Details

Network Traffic Engineering


Network Traffic Engineering

Stochastic Models and Applications
1. Aufl.

von: Andrea Baiocchi

115,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 24.07.2020
ISBN/EAN: 9781119632511
Sprache: englisch
Anzahl Seiten: 816

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>A comprehensive guide to the concepts and applications of queuing theory and traffic theory</b></p> <p><i>Network Traffic Engineering: Models and Applications</i> provides an advanced level queuing theory guide for students with a strong mathematical background who are interested in analytic modeling and performance assessment of communication networks.</p> <p>The text begins with the basics of queueing theory before moving on to more advanced levels. The topics covered in the book are derived from the most cutting-edge research, project development, teaching activity, and discussions on the subject. They include applications of queuing and traffic theory in:</p> <ul> <li>LTE networks</li> <li>Wi-Fi networks</li> <li>Ad-hoc networks</li> <li>Automated vehicles</li> <li>Congestion control on the Internet</li> </ul> <p>The distinguished author seeks to show how insight into practical and real-world problems can be gained by means of quantitative modeling. Perfect for graduate students of computer engineering, computer science, telecommunication engineering, and electrical engineering, <i>Network Traffic Engineering</i> offers a supremely practical approach to a rapidly developing field of study and industry.</p>
<p>Preface xvii</p> <p>Acronyms xix</p> <p><b>Part I Models for Service Systems </b><b>1</b></p> <p><b>1 Introduction </b><b>3</b></p> <p>1.1 Network Traffic Engineering: What, Why, How 3</p> <p>1.2 The Art of Modeling 8</p> <p>1.3 An Example: Delay Equalization 13</p> <p>1.3.1 Model Setting 14</p> <p>1.3.2 Analysis by Equations 15</p> <p>1.3.3 Analysis by Simulation 19</p> <p>1.3.4 Takeaways 21</p> <p>1.4 Outline of the Book 21</p> <p>1.4.1 Plan 21</p> <p>1.4.2 Use 25</p> <p>1.4.3 Notation 27</p> <p>1.5 Further Readings 29</p> <p>Problems 30</p> <p><b>2 Service Systems and Queues </b><b>33</b></p> <p>2.1 Service System Structure 33</p> <p>2.2 Arrival and Service Processes 35</p> <p>2.3 The Queue as a Service System Model 38</p> <p>2.4 Queues in Equilibrium 40</p> <p>2.4.1 Queues and Stationary Processes 40</p> <p>2.4.2 Little’s Law 45</p> <p>2.5 Palm’s Distributions for a Queue 49</p> <p>2.6 The Traffic Process 53</p> <p>2.7 Performance Metrics 56</p> <p>2.7.1 Throughput 56</p> <p>2.7.2 Utilization 59</p> <p>2.7.3 Loss 59</p> <p>2.7.4 Delay 61</p> <p>2.7.5 Age of Information 62</p> <p>Summary and Takeaways 63</p> <p>Problems 65</p> <p><b>3 Stochastic Models for Network Traffic </b><b>71</b></p> <p>3.1 Introduction 71</p> <p>3.2 The Poisson Process 72</p> <p>3.2.1 Light versus Heavy Tails 78</p> <p>3.2.2 Inhomogeneous Poisson Process 79</p> <p>3.2.3 Poisson Process in Multidimensional Spaces 84</p> <p>3.2.3.1 Displacement 89</p> <p>3.2.3.2 Mapping 89</p> <p>3.2.3.3 Thinning 90</p> <p>3.2.3.4 Distances 91</p> <p>3.2.3.5 Sums and Products on Point Processes 92</p> <p>3.2.3.6 Hard Core Processes 94</p> <p>3.2.4 Testing for Poisson 96</p> <p>3.3 The Markovian Arrival Process 100</p> <p>3.4 Renewal Processes 103</p> <p>3.4.1 Residual Inter-Event Time and Renewal Paradox 108</p> <p>3.4.2 Superposition of Renewal Processes 110</p> <p>3.4.3 Alternating Renewal Processes 111</p> <p>3.4.4 Renewal Reward