• 沒有找到結果。

Design and analysis of delay control for CBR services in ATM networks

N/A
N/A
Protected

Academic year: 2021

Share "Design and analysis of delay control for CBR services in ATM networks"

Copied!
15
0
0

加載中.... (立即查看全文)

全文

(1)

computer

ELSEVIER Computer Communications 21 (1998) 445-459

Design and analysis of delay control for CBR services in ATM networks

Y.C. Chen*, C.T. Chan, S.C. Hu

Departmenr of Computer Science and Information Engineering, National Chiuo Tung University, tfsinchu, Taiwan 30050, ROC Received 2 September 1997; revised 9 December 1997

Abstract

Asynchronous transfer mode (ATM) networks are designed to provide end-to-end transport of user data via virtual connections with specified quality of services (QOS), which is expected to be satisfied through effective traffic control mechanisms. This paper presents an adaptive delay-jitter control (ADJC) method that guarantees the delay bounds of constant bit rate (CBR) services in ATM networks. Our proposed method is based on a node-by-node time-frame scheme. Through both mathematical derivation and simulation, we have demon- strated that ADJC features a significant improvement over existing approaches in jitter delay, which can be reduced to one time-frame

from end-to-end for CBR traffic. Simulation results have shown that CBR services receive satisfactory delay performance using our

approach. 0 1998 Elsevier Science B.V.

Keywords: ATM; CBR services; Adaptive delay-jitter control

1. Introduction

The asynchronous transfer mode (ATM) is selected as the

basis of B-ISDN due to its flexibility and efficiency for

accommodating a wide range of services. The high band-

width offered by ATM networks makes real-time appli-

cations, such as audio/video transport, feasible. To support

these applications, ATM networks are designed to provide

end-to-end transport of user data with specified quality of

services (QOS), which is expected to be satisfied through

effective traffic control. Usually, in high-speed networks

such as ATM, the propagation delay between intermediate

nodes is relatively long compared with the packet (cell)

transmission time, thus the reactive control method may

not be effective to accommodate delay-sensitive traffic

(e.g. constant bit rate (CBR) traffic, real-time traffic). On

the other hand, preventive control approaches [l-7] which

try to avoid network congestion in advance are more pro-

mising. The cell scheduling discipline at each intermediate

node determines whether a cell is ready to be transmitted

based on its QOS requirement. There are work-conserving

and non-work-conserving cell scheduling disciplines. In the

former the transmission is never idle as long as there is a cell

waiting to be sent. Several well-known examples are

weighted fair queuing (WFQ) (81, virtual clock [lo],

* Corresponding author. Tel.: 00886 3573 1864; fax: 00886 3572 7842; e-mail: ycchen@csie.nctu.edu.tw

0140-3664/98/$19.00 0 1998 Elsevier Science B.V. All rights reserved

PII SO l40-3664(98)001 19-4

packet-by-packet generalized processor sharing (PGPS)

[9,24] and self-clocked fair queuing (SCFQ) [ 11,12,25].

While in the latter, the transmission may be idle even

when there are cells ready to send; some popular examples are stop-and-go framing (S&G) [ 15-171, hierarchical round

robin (HRR) [18], rate control static priority (RCSP)

[ 11,19,20] and traffic-controller rate-monotonic priority

scheduling (TCRM) [21]. Work-conserving disciplines pro-

vide lower average queuing delay and larger end-to-end

delay jitter than non-work-conserving disciplines. In

work-conserving discipline, traffic needs to be characterized

inside the network on a per connection basis to derive end-

to-end delay bounds and buffer space requirements.

However, the traffic pattern is usually distorted inside the

network due to the cell transmission contention, and it is

difficult to restore the original traffic pattern after the

distortion.

The non-work-conserving disciplines have several advan-

tages for supporting CBR services. These advantages

include : (1) the end-to-end queuing delay can be easily

derived through local delay analysis at each intermediate switch; (2) the required buffer space to prevent cell overflow at each switch can be reduced through traffic regulation inside the network; (3) it features shorter delay jitter perfor-

mance and smaller buffer requirement for playing back at

the end system. However, the non-work-conserving

disciplines suffer lower bandwidth utilization because the

(2)

446 Y.C. Chen et al./Computer Communications 21 (1998) 445-459 waiting. This problem can be improved by accounting for

non-delay-sensitive traffic in an integrated-services envir- onment. A well-known non-work-conserving discipline, S&G frame strategy, has a remarkable end-to-end delay bound and delay-jitter bound compared to HRR, but its bandwidth management is inflexible and it is difficult to choose a proper time-frame size to meet various application needs. While RCSP provides a nearly optimum packet delay-jitter control for real-time traffic, however, it needs to pass the delay information (cell eligible time) from node to node and to synchronize the clock time of all intermediate nodes precisely, which is extremely difficult in an ATM wide-area network environment. TCRM provides a bounded end-to-end delay for real-time communications. It provides lower average queuing delay compared with S&G, but its delay-jitter control is worse than that in S&G.

This paper presents a feasible traffic control approach that guarantees both end-to-end delay bound and delay-jitter bound for CBR services in ATM networks. Apparently, we can reconstruct the characteristics of a CBR stream at the end system as long as its delay-jitter bound is guaran- teed. We proposed a cell scheduling method based on time- frame synchronization and non-preemptive priority sorting, and demonstrated through mathematical derivation and system simulation that our cell scheduling method achieves a significant improvement over existed approaches in end- to-end delay jitter, as well as provides an adaptive delay- jitter control with end-to-end delay jitter reduced to one time-frame. The organization of this paper is as follows. Section 2 addresses the traffic control framework. In Section 3 the mathematical analysis of the proposed method is pre- sented. The system simulation and performance evaluation are discussed in Section 4. Section 5 concludes the work.

