Presentation is loading. Please wait.

Presentation is loading. Please wait.

Schedulability Conditions for Scheduling Algorithms

Similar presentations


Presentation on theme: "Schedulability Conditions for Scheduling Algorithms"— Presentation transcript:

1 Schedulability Conditions for Scheduling Algorithms
ECE 1545

2 Packet Switch Fixed-capacity links
Variable delay due to waiting time in buffers Delay depends on Traffic Scheduling

3 Schedulability Conditions
Conditions that determine whether a single schedule (or a network) can support set of service guarantees may assume that upper bounds on arrivals are available integral part of an admission control system Accuracy vs. Resource efficiency: Accuracy of schedulability condition determines how much traffic can be supported with service guarantees Accuracy vs. computational efficiency: Accurate schedulabilitiy conditions may take a long time to verify

4 Computing delays in such networks is notoriously hard …
Simplified Network Computing delays in such networks is notoriously hard …

5

6

7

8

9 Traffic Characterization
Cumulative arrivals A Traffic arrivals in time interval [s,t) is Need to have a time-invariant description

10

11

12 Shaped Arrivals Traffic is shaped by an envelope such that:
Flow 1 . C Flow N Flows are shaped Regulated arrivals Buffered Link Traffic is shaped by an envelope such that: Popular envelope: “token bucket”

13 What is the maximum number of shaped flows with delay requirements that can be put on a single buffered link? Link capacity C Each flows j has arrival function Aj envelope Ej delay requirement dj

14 Delay Analysis of Schedulers
Consider a link scheduler with rate C Consider arrival from flow i at t with t+di: Limit (Scheduler Dependent) Deadline of Tagged arrival Arrivals from flow j Tagged arrival Tagged arrival departs by if

15 Delay Analysis of Schedulers
Arrivals from flow j with FIFO: Static Priority: EDF:

16 Schedulability Condition
We have: Therefore: An arrival from class i never has a delay bound violation if Condition is tight, when Ej is concave

17 Plugging in … Let: FIFO SP EDF

18 Numerical Result (Sigmetrics 1995)
C = 45 Mbps MPEG 1 traces: Lecture: d = 30 msec Movie (Jurassic Park): d = 50 msec EDF Static Priority (SP) Peak Rate strong effective envelopes Type 1 flows

19 Expected case Deterministic worst-case Probable worst-case

20 Statistical Multiplexing Gain
Worst-case arrivals Arrivals Flow 1 Flow 2 Flow 3 Time Backlog Worst-case backlog With statistical multiplexing Arrivals Flow 1 Flow 2 Flow 3 Time Backlog Backlog

21 Statistical Multiplexing Gain
Statistical multiplexing gain is the raison d’être for packet networks.

22 What is the maximum number of flows with delay requirements that can be put on a buffered link and considering statistical multiplexing? Arrivals are random processes Stationarity: is stationary random processes Independence: Any two flows and are stochastically independent

23 Envelopes for random arrivals
Statistical envelope bounds arrival from flow j with high certainty Statistical envelope : Statistical sample path envelope : Statistical envelopes are non-random functions

24 Aggregating arrivals Arrivals from group of flows:
with deterministic envelopes: with statistical envelopes:

25 Statistical envelope for group of indepenent (shaped) flows
Exploit independence and extract statistical multiplexing gain when calculating For example, using the Chernoff Bound, we can obtain

26 Statistical vs. Deterministic Envelope Envelopes
(JSAC 2000) Type 1 flows: P =1.5 Mbps r = .15 Mbps s =95400 bits Type 2 flows: P = 6 Mbps s = bits statistical envelopes Type 1 flows

27 Statistical vs. Deterministic Envelope Envelopes (JSAC 2000)
Traffic rate at t = 50 ms Type 1 flows

28 Scheduling Algorithms
Work-conserving scheduler that serves Q classes Class-q has delay bound dq D-scheduling algorithm . Scheduler Deterministic Service Never a delay bound violation if: Statistical Service Delay bound violation with if:

29 Statistical Multiplexing vs. Scheduling (JSAC 2000)
Example: MPEG videos with delay constraints at C= 622 Mbps Deterministic service vs. statistical service (e = 10-6) dterminator=100 ms dlamb=10 ms Thick lines: EDF Scheduling Dashed lines: SP scheduling Statistical multiplexing makes a big difference Scheduling has small impact

30 More interesting traffic types
So far: Traffic of each flow was shaped Next: On-Off traffic Fraction Brownian Motion (FBM) traffic Approach: Exploit literature on Effective Bandwidth Derived for many traffic types Peak rate Mean rate effective bandwidth

31 Statistical Envelopes and Effective Bandwidth
Effective Bandwidth (Kelly 1996) Given , an effective envelope is given by

32 Different Traffic Types (ToN 2007)
Comparisons of statistical service guarantees for different schedulers and traffic types Schedulers: SP- Static Priority EDF – Earliest Deadline First GPS – Generalized Processor Sharing Traffic: Regulated – leaky bucket On-Off – On-off source FBM – Fractional Brownian Motion C= 100 Mbps, e = 10-6

33 Delays on a path with multiple nodes:
Impact of Statistical Multiplexing Role of Scheduling How do delays scale with path length? Does scheduling still matter in a large network?

