Shape-controlled traffic patterns that maximize overflow probabilities in high-speed networks

George Kesidis, Takis Konstantopoulos

Research output: Contribution to journalArticle

Abstract

We consider the problem of allocation of network resources for a Variable Bit Rate connection requiring a probabilistic bound on cell delay. We only make the standard assumption that the connection has a deterministically controlled shape as specified by a (σ, ρ) constraint, simultaneously with a (0, π) (or peak-rate) constraint. This paper settles one instance of this open problem raised by Doshi which is motivated by the need to obtain worst-case probabilistic bounds, and is particularly applicable to situations where no statistical descriptors of network traffic are available. In other words, instead of an approach based on traffic modeling and effective bandwidths, we describe an approach using `worst-case' bounds assuming only these deterministic constraints. In particular, we describe that traffic pattern (among all stationary-ergodic and deterministically constrained arrival processes) which maximizes the `overflow probability' P(Q0>b), for a given buffer level b, where {Qt} is the buffer occupancy process, in steady-state, when the service rate is some constant c between ρ and π. This result could be used for resource provisioning of connections or for performance evaluation of network devices.

Original languageEnglish (US)
Pages (from-to)545-550
Number of pages6
JournalProceedings of the IEEE Conference on Decision and Control
Volume1
StatePublished - 1998

Fingerprint

High-speed Networks
HIgh speed networks
Overflow
Telecommunication traffic
Buffers
Maximise
Traffic
Bandwidth
Buffer
Effective Bandwidth
Traffic Modeling
Resources
Network Traffic
Descriptors
Performance Evaluation
Open Problems
Cell

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Safety, Risk, Reliability and Quality
  • Chemical Health and Safety

Cite this

@article{66416517e427446397536c8643d14d21,
title = "Shape-controlled traffic patterns that maximize overflow probabilities in high-speed networks",
abstract = "We consider the problem of allocation of network resources for a Variable Bit Rate connection requiring a probabilistic bound on cell delay. We only make the standard assumption that the connection has a deterministically controlled shape as specified by a (σ, ρ) constraint, simultaneously with a (0, π) (or peak-rate) constraint. This paper settles one instance of this open problem raised by Doshi which is motivated by the need to obtain worst-case probabilistic bounds, and is particularly applicable to situations where no statistical descriptors of network traffic are available. In other words, instead of an approach based on traffic modeling and effective bandwidths, we describe an approach using `worst-case' bounds assuming only these deterministic constraints. In particular, we describe that traffic pattern (among all stationary-ergodic and deterministically constrained arrival processes) which maximizes the `overflow probability' P(Q0>b), for a given buffer level b, where {Qt} is the buffer occupancy process, in steady-state, when the service rate is some constant c between ρ and π. This result could be used for resource provisioning of connections or for performance evaluation of network devices.",
author = "George Kesidis and Takis Konstantopoulos",
year = "1998",
language = "English (US)",
volume = "1",
pages = "545--550",
journal = "Proceedings of the IEEE Conference on Decision and Control",
issn = "0191-2216",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Shape-controlled traffic patterns that maximize overflow probabilities in high-speed networks. / Kesidis, George; Konstantopoulos, Takis.

In: Proceedings of the IEEE Conference on Decision and Control, Vol. 1, 1998, p. 545-550.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Shape-controlled traffic patterns that maximize overflow probabilities in high-speed networks

AU - Kesidis, George

AU - Konstantopoulos, Takis

PY - 1998

Y1 - 1998

N2 - We consider the problem of allocation of network resources for a Variable Bit Rate connection requiring a probabilistic bound on cell delay. We only make the standard assumption that the connection has a deterministically controlled shape as specified by a (σ, ρ) constraint, simultaneously with a (0, π) (or peak-rate) constraint. This paper settles one instance of this open problem raised by Doshi which is motivated by the need to obtain worst-case probabilistic bounds, and is particularly applicable to situations where no statistical descriptors of network traffic are available. In other words, instead of an approach based on traffic modeling and effective bandwidths, we describe an approach using `worst-case' bounds assuming only these deterministic constraints. In particular, we describe that traffic pattern (among all stationary-ergodic and deterministically constrained arrival processes) which maximizes the `overflow probability' P(Q0>b), for a given buffer level b, where {Qt} is the buffer occupancy process, in steady-state, when the service rate is some constant c between ρ and π. This result could be used for resource provisioning of connections or for performance evaluation of network devices.

AB - We consider the problem of allocation of network resources for a Variable Bit Rate connection requiring a probabilistic bound on cell delay. We only make the standard assumption that the connection has a deterministically controlled shape as specified by a (σ, ρ) constraint, simultaneously with a (0, π) (or peak-rate) constraint. This paper settles one instance of this open problem raised by Doshi which is motivated by the need to obtain worst-case probabilistic bounds, and is particularly applicable to situations where no statistical descriptors of network traffic are available. In other words, instead of an approach based on traffic modeling and effective bandwidths, we describe an approach using `worst-case' bounds assuming only these deterministic constraints. In particular, we describe that traffic pattern (among all stationary-ergodic and deterministically constrained arrival processes) which maximizes the `overflow probability' P(Q0>b), for a given buffer level b, where {Qt} is the buffer occupancy process, in steady-state, when the service rate is some constant c between ρ and π. This result could be used for resource provisioning of connections or for performance evaluation of network devices.

UR - http://www.scopus.com/inward/record.url?scp=0032268914&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0032268914&partnerID=8YFLogxK

M3 - Article

VL - 1

SP - 545

EP - 550

JO - Proceedings of the IEEE Conference on Decision and Control

JF - Proceedings of the IEEE Conference on Decision and Control

SN - 0191-2216

ER -