2. The traffic control framework

Constant bit rate (CBR) services such as CBR audio and video are expected to comprise a significant portion of the traffic on ATM networks. Two important QOS measures for CBR traffic are the end-to-end delay and the delay-jitter, which can be guaranteed with an effective strategy for bandwidth reservation and traffic control. We use a time- frame-based technique that combines both call admission and cell scheduling policies to accomplish the task. The former decides whether to accept or to reject an incoming connection request, so that network loading can be kept below the congestion level, and the delay bounds of those accepted connections can all be satisfied, while the latter

reconstructs the time property of the admitted traffic in each intermediate node, and this is essential to guarantee the queuing delay bound. The source traffic must be shaped through a regulator as smooth traffic pattern in which the cell interarrival time is restricted. Before presenting the proposed traffic control scheme, it is necessary to define the simple-smooth traffic in the ATM network as follows.

Definition 1. In ATM network, the cell stream of a con- nection is defined as simple-smooth trafJic (SST) with time frame T (in cell slot) if, during each non-trivial period T (i.e.

T > l), there is at most one cell transmission of the same stream. A connection that carries an SST in the network is called an SST connection or an SST stream.

Assume a CBR connection has a guaranteed bandwidth R

with time frame T, which is obtained through negotiation during the connection setup based on the cell interarrival characteristics, where T = [C/R], and C is the link capacity. Fig. 1 shows an SST stream, the traffic of a CBR connection in the network will be regulated as an SST stream through- out the network using our proposed strategy.

Before we proceed to the discussion, it has to define the terminology of eligibility.

Definition 2. A cell of an SST connection with time frame T is said to be eligible in an intermediate node if it is ready to be scheduled, and its preceding cell of the same connection was scheduled no shorter than T ago.

Fig. 2 shows the CBR transmission control configuration of our traffic control architecture. The transmission control- ler (TC) consists of a cell dispatcher (CD), a rate controller (RC) and a priority service scheduler (PSS). The CD dis- tributes a cell to its associated FIFO queue. The RC provides a set of regulators to accommodate each CBR connection. Each regulator shapes the input traffic of the associated connection as SST according to the eligibility rule. The PSS schedules all eligible cells for transmission. Through such traffic regulation, the TC can provide a bounded end- to-end queuing delay for CBR services. Assume that shared memory is used, then each output buffer can be logically partitioned into n separate FIFO queues for holding the incoming cells of the associated CBR connections. In addi- tion, we can assign N priority levels to accommodate the eligible cells from their corresponding CBR service classes. Our proposed strategy is similar to the S&G scheme, Zhang’s RCSP [20] and TCRM [21] in the objective of transmission-control. However, our service discipline pro- vides a significant improvement in the average end-to-end queuing delay compared with the first scheme, and features

Time e 0 cell slot payload of SST

(3)

Y.C. Chen et al./Computer Communications 21 (1998) 445-459 447 Input Link 1 . . Input Link M I 1 MM4 Switching Core :

I

I

R

I 1

K

Fig. 2. Proposed CBR transmission control in an ATM switching node.

a more realistic time-frame based method for delay-jitter

control compared with the latter two. The main difference between the S&G approach and ours is that ADJC avoids

the extra waiting time through node-by-node synchroniza-

tion, which allows arbitrary time-frame sizes that are not

supported in S&G, while the difference between the delay- jitter control in RCSP and ours is the time synchronization

method. ADJC does not need the cell eligibility time infor-

mation from the upstream node; therefore, not only the

implementation becomes feasible, but also the overhead is

greatly reduced, since per cell time-stamping and time

synchronization between different switching nodes are not

realistic under ATM network environment. While the rate-

jitter regulator in RCSP controls delays jitter by partially

reconstructing the traffic pattern, it introduces large delay

and buffer space requirement at a single switch node.

Although the RCSP avoids the dependencies between prior-

itized scheduling and bandwidth allocation, its stringent

admission control conditions for satisfying the delay-

bound requirement restrict the resource utilization. The

main difference between the TCRM approach and ours is

that ADJC is time-frame based which can be realized using

counters, thus it is more feasible as well as provides a better delay-jitter control.

3. Analysis of proposed traffic control method

First, we propose a simple delay-jitter control strategy

(SDJC), then we will enhance SDJC to an adaptive delay- jitter control strategy (ADJC).

3.1. Simple delay-jitter control (SDJC) strategy

The SDJC deals with two issues: the resolution of

transmission contention among multiple SSTS, and the

maintenance of the outgoing cell stream of each connection

as SST. We set three rules for intermediate nodes. (1) In

order to meet the delay requirement among various service

types, the priority ordering of transmission will prefer the

cell with the smallest time-frame. Of course, this priority

ordering can be adjusted flexibly for practical needs. (2) To keep the traffic pattern of a connection as SST throughout the network, only one cell can be granted eligibility within one time-frame interval for each connection. (3) The transmission for CBR service will be idle if there is no eligible cell.

Let N be the time-frame priority level and nj be the

number of connections with time-frame Tj, where T1 < T2

< ... < TN, 0 5 nj and 1 I j 5 N. When a new CBR connection request is received by the network, a CAC proce- dure is executed to decide whether to accept or to reject the call. If there already existed xr= Ink CBR connections in any

node along the end-to-end path, the newly requested CBR

connection with time-frame Ti can be accepted by that node if the following conditions are satisfied. The first condition,

(1)

ensures that the total traffic load will not exceed the link capacity. It implies that the new CBR connection can obtain

the required bandwidth, while the second condition,

P

I Ti

> Ti and x

fcdll, T,ST, _ ,

< Ti- 19

is necessary to guarantee the queuing delay bound of a CBR

(4)

448 Y.C. Chen et al./Computer Communications 21 (1998) 445-459

contention among connections with various priority levels,

the maximum number of cell arrivals within time-frame Ti

from those connections with time-frame less or equal to Ti

must be not greater than Ti(Zq,r)nj X ([T,)/(q)]) 5 Ti) to

guarantee the bounded delay. However, it can also provide the bounded delay in the case that the maximum number of

arriving cells within time-frame 7’i from those connections

with time-frame less than or equal to Ti is greater than Ti. This is because there is an idle cell slot during the Ti_ 1 time- interval. For example, assume there already existed three

connections with T, = 2, T2 = 4 and T3 = 8. When a new

request with T4 = 9 arrives, it will be accepted. This will not deteriorate the QOS of the CBR connection because the new connection will use the idle slot within the time-frame T3. In this case, the CAC must determine whether

~~~~11~ c [;:;I $[# $Ym:!n tlmann~;h~,n,oti.d~~

slot cad be used within Ti_1 time duration. Therefore, the new request connection can be accepted as long as the num-

ber of connections with time-frame Ti is no greater than

[(Ti_ I)/TJ (i.e. ni 5 [(Ti_ I)/TiJ)*

A new connection request is accepted if the network has

enough resources to provide the QOS requirements of the

connection without affecting the QOS already established in the network. Hence, when a new connection request satisfies

the above two conditions, the CAC procedure must further

decide whether admitting the new connection causes the

QOS violation of the existing connection or not. The algo-

rithm for the CAC is stated as follows:

Algorithm Call-Admission-Control:

Declaration:

N: the number of time-frame priority levels Ti: the time-frame size of the new request,

which belongs to class i (1 I i 5 N)

nj: the number of connections with time-frame Tj, where TI < T2 < ..’ < TN

Et= ,nk: the number of existing CBR connections

in an intermediate node

R-Flag: the recursive status flag, it is 0 if the

recursive process is terminated, and 0 otherwise

A-Flag: the output status flag, it is 1 if the new

connection is accepted. and 0 otherwise

Initialization: A-Flag = 0; R-Flag = 1; Begin if l/Ti + xt= 1 (nk X l/Tk) I 1 then CAC(i, Ti); endif end

Procedure CAC(i, Ti): Begin if (R-Flag) then if (i = N) then if ~r,~r,5 X ([TN/q]) 5 TN then A-Flag = 1; R-Flag = 0; else

if &sr,_,nj X ([TN- l/TjI) > TN- I and ni 5 [TN/TN _ 1 ] then A-Flag = 1; R-Flag = 0; endif endif else if xqSTnj X (rTi/Ti]) 5 Ti then CAC(i+ 1, Ti+ 1); else if Zr+r,+, 4 X ([Ti _ ,lTl]) < T; _ 1 and Al; 5 [(Ti)l(Ti _ I)]) then

CAC(i+ l,Ti+,); else R-Flag = 0; endif endif endif endif End

Assume an SST cell has a higher transmission priority

than a non-SST cell, we can show that an SST cell with

time-frame Tk can be transmitted within Tk time interval

once it becomes eligible.

Lemma 1. Given an SST connection k with time-frame Tk, let W;’ be the delay time for its jth cell to be transmitted in node i once it becomes eligible, then 1 I W: I Tk.

Proof. Since the TC transmits eligible cells only, thus

according to the traffic regulation, each SST connection

will have at most one cell ready within each associated

time-frame interval. An SST connection with a smaller

time-frame has higher priority than that with a larger

time-frame, cell transmissions of these connections with

a time-frame no greater than Tk will not be affected by

those with a time-frame larger than Tk. According to our

call admission strategy and priority scheduling, the incom-

ing cell with time-frame T, eligible at time t can always be transmitted within [t + 1,t + Tk]. This assertion is also true

for an arbitrarily chosen time-frame. QED.

Given a connection i with time-frame Ti, we use the

counter C,,(i) to track the cell-eligibility. Once a cell of

connection i becomes eligible, C,,(i) is set to T;, which

then counts down to zero in Ti cell-slot time. When a cell arrives, it checks whether C,,(i) is equal to 0 or not. If yes,

(5)

Y.C. Chen et al./Computer Communications 21 (1998) 445-459 449

the arriving cell will become eligible immediately, other- wise it has to wait. Through such a mechanism, the TC can regulate each cell stream to be an SST pattern. The algo- rithm for the TC is stated as follows:

Algorithm for CBR transmission controller: Declaration:

n: the total number of connections

C,,(i): the traffic regulation counter of the ith connection (1 5 i I n)

N: the number of priority levels

T(i): the timeframe of ith connection (1 SiSn,T(i)E {T,,T2;**,T,})

L(i): the ith FIFO queue status. It is 0 if the queue is empty, and 1 otherwise

Initialization:

C,,(i) = 0; i = 1 *aen /* for accepted connections with time-frame Tj */ Begin for (i = 1 to n) do if C,,(i) > 0 C,,(i) = C,,(i) - 1; endif

if (L(i) # 0) and (C,,(i) = 0) then

insert the HOL cell of ith FIFO to the PSS for priority transmission service;

C,,(i) = z-(i) endif

endfor End

Assuming that a connection k with time-frame Tk

routes through H hops, let r1 represent the fixed-time overhead including the cell processing time in the Ith switching node and the propagation delay in the outgoing link, where 1 = l...H, and r. be the propagation delay of the source access link. It is obvious that the end-to-end delay of jth cell for connection k is L$ = rk + QD;,

where .Tk = zr_ ari is the total propagation delay between two end systems plus the total processing time in the intermediate nodes; Q$ = XI”= 1 (I$ where Qi is the total queuing delay of the jth cell in the ith switching node. a includes 4, the queuing delay (excluding the fixed processing time) of jth cell waiting for eligibility after it finishes the necessary processing in the ith node, and W{, the delay time for the jth cell to be transmitted once it becomes eligible at node i. Then we have the follow- ing lemma.

Lemma 2. For any SST connection k with time-frame Tt,

the queuing delay for eligibility, 4, of the jth cell in the ith node is bounded by [O,Tk - 11.

Proof. Let 4 be the queuing delay of the jth cell waiting for eligibility and Wi be the delay time for the jth cell to be transmitted once it becomes eligible at node i, in other words, 4 = & - W/.

As illustrated in Fig. 3, the difference between the depar- ture time of the (j - 1)th cell and thejth cell in the (i - 1)th nodeisTk-IV-’ r_, + W;_,, thus

d=T,-(T,-Wj_:+Wlj_,-d-‘)

= w{J - w;_i +d-‘. (3)

Needless to say, 4 must be no less than zero; thus, if Eq. (3) is no greater than zero then di = 0, which means that the

U - 1h Node

(j-Ile (i-h +h . Ilk

I*- 9!., * irk Node j-1,. “1 : - i”’ lyy - W,!, ; 4- w,’ -+ : TZ + Q! *:

1 : Cellarrival 1 : Cell becomes eligible + , : cell departure

(6)

450 Y.C. Chen et al./Computer Communications 21 (1998) 445-459

arriving cell is eligible immediately; otherwise

4 = d- ’ + W{_: - W:_ , , hence the following equation

QL$ = xy=, a and @ is the total delay of the jth cell in the ith node.

w;:; -w{_, +q/-’ >o

, where qf =O, i= l...H, j= 1,2, .*a. (4)

otherwise

must hold for any cell j of connection k in the ith node. It is evident that 4 should have a positive value from Eq. (3). To derive the upper bound of d, we expand Eq. (4) as follows

4 =qj-‘+W/~; -w;_,

- Wi-t+Wj-1-W’

1-l t-l i-l’

(3 Since C,,(i) is preset to 0, when the first cell of a connection arrives, it becomes eligible immediately, i.e.,q! = 0, where i = 1 . ..H. Therefore, the maximum value of 4 can be derived as follows:

where i 2 2. (6)

Since the traffic from the source is in SST pattern, thus 4 will have the same property as 4 for i 2 2. From Lemma 1, it is clear that d is bounded by [O,Tk - 11. QED.

Theorems regarding the traffic property under the SDJC strategy are given as follows:

Theorem 1. For any SST connection k with time-frame T,, the maximum delay, a of the jth cell in the ith node is bounded by [1,2Tk - 11.

Proof. Since & consists of two parts, the queuing delay waiting for eligibility and the delay to complete the trans-

mission, from Lemma 1 and Lemma 2, the following

inequality

O<ej=W;+q+2Tk-1 (7)

must hold for any cell of connection k. Clearly, the queuing delay @ of thejth cell in the ith node is bounded by [ 1 ,2Tk - 11. This completes the proof. QED.

If the jth cell becomes eligible immediately after its arri- val at the ith node (i.e. d = 0), the total queuing delay of the jth cell will be no greater than Tk. Otherwise (i.e. 4 # 0), the total queuing delay of the jth cell may be larger than Tk in the ith node. It is obvious that the end-to-end delay of thejth

cell of a given connection k is 0; = .Tk + QDf, where

Theorem 2. For any SST connection k with time-frame Tk, which routes through H hops, the end-to-end delay 0; = 7k + QDj” is bounded by [.7k + H, .Tk + HTk + Tk - I],

where QD;Zf!=, a.

Proof. The delay time, QD~~~f, & of the jth cell can be substituted by

QD;= &q{+W;)=q;+W;+q;+W;+...+q:, i=l

If the CBR source traffic is regulated as a constant traffic pattern (i.e. fixed interarrival), the values of q! and 4 ,will be equal to 0. From Lemma 1 and Lemma 2, W: and 4 are

bounded by [l,Tk] and [O,Tk - 11, respectively, thus Eq. (8)

becomes H-l QD;=d;+ 1 Wi’ +W+HTk ( 1 (9) i= 1

It should be pointed out that if a source traffic is not regu- lated as a constant traffic pattern, the time intervals between

any two data cells in consecutive time-frames may be not

identical (i.e. 0 5 di 5 Tk - l), thus

HsQD;‘(Tk-l)+HTk. (10)

As a sequel, the maximum end-to-end delay of the jth cell

for connection k is bounded by

#+H&+QD;&+(Tk-l)+HTk. This completes the proof. QED.

(11)

From Theorem 2, we can find out that the delay-jitter of SDJC is (H + l)(Tk - 1). In order to achieve a better delay-

jitter performance, we improve SDJC to the adaptive delay-

jitter control described as follows.

3.2. Adaptive delay-jitter control (ADJC) strategy

As stated in the previous subsection, once an incoming

SST cell with time-frame Ti becomes eligible at time t, it

can be transmitted within the eligible time interval [t + 1,t + Ti]. To achieve our adaptive delay-jitter control, we intro- duce a specific time interval T,(l 5 T, I Ti) which is used

(7)

Y.C. Chen et al./Computer Communications 21 (1998) 445-459 451

Deparhmfmmingintbc

upmwm node via link I’

Arrival fiatning in the yr,-*:r,+

: I-r--

_____

curtent node via link I’ I f I I

I +Gi4-

Dcpamuefmminginlbc I

cuttent ncdc via link I

Depattutc framing in the upsucam node via link I’

Attival fmming in the

7 q + r, + I-” --- CuffeOt node via link I’ : I *l I I

I ;*-rr+

Deplrturr mng in the ’

current no& via link 1

I

I f

Cdlbecomes eligible (b) $ >T,

Fig. 4. Illustration of the adaptive delay-jitter control.

to determine when an incoming cell should become eligible in the current node. Assume that the current node i has an

outgoing link 1, and an incoming link I’ connecting to the

upstream node i - 1. If an incoming cell j is served at time t’ + T, (i.e. TP = W{_ ,) in the upstream node after it became eligible at time t’, where Tp I T,, then it will be delayed for a duration T, - Tg, before it becomes eligible in the current node, as shown in Fig. 4(a). Otherwise, if To > T, due to the

transmission contention in the upstream node, the incoming

cell will become eligible immediately, as illustrated in

Fig. 4(b).

The question is, how can an intermediate node know

the time interval T, which is used to determine the delay

(i.e. T, - To) for an incoming cell to be eligible? To resolve

this problem, we investigated the behavior of any two con-

secutive SST cells under ADJC. Assume that two consecu- tive SST cells A and B arriving via link 1’ and heading for link 1 were served in the upstream node at times t’ + Tpl and t’ + Ti + To2 after they became eligible at times t’ and t’ + Ti respectively. In the first case, TB,, To2 5 T,, the incom- ing cell A with time-frame Ti will be delayed a time duration T, - To, (i.e. tl - to) before it becomes eligible at time lI in the current node, then the cell A can be transmitted within the time interval [t, + l,t, + Ti] and the following cell B will become eligible as soon as this time interval is over.

The waiting time for eligibility of cell B in the current

node is T, - To2 (i.e. t3 - tz), as shown in Fig. 5(a). The second case is T,, 5 T, and Tb2 > T,. Owing to the trans-

mission contention in the upstream node, cell B’s arrival

time, t4, is later than the ending time of cell A’s eligible

region (i.e. t3 or (tr + Ti)), thus it becomes eligible

immediately, as shown in Fig. 5(b). Similarly, the other

two cases are To, > T,, To2 5 T, and ToI, Tp > T, as

illustrated in Fig. 5(c) and Fig. 5(d), respectively. It can

be found that no matter how early or how late cell B arrives, it will not be eligible until the eligible time interval of cell A is over.

Since an arriving cell immediately becomes eligible only

when the eligible time interval of the preceding cell is over,

the feasibility consideration of ADJC is regarding the com-

plexity imposed on each intermediate node to set the time

framing of the first data cell for each SST connection. To

alleviate the extra loading of intermediate nodes, a leading RM cell can be used to indicate the start of an SST cell stream, and a reserved field can be used to carry the queuing delay information T, of the RM cell itself in the upstream node. Before a CBR traffic source starts the cell trans- mission, it needs to send an RM cell first. When the leading RM cell is received by an intermediate node, the cell trans-

mission delay information Tp of an SST stream in each

intermediate node can be carried to the next downstream

node. Since the parameter T, can be set during the connec- tion setup, the queuing delay for an RM cell waiting for eligibility after it arrives at the current node is equal to [T, - Ta]*. Then, the following data cells only need to obey a simple rule to achieve the adaptive delay-jitter con- trol, that is, an arriving cell immediately becomes eligible as

soon as the eligible time interval of the preceding cell is

over. As a consequence, our service scheduling method

removes the extra waiting time through node synchroniza- tion, and it supports an arbitrary time frame. In the rest of

(8)

452 Y.C. Chen et al./Computer Communications 21 (1998) 445-459

Depamue framing in the

;c

r+i

upmaol node via link I’ Arrival fmning in the CuTcot node via link I’

Depamm framing in tbe

cunult no& via link I

Deparhm framing in the +s- & upstream no& via link 1’

Arrival framing in the current no& via link I’

I 14

Depamm framing in the cuffcot node via link I

I 4 ‘I

I Tim?

(b) Ts, I T, and Tsz > T,

Depamue framing in the

upstream ode via liok I’ Arrival framiog in the cumot ode via link I’ Departwe hniog in the cunu3toodcvialiokI

(c) Ts, > T, and Ta2 < T,

t

Depamuehmiogiothe + & upstream node via Iink 1’

Arrival framing in the current ncde via link I’ Depammffamingiofbc

cumotoodevialiokf

I 1

Fig. 5. Illustration of the relationship between two consecutive cells under ADJC.

adaptive delay-jitter control. Assuming an SST connection k As shown in Fig. 6, the total end-to-end delay of the jth cell with time frame Tk routes through H hops, we can define the

time interval q’{ as follows:

for a given connection k with fixed cell interarrival time is represented as follows:

qlj =

{

0 if Ts 5 T,

To-T, otherwise ’ where i= l...H, j= 1,2, .--, (12)

+g+QD;=$+ f(Ta+qr;)+d,=$+(H-1)T,

i=2

where Ts is the time interval of jth cell to finish the trans- mission once it becomes eligible at the (i - 1)th node. Clearly, q’{ is bounded by

Osq’{‘Tk-T, (13)

H

+ &(q':)+d, 5 #+HTk, (14)

where dj is the time interval for the jth cell to finish transmission after it becomes eligible at the Hth node (i.e. dj = I+$,, 1 5 dj 5 Tk). Since q’{ is bounded by

(9)

Y.C. Chen et al./Computer Communications 21 (1998) 445-459 453 DepMutcftamingotl : theoutgoittglinkoftheI’kop Arrival framing on 0 tkinmmingliikoftke2”‘kop I I Dcpuwrc framiig 0” the outgoing link of the 2’ hop

i--e- e---e

I I I

Anivd framing on : iy-71-+ : *a; i the Lneominglink of the 3’ hop a )_A_’ -____ I

‘ I

Depucurrfnminson :

+T +: r l +q’; F the outgoing link of tke 3’ hop :

Arrival fmmiig 0” I theincominglinkofthe4~hop : -+i r, +qy ic : . : : Arrival framing on ,---- the outgoing link of the Hth hop :

m--m_

I 8 I

:* D:-rwm.+&:’ + d, ;+ Gt

Fig. 6. Cell delays incurred during the transmission process in ATh4 networks.

[O,Tk - T,], then the end-to-end delay is bounded by

rk+(H-l)7-,+l +%.k+HTk. (15)

It should also be pointed out that if a source traffic is not regulated as a fixed interarrival traffic pattern (i.e. 0 5 4 5 Tk - l), then

(lo) Clearly, the end-to-end delay of thejth cell for connection k

is bounded by

&(T,-l)+(&l)T,+l 5D+rki-(T,-l)+HTk.

(17) From the above discussion, it is apparent that we can adap- tively control the delay-jitter. For example, let us set the time interval T, to Tk , then the end-to-end delay of a given cell of the connection k is bounded by

[rk+HTk, #+((H+l)Tk-l].IfwesetT,tol,theresults

will be the same as that in the SDJC strategy. Obviously, in ADJC the end-to-end delay-jitter can be adaptively con- trolled. In addition, the end-to-end delay (excluding total propagation delay) of a connection is reduced from 2HTk

in S&G to (H + l)Tk in our ADJC strategy. Compared to S&G, there is a significant improvement in the end-to-end queuing delay for an arbitrary time frame size. More impor- tantly, we can use the delay parameter T, to adaptively reduce the delay-jitter down to Tk - 1 and to precisely meet the services’ requirements.

For further analysis of the smoothness property, we now investigate the relationship between the incoming cells. Given a source traffic with time frame size Ti, owing to the transmission contention among different connections, the cell transmission may be delayed, which may cause the time interval between two consecutive cells of the same connection smaller than T;. Moreover, it is possible that two consecutive .SST cells are interclustered back to back. According to the TC algorithm, it maintains the traffic smoothness for each connection based on per-VC queuing. Cells of an SST connection with time frame Ti always keep the SST pattern throughout the network. Given Num SST connections in a switching node, for the Ith connection (1 5 1 I Mm), it is possible that the FIFO occupancy, L(I), will be greater than 1 under the proposed service discipline. For an SST cell stream, the kth incoming cell should com- plete the transmission before the (k + 2)th cell arrives, thus two-cell buffer space is sufficient for each connection to prevent FIFO buffer from overflow; in other words, using our proposed method, SST streams only need a total buffer space of 2 X Num cells in the output ports to avoid buffer overflow.

The proposed strategy can support a bounded queuing delay and prevent network congestion for CBR traffic mainly because the strict transmission control always keeps the traffic pattern as SST throughout the ATM network. Since non-delay-sensitive traffic can tolerate longer delay comparing with delay-sensitive traffic, the utilization problem can be compensated by accounting for

(10)

454 Y.C. Chen et al./Computer Communications 21 (1998) 445-459 non-delay-sensitive traffic, such as ABR and UBR services,

in the integrated service environment. If there is no eligible CBR cell to transmit, the idle time can be used to service non-delay-sensitive traffic or other types of traffic. Such integrated service policies can offer higher bandwidth utili- zation. In the remainder of this section, we examine the realization of a possible approach for our proposed traffic control.

3.3. Realization of the proposed trafJic control method

We have shown that our proposed CBR transmission con- trol configuration has three components, a cell dispatcher, a rate controller and a priority service scheduler. At first, arriving cells are classified and written into the cell pool. Prior to this process, the associated traffic property (i.e. time frame size, TFS) is extracted by the CD and stored with its physical address (PA) into the associated queue at the RC. The RC consists of a set of regulators, each corresponding to a connection. A regulator has two functions: setting the eligibility of those HOL cells for all non-empty queues and holding a cell until it becomes eligible. The regulator can be realized by a synchronous countdown counter with parallel load, as shown in Fig. 7. This realization approach is inflexible since the number of regulators is directly propor- tional to the number of active CBR connections. We can conceptually decompose the RC into a set of regulators, and as each is associated with a connection, we have no need of multiple physical regulators in the implementation; a com- mon mechanism employees a modified version of the calen- dar queue, which is shared by all logical regulators [19,22,21]. The PSS consists of several modules in which the TFS and PA are stored. Once the HOL cell of a queue becomes eligible, the pair (TFS, PA) of the cell will be stored into the PSS. As stated in the previous subsection, to meet the delay requirements for each service class, the transmission priority is set to prefer the smallest TFS. When cells are served by the PSS, the server compares the TFSs of those eligible cells and selects the smallest TFS for trans- mission since the cell with the smallest TFS value is the most urgent. The major complexity of the PSS is to select the smallest time-frame-size among all eligible cells. Using

Binary Count-Down Counter - t Clock

Fig. 7. A realization of the regulator.

I-

r‘ig. 8. Implementation architecture of the proposed traffic controller.

hardware, implementation is preferable for high speed ATM, e.g. 2.78 ~LS cell transmission time at 155.52 Mbps. We can use the available VLSI Sequencer chips [ 13,14,23] to implement the PSS module. Through this hardware realization, the proposed strategies are able to accommodate the CBR cell streams. The implementation architecture of the proposed traffic controller is illustrated in Fig. 8.

4. System simulation and performance evaluation

4.1. System simulation model

For CBR services, a traffic source can be characterized by simple parameters. In our simulation, a simple ATM subnet consists of four switching nodes and nine end-systems, which function as input sources, as shown in Fig. 9. Let these nine connections be established as follows. Sources

A, B, and C connect to switch 1 and then through switch 2 to

switch 4. Sources D and E connect to switch 2 and through the subnet to switch 4. Sources F and G connect to switch 3 and through the subnet to switch 4. Sources H and I route through node 4 to their destinations. All sources pass through the same output link of node 4 which has the heaviest load. There are frames T = 4, 4, 8, 16, 32, 64, 128, 128, 128 (cell slot time) for sources A, B, C, D, E, F,

G, H and I respectively. The switch output port buffer is

organized as parallel FIFOs which share the output link’s bandwidth via a priority scheduling. The major performance measure was the queuing delay. The transmission service of each output link can be modeled as a single server with multiple queues. We assume that every link has a transmis- sion rate of 155.52 Mbps. For the sake of simplicity in

(11)

Y.C. Chen ef al./Compurer Communications 21 (1998) 445-459

C E G I

Fig. 9. System model for queuing delay analysis.

455

solmxs l-14 Soureer IS-28 sourus 29-42 Sources 43-56

,

IO DL?sithoos to D88dnuions to Jhiaatioas

1-14 IS-28 29-42

Fig. 10. System model for delay-jitter analysis.

simulating the S&G scheme, we assume that the mismatch phase, 0, of both the arrival frame and the departure frame is Ti/2 in a switching node.

The other model consists of four nodes and 57 sources as shown in Fig. 10. Let these 57 sources be established as follows. Source 0 connects to node 1 and then through node 2 to node 4. Sources i (i # 0) connect to the ([i/l4])th node and then through the ([i/141+ 1)th node to its destination. These nodes were connected through links with 155.52 Mbps capacity. Each source has a time frame

measure considered here is the end-to-end queuing delay of source 0 in the worst case, because source 0 has the lowest priority in service contention.

As discussed earlier, the average queuing delay under work-conserving disciplines is smaller than that under non-working disciplines. However, the delay distribution of work-conserving disciplines, such as PGPS and FIFO, has much wider range, as shown in Fig. 11. In the PGPS strategy, source A is allocated with a larger guaranteed bandwidth (i.e. l/TA = l/2) so that its cells have greater Tj = 15 cell slot time, i = 0,l; . .,56. The major performance opportunity for transmission. As

1

16500 < % 14500 12500 ‘;f LOS00 j 85&l C 6SOO g 4500 g 2500 500 * 4scI i! am = 350 .g 300 gi 2 1sa 8 loo 3% 0

a result, the number of

Traffic intensity =0.886, q = 2 ..,,..,I 4 8 8 8 8 8 8 8 and the on/off period is 60/40 cell slot time. Fig. 11. End-to-end cell delay distribution of source A by using FIFO queuing and PGPS strategies.

(12)

456

90

Y.C. Chen et al./Computer Communications 21 (1998) 445-459

80 70

Fig. 12. Average delay of VCs with different frame sizes by SDJC at switch node 4.

cells to be sent immediately after cells arrive at a switching Consequently, the SDJC strategy provides priority services node is larger than that in FIFO queuing. as well as a bounded delay.

4.2. Simulation results

In the followmg simulation results, the end-to-end delay excludes the fixed propagation delay.

4.2.1. Comparison of end-to-end delay and delay-jitter of SDJC strategy and S&G

Average delay versus traftic intensity. The traffic intensi- ties vary from 0.1 to 0.95 at switch node 4. From the simu- lation results shown in Fig. 12, the average delay time of different time-frame sizes increases as the traffic intensity increases. We also found that the maximum cell delay, Qi, for a given connection never exceeds its upper bound (i.e. 1 5 Qk 5 2Tk - 1) even at a high traffic intensity (0.95).

Average end-to-end delay versus trafJic intensity. The traffic intensities vary from 0.1 to 0.9. From the simulation results shown in Fig. 13, the SDJC gives a better average end-to-end delay than S&G. The major reason is that an incoming cell of connection i will become eligible immedi- ately if C,,(i) = 0. It removes the extra synchronization delay and leads to a smaller queuing delay.

End-to-end cell delay distribution. In order to evaluate the end-to-end delay under heavy load, the total traffic intensity is increased to nearly 1.0 in each node. In S&G strategy, the end-to-end cell queuing delay is given as

D,=HT+~~=,Oi_l,i+d,, where -T<d,<T and

H = 4. Since source 0 (To = 15) passed through four nodes, every mismatch is equal to T0/2, thus the total end- to-end delay is within the interval of [75, 1041 cell slots and

_ ml - (‘___.._~_._---’ ~_...I % l .._....,.“‘-’ _*_....- i8 )_‘_..’ 5 , . . . . ._______*...-.‘- s ao- i?

Ei

I3

zl60-

6

#43-

%

2

20- 01 I 0.1 0.18 0.26 0.34 0.42 0.5 0.58 0.66 0.74 0.82 0.9 Traffic lotensity

(13)

Y.C. Chen et al./Computer Communications 21 (1998) 445-459 451

Fig. 14. End-to-end queuing delay distribution of source 0 under both SDJC and S&G strategies.

the delay-jitter is bounded by 2To. In SDJC strategy, the end-to-end delay is bounded by [4, 741 cell slots and the delay-jitter is bounded by (H + l)(Ts - l), as illustrated in Fig. 14. The simulation results demonstrate that the SDJC strategy provides a guaranteed service for the CBR traffic. Although SDJC has higher delay-jitter than S&G, its end-to- end delay is much lower. From the viewpoint of an end- system, SDJC can provide a better end-to-end performance with lower implementation complexity.

4.2.2. Comparison in end-to-end delay and delay-jitter of ADJC strategy and S&G

As illustrated in Fig. 15, the results of ADJC with differ- ent control parameter values (T,) show that the ADJC strat- egy provides a bounded end-to-end delay and supports adaptive delay-jitter control for SST connections. Since source 0 (To = 15) passed through four nodes, if the delay

control parameter T, is set to 1, 5, 10, and 15, then the total end-to-end delay is within the interval of [4, 741, [20, 741, [40,74], and [60,74] respectively. By using ADJC strategy, we can flexibly control the delay-jitter for various CBR services in ATM networks.

4.3. Numerical analysis

Assume a source traffic is regulated as an SST pattern with time-frame T and there are H hops in the routing path, the S&G framing strategy guarantees bounded end-to-end

delay, delay-jitter and cell-loss-free transmission for each connection. However, S&G may lead to extra synchroniza- tion delay. In S&G, the maximum end-to-end queuing delay is bounded by 2HT + T and the delay-jitter is bounded by 2T. While the RCSP/DJ provides a nearly optimal delay- jitter control, the delay-jitter is bounded by T. However, it

(14)

458 Table 1

Y.C. Chen et al./Computer Communications 21 (1998) 445-459

Comparison among different traffic control strategies

Advantages Disadvantages

S&G strategy

RCSP/DJ TCRM ADJC strategy

Bounded queuing delay [ZHT - T, 2HT + TJ. Bounded Large total end-to-end delay. Extra synchronization delay is

delay jitter [0, 2T]. introduced. Assigned frame size is inflexible.

Bounded queuing delay [0, HT]. Bounded delay-jitter [0, r]. Very difficult to realize. Bounded queuing delay [0, HTJ Bounded delay-jitter [0, HT]. Larger delay-jitter.

Adaptive bounded queuing delay. Flexible delay-jitter control. Introducing control parameter T,. Overhead of the RM cell. Maximum delay-jitter [0, HT]. Minimal delay-jitter [0, T].

needs to pass the delay information (cell eligible time) from

node to node and to synchronize the clock time of all

intermediate nodes precisely, which is very difficult in a

wide-area ATM network. The TCRM provides a guaranteed end-to-end queuing delay HT for real-time traffic, although it provides a lower average queuing delay HT than S&G, but the delay-jitter HT is worse than that in S&G. In the ADJC

strategy, the maximum end-to-end queuing delay is

bounded by HT and we can adaptively control the delay-

jitter down to T. Our proposed strategy removes the extra

synchronization delay and allows arbitrary time-frame

sizes. The advantages and disadvantages between other

schemes and our proposed method are listed in Table 1.

[2] D. Hong, T. Suda, Congestion control and prevention in ATM net- work, IEEE Network Magazine July ( 199 1) IO- 16.

[3] J.J. Bae, T. Suds, Survey of traffic control schemes and protocols in ATM network, Proceedings of IEEE 79 (2) ( 199 1) 170- 189. [4] H. Kroner, G. Hebuteme, P. Boyer, A. Gravey, Priority management

in ATM switching nodes, IEEE Journal on Selected Areas in Com- munications 9 (3) (1991) 418-427.

[5] D.W. Peter and V.S. Frost, Nested threshold cell discarding for ATM overload control: optimization under cell loss constraints, IEEE INFOCOM ‘91, pp. 1403-1412.

[6] J. Turner, Managing bandwidth in ATM networks with bursty traffic, IEEE Network September (1992) 50-58.

[7] J. Turner, B-ISDN/ATM traffic and congestion control, IEEE Net- work Magazine September (1992) 28-37.

[S] A. Demers, S. Keshav, S. Shenker, Analysis and simulation of a fair queueing algorithm, J. Intemetworking Research and Experience October (1990) 3-26.

5. Conclusion

In ATM networks where flow control and error control are end-to-end, the networks may be vulnerable to overload/

congestion that severely degrades their performance. It has

been suggested that congestion problems can be solved by

reactive control as well as preventive control strategies. The

combination of access control and transmission control

provides a more effective control method. Therefore, we

propose a simple rate control technique and a feasible

implementation method to guarantee the performance of

delay-sensitive traffic in broadband networks. In our

proposed strategy, the traffic pattern of each connection

can be maintained as close to the smoothed source traffic

(i.e. SST) as possible throughout the network. The major

advantages of the ADJC strategy is the improvement of the

end-to-end delay by removing the extra synchronization

delay, and the flexibility to control the delay-jitter. Although the ADJC strategy needs an RM cell to carry the delay

information To of the upstream node, the overhead can be

neglected for a CBR connection. The ADJC strategy can be

implemented in most switching architectures. By using the

ADJC strategy, a bounded end-to-end delay and a flexible

delay-jitter can be well controlled.

[9] A. Parekh, R. Gallager, A generalized processor sharing approach to flow control in integrated services networks: the single-node case, IEEE Transactions on Networking 1 (3) (1993) 344-357.

[IO] L. Zhang, Virtual clock: a new traffic control algorithm for packet switching networks, Proc. ACM SIGCOMM ‘90, Philadelphia, PA, September 1990, pp. 19-29.

[ Ill H. Zhang, Service disciplines for guaranteed performance service in packet-switching networks, Proceedings of the IEEE 83 (10) (1995)

1374-1396.

[ 121 H. Zhang, Providing end-to-end performance guarantees using non- work-conserving disciplines, Computer Communications 18 (10) (1995) 769-781.

[ 131 H.J. Chao, N. Uzun, An ATM queue management handling multiple delay and loss priority, IEEE/ACM Transactions on Networking 3 (6) (1995) 652-659.

[ 141 H.J. Chao, N. Uzun, A VLSI sequencer chip for ATM traffic shaper and queue management, IEEE J. Solid-State Circuits 27 (11) (1992) 1634-1643.

[I51 S. Golestani, A framing strategy for congestion management, IEEE Journal on Selected Areas in Communications 9 (7) (1991) 1064- 1077.

1161 S. Golestani, Congestion-free for communication in high speed packet network, IEEE Transactions on Communications 39 (12) (1991) 1802-1812.

References

[ 171 L. Trajkovic, S. Golestani, Congestion control for multimedia ser- vices, IEEE Network Magazine September (1992) 20-26.

[ 181 C. Kalmanek, H. Kanakia and S. Keshav, Rate controlled services for very high-speed networks, IEEE Global Telcommun. Conf., San Diego, CA, December 1990, pp. 300.3.1-300.3.9.

[I91 H. Zhang and D. Ferrari, Rate-controlled static priority queueing, IEEE INFGCOM ‘93, San Francisco, CA, April 1993, pp. 227-236. [20] H. Zhang, Providing end-to-end performance guarantees using non-

work-conserving disciplines, Computer Communications 18 (IO) (1995) 7699781.

[I] J. Golestani, Multimedia traffic management principles for guaranteed [21] S.-K. Kweon and K.G. Shin, Traffic-controlled rate-monotonic ATM network performance, IEEE Journal on Selected Areas in Com- priority scheduling of ATM cells, IEEE INFGCOM ‘96, pp. 655-

(15)

Y.C. Chen et al./Computer Communications 21 (1998) 445-459 459 [22] R. Brown, Calendar queue: a fast O(1) priority queue implementation flow control in integrated services networks: the multiple node case,

for the simulation event set problem, Communications of the ACM 3 1 IEEE Transactions on Networking 2 (2) (1994) 137- 150.

(10) (1988) 1220-1227. [25] S. Golestani, A self-clocked fair queueing scheme for broadband [23] M.W. Garrett, A service architecture for ATM: from applications to applications, IEEE INFOCOM ‘94, Toronto, CA, June 1994,

scheduling, IEEE Network May/June (1996) 6- 14. pp. 636-646. [24] A. Parekh, R. Gallager, A generalized processor sharing approach to

數據

Fig.  2 shows the  CBR  transmission  control  configuration  of our traffic  control  architecture
Fig.  2.  Proposed  CBR  transmission  control  in  an  ATM  switching  node.
Fig.  3.  Timing  diagram  of  the  cell  queuing  delay  in  a  switching  node.
Fig.  4.  Illustration  of  the  adaptive  delay-jitter  control.
+7

參考文獻

相關文件

Textbook Chapter 33.4 – Finding the closest pair of points.. Closest Pair of

✓ Combining an optimal solution to the subproblem via greedy can arrive an optimal solution to the original problem. Prove that there is always an optimal solution to the

✓ Combining an optimal solution to the subproblem via greedy can arrive an optimal solution to the original problem.. Prove that there is always an optimal solution to the

Textbook Chapter 4.3 – The substitution method for solving recurrences Textbook Chapter 4.4 – The recursion-tree method for solving recurrences Textbook Chapter 4.5 – The master

Calculate the amortized cost of each operation based on the potential function 4. Calculate total amortized cost based on

jobs

A floating point number in double precision IEEE standard format uses two words (64 bits) to store the number as shown in the following figure.. 1 sign

A floating point number in double precision IEEE standard format uses two words (64 bits) to store the number as shown in the following figure.. 1 sign