ADMISSION CONTROL FOR MULTI-LAYER MANAGEMENT OF HIGH-SPEED PACKET-SWITCHED NETWORKS UNDER OBSERVATION NOISE' Izhak Rubin and Teresa Cheng Department of Electrical Engineering University of Califomia, Los Angeles (213) 825-2326

Abstract We study admission control as a congestion avoidance mechanismin the management of high-speedpacket-switched networks under imperfect information. A multi-layer model which can be usedfor the analysis of ISDNand B-ISDN - type networks is presented. In this model, traflc requirements at the lower layers result in constraintson the admissionpolicies at the call layer. Using such a model, we examine the effects of noisy estimates (due to uncertainties in measured state information, or due to the use of realistic limited state distribution mechanisms) on the performance of networks managed via f i e d threshold call admission policies. The standard-deviation of the collected information concerning the network status serves as a key parameter in representing the complexity, coverage, extensiveness, and cost of the implementednetwork managementand informationcollecting procedure. For a singledomain network the effects of Gaussian noise on call blocking, call throughput. packet throughput, and the probability of excess calls are examined in detail. The throughput capacity trajectory is describedfor fixed packet blocking,packet delay, and probability of excess call constraints. Similar analysis can be carried out for multi-domain networks in which uncertainty is introduced through the management domain structure.

1. Introduction In future generation high-speed networks such as ATM networks, congestion control will be essential in allowing for the efficient use of network resources while providing customers with a high grade of service. A general description of the congestion control problem in broadband networks is provided by [1]-[3]. We study admission control as a congestion avoidance mechanism in the management of high-speedpacket-switched networks. Call admission is critical to ATM networks (noting them to be connection-oriented) because high volumes of time-critical traffic require the minimization of per-packet processing at the switches, thus shifting the primary burden for congestion control to the periphery. Parameters such as average packet generation rate and maximum burst, as well as grade of service requirements such as maximum delay and packet loss probability, will be negotiated before calls are admitted into the network. Calls will only be admitted if an

acceptable grade of service can be provided to the new call while maintaining the level of service required by ongoing calls. Several call admission or bandwidth allocation schemes are discussed in [4]-[8]. These studiesfocus on the difficulties inherent in performing resource allocation for networks with heterogenous and/or bursty traffic. One problem that we have not seen addressed in the literature is how to implement call admission under noisy conditions or with incomplete state information. For example, to attain consistently accurate state estimates (which we characterize by low standard deviations on the estimation error),the network managementscheme may have to gather extensive network state data at relatively high observation rates, resulting in high bandwidth and processing requirements for the implementation of the underlying network management system. In this paper we illustrate the effects of noise on a class of fmed threshold call admission policies and examine several approaches for choosing suitable threshold values. First, a model that can be used to study the approximate performance of networks under a variety of admission control policies and noisy estimation conditions is presented. Modeling the observed state information as a noisy variable serves to represent the uncertainties embedded in the measured and distributed informationresulting from sampling rate, accuracy of the sampling technique, and the exchange of partial subnetwork state information between network managers. Under this model, traffic requirements at the lower layers result in constraints on the admission policies at the call level. For a single management domain example, the effects of Gaussian estimation noise on call blocking, call throughput, packet throughput, and probability of excess calls are examined in detail, using basic queueing models which are representative of congestion behavior at the packet and call layers.

2. Multi-Layer Model In our study, we consider two layers: the packet layer and the call layer. To make the analysiscomputationally tractable, we introduce the quasi-stationary assumption: changes in the call process occur slowly relative to those in the packet process, so that the time required for the packet process to reach steady stateafter achangein call stateis shortcompared to the interval between call state transitions. The instantaneous packet blocking probabilities given the call process is in a particular

1This work was supported by NSF Grant NCR-8914690, Pacific Bell and MICRO Grant 90-135, US WEST Contract D890701, and a UCLA Academic Senate grant.