Processes 113</p> <p>3.5 Birth-Death Processes 115</p> <p>3.6 Branching Processes 121</p> <p>Summary and Takeaways 125</p> <p>Problems 126</p> <p><b>Part II Queues </b><b>131</b></p> <p><b>4 Single-Server Queues </b><b>133</b></p> <p>4.1 Introduction and Notation 133</p> <p>4.2 The Embedded Markov Chain Analysis of the <i>M</i>∕<i>G</i>∕1 Queue 134</p> <p>4.2.1 Queue Length 136</p> <p>4.2.2 Waiting Time 141</p> <p>4.2.3 Busy Period and Idle Time 145</p> <p>4.2.4 Remaining Service Time 148</p> <p>4.2.5 Output Process 149</p> <p>4.2.6 Evaluation of the Probabilities {<i>a<sub>k</sub></i>}<i><sub>k</sub></i><sub>∈ℤ</sub> 151</p> <p>4.3 The <i>M</i>∕<i>G</i>∕1∕<i>K </i>Queue 152</p> <p>4.3.1 Exact Solution 153</p> <p>4.3.2 Asymptotic Approximation for Large <i>K </i>157</p> <p>4.4 Numerical Evaluation of the Queue Length PDF 166</p> <p>4.5 A Special Case: the <i>M</i>∕<i>M</i>∕1 Queue 168</p> <p>4.6 Optimization of a Single-Server Queue 170</p> <p>4.6.1 Maximization of Net Profit 171</p> <p>4.6.2 Minimization of Age of Information 174</p> <p>4.6.2.1 General Expression of the Average Age of Information 175</p> <p>4.6.2.2 Minimization of the Age of Information for an <i>M</i>∕<i>M</i>∕1 Model 177</p> <p>4.7 The <i>G</i>∕<i>M</i>∕1 Queue 178</p> <p>4.8 Matrix-Geometric Queues 185</p> <p>4.8.1 Quasi Birth-Death (QBD) Processes 186</p> <p>4.8.2 <i>M</i>∕<i>G</i>∕1 and <i>G</i>∕<i>M</i>∕1 Structured Processes 188</p> <p>4.9 A General Result on Single-Server Queues 192</p> <p>Summary and Takeaways 194</p> <p>Problems 195</p> <p><b>5 Multi-Server Queues </b><b>199</b></p> <p>5.1 Introduction 199</p> <p>5.2 The Erlang Loss System 201</p> <p>5.2.1 Insensitivity Property of the Erlang Loss System 211</p> <p>5.2.2 A Finite Population Model 213</p> <p>5.2.3 Non-Poisson Input Traffic 214</p> <p>5.2.3.1 Wilkinson’s Method 217</p> <p>5.2.3.2 Fredericks’ Method 218</p> <p>5.2.4 Multi-Class Erlang Loss System 221</p> <p>5.3 Application of the Erlang Loss Model to Cellular Radio Access Network 224</p> <p>5.3.1 Cell Dimensioning under Quality of Service Constraints 225</p> <p>5.3.2 Number of Handoffs in a Connection Lifetime 230</p> <p>5.3.3 Blocking in a Cell with User Mobility 232</p> <p>5.3.4 Trade-off between Location Updating and Paging 234</p> <p>5.3.5 Dimensioning of a Cell with Two Service Classes 236</p> <p>5.4 The <i>M</i>∕<i>M</i>∕<i>m </i>Queue 238</p> <p>5.4.1 Finite Queue Size Model 243</p> <p>5.4.2 Resource Sharing versus Isolation 244</p> <p>5.5 Infinite Server Queues 247</p> <p>5.5.1 Analysis of Message Propagation in a Linear Network 252</p> <p>Summary and Takeaways 257</p> <p>Problems 258</p> <p><b>6 Priorities and Scheduling </b><b>265</b></p> <p>6.1 Introduction 265</p> <p>6.2 Conservation Law 268</p> <p>6.3 <i>M</i>∕<i>G</i>∕1 Priority Queueing 272</p> <p>6.3.1 Non-FCFS Queueing Disciplines 273</p> <p>6.3.2 Head-of-Line (HOL) Priorities 276</p> <p>6.3.3 Preempt-Resume Priorities 283</p> <p>6.3.4 Shortest Job First 284</p> <p>6.3.5 Shortest Remaining Processing Time 286</p> <p>6.3.6 The <i>𝜇C </i>Rule 288</p> <p>6.4 Processor Sharing 289</p> <p>6.4.1 The <i>M</i>∕<i>G</i>∕1 Processor Sharing Model 290</p> <p>6.4.2 Generalized Processor Sharing 293</p> <p>6.4.3 Weighted Fair Queueing 298</p> <p>6.4.4 Credit-Based Scheduling 302</p> <p>6.4.5 Deficit Round Robin Scheduling 306</p> <p>6.4.6 Least Attained Service Scheduling 308</p> <p>6.5 Miscellaneous Scheduling 312</p> <p>6.5.1 Scheduling on a Radio Link 312</p> <p>6.5.1.1 