A Generalized Processor Sharing Approachto Flow Control .ppt

上传人:bowdiet140 文档编号:377830 上传时间:2018-10-09 格式:PPT 页数:17 大小:108.50KB
下载 相关 举报
A Generalized Processor Sharing Approachto Flow Control .ppt_第1页
第1页 / 共17页
A Generalized Processor Sharing Approachto Flow Control .ppt_第2页
第2页 / 共17页
A Generalized Processor Sharing Approachto Flow Control .ppt_第3页
第3页 / 共17页
A Generalized Processor Sharing Approachto Flow Control .ppt_第4页
第4页 / 共17页
A Generalized Processor Sharing Approachto Flow Control .ppt_第5页
第5页 / 共17页
亲,该文档总共17页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single-Node Case Abhay K. Parekh, Member, IEEE, and Robert G. Gallager, Fellow, IEEE,IntServ Approach rate-based flow; the sources traffic is assigned values to the parameterized set of statistics (avg rate

2、, max rate, and burstiness) . We assume that rate admission control is done through leaky buckets User requests a certain QoS(throughput ,worst-case packet delay). The traffic entering the network has been “shaped” by the leaky bucket in a manner that can be succinctly characterized (we will do this

3、 in Section V), and so the network can upper bound the queuing delay through this characterization. network checks to see if a new source can be accommodated and, if so, takes actions (such as reserving transmission links or switching capacity) to ensure the quality of service desired. Once a source

4、 begins sending traffic, the network ensures that the agreed-upon values of traffic parameters are not violated.,Presentation Organization Generalized Processor Sharing (GPS) and the packet based scheme, PGPS, is defined and explained Results obtained in these section allow us to translate session d

5、elay and buffer requirement bounds derived for a GPS server system to a PGPS server system. a virtual time implementation of PGPS is proposed in the next section. The Leaky Bucket is described and proposed as a desirable strategy for admission control. We then proceed with an analysis, of a single G

6、PS server system in which the sessions are constrained by leaky buckets.,Why GPS Generalized Processor Sharing(GPS) is a flow-based multiplexing discipline that is efficient, flexible, fair and analyzable. characterized by two attractive properties: (i) each backlogged flow is guaranteed a minimum s

7、ervice rate(fairness), and (ii) the excess service rate is redistributed among the backlogged flows in proportion to their minimum service rates(flexible and efficient). analyzable so that performance guarantees can be made.,GPS server characteristics work conserving(server must be busy if there are

8、 packets waiting in the system) and operates at a fixed rate T. It is characterized by weights(positive real numbers) given to the flows Let Si(T,t) be the amount of session i traffic served in an interval (T,t. Then. a GPS server is defined as one for whichSi(T,t)/ Sj(T,t) = i/j, j=1,2,.Nsession i

9、is guaranteed a rate ofgi = ( i/j )r,GPS advantages Throughput guarantee Bounded delay Flexibilty Worst-case network queueing delay guarantees when the sources are constrained by leaky buckets. Session i is guaranteed a rate ofgi = ( i/j )r,A PACKET-BY-PACKET TRANSMISSION SCHEMEPGPS In PGPS the serv

10、er picks the first packet that would complete service in the GPS simulation if no additional packets were to arrive after time T.,Lemma 1: Let p and p be packets in a GPS system at time T, and suppose that packet p completes service before packet p if there are no arrivals after time T. Then, packet

11、 p will also complete service before packet p for any pattern of arrivals after time r.,Theorem 1: Fp = time at which packet p will depart under GPS. Fp = time at which packet p will depart under PGPS. Lmax = maximum packet length and r = rate of the server.Fp Fp = Lmax/r,Theorem 2: Si(T,t) = the am

12、ount of session i traffic (in bits, not packets) served under GPS in the interval T,t. i(T,t) = the amount of session i traffic served under PGPS. Lmax = maximum packet length and For all times t and sessions i, Si(0,t) - i(0,t) 0 such that Si(0,t) - i(0,t) = cLmaxholds for all sessions i over all p

13、atterns of arrivals.,Virtual time Virtual time , v(t), is used to to represent the progress of work in the reference system.,LEAKY BUCKET = token generation rate. = max tokens in bucket. C = maximum rate at which traffic leaves the bucket. Ai(,t) = min(t- ) Ci, , i + i(t- ) li(t) = tokens in the ses

14、sion i token bucket at time t. Ki(t) = total number of tokens accepted at the session i bucket in the interval (0, t.Ai(,t) = li() + i(t- ) - li(t),Lemma 2: For every session i, = (t- ) i / Nj=1 j,ConclusionThe use of Generalized processor Sharing (GPS), when combined with Leaky Bucket admission control, allows the network to make a wide range of worst-case performance guarantees on throughput and delay.,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教学课件 > 大学教育

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1