6A.4.1. CH2979-3/91/0000-0570$1 .OO

0 1991 IEEE

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

state x can then be approximated by the steady state values induced by the call state x. The quasi-stationary assumption is discussed in [9] where it was found to be accurate for the conditions of interest. Using the quasi-static assumption, we separate the call layer from the packet layer and treateach one independently. The call process provides the offered packet arrival rates as input to the packet process. In return, results from the packet process reflect as constraints on the admission policies at the call layer. Consider a network of LANs interconnected via other high-speed LANs and/or MANS. In such a network, management duties including surveillance and congestion control may beshared by several networkmanagers. Assumethateach network manager has a region (one or more subnetworks) for which it performs some management duties, and that each subnetworkis associated with at least one manager. We denote each such region a management domain. Within a multidomain network, managers can exchange information about the state of their domains. Some decisions such as admitting long distance traffic can be made jointly as well. Traffic classes are characterized by resourcerequirements, such as average offered traffic intensity, bandwidth, burstiness, and mean connection time, and performance requirements, such as maximum end-to-end delay and packet blocking. Voice, video, and data are examples of possible traffic classes. A distinctcall type is defined for each possible route between an origin-destination pair and each traffic class which may be carried between that origin-destination pair. Let Lbe the set of call types, indexed by I = 0, 1, ...,L- 1. The call space (representing the number of calls of each call type) is given by: R = J~ where 3 represents the set of non-negative integers.

2.1. Packet Layer

rates are given by yp(x).Similarly, d(yp(x))are the end-to-end packet delays. The subspace of calls that can be carried by the network while satisfying the packet blocking and delay requirements is given by R such that Pe,p(r,(x)) q and d(yp(x))2 dV X E fi. (2)

2.2. Call Layer The state of the system for the call process represents the number of each type of call that is currently being carried. Assume that basic system parameters such as node, line, and network capacities and the service requirements of various traffic types are known by the appropriate network managers. Network managers may not have information about the complete state of the network, or they may have inaccurate information. The information they have is defined via observation functions which are functions of the system state. For example, one possible observation function is an aggregation function such that the network manager knows the total number of calls being carried but not the call types. Observation functions may have several components: the local component that is comprised of information on the local network which may be directly observed by the manager, and reported information which is obtained from other managers. A distinction is made between the local component of the observation function which consists of all the available informationaboutagivenregionand thesummary information obtained from other domain managers which may be less complete or less accurate. Call admission decisions are made on the basis of these observation functions. Each domain manager has an associated observation function and decision function. The decision on whether or not to admit a given call can be made by one manager based on its observation function, or it can be made jointly by several managers. A call which is not admitted is blocked.

The object of our packet or cell level analysis is to determine the subspace of calls, c R, which can be carried while meeting the packet performance requirements. These results can be obtained via queueing network analysis,simulation, or even data gathered from an existing network.

Call parameters are defined by the vectors: h, = (h,(O),hc(l),...,h,(L - 1))where &(l) is the arrival rate of

Each call type 1 generates packets at a rate &(l). The system packet rate vector is

type 1 calls, and pc = (~(0)~ pc(l),...,PAL - 1)) where 1 M O is the average holding time for type I calls.

2.2.1. Notation

~ p = ~ ~ p ~ ~ ~ , ~ p ~ ~ ~ , ~ ~ ~ , h p ~ ~ - l ~ ~ . The call state is denoted as X = ( ~ , , X ~ , . . . , X where ~ - ~ )xi represents the number of currently carried type i calls. The offered load into the packet process is then given by YJX) = ( ~ p ~ o b o...,hp 7~p (L (-~ 1bL-J. ~l~ (1)

The stateof the call process is given by x = (x,x,, ...,xL- l ) r where x, is the number of currently carried type I calls. The state of the system at time r is denoted as x(r). We also define the following notation: x; = (xo.X I , ...,x, - 1' xi + 1,XI + 1' . .. XL - 1) t

Packet performance requirements are given for each call type. Possible requirements include: = (PBy(0), 1). ...,PBY(L- l)), the maximum endto-end probability of packet blocking, or packet loss, and dmx=(d"(0),d-(l), ...,d"(L- l)), the maximum end-to-end delay. Let PB,p(yp(~)) be the vector of packet blocking probabilities given that the offered packet arrival

P,Y(

xi = (xg,X I , ...,xi - 1'Xi - 19xi + 1, *.

.I

XL - 1).

From the packet layer analysis, we have a subspace fi of the call process space for which the packet performance requirements are met. One possible objective of the network managers is to constrain the call stateto R to guarantee meeting the packet requirements.

