus the problem of maximizing the function f can be solved in a decentralized fashion, within a market for services where this optimal price vector will be determined. Observe that in most cases, p i = p j equals Þ i =Þ j , so prices are proportional to effective bandwidths. This is the main motivation for using effective bandwidths in pricing. Note that in the original model, x i denoted the number of boxes of type i that are placed in the elevator. We can extend the model and assume that the elevator takes one unit of time for each trip. Now x i denotes the rate at which boxes of type i are served. We can make the analogy to networks by thinking of services as boxes and the network as an elevator. This is a valid analogy since services consume network resources, of which networks have finite amounts. If it takes time T i to complete a service of type i and such service requests 90 NETWORK CONSTRAINTS AND EFFECTIVE BANDWIDTHS arrive at a rate of x i per T i units of time, then the mean number of services of type i in the network will be x i . (This follows from Little’s Law, which says that the mean number of jobs in the system, L, equals the product of arrival rate, ½, and mean time spent in the system, W , i.e., L D ½W ; this translates here to x i D .x i =T i /T i ). As above, posting prices that affect arrival rates can solve the problem of maximizing a utility function that captures the value of the services to the customers. A similar observation applies to the interpretation of x in (4.1). If each service is priced with an appropriate price p i , then the market will find an equilibrium at the solution of this optimization problem. Again, such prices should be proportional to the effective bandwidths of the services. Note that it is valid to make this simple translation from x i as a number of boxes to an arrival rate of boxes only if the boxes arrive regularly, i.e., exactly every T i =x i time units. If, however, boxes arrive irregularly, say according to a stochastic process, and x i is only an average arrival rate, then the instantaneous rate of arriving boxes can occasionally exceed the average value. So, if the elevator is full some arriving boxes may be blocked from being served. We discuss models that take account of such blocking effects in Sections 4.14 and 9.3.3 4.5 Effective bandwidths We have seen in the elevator example of Section 4.4 that a key notion in assessing resource usage is substitution. Let us explore this in a more general way. Suppose the technology set is defined by x ½ 0andg i .x/ Ä c i , i D 1;:::;m. Assume g i .x/ is nondecreasing in each component of x. In the elevator example g i is linear in x. Suppose g i . Nx/ D c i is the unique binding constraint at point Nx. Then (by Taylor’s theorem) a change of Nx to Nx C ž changes the value of the left-hand side of this constraint to g i . Nx/ C ž 1 @g i =@x 1 CÐÐÐCž k @g i =@x k j xDNx C o.ž/ (where o.ž/ denotes a term that is small compared to ž: explicitly, o.ž/=jžj!0asjžj!0). So, we satisfy the binding constraint to within o.ž/ if ž 1 @g i =@x 1 CÐÐÐCž k @g i =@x k j xDNx D 0 Thus, it is natural to define the effective bandwidth of contract j as Þ j D @g i =@x j þ þ xDNx .It can again be viewed as a substitution coefficient, because if we let the number of type 1 contracts, x 1 , increase by Ž=Þ 1 and the number of type 2 contracts, x 2 , decrease by Ž=Þ 2 and hold all other components of x constant, then the constraints of the technology set are still satisfied to within o.Ž/. The above analysis suggests a method for constructing the effective bandwidths from knowledge of the acceptance region. Unfortunately, it is hard to determine A in practice, since its boundary can be found only by experimentation at a very large number of points. In the next section we present an approach for deriving the Þ 1 ;:::;Þ k from statistical characteristics of the sources. The previous discussion suggests that we can interpret effective bandwidths as defining a local linear approximation to the boundary of the technology set at the operating point Nx. In Figure 4.5 two constraints define A. One is linear and one is nonlinear. Suppose the operating point is on the boundary of the nonlinear constraint, g 1 Ä c 1 .Then P j x j Þ j D P j Nx j Þ j defines a hyperplane that is tangent to g 1 D c 1 at the operating point Nx, with Þ j D @g 1 =@x j þ þ xDNx .HereÞ depends on which constraint is binding and this depends on the operating point Nx. Now a local approximation to the boundary of g 1 .x/ Ä c 1 EFFECTIVE BANDWIDTHS FOR TRAFFIC STREAMS 91 A x 2 x 1 f = constant tangent to f and g 1 : x g 1 = c 1 g 2 = c 2 ∑ j = 1 x j a j = C* k Figure 4.5 The acceptance region A is defined by two constraints. At the operating point Nx,which achieves the maximum of f in A, the active constraint is g 1 .x / Ä c 1 and so the effective bandwidths will be of the form Þ j D @g 1 =@x j þ þ xDNx . Note that the problem of maximizing f subject to P k jD1 x j Þ j Ä C Ł ,whereC Ł D P k jD1 Nx j Þ j , is also solved at Nx .Thus,wecanusesimpler effective bandwidth constraints, in place of the actual acceptance region constraints, in posing the optimization problem. at the operating point Nx is the hyperplane k X jD1 x j Þ j Ä C Ł ; defining C Ł :D k X jD1 Nx j Þ j (4.4) If the operating point Nx was defined by maximizing f over A, then this line is also tangent to a contour of f at this point. The problem of maximizing f subject to (4.4) is solved also at Nx. Thus, for the purposes of identifying Nx, or motivating users to choose Nx in a decentralized way, the approximation in (4.4) to the boundary of A is as good as the true constraint g 1 .x/ Ä c 1 . 4.6 Effective bandwidths for traffic streams The technology set for transport services depends on the information that is available about the connections. We look first at the case in which we have a full description of each connection’s traffic. In subsequent sections, we consider the more realistic case that the only information available about a connection is its service contract. The material of this section is mathematically intricate and some readers may wish to skip to the summary at the end. We consider the simple problem of determining the number of contracts that can be handled by a single switch. The switch has a buffer of size B and serves C cells per second in a First Come First Serve (FCFS) fashion. In practice, switches may require more sophisticated modelling than FCFS in order to capture the effects of the sophisticated scheduling mechanisms that are used for differentiated services. Suppose the QoS is defined only in terms of the CLP, or equivalently in terms of the probability that the content of the buffer exceeds a certain level. Constraints concerned with exceeding maximum delay bounds can also be modelled this way (see Example 4.7). However, it is reasonable to focus on CLP because in present switch design this is more important than average delay. Present designs use small buffers for real time services. This keeps the maximum delay small. Even if large buffers are used, the CLP is usually already greater than we wish to permit before the size of the delay becomes important. Suppose that there are k classes of traffic whose statistics are known. We consider QoS constraints that are either deterministic (CLP D 0) or probabilistic, say CLP < 10 8 . 92 NETWORK CONSTRAINTS AND EFFECTIVE BANDWIDTHS As before x i denotes the number of sources in class i. The technology set is the set of all .x 1 ;:::;x k / for which the QoS constraints are not violated. It depends upon the information available in advance (knowledge of the actual source statistics, the leaky bucket constraints of the contracts), dynamic information (on-line measurements), and on the QoS constraints. Let X j [0; t] be the number of cells produced by a bursty source of type j in a window of length t seconds. Suppose that at the operating point Nx only a single constraint is binding, and it is of the form  log.CLP/ Ä  . Then the effective bandwidth of a source of type j is defined, (for values of the space parameter s and the time parameter t, which are defined below), as Þ j .s; t/ D 1 st log E h e sX j [0;t] i (4.5) In Section 4.5, we showed that the binding constraint at the operating point Nx can be approximated by the linear constraint k X jD1 x j Þ j .s; t/ Ä C Ł (4.6) where C Ł D P Nx j Þ j .s; t/. We emphasize that the effective bandwidth of a traffic stream is a function of its multiplex- ing context. This is fully summarized in the value of the parameters s and t. To determine the effective bandwidth constraint, one must first find the values of these parameters. They depend upon the operating point, Nx, the link parameters, .C; B/, and the permitted CLP. In fact, defining .C; B/ in (4.9), as an asymptotic value of log.CLP/, it follows that s D d dB ; st D d dC (4.7) Both parameters also have physical interpretations and in principle could be ‘observed’ in the system. To interpret t, we note that there are many ways in which the buffer of the switch can fill and overflow. An important heuristic, which one can make precise using the mathematical theory of large deviations, is that when a rare event such as buffer overflow occurs, it occurs in its most probable possible way. The time parameter t corresponds to the most probable time over which the buffer fills during a busy period in which overflow occurs (see Figure 4.6). As we have said, this most probable time to overflow depends rate time t buffer B t 1 t 2 Figure 4.6 The operating point parameter t corresponds to the most probable time over which the buffer fills during a busy period in which overflow occurs. Here the source rate varies on two timescales and t 2 is more relevant to overflow than is t 1 . This is because it is when the source produces at a high rate for a relatively long time, of order t 2 , that the buffer overflows. During such a long time, fluctuations on the t 1 timescale are evened-out and do not contribute to the overflow. [...]... available through the traffic contract? Since this information is to be used to accept or to reject a call, it must be available at the time the call is set up One way to obtain more information is through pricing The network posts a set of possible tariffs for the same traffic contract, each one resulting in a different charge, depending on the traffic that is actually generated during the contract Assuming... choice therefore reveals important information to the network operator, who can use this information to obtain a better approximation of the effective bandwidth This is an example of incentive compatible pricing; when users optimize their tariff choices the network operator gains information that allows him to better load and more efficiently run the network as a whole 4.11 Bounds for effective bandwidths... t2 , the acceptance region is defined by x1 h 1 C x2 h 2 x1 ²1 C x2 h 2 x1 ²1 C x2 ²2 Ä Ä Ä C C B=t C C B x 1 þ1 /=t C C B x 1 þ1 x2 þ2 /=t for 0 Ä t Ä t1 for t1 Ä t Ä t2 for t2 Ä t (4.27) EXTENSION TO NETWORKS 107 These must hold for all t But as the reader can verify, it is enough that they hold for t D t1 , t D t2 and t D 1 The corresponding constraints become x1 h 1 C x2 h 2 Ä C C B=t1 x1 ²1 C þ1... to check a finite set of equations, similar to (4.27), at a finite number of times at which different leaky buckets become active by constraining the maximum contribution of the sources 4.13 Extension to networks We have seen how to compute the effective bandwidths of a flow that is multiplexed at one buffered switch But is this any use in the context of a network? Clearly, the statistics of the flow change... present Note that these are limiting results: they hold in the limit as the capacity of the links become larger This assumption is realistic in the context of the expanding capacity of today’s broadband networks Using this result we can describe the technology set of the network as follows Let L be a set of links and R be a set of routes Write j 2 r if route r uses link j Assume each route is associated... definition Siris (2002) maintains a nice web site on large deviation techniques and on-line tools for traffic engineering The extension of the single link models and the application of the asymptotics to networks in Section 4.13 is due to Wischik (1999) Section 4.14 summarizes ideas from Kelly (1991b) and (1991c) More refined asymptotics for the blocking probabilities are described by Hunt and Kelly (1989) . band- width theory is applied to the pricing of transport service classes in Section 4.6. Here we Pricing Communication Networks: Economics, Technology and. under which networks operate. Just as a manufacturing facility produces goods by consuming input factors, so a communication network provides communications

Ngày đăng: 14/12/2013, 23:15