Proportional Fairness 312</p> <p>6.5.1.2 Multi-rate Orthogonal Multiplexing 313</p> <p>6.5.2 Job Dispatching 318</p> <p>6.6 Optimal Scheduling 324</p> <p>6.6.1 Anticipative Systems 325</p> <p>6.6.2 Server-Sharing, Nonanticipative Systems 325</p> <p>6.6.3 Non-Server-Sharing, Nonanticipative Systems 326</p> <p>Summary and Takeaways 327</p> <p>Problems 327</p> <p><b>7 Queueing Networks </b><b>331</b></p> <p>7.1 Structure of a Queueing Network and Notation 331</p> <p>7.2 Open Queueing Networks 332</p> <p>7.2.1 Optimization of Network Capacities 345</p> <p>7.2.2 Optimal Routing 347</p> <p>7.2.3 Braess Paradox 350</p> <p>7.3 Closed Queueing Networks 355</p> <p>7.3.1 Arrivals See Time Averages (ASTA) 358</p> <p>7.3.2 Buzen’s Algorithm for the Computation of the Normalization Constant 359</p> <p>7.3.3 Mean Value Analysis 360</p> <p>7.4 Loss Networks 369</p> <p>7.4.1 Erlang Fixed-Point Approximation 373</p> <p>7.4.2 Alternate Routing 378</p> <p>7.5 Stability of Queueing Networks 381</p> <p>7.5.1 Definition of Stability 385</p> <p>7.5.2 Turning a Stochastic Discrete Queueing Network into a Deterministic Fluid Network 387</p> <p>7.6 Further Readings 390</p> <p>Appendix 391</p> <p>Summary and Takeaways 394</p> <p>Problems 394</p> <p><b>8 Bounds and Approximations </b><b>399</b></p> <p>8.1 Introduction 399</p> <p>8.2 Bounds for the <i>G</i>∕<i>G</i>∕1 Queue 401</p> <p>8.2.1 Mean Value Analysis 404</p> <p>8.2.2 Output Process 406</p> <p>8.2.3 Upper and Lower Bounds of the Mean Waiting Time 407</p> <p>8.2.4 Upper Bound of the Waiting Time Probability Distribution 409</p> <p>8.3 Bounds for the <i>G</i>∕<i>G</i>∕<i>m </i>Queue 412</p> <p>8.4 Approximate Analysis of Isolated <i>G</i>∕<i>G </i>Queues 416</p> <p>8.4.1 Approximations from Bounds 416</p> <p>8.4.2 Approximation of the Arrival or Service Process 417</p> <p>8.4.3 Reflected Brownian Motion Approximation 418</p> <p>8.4.4 Heavy-traffic Approximation 423</p> <p>8.5 Approximate Analysis of a Network of <i>G</i>∕<i>G</i>∕1 Queues 426</p> <p>8.5.1 Superposition of Flows 427</p> <p>8.5.2 Flow Through a Queue 428</p> <p>8.5.3 Bernoulli Splitting of a Flow 428</p> <p>8.5.4 Putting Pieces Together: The Decomposition Method 429</p> <p>8.5.5 Bottleneck Approximation for Closed Queueing Networks 442</p> <p>8.6 Fluid Models 443</p> <p>8.6.1 Deterministic Fluid Model 444</p> <p>8.6.2 From Fluid to Diffusion Model 452</p> <p>8.6.3 Stochastic Fluid Model 456</p> <p>8.6.4 Steady-State Analysis 459</p> <p>8.6.4.1 Infinite Buffer Size (<i>K </i>= ∞) 462</p> <p>8.6.4.2 Loss Probability 463</p> <p>8.6.5 First Passage Times 466</p> <p>8.6.6 Application of the Stochastic Fluid Model to a Multiplexer with ON-OFF Traffic Sources 468</p> <p>Summary and Takeaways 471</p> <p>Problems 472</p> <p><b>Part III Networked Systems and Protocols </b><b>477</b></p> <p><b>9 Multiple Access </b><b>479</b></p> <p>9.1 Introduction 479</p> <p>9.2 Slotted ALOHA 482</p> <p>9.2.1 Analysis of the Naïve Slotted ALOHA 483</p> <p>9.2.2 Finite Population Slotted ALOHA 487</p> <p>9.2.3 Stabilized Slotted ALOHA 494</p> <p>9.3 Pure ALOHA with Variable Packet Times 499</p> <p>9.4 Carrier Sense Multiple Access (CSMA) 504</p> <p>9.4.1 Features of the CSMA Protocol 505</p> <p>9.4.1.1 Clear Channel Assessment 505</p> <p>9.4.1.2 Persistence Policy 506</p> <p>9.4.1.3 Retransmission Policy 507</p> <p>9.4.2 Finite Population Model of CSMA 509</p> <p>9.4.3 Multi-Packet Reception CSMA 513</p> <p>9.4.3.1 Multi-Packet Reception 1-Persistent