6A.4.2. 0571

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

2.2.2. Decision and Observation Functions Define the set of management domains !a4 to be indexed by m = 0,1,. ..,M- 1. Each domain manager has an associated observation function O,(x) and decision function Dm(O,(x). I). The decision function yields a value in the range [0,11, providing the probability that an arriving type I call will be accepted under state estimates given by Om@). Decisions which affect several domains may be made by a central authority or by committee with input from all the managers involved. Associated with each call type is a set of network managers who are responsible for making the admission decision. For call type 1, denote this set %. For example, the decision whether to admit a type I call can be given by DIb) = q q x ) , 0. (3)

jFI

2.2.3. Solution Technique

i ~ ~ ( O

X,En',x,#x

for I = 0, 1, ...,L - 1andx, xl, x; y f x;,x;,x for I = O , l ,

E

3. Performance of a Single-Domain Network with Noisy State Estimates 3.1. Model To isolate the effects of noisy state estimates on network performance, we study the simplest possible case: a single domain, singletraffic-type model. Each ongoing call generates packets at the rate..,A. The average service time per packet is Vp,. Call requests arrive at rate A,, and last for an average l/pc.Calls which are not admitted are blocked.

3.1.1. Packet Layer

Assume that arrivalsof type I calls form independent Poisson arrival streams, and that the holding times are exponential, thenX = {x(t),t 2 0)formsacontinuoustimeMarkovprocess. Let 8' be the set of allowable states determined by the combination of observation functions and decision policies in effect.Given the system parameters, the observation functions and the decision functions, we can calculate the nonzero elements of the infinitesimal generator (or transition rate) matrix Q for the Markov process to be given by Q(x,x3 = D , ( x ) W Q(x,XJ = x Q(x, X) = -

To illustratethe use of our model, and to proceed with the analysis of call admission under noise, we consider several examples in the following sections.

(4)

Q(KxJ

The packet layer activities are illumated by the behavior of an W l I r queue with service rate p, and buffer size r. Each call generates packets at a rate 5.Packets have maximum average delay and maximum probability of blocking constraints. Denote these values d- and P B yrespectively. Other queueing and network models can be similarly employed, exhibiting analogous behavioral trends. Letqj(k)be the steady-stateprobability of having j packets in the system given that there are currently k calls being carried. Using M/M/l/r steady-stateequations, and noting that the packet arrival rate is now given by kh,, we have:

R'. Note that Q(x, y) = 0 for

...,L - 1.

Under typical decision functions, we obtain a homogeneous, irreducible, non-null Markov process, so we are guaranteed of the existence of a unique equilibrium distribution which satisfies: xQ=O In= 1

(5)

where 1is the appropriately sized vector of ones. A variety of algorithms can be used to solve this set of linear equations. A variety of network performance measures can be calculated using x. For example, since IC, gives the steady-state probability that the call process will be in state x,

p,=

c

~~t

n rc,

(6)

gives the probability of excess calls, or the probability that the call process will be in a state for which the packet requirements are not met. Several other performance measures will be discussed later.

0

otherwise.

The probability of packet blocking is given by P,,,(k) = q,(k). Average delay d ( k ) (for an admitted packet) can be calculated via Little's result by first computing the average number of packets in the system pp(k)where

and then using d ( k )= p p ( k ) / ( k h p )A. simple check can be performed to see whether the delay constraint is likely to be binding: if r / y Id", then we know that the delay constraint will be satisfied without having to compute the steady-state distribution, so that the binding packet performance measure is the packet blocking probability. The packet delay distribution can be calculated and used to bound the 95 percentile delay, as well.

2 Although these equations are conceptually easy to solve,the state space grows rapidly with the size of the network. Considerations on solving larger systems are discussed in [lo] where an iterative algorithm is presented.

6A.4.3. 0572 -~

.

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

The decision threshold for the perfect information Case. denoted as m,represents the maximum number of allowable admitted calls when no observation noise in incuned. The valuem is selected toguaranteetheprescribedmaximum mean packet delay and packet blocking probability levels (even when the number of admitted calls equals m): d(m)S dand d(m + 1)> dor PB,,(m>

(8)

and PB,,(m + 1)

>PE.

3.1.2. Call Layer In the singledomainsingletraffic-type model, thecall process X = { x ( t ) , t 10) is a one-dimensional birth-death Markov chain. Under perfect information, an admission policy that satisfies packet performance requirements would simply compare the current state, x , to m and accept an arriving call if x c m. In this case the call process X follows the behavior of an M/M/m/mqueue with arrival intensities x
3.2. Measures of Performance The measures of performance which we consider are: call blockingprobability (Pi),probability of excesscalls (P,,),call throughput (s,), and packet throughput (s,). From the packet layer analysis, we calculate a threshold m, which is the maximum number of calls which can be carried while satisfying the packet blocking and delay constraints as discussed in Section 3.1.1. The probability of excess calls gives the probability that there are greater than m calls in the system. Under imperfect information, however, m may not be a desirable decision threshold, so we distinguish between m', the selected decision threshold under observation noise conditions. and m. The performance measures are calculated by: Pi =

-

c pkP(e1 m'-k)

k =O

-

k=m+l

pk

s, = A,( 1 - P i )

x2m

and service rates

3.2.1. Perfect Information Hence, the equilibrium dismbution for the number of system carried calls is given by (9)

Pk =

pi = P , P,, = 0

k>m

0

With perfect information, several of the formulas for the system performance measures can be simplified to yield:

where

s, = U 1- P,)

1

(12)

m

Suppose, however, that we have state estimates which are corrupted by noise: for example, R = x + e where R is the observed state,x is the true state. and e is the estimation error. For a fiid threshold admission scheme with threshold level m', a call will be accepted only if 1 < m'. which occurs with probability P ( e c m ' - x ) . Thus, the resulting intensity of admitted calls. when the true state of the system is x , is equal to 14,= k p ( e e m'-x). The resulting call state process X is now a continuous-time birth-death Markov chain with arrival intensity 14,and departure rate xpc, when X = x . Substituting into the general birth-death equations,we have

where

3.3. Performance Results for a Single Domain Example The default parameters for the single domain example are listed in Table 1.

3.3.1. Effects of Gaussian Noise We consider network performance when the call admission decision is made on the basis of information which is corrupted by zero-mean Gaussian noise. The various performance measures are calculated as a function of the standard deviation of the noise for severalpossible thresholds around the noiseless state threshold, m = 15, which was determined by the packet process. As Figure 1 illustrates, there is a sharp increase or decrease from 0 to CJ+ in each of the curves, except for the probability of excess calls curves form' = 14. After the initial jump, increasing CT results in increased call blocking, reduced call throughput, and reduced packet throughput. The behavior of the probability of excess calls depends on the threshold value.

6A.4.4.

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

Define the network utilization to be X C

p, =-. W

C

Curves are shown for pc= 1.067.

10 packetdms 60 packets

(a) Packet parameters

I 1

calldmin OScalls/min

I

15 calls

(b) Call parameters

Table 1. Parameters for the Single-Domain Example

0' Effects: Consider the m ' = m case. The call blocking , probability for o=O is simply p,,,. For o = ~E>O, P(e2-1)=1 and P ( e > l ) = O while P(e>O)=;. h t {pk} denote the steady state carried call level probabilities for the perfect information case (a= 0) and pk' denote the corresponding probabilities for the case with ~ = E , E > O . For 0 I k I m, pk' = pk. Substituting into the call blocking equations we see that 1 1 Pi' = p,'P(e 2 0) = -pm' = -p, < p , =Pi. 2 2 Actually, Pi' includes a P,,,+~'term which is very small for small 6,SO typically f Pi < Pi' < Pi.The probability of excess calls is then expreswxl as:

Call throughput sc is a linear function of the call blocking probability, so the decrease in P i reflects an increase in sc.As apparent from the definition, packet throughput depends on two effects: the 1 - P& ,) term which decreases for high k