34 Deterministic Network Calculus (1/3)
Systems theory for networks in (min,+) algebra developed by Rene Cruz, C. S. Chang, JY LeBoudec (1990’s) Service curve S characterizes node Used to obtain worst-case bounds on delay and backlog

35 Deterministic Network Calculus (2/3)
Worst-case view of arrivals: service : Implies worst-case bounds backlog: delay : (min,+) algebra operators Convolution: Deconvolution:

36 Deterministic Network Calculus (3/3)
Main result: If describes the service at each node, then describes the service given by the network as a whole. Sender Receiver Sender Receiver S3 S1 S3 S2 A (t) network S1 D (t) network S2 A (t) network D (t) network S = S * S * S network 1 2 3 S = S * S * S network 1 2 3 Receiver Sender Receiver Sender S network S network D (t) network A (t) network D (t) network A (t) network

37 Stochastic Network Calculus
Probabilistic view on arrivals and service Statistical Sample Path Envelope Statistical Service Curve Results on performance bounds carry over, e.g.: Backlog Bound

38 Stochastic Network Calculus
Hard problem: Find so that Technical difficulty: is a random variable!

39 Statistical Network Service Curve (Sigmetrics 2005)
Notation: Theorem: If are statistical service curves, then for any : is a statistical network service curve with some finite violation probability.

40 EBB model Traffic with Exponentially Bounded Burstiness (EBB)
Sample path statistical envelope obtained via union bound

41 Example: Scaling of Delay Bounds
Traffic is Markov Modulated On-Off Traffic (EBB model) All links have capacity C Same cross-traffic (not independent!) at each node Through flow has lower priority:

42 Example: Scaling of Delay Bounds
Two methods to compute delay bounds: Add per-node bounds: Compute delay bounds at each node and sum up Network service curve: Compute single-node delay bound with statistical network service curve

43 Example: Scaling of Delay Bounds (Sigmetrics 2005)
Peak rate: P = 1.5 Mbps Average rate: r = 0.15 Mbps T= 1/m + 1/l = 10 msec C = 100 Mbps Cross traffic = through traffic e = 10-9 Addition of per-node bounds grows O(H3) Network service curve bounds grow O(H log H)

44 Result: Lower Bound on E2E Delay (ToN 2011)
M/M/1 queues with identical exponential service at each node Theorem: E2E delay satisfies for all Corollary: -quantile of satisfies

45 Numerical examples Tandem network without cross traffic Node capacity:
Arrivals are compound Poisson process Packet arrival rate: Packet size: Utilization:

46 Upper and Lower Bounds on E2E Delays (ToN 2011)

47 Superlinear Scaling of Network Delays
For traffic satisfying “Exponential Bounded Burstiness”, E2E delays follow a scaling law of This is different than predicted by … worst-case analysis … networks satisfying “Kleinrock’s independence assumption”

48 How do end-to-end delay bounds look like for different schedulers?
Back to scheduling … So far: Through traffic has lowest priority and gets leftover capacity  Leftover Service or Blind Multiplexing BMux C How do end-to-end delay bounds look like for different schedulers? Does link scheduling matter on long paths?

49 Service curves vs. schedulers (JSAC 2011)
How well can a service curve describe a scheduler? For schedulers considered earlier, the following is ideal: with indicator function and parameter

50 Example: End-to-End Bounds
Traffic is Markov Modulated On-Off Traffic (EBB model) Fixed capacity link

51 Example: Deterministic E2E Delays (Infocom ‘11)
Peak rate: E(t) = b+rt Average rate: r = 0.15 Mbps C = 100 Mbps Link utilization: 90% (through: 1.5%) BMUX EDF (delay-tolerant) FIFO EDF (delay intolerant

52 Example: Statistical E2E Delays (Infocom`11)
Peak rate: P = 1.5 Mbps Average rate: t = 0.15 Mbps EBB traffic C = 100 Mbps e = 10-9 Link utilization: 90% (through: 1.5%)

53 How about an overloaded scheduler ?
Delays are of course unbounded? But how about throughput?

54 CBR traffic at a FIFO scheduler
Problem appeared in probing method for bandwidth estimation FIFO system Output: Service curve:

55 Overloaded systems FIFO shares bandwidth proportional to input
Service curve becomes BMUX The same holds for any D-scheduler with finite Ds for any traffic type with an average traffic rate

56 Can we compute scaling of delays for heavy-tailed traffic ?

57 Heavy-Tailed Self-Similar Traffic
A heavy-tailed process satisfies with A self-similar process satisfies Hurst Parameter

58 htts Traffic Envelope Heavy-tailed self-similar (htss) envelope:
Main difficulty: Backlog and delay bounds require sample path envelopes of the form Key contribution (not shown): Derive sample path bound for htss traffic

59 Example: Node with Pareto Traffic (Infocom 2010)
Traffic parameters: Node: Capacity C=100 Mbps with packetizer No cross traffic Compared with: Lower bound from ToN 2011 paper Simulations

60 Example: Nodes with Pareto Traffic (End-to-end)
Parameters: Compared with: Lower bound from ToN 2011 paper Simulation traces of 108 packets

61 Illustration of scaling bounds (Infocom 2010)
Upper Bound: Lower Bound: Bounds: a = 1.5 Upper Bound Lower Bound  (N log N)  (N)

62 Summary of insights Satisfying delay bounds does not require peak rate allocation for complex traffic Statistical multiplexing gain dominates gain due to link scheduling scaling law of end-to-end delays New laws for heavy-tailed traffic Link scheduling plays a role on long path


Download ppt "Schedulability Conditions for Scheduling Algorithms"

Similar presentations


Ads by Google