CSMA with Poisson Traffic 515</p> <p>9.4.3.2 Multi-Packet Reception Nonpersistent CSMA with Poisson Traffic 519</p> <p>9.4.4 Stability of CSMA 523</p> <p>9.4.5 Delay Analysis of Stabilized CSMA 531</p> <p>9.5 Analysis of the WiFi MAC Protocol 534</p> <p>9.5.1 Outline of the IEEE 802.11 DCF Protocol 534</p> <p>9.5.2 Model of CSMA/CA 538</p> <p>9.5.2.1 The Back-off Process 540</p> <p>9.5.2.2 Virtual Slot Time 543</p> <p>9.5.2.3 Saturation Throughput 545</p> <p>9.5.2.4 Service Times of IEEE 802.11 DCF 549</p> <p>9.5.2.5 Correlation between Service Times 554</p> <p>9.5.3 Optimization of Back-off Parameters 556</p> <p>9.5.3.1 Maximization of Throughput 556</p> <p>9.5.3.2 Minimization of Service Time Jitter 561</p> <p>9.5.4 Fairness of CSMA/CA 565</p> <p>9.6 Further Readings 570</p> <p>Appendix 572</p> <p>Summary and Takeaways 573</p> <p>Problems 575</p> <p><b>10 Congestion Control </b><b>579</b></p> <p>10.1 Introduction 579</p> <p>10.2 Congestion Control Architecture in the Internet 583</p> <p>10.3 Evolution of Congestion Control in the Internet 587</p> <p>10.3.1 TCP Reno 588</p> <p>10.3.1.1 TCP Congestion Control Operations 589</p> <p>10.3.1.2 NewReno 593</p> <p>10.3.1.3 TCP Congestion Control with SACK 594</p> <p>10.3.1.4 Congestion Window Validation 595</p> <p>10.3.2 TCP CUBIC 596</p> <p>10.3.3 TCP Vegas 598</p> <p>10.3.4 Data Center TCP (DCTCP) 601</p> <p>10.3.4.1 Marking at the Switch 602</p> <p>10.3.4.2 ECN-Echo at the Receiver 603</p> <p>10.3.4.3 Controller at the Sender 603</p> <p>10.3.5 Bottleneck Bandwidth and RTT (BBR) 604</p> <p>10.3.5.1 Delivery Rate Estimate 607</p> <p>10.3.5.2 StartUp and Drain 608</p> <p>10.3.5.3 ProbeBW 609</p> <p>10.3.5.4 ProbeRTT 610</p> <p>10.3.5.5 Pseudo-code of BBR Algorithm 610</p> <p>10.4 Traffic Engineering with TCP 611</p> <p>10.5 Fluid Model of a Single TCP Connection Congestion Control 614</p> <p>10.5.1 Classic TCP with Fixed Capacity Bottleneck Link 615</p> <p>10.5.2 Classic TCP with Variable Capacity Bottleneck Link 617</p> <p>10.5.2.1 Discretization of the Evolution Equations 625</p> <p>10.5.2.2 Accuracy of the Fluid Approximation of TCP 627</p> <p>10.5.3 Application to Wireless Links 630</p> <p>10.5.3.1 Random Capacity 630</p> <p>10.5.3.2 TCP over Cellular Link 632</p> <p>10.6 Fluid Model of Multiple TCP Connections Congestion Control 635</p> <p>10.6.1 Negligible Buffering at the Bottleneck 635</p> <p>10.6.2 Classic TCP with Drop Tail Buffer at the Bottleneck 637</p> <p>10.6.3 Classic TCP with AQM at the Bottleneck 638</p> <p>10.6.4 Data Center TCP with FIFO Buffer at the Bottleneck 639</p> <p>10.7 Fairness and Congestion Control 642</p> <p>10.8 Network Utility Maximization (NUM) 645</p> <p>10.9 Challenges to TCP 652</p> <p>10.9.1 Fat-Long Pipes 653</p> <p>10.9.2 Wireless Channels 655</p> <p>10.9.3 Bufferbloat 656</p> <p>10.9.4 Interaction with Applications 658</p> <p>Appendix 659</p> <p>Summary and Takeaways 664</p> <p>Problems 665</p> <p><b>11 Quality-of-Service Guarantees </b><b>669</b></p> <p>11.1 Introduction 669</p> <p>11.2 Deterministic Service Guarantees 670</p> <p>11.2.1 Arrival Curves 673</p> <p>11.2.2 Service Curves 677</p> <p>11.2.3 Performance Bounds 681</p> <p>11.2.4 Regulators 683</p> <p>11.2.5 Network Calculus 688</p> <p>11.2.5.1 Single Node Analysis 689</p> <p>11.2.5.2 End-to-End Analysis 692</p> <p>11.3 Stochastic Service Guarantees 703</p> <p>11.3.1 Multiplexing with Marginal Buffer Size 703</p> <p>11.3.2 Multiplexing with Non-Negligible Buffer Size 