values, and the packet arrival rate, kh,which increases with k. In our example, P,,,(k) does not increase dramatically as k changes from m to m + 1,SO the effectof a positive probability of an increased arrival rate dominates, resulting in a higher packet throughput. Theincreasesin call throughput and packet throughput represent the performance benefits which can be achieved in return for the willingness to tolerate a small probability that the packet requirements will not be met (i.e. the probability of excess calls). Long-Term Effects: Noisy estimates affect the call process in two ways: 1) calls which should be accepted are rejected, and 2) calls which should be rejected are accepted. The 0' effectsdescribed above are the result of accepting calls which would have been rejected under perfect information. As o increases. however, calls which should be accepted are rejected due to overestimating the number of calls in the system. The consequence is that the probability of having a high number of calls (near m ) is reduced, since the relative transition rates of the birth-death process have shifted towards "deaths". The process is slowly choked off, resulting in increased call blocking. Since the probability of being in the high tail of the distribution is reduced (even though the tail may be longer), the probability of excess calls is reduced. Call throughput and packet throughput are also reduced. The level of reduction is one measure of the cost of noisy information. These effects are illustrated in Figure 1. Threshold Value Effects: If m' < m and Q = 0, calls which would have been accepted if m' had been equal to m are rejected. Call blocking is higher while call and packet throughput are lower. The probability of excess calls is the same, remaining at 0. As Q increases, the 0' effects described above hold, with the exception of the probability of excess calls curves. Since m' < m , it will take a greater error for the system to reach k > m. This is not likely to occur until the standard deviation of the noise distribution reaches the point where P ( e < m ' - ( m +1))%0. Hence, in Figure lb, the probabilityofexcesscallsform'= 14remainsatOuntilo= 0.4 and then increases gradually before tapering off due to the "choking off' effect. If m' > m and o = 0, the probability of excess calls is greater than zero sincemore than m calls will be accepted into the system. Network Loading Effects: Increased loading of the network results in increased call blocking, probability of excess calls, call throughput, and packet throughput as expected. For a lightly loaded network, for instance pE = 0.433, and at low Q values, the call blocking values are very close for the various decision thresholds because the probability of being in, or near, the blocking statesis low. As the load increases, the probability of being in the blocking states increases,and there is a greater spread between the curves for the various threshold values.

6A.4.5. 0574

0 35

0.3 01

ti f 3

o.25

_*-O2

4--

i

0.15

-. .

0

1

2

3

4

5

Sigma

Sigma

(a)

(b)

7 .

56

-

5.4

I 0

I

1

I

2

I

I

I

I

I

4

I

I

3

4

5

1

2

3

4

5

Sigma

Sigma

(c) (4 Figure 1. Various performancemeasuresversus ounderzero-meanGaussiannoiseforp, = 1.067: (a)Callblocking. (b)Probability of excess calls. (c)Call throughput. (d)Packet throughput.

3.3.2. Sensitivity to noise distribution-type To test whether our results are sensitive to the particular noise distribution. we ran several additional cases. One case involved a zero-mean uniform distribution with varying range values. Another case involved a zero-mean two-sided exponential dismbution with a varying intensity parameter which we refer to as o. The performance curves for these noise distributions show Uends that are similar to those shown for the Gaussian distribution.

3.3.3. Throughput Capacity Trajectory Once the packet delay and blocking probability levels have been prescribed, the probability of excesscalls determines the likelihood that the network will fail to meet these performance levels. Suppose that we fm the maximum probability of excess calls value and determine the maximum achievable call throughput and packet throughput combinations which we refer to as the throughput capacity trajectory. This process is illustrated in Figure 2. For t h i s example, to better illustrate the form of the capacity trajectory, we increase the prescribed packet blocking probability from 0.001 to P B y= 0.2 which in turn yields an increased threshold of m = 20. We assume

A, =8.0, giving a pc= 1.067. To calculate the feasible throughput capacity pairs, we fix the maximum probability of excess calls to be 0.05. Figures 2a-2c show a family of curves exhibiting the probability of excess calls, call throughput, and packet throughput versus Q for m' ranging from 17 to 24. For each decision threshold m', we use Figures 2a-2c to find the maximumcall throughputand packet throughput values which satisfy the excess call constraint. These values are used in Figure 2d where the corresponding maximum packet throughput is plotted against the maximum call throughput for the various "levels (aswell as form' = 25). For this example there is an optimal m' that maximizes both throughput values. The existence of a single optimal point is not guaranteed, however, as other examples have shown. For small packet blocking probabilities, the throughput capacity trajectory can be approximated by a line. Figure 3 shows the packet throughput versus call throughput curve for a range of decision thresholds for hc=5.0, P B y= 0.001, m = 15, and P e y = .005. Notice that the points fall on a line (approximately), with maximum throughput valuesachievedform'= 14.Tounderstandwhy thisisso,note that for P,,Jk) 8: 1, we have:

6A.4.6. 0575

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

0.1

75 P

3

0.08

z

B

B

5 0.08

-f

z

I-

64

3

6

0

0.M

P

7

5.5 0.02

5

n

4.5 0

6

4

2

10

2

4

10

6

Sigma

Sigma

(4

(b)

520.000

.2

515.000

c W

g 510.000 30

I-

n

505.000

500.000

1 0

Sigma

10

495.000 0.9

I

I

I

I

I

I

I

7

7.1

7.2

73

7.4

7.5

7.6

Call Throughput

(c)

(4

Figure 2. Procedure for calculating throughput capacity trajectory (p, = 1.067, m = U),P B y= 0.2): (a)Set P, = 0.05, determineappropriate Q values for each "curve. (b)Findcall throughput values correspondingto o's determined in (a). (c)Find packet throughput values correspondingto o's determined in (a). (d)Plot packet throughput values versus call throughput values.

s p=

c Ptkhp(l -~B,p(kN

= hpp

P t

= hPW where represents the average number of calls. From Little's result we know that the average number of customers in a queueing system is equal to the average arrival rate of customers to that system, times the average time spent in the system [l 11. In our system, the arrival rate of calls into the system is given by h,(l -Pi).Thus, for smallpacket blocking values we observe the linear relationship

%

have seen, for large o,call throughput and packet throughput are decreasing functions of o.The decision threshold value which maximizes throughput depends on the probability of excess call constraint. For a high constraint value, the throughput is maximized by a decision threshold m' which is greater than m and by observation noise conditions which involve higher o > 0 levels. In other words, higher noise levels can be sustained (and thus a possibly lower cost network management scheme) with no penalty incurred on the call and packet throughput levels. For low probability of excess calls constraints,on the other hand, the effect of throughput being a decreasing function of o dominates for large decision threshold values. In these cases, as in Figure 3, the optimal m' may be less than m .

sp =-s,,

Pc

as noted in Figure 3. If the decision threshold is too low, too many calls are rejected, and the throughput is lower than necessary. On the other hand, if the decision threshold is too high, the only way to meet the excess call constraint is for o to be large. As we

3.3.4. Admission Policies A natural question to ask is how best to manage a network in the face of incomplete or inaccurateinformation. We evaluate the fixed threshold and the fixed probability of blocking policies under various traffic loads and noise conditions.

6A.4.7. 0576

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

:

and less accurate, it may be better to use no information at all than to use the inaccurate state estimates. To test this hypothesis, we calculate the probability of call blocking, probability of excess calls, call throughput, and packet throughput for a range of fiied blocking probabilities.

/

// nr.17

310,000

Substituting h, = &,Piinto the birth and death equations, we obtain

where

w.11

I 4.7

5oo.OOo 4.2

4.3

4.4

4.5

4.6

Call Throughput

4.8

Figure 3. Throughput capacity trajectory for parameters: P B y= 0.001, P,, = 0.005, and pc= 0.667.

Fixed Threshold: Several approaches can be taken in determining a desirable decision threshold, depending on which values are fiied. One natural possibility is to use the throughput capacity trajectory described in Section 3.3.3 to determine an m‘ which maximizes call and packet throughput for a f i e d P,,.Another approach is to f i the o and examine the achievable performance measures for each decision threshold.

7.8

M a

1

---._. M a

As in the cases described above, the trade-off is between the probability of excess calls and the other performance measures: call blocking, call throughput, and packet throughput. Since the fixed blocking policy is not adaptive, it cannot trade-off intelligently. To meet a given probability of excess call constraint, the call blocking probability must be relatively high compared to those policies that are able to distinguish between high and low levels of traffic. Figure 5 shows the probability of excess calls plotted against the call blocking probabilities. Similar curves are shown for several f i e d threshold policies.Each point on these fiied threshold curves has an implicit o associated with it. From this chart it is clear that even for very large o’s, it is better to use the information available, although, eventually the cost of gathering the information may outweigh the benefits. In the reasonable range of 0’s. however, we observe the threshold policy to be superior. 0.36

0.3

: 6.0 0

I

I

I

I

I

1

2

3

4

5

0.2

14os.000

3 0.15

Sigma

Figure 4. Call throughput and packet throughput versus o for pc= 1.067, m =20, PBy=0.2, and P,, = 0.05.

Figure 4 provides another view of the information displayed in Figure 2. Here. for various values of 6,we see decision thresholds that maximize call throughput and packet throughput while meeting the probability of excess call constraint. Ag,ain we see that the maximum throughput values occur at m‘= 21 and a = 1.2134. Fmed Probability of Blocking: The fixed probability of blocking policy makes no use of state information. Instead, each incoming call is accepted or rejected with a fixed probability P i . This policy is included to provide a comparative measure for the value of information in the implementation of call admission control. As the estimates become less

?

n

01

OS6

e 015

02

025

03

035

04

045

Call Blocking Probability

Figure 5. Probability of excess calls versus call blocking probability for fixed threshold policies m‘ = 14, 15, and 16, and a fixed blocking policy.

4. Conclusion Using a fairly general model, we have illustrated the effects of observation noise on a class of fned threshold call admission policies. Under certain conditions, it appears that low levelsof noise can improve system call and packet throughput

6A.4.8.

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

performance,as long as a smallexcess-call probability can be tolerated. The singledomain example demonslrates that decision thresholds can be tailored to specific conditions to improve network performance. In addition, analysis of the throughput capacity trajectories demonstrates the relationships between noise levels, decision thresholds, and various network performance measures.

References G. Gallassi, G. Rigolio, and L. Verri, "Resource Management and Dimensioning in ATM Networks." IEEE Network Magazine, Vol. 4, NO. 3, pp. 8-17, May 1990. C. A. Cooper and K. I. Park, "Toward a Broadband Congestion Control Strategy," IEEE Network Magazine, vol. 4, no. 3, pp. 18-23, May, 1990. R. Jain, "Congestion Control in Computer Networks: Issues and Trends," IEEE Network Magazine, vol. 4, no. 3, pp. 24-30, May, 1990. J. Filipiak, "Structured Systems Analysis Methodology for Design of an ATM Network Architecture," IEEE Journal on Selected Areas in Communications, vol. 7, no. 8, pp. 1263-1273, October 1989.

J. Y. Hui, "Resource Allocation for Broadband Networks," IEEE Journal on Selected Areas in Communications. vol. 6. no. 9, pp. 1598-1608, December 1988. H. Ohnishi, T. Okada, and K. Noguchi, "Flow Control Schemes and DelayLoss Tradeoff in ATM Networks," IEEE Journal on Selected Areas in Communications, vol. 6, no. 9, pp. 1609-1616. December 1988. B. Kraimeche and M. Schwartz, "Analysis of Traffic Access Control Strategies in Integrated Service Networks." WEE Transactions on Communications, vol. COM-33, no. 10, pp. 1085-1093, October 1985. G. Gallassi and G. Rigolio, "ATM Bandwidth Assignment and Bandwidth Enforcement Policies," Proceedings IEEE Globecom '89. T. Kamitake and T. Suda, "Evaluation of an Admission Control Scheme for an ATM Network Considering Fluctuations in Cell Loss Rate," Proceedings IEEE Globecom '89. I. Rubin and T. Cheng, "Performance of Traffic Management Strategies for Interconnected High-speed Local and Metropolitan Area Networks," Proceedings IEEE Intl. Con8 on Communications (ICC'90). Atlanta, GA, April 1990. L. Kleinrock, Queueing Systems, Vol. I : Theory. New York: John Wiley & Sons, 1975.

6A.4.9. 0578 ~.

~___

Authorized licensed use limited to: Univ of Calif Los Angeles. Downloaded on March 4, 2009 at 01:08 from IEEE Xplore. Restrictions apply.

Admission control for multi-layer management of high ...

tomers with a high grade of service. A general description of the congestion control problem in broadband networks is provided by [1]-[3]. We study admission ...

732KB Sizes 5 Downloads 174 Views

Recommend Documents

Quality of Service Routing and Admission Control for ...
1. Quality of Service Routing and Admission Control for Mobile. Ad-hoc Networks with a Contention-based MAC Layer. L. Hanzo (II.) and R. Tafazolli. Centre for ...

Game-Based Admission Control for Wireless Systems
Our preliminary results show that these schemes have the potential ... mobile devices, by design, have only limited battery capac- ity. ... the signal-to-inference ratio (SIR) in the associated wireless channel. .... Thus, the latter point is the “

An online admission control algorithm for dynamic traffic ... - CNSR@VT
how to handle the dynamic changes for online traffic arrival and departure in both the ... our algorithm will configure MIMO degree-of-freedom. (DoFs) at each ...... This sequential accounting of IC responsibility is the basis of our ...... INFOCOM 2

ADMISSION POLICY FOR MIDDLE AND HIGH LEARNING TRUST ...
Marden Bridge Middle School. Lovaine Avenue ... Burnside Business Enterprise College ... determined by the Governing Bodies of the above Learning Trust Schools in North ... If you applied online you will be sent an email on this day if you.

ADMISSION POLICY FOR MIDDLE AND HIGH LEARNING TRUST ...
of the home address (including flats) to the central point of the school using the. Local Land ... contact the Access Team on telephone number 0191 643 8724.

Connection admission control for capacity-varying ... - Semantic Scholar
ations and billing, network providers may only permit a small number of ... tions experts engaged in software development and consulting services. Dr. Rubin ...

An online admission control algorithm for dynamic traffic ... - CNSR@VT
how to handle the dynamic changes for online traffic arrival and departure in ...... for distance and bandwidth with appropriate dimensions. We assume the ..... [4] F. Gao, R. Zhang, Y.-C. Liang, and X. Wang, “Design of learning- based MIMO ...

ADMISSION POLICY FOR MIDDLE AND HIGH LEARNING TRUST ...
Oct 30, 2015 - If you applied online you will be sent an email on this day if you ... December 2016; no list will be held by any individual school or the Local ... To find out which catchment area you live in log onto www.northtyneside.gov.uk or.

Admission to high school1.pdf
Page 1 of 5. u~~n1A1~t.11~t.1B1~1An'l':l1n1ru~'UU~ ., . b~B..:i u~~n1A~1t.1~m~i'.rn~ib-U'1 n'l':l1~B~ ~uu~~mAut.1um1"U1~'W (u1"U.) 'IJ. u~~:ij1tJn1~ '\':1 1 1€i

Admission to high school.pdf
Page 1 of 5. tl~~n1Ai'VltJ1i;rtJei1~1fimnn1ru\l'UU~ ., . b~ei.:i tl~~mA~1tJ~ei~ij~'Vltb-U'1fimfl~ei~~~utl~~mAut:Jumi"1J1~vi.ff'U6i.:i Ctl16-1.) 'U 'U. u1~mf'llut1um1'1!1~~.ff'U~.:i 'U (u1~ ) u~d :Wmvi'forl'~b~e:imb~~t:.i1'Um1Yi\111ru1b.V1Pim·.n\;)m~

Exponentiated backpropagation algorithm for multilayer ...
3Department of Mathematics and Computer Applications. 4Department of Information Technology. Sri Venkateswara College of Engineering, Sriperumbudur ...

Multilayer reverse osmosis membrane of polyamide-urea
Oct 29, 1991 - support of polyester sailcloth. The solution is cast at a knife clearance of 5.5 mi]. The sailcloth bearing the cast polyethersulfone solution is ...

Application for Admission
Note: All documents submitted with the application must be either in the ... 197 – computer-based, min. ... courses), work experience and language proficiency.

multilayer systems
The width of the first wide barrier for real systems can be taken equal to 8 instead of 20, required for perfect system with no losses. Accounting for losses shows that the increase of the first barrier only increases losses in the whole range of ene

Multilayer plastic substrates
Jul 12, 2004 - See application ?le for complete search history. (56). References Cited ..... mance Differences Arising From Use OF UV Or Electron.

Application for Admission
1) complete the application form either online or in hard copy. ... Degree seeking applicants are typically required to conduct an interview in person or via phone.

Multilayer optical fiber coupler
Dec 6, 2003 - This patent is subject to a terminal dis claimer. (21) App1.No. ... cal Elements by the Use of EiBeam Directed Write on an. Analog Resist and a ...

Multilayer optical fiber coupler
Dec 6, 2003 - comprise glass having an index of refraction that approxi mately matches the index of the optical ?ber, and an optical epoxy is used to af?x the ...

A Receding Horizon Control algorithm for adaptive management of ...
Apr 22, 2009 - eters are refined and the management horizon advances. The RHC .... energy transport model was used to drive the RHC algorithm qk | k.

A Receding Horizon Control algorithm for adaptive management of ...
Apr 22, 2009 - managing soil irrigation with reclaimed water. The largest current .... To explain RHC, we .... information x(k) and the first control u*(k) is then used to calculate the state x(k ю 1) ...... Technical Report NCSU-IE Technical Report