711</p> <p>11.3.3 Effective Bandwidth 714</p> <p>11.3.3.1 Definition of the Effective Bandwidth 714</p> <p>11.3.3.2 Properties of the Effective Bandwidth 715</p> <p>11.3.3.3 Effective Bandwidth of a Markov Source 716</p> <p>11.3.4 Network Analysis and Dimensioning 721</p> <p>11.4 Further Readings 727</p> <p>Appendix 728</p> <p>Summary and Takeaways 732</p> <p>Problems 733</p> <p><b>A Refresher of Probability, Random Variables, and Stochastic Processes </b><b>735</b></p> <p>A.1 Probability 735</p> <p>A.2 Random Variables 737</p> <p>A.3 Transforms of Probability Distribution Functions 739</p> <p>A.4 Inequalities and Limit Theorems 744</p> <p>A.4.1 Markov Inequality 744</p> <p>A.4.2 Chebychev Inequality 745</p> <p>A.4.3 Jensen Inequality 746</p> <p>A.4.4 Chernov Bound 746</p> <p>A.4.5 Union Bound 747</p> <p>A.4.6 Central Limit Theorem (CLT) 747</p> <p>A.5 Stochastic Processes 748</p> <p>A.6 Markov Chains 749</p> <p>A.6.1 Classification of States 750</p> <p>A.6.2 Recurrence 751</p> <p>A.6.3 Visits to a State 754</p> <p>A.6.4 Asymptotic Behavior and Steady State 756</p> <p>A.6.5 Absorbing Markov Chains 762</p> <p>A.6.6 Continuous-Time Markov Processes 763</p> <p>A.6.7 Sojourn Times in Process States 765</p> <p>A.6.8 Reversibility 766</p> <p>A.6.9 Uniformization 768</p> <p>A.7 Wiener Process (Brownian Motion) 769</p> <p>A.7.1 Wiener Process with an Absorbing Barrier 771</p> <p>A.7.2 Wiener Process with a Reflecting Barrier 772</p> <p>References 775</p> <p>Index 789</p>
<p><b>ANDREA BAIOCCHI,</b> PhD, is a Full Professor in the Department of Information Engineering, Electronics and Telecommunications of the University of Roma "La Sapienza". He has published over 160 papers on international journals and conference proceedings. He has participated to the Technical Program Committees of more than seventy international conferences. He served in the editorial board of the telecommunications technical journal published by Telecom Italia (currently TIM) for ten years.
<p><b>A COMPREHENSIVE GUIDE TO THE CONCEPTS AND APPLICATIONS OF QUEUING THEORY AND TRAFFIC THEORY</b> <p><i>Network Traffic Engineering: Stochastic Models and Applications</i> provides an advanced level queuing theory guide for students with a strong mathematical background who are interested in analytic modeling and performance assessment of service system networks, with a focus on communication networks. <p>The text begins with the basics of queuing theory before moving on to more advanced levels. Examples and applications are a key part of the material. The topics covered in the book are derived from cutting-edge research, project development, teaching activity, and discussions on the subject. They include applications of queuing and traffic theory in: <ul> <li>Cellular networks</li> <li>Wi-Fi networks</li> <li>Ad-hoc and vehicular networks</li> <li>Congestion control in the Internet</li> </ul> <p>The distinguished author seeks to show how insight into practical and real-world problems can be gained by means of quantitative modeling. Perfect for graduate and PhD students of engineering and science in the field of Information and Communication Technologies, including computer, telecommunications, and electrical engineering, computer science, data science, Network Traffic Engineering offers a supremely practical approach, grounded on a solid theoretical foundation, to a rapidly developing field of study